This document describes a USB driver embedded controller that was developed using embedded C. It functions as a USB host to allow data transfer from an application system to a USB storage device like a pen drive. The controller uses a PIC microcontroller with a USB interface and can store data input through a keypad in its memory. When a USB storage device is connected, it transfers the stored data files to the device. This embedded controller provides advantages over traditional data logging systems as it is portable, low cost, and does not require a computer to be mounted near the application system. The document discusses the implementation of the controller and the development of the USB device driver in more detail.
A switch is a networking device that filters and forwards packets between ports. Unmanaged switches allow devices to connect without configuration, while managed switches can be customized through settings like VLANs and bandwidth allocation. Switches are more advanced than hubs as they can direct traffic to specific ports, improving network efficiency compared to hubs which broadcast all traffic to all ports. Common switch types include unmanaged switches for home networks, smart switches with basic web interfaces, and fully managed enterprise switches for large networks.
This document provides an overview of the Universal Serial Bus (USB) standard. It discusses the history and development of USB from versions 1.0 to 3.1. Key points include that USB was designed in the 1990s to standardize connections between computers and devices, it has become common on many electronic devices, and newer versions have increased speed up to 10 Gbps for USB 3.1. The document also covers USB technical details like connectors, data transfer speeds, the device enumeration process, and the asymmetric star topology used.
Informatics practices project by sagar mandloisagar mandloi
This document defines and provides examples of various computer input and output devices. It discusses keyboards, mice, scanners, cameras, and joysticks as common input devices used to provide data to computers. Output devices mentioned include monitors for displaying images, printers for printing text and images, speakers for sound reproduction, and various types of ports and memory cards for transferring data out of computers.
Primary storage refers to the internal memory of a computer, including RAM and ROM. RAM (random-access memory) allows for reading and writing of data during processing but is volatile and loses data when power is turned off. ROM (read-only memory) holds programs and data non-volatily but only allows for reading. Primary storage is directly accessible by the CPU and stores instructions and data currently being processed. Larger and more complex programs/functions are placed in primary storage.
This document provides an overview of USB, including its history and key versions. USB (Universal Serial Bus) allows connection of peripherals to computers. It has evolved from USB 1.0 with 1.5Mbps speeds to USB 2.0 at 480Mbps to the latest USB 3.0 offering data transfer rates up to 4.8Gbps. USB 3.0 features a single connector type, hot swapping, plug and play functionality, and high performance speeds. It supports connection of storage drives and other peripherals.
Device to-device communication (pen drive) without pcIJARIIT
In present days, computers and laptops have become an inseparable part of our busy lives. One of the commonly
used devices for data transfers is Universal Serial Bus (USB) flash drives. Due to emerging technology, USB devices are
shrinking in size day by day, but not the equipment’s which is required to access them. Data transfer using portable devices is
the most important factor in today's scenario. Data transfer between two pen drives is generally done using laptops or desktops.
But it is not always possible to carry such a large size device to the particular location. So, to overcome this problem, we are
designing a hardware which is more compact to carry anywhere. With the help of this project we cannot only transfer the data
between devices but also, we can see the transfer of the particular file which we want to send by using LCD display. This
system pen drive to pen drive data transfer without PC is done by using Raspberry Pi. The pen drives are connected to USB
module through USB hub, the communication between two pen drives is done by using Raspberry Pi. Using this System, the
data transfer can be done from any place in the world.
This document provides information about extranets and communication devices and their hardware requirements. It discusses:
1) What an extranet is, how it originated in the late 1990s/early 2000s, and how it allows authorized parties like customers and affiliates external access to a company's website.
2) Examples of communication devices like network interface cards, wireless network cards, modems, hubs/switches, routers, and wireless access points that enable computers to communicate over a network.
3) Requirements for communication devices including different types of network cards, modems, how hubs/switches and routers function, and that wireless access points use antennas to transfer information wirelessly.
A switch is a networking device that filters and forwards packets between ports. Unmanaged switches allow devices to connect without configuration, while managed switches can be customized through settings like VLANs and bandwidth allocation. Switches are more advanced than hubs as they can direct traffic to specific ports, improving network efficiency compared to hubs which broadcast all traffic to all ports. Common switch types include unmanaged switches for home networks, smart switches with basic web interfaces, and fully managed enterprise switches for large networks.
This document provides an overview of the Universal Serial Bus (USB) standard. It discusses the history and development of USB from versions 1.0 to 3.1. Key points include that USB was designed in the 1990s to standardize connections between computers and devices, it has become common on many electronic devices, and newer versions have increased speed up to 10 Gbps for USB 3.1. The document also covers USB technical details like connectors, data transfer speeds, the device enumeration process, and the asymmetric star topology used.
Informatics practices project by sagar mandloisagar mandloi
This document defines and provides examples of various computer input and output devices. It discusses keyboards, mice, scanners, cameras, and joysticks as common input devices used to provide data to computers. Output devices mentioned include monitors for displaying images, printers for printing text and images, speakers for sound reproduction, and various types of ports and memory cards for transferring data out of computers.
Primary storage refers to the internal memory of a computer, including RAM and ROM. RAM (random-access memory) allows for reading and writing of data during processing but is volatile and loses data when power is turned off. ROM (read-only memory) holds programs and data non-volatily but only allows for reading. Primary storage is directly accessible by the CPU and stores instructions and data currently being processed. Larger and more complex programs/functions are placed in primary storage.
This document provides an overview of USB, including its history and key versions. USB (Universal Serial Bus) allows connection of peripherals to computers. It has evolved from USB 1.0 with 1.5Mbps speeds to USB 2.0 at 480Mbps to the latest USB 3.0 offering data transfer rates up to 4.8Gbps. USB 3.0 features a single connector type, hot swapping, plug and play functionality, and high performance speeds. It supports connection of storage drives and other peripherals.
Device to-device communication (pen drive) without pcIJARIIT
In present days, computers and laptops have become an inseparable part of our busy lives. One of the commonly
used devices for data transfers is Universal Serial Bus (USB) flash drives. Due to emerging technology, USB devices are
shrinking in size day by day, but not the equipment’s which is required to access them. Data transfer using portable devices is
the most important factor in today's scenario. Data transfer between two pen drives is generally done using laptops or desktops.
But it is not always possible to carry such a large size device to the particular location. So, to overcome this problem, we are
designing a hardware which is more compact to carry anywhere. With the help of this project we cannot only transfer the data
between devices but also, we can see the transfer of the particular file which we want to send by using LCD display. This
system pen drive to pen drive data transfer without PC is done by using Raspberry Pi. The pen drives are connected to USB
module through USB hub, the communication between two pen drives is done by using Raspberry Pi. Using this System, the
data transfer can be done from any place in the world.
This document provides information about extranets and communication devices and their hardware requirements. It discusses:
1) What an extranet is, how it originated in the late 1990s/early 2000s, and how it allows authorized parties like customers and affiliates external access to a company's website.
2) Examples of communication devices like network interface cards, wireless network cards, modems, hubs/switches, routers, and wireless access points that enable computers to communicate over a network.
3) Requirements for communication devices including different types of network cards, modems, how hubs/switches and routers function, and that wireless access points use antennas to transfer information wirelessly.
The document provides information about various components of a motherboard and computer networking concepts. It discusses motherboard components like the CPU, memory slots, chipset, BIOS and their functions. It also explains different types of computer networks like LAN, WAN, MAN and network topologies. Furthermore, it summarizes various internet connection types including dial-up, DSL, cable, wireless and their features. The document is aimed to provide essential information about motherboards, computer networks and internet connections.
This document provides an overview of the Universal Serial Bus (USB) standard. It describes the key aspects of USB including its architectural overview as a tiered star topology, electrical and mechanical characteristics of USB connectors, the USB protocol layer and packet types, USB device framework including descriptors and data transfer types, and how USB interfaces are created. The document is intended to explain the fundamental concepts and specifications that define USB.
The document discusses various topics related to USB including:
- USB standards and speeds such as USB 1.1, 2.0, 3.0, and Wireless USB.
- USB system architecture including north/south bridges and how USB fits into the system.
- USB protocol layers, descriptors, endpoints, interfaces, and common packet fields.
- USB transfer types including control, interrupt, isochronous, and bulk transfers.
- USB topology, device enumeration process, and how devices advertise their capabilities to the host through descriptors.
This document discusses various ports and connectors used in computer systems. It describes common ports like USB, serial, parallel, PS/2, VGA, audio, RJ-45, RJ-11, firewire, DVI, HDMI and S-Video. It provides details on the purpose of each port, corresponding connector type and color coding of pins/wires. It also includes images to illustrate the different ports and connectors.
This document provides a summary of the USB standard, intended to help readers understand the key aspects without having to read the entire lengthy specification. It breaks down the USB standard into chapters and explains which sections are most important for designers of different USB device types to understand. The summary highlights that peripheral hardware designers especially need to understand the architectural overview, data flow model, mechanical connectors, and electrical specifications. It also introduces some of the basic concepts of USB including speeds, topology, transfer modes, and connectors.
This document contains information about a student named Jinat Afroz taking the course "Data Communication" in the spring 2021 semester. It provides details of the student's ID, program, course code, batch, campus, teacher, deadline and submission dates. It then answers questions about various topics in data communication including definitions of data communication, networks, PAN, nodes, LAN, MAC address, NIC, IP address, ports, network devices, switches, bits and bytes, differences between networking devices, bridges, repeaters and more.
This document provides information about various computer connections and ports. It defines terms like connection, connector, and expansion slot. It describes common connection types like IDE, SATA, SCSI, serial, parallel, USB, FireWire, MIDI, sound cards, and video ports. It includes images and descriptions of specific connectors, cables, and the devices they are used for. It also lists common USB devices and provides information on USB transfer speeds and connector variations.
In computer hardware, a port serves as an interface between the computer and other computers or
peripheral devices. Computer ports have many uses, to connect a monitor, webcam, speakers, or other
peripheral devices. On the physical layer, a computer port is a specialized outlet on a piece of
equipment to which a plug or cable connects. Electronically, the several conductors where the port and
cable contacts connect provide a method to transfer signals between devices.
A port is the point at which a peripheral attaches to or communicates with a system unit (sometimes referred to as a jack)
while a connector is any connector used within computers or to connect computers to networks, printers or other devices.
This document provides summaries of various computer ports and connectors, including USB ports, video ports, audio ports, network ports, and storage ports. It explains what each port is used for and includes images of examples. Key ports discussed include USB, video ports like DVI and HDMI, audio ports like optical audio and coaxial digital, network ports like Ethernet, and storage ports like SATA, Firewire, and eSATA.
The document summarizes the USB standard and enumeration process. It discusses that USB was developed in the 1990s by major tech companies as a standard cable and protocol for connecting devices. The 12 step enumeration process is then outlined, beginning with a device attaching to a port, the hub detecting it, the host learning about it and assigning an address, retrieving descriptors to identify the device and load appropriate drivers, and ultimately selecting a configuration so communication can begin.
The document discusses various topics related to data communication and computer networks including:
- The definition of data communication as the sharing of virtual messages and computer networks as linking computers to share resources.
- The differences between data communication, which can be local or remote, and computer networks, which enable file sharing and information transfer.
- Key terms related to networking including nodes, LANs, PANs, MANs, WANs, NICs, MAC addresses, IP addresses, ports, and the differences between hubs, switches, routers, bridges, and repeaters.
- Explanations of bits, bytes, bridges, and the differences between MAC addresses and IP addresses.
Chapter 2- Ports and Connections A+ 801 802 PREPJessie Harris
This document discusses various legacy and modern ports and connectors used in computing. It describes serial and parallel ports, video ports like VGA, DVI and DisplayPort, audio ports including 3.5mm mini jacks and S/PDIF, networking ports like RJ45, and modern ports including USB, FireWire and SCSI. It provides details on the specifications of different port standards like maximum speeds, cable lengths and pin configurations.
USB Specification 2.0 - Chapter 9 - Device FrameworkMacpaul Lin
The document summarizes Chapter 9 of the USB 2.0 Specification regarding the USB device framework. It describes USB device states including attached, powered, default, address, configured, and suspended. It also outlines generic USB device operations such as dynamic attachment/removal, address assignment, configuration, data transfer, and power management. Key concepts covered include bus enumeration, alternate interface settings, power budgeting, and remote wakeup capability.
USB (Universal Serial Bus) was invented in 1999 to standardize connectivity between devices and hosts. It allows communication and power delivery. USB has evolved through several versions with increasing speeds up to 10 Gbps in USB 3.1. USB uses a star topology with a host connected to peripherals. Communication uses pipes that connect endpoints in a one-to-one manner. Data transfer follows three processes: isochronous, interrupt, and bulk.
An interconnected collection of autonomous computers is called a computer network. Networks allow computers to share resources like hardware, software, databases, and communicate with each other. The first network was ARPANET in 1969 which connected universities and defense organizations in the US. Later networks like NSFnet and the Internet improved capacity and connectivity. A network uses nodes, servers, network interface units, and types of networks can be LANs, MANs, or WANs depending on geographical reach. Networking evolved to improve sharing, reliability, and reduce costs.
(1) The M&L Company marketing team is taking a business trip to the US for 4 nights and 5 days. Team members are backing up main materials on a large external hard drive and printing materials in case clients request them.
(2) Miss Lingo has prepared for the trip with her sub-laptop and Lingo device, which allows her to access files on her main computer remotely using a wireless mouse.
(3) Lingo is a small portable device that functions as a wireless mouse, MP3 player, USB drive, and enables remote access to another computer. It aims to provide an integrated interface for mobile users.
The document summarizes key aspects of the Universal Serial Bus (USB) standard. It discusses the history and evolution of USB, its architectural overview including host, hubs and devices, communication flow through pipes between host and devices, and the protocol layer involving different packet and transfer types. The document provides an overview of the USB standard to understand its functionality and implementation.
This document summarizes a proposed system for providing data security and accountability in cloud computing. It discusses the existing issues around lack of security and accountability when data is stored in the cloud. The proposed system aims to address these issues through the use of technologies like OTP verification for user registration, encryption and fragmentation of user data, and monitoring of data and system activities by a Third Party Auditor. The system is designed with modules for data security, accountability, and integrity verification. It outlines the architecture including user registration and authentication, file uploading and downloading processes, and generation of alerts if any security issues are detected during internal monitoring.
The document provides information about various components of a motherboard and computer networking concepts. It discusses motherboard components like the CPU, memory slots, chipset, BIOS and their functions. It also explains different types of computer networks like LAN, WAN, MAN and network topologies. Furthermore, it summarizes various internet connection types including dial-up, DSL, cable, wireless and their features. The document is aimed to provide essential information about motherboards, computer networks and internet connections.
This document provides an overview of the Universal Serial Bus (USB) standard. It describes the key aspects of USB including its architectural overview as a tiered star topology, electrical and mechanical characteristics of USB connectors, the USB protocol layer and packet types, USB device framework including descriptors and data transfer types, and how USB interfaces are created. The document is intended to explain the fundamental concepts and specifications that define USB.
The document discusses various topics related to USB including:
- USB standards and speeds such as USB 1.1, 2.0, 3.0, and Wireless USB.
- USB system architecture including north/south bridges and how USB fits into the system.
- USB protocol layers, descriptors, endpoints, interfaces, and common packet fields.
- USB transfer types including control, interrupt, isochronous, and bulk transfers.
- USB topology, device enumeration process, and how devices advertise their capabilities to the host through descriptors.
This document discusses various ports and connectors used in computer systems. It describes common ports like USB, serial, parallel, PS/2, VGA, audio, RJ-45, RJ-11, firewire, DVI, HDMI and S-Video. It provides details on the purpose of each port, corresponding connector type and color coding of pins/wires. It also includes images to illustrate the different ports and connectors.
This document provides a summary of the USB standard, intended to help readers understand the key aspects without having to read the entire lengthy specification. It breaks down the USB standard into chapters and explains which sections are most important for designers of different USB device types to understand. The summary highlights that peripheral hardware designers especially need to understand the architectural overview, data flow model, mechanical connectors, and electrical specifications. It also introduces some of the basic concepts of USB including speeds, topology, transfer modes, and connectors.
This document contains information about a student named Jinat Afroz taking the course "Data Communication" in the spring 2021 semester. It provides details of the student's ID, program, course code, batch, campus, teacher, deadline and submission dates. It then answers questions about various topics in data communication including definitions of data communication, networks, PAN, nodes, LAN, MAC address, NIC, IP address, ports, network devices, switches, bits and bytes, differences between networking devices, bridges, repeaters and more.
This document provides information about various computer connections and ports. It defines terms like connection, connector, and expansion slot. It describes common connection types like IDE, SATA, SCSI, serial, parallel, USB, FireWire, MIDI, sound cards, and video ports. It includes images and descriptions of specific connectors, cables, and the devices they are used for. It also lists common USB devices and provides information on USB transfer speeds and connector variations.
In computer hardware, a port serves as an interface between the computer and other computers or
peripheral devices. Computer ports have many uses, to connect a monitor, webcam, speakers, or other
peripheral devices. On the physical layer, a computer port is a specialized outlet on a piece of
equipment to which a plug or cable connects. Electronically, the several conductors where the port and
cable contacts connect provide a method to transfer signals between devices.
A port is the point at which a peripheral attaches to or communicates with a system unit (sometimes referred to as a jack)
while a connector is any connector used within computers or to connect computers to networks, printers or other devices.
This document provides summaries of various computer ports and connectors, including USB ports, video ports, audio ports, network ports, and storage ports. It explains what each port is used for and includes images of examples. Key ports discussed include USB, video ports like DVI and HDMI, audio ports like optical audio and coaxial digital, network ports like Ethernet, and storage ports like SATA, Firewire, and eSATA.
The document summarizes the USB standard and enumeration process. It discusses that USB was developed in the 1990s by major tech companies as a standard cable and protocol for connecting devices. The 12 step enumeration process is then outlined, beginning with a device attaching to a port, the hub detecting it, the host learning about it and assigning an address, retrieving descriptors to identify the device and load appropriate drivers, and ultimately selecting a configuration so communication can begin.
The document discusses various topics related to data communication and computer networks including:
- The definition of data communication as the sharing of virtual messages and computer networks as linking computers to share resources.
- The differences between data communication, which can be local or remote, and computer networks, which enable file sharing and information transfer.
- Key terms related to networking including nodes, LANs, PANs, MANs, WANs, NICs, MAC addresses, IP addresses, ports, and the differences between hubs, switches, routers, bridges, and repeaters.
- Explanations of bits, bytes, bridges, and the differences between MAC addresses and IP addresses.
Chapter 2- Ports and Connections A+ 801 802 PREPJessie Harris
This document discusses various legacy and modern ports and connectors used in computing. It describes serial and parallel ports, video ports like VGA, DVI and DisplayPort, audio ports including 3.5mm mini jacks and S/PDIF, networking ports like RJ45, and modern ports including USB, FireWire and SCSI. It provides details on the specifications of different port standards like maximum speeds, cable lengths and pin configurations.
USB Specification 2.0 - Chapter 9 - Device FrameworkMacpaul Lin
The document summarizes Chapter 9 of the USB 2.0 Specification regarding the USB device framework. It describes USB device states including attached, powered, default, address, configured, and suspended. It also outlines generic USB device operations such as dynamic attachment/removal, address assignment, configuration, data transfer, and power management. Key concepts covered include bus enumeration, alternate interface settings, power budgeting, and remote wakeup capability.
USB (Universal Serial Bus) was invented in 1999 to standardize connectivity between devices and hosts. It allows communication and power delivery. USB has evolved through several versions with increasing speeds up to 10 Gbps in USB 3.1. USB uses a star topology with a host connected to peripherals. Communication uses pipes that connect endpoints in a one-to-one manner. Data transfer follows three processes: isochronous, interrupt, and bulk.
An interconnected collection of autonomous computers is called a computer network. Networks allow computers to share resources like hardware, software, databases, and communicate with each other. The first network was ARPANET in 1969 which connected universities and defense organizations in the US. Later networks like NSFnet and the Internet improved capacity and connectivity. A network uses nodes, servers, network interface units, and types of networks can be LANs, MANs, or WANs depending on geographical reach. Networking evolved to improve sharing, reliability, and reduce costs.
(1) The M&L Company marketing team is taking a business trip to the US for 4 nights and 5 days. Team members are backing up main materials on a large external hard drive and printing materials in case clients request them.
(2) Miss Lingo has prepared for the trip with her sub-laptop and Lingo device, which allows her to access files on her main computer remotely using a wireless mouse.
(3) Lingo is a small portable device that functions as a wireless mouse, MP3 player, USB drive, and enables remote access to another computer. It aims to provide an integrated interface for mobile users.
The document summarizes key aspects of the Universal Serial Bus (USB) standard. It discusses the history and evolution of USB, its architectural overview including host, hubs and devices, communication flow through pipes between host and devices, and the protocol layer involving different packet and transfer types. The document provides an overview of the USB standard to understand its functionality and implementation.
This document summarizes a proposed system for providing data security and accountability in cloud computing. It discusses the existing issues around lack of security and accountability when data is stored in the cloud. The proposed system aims to address these issues through the use of technologies like OTP verification for user registration, encryption and fragmentation of user data, and monitoring of data and system activities by a Third Party Auditor. The system is designed with modules for data security, accountability, and integrity verification. It outlines the architecture including user registration and authentication, file uploading and downloading processes, and generation of alerts if any security issues are detected during internal monitoring.
This document summarizes a research paper on face recognition using principal component analysis (PCA). It discusses how PCA can be used to reduce the dimensionality of face images for recognition. The system detects faces in images, extracts features using PCA, and then compares new faces to those in a training database to recognize identities. The results showed an accuracy of 87.09% on a test set of 30 images using this PCA-based approach for face recognition. While effective, the system has limitations when faces vary significantly from the training data. Overall, PCA provides a way to analyze face patterns and identify faces with reasonable accuracy under controlled conditions.
This document discusses distributed firewalls as an alternative to traditional firewalls. It provides an overview of distributed firewalls, including that they allow security policies to be centrally defined but enforced across individual endpoints. The key advantages of distributed firewalls are that they do not depend on network topology, protect from internal threats, and avoid bottlenecks since there are multiple secure entry points rather than a single point of failure. The document also reviews related work on distributed firewalls and some of their disadvantages, such as increased complexity if the central management system is compromised.
This paper discusses the optimization of an adaptive equalization system using the steepest gradient method. It presents the steepest gradient algorithm for minimizing a cost function with respect to adjustable filter parameters. Simulation results show the actual and estimated weights, true and estimated output signals, and estimation error over samples converging as the algorithm runs. The steepest gradient method provides an effective approach for removing limitations in the system and achieving weight equalization.
El documento discute la relación entre el diseño y la cultura. Explica que el diseño refleja la historia y cultura humana y puede usarse para desarrollar habilidades e instituciones. También señala que el diseño contribuye al bienestar humano a través de la calidad de los productos y servicios. Finalmente, concluye que la relación entre diseño y cultura ha cambiado en los últimos años para fomentar la innovación y el desarrollo.
Daniela expresa la importancia de ser valiente ante las dificultades de la vida y de creer en uno mismo y sus capacidades. También enfatiza la necesidad de superar los límites personales y esforzarse para alcanzar los sueños, sin rendirse a pesar de los obstáculos. Finalmente, destaca que los sueños pueden volverse realidad si se lucha por ellos.
This document discusses assistive technology and its use for individuals with disabilities. It defines assistive technology as equipment that increases the capabilities of those with disabilities. Laws like the Tech Act of 1988 and IDEA mandated the use of assistive technology in schools. The document then provides examples of assistive technology for different disabilities, including audio loops for hearing impairments, screen readers for visual impairments, speech recognition for learning disabilities, and sip-and-puff devices for physical disabilities. References are provided at the end on assistive technology legislation and uses.
This document describes two techniques for designing optical XNOR and NAND logic gates. The first technique uses a 2D array of coupled optical cavities with Kerr nonlinearity. Discrete cavity solitons are numerically simulated and used to demonstrate optical XNOR and NAND gates by controlling soliton interactions with a Gaussian beam. The second technique uses multi-mode interference waveguides to convert the phase of binary-phase-shift keying input signals to amplitude at the output, implementing optical XNOR and NAND logic. Numerical simulations using the finite element method show contrast ratios of 21.5 dB for the XNOR gate and 22.3 dB for the NAND gate.
This study examined the scientific attitude of 9th class students based on management, locality, and sex. 300 9th class students were surveyed using a scientific attitude test. The study found that:
1. Management and sex had a significant influence on scientific attitude, with government school students and female students having higher scientific attitudes.
2. Locality did not have a significant influence on scientific attitude.
3. The study concluded that sex, management, and locality should be considered to improve science education and foster scientific attitude among students. Teachers should work to create interest in science for all students.
This document summarizes a research paper on using active power filters to reduce total harmonic distortion. It provides background on power quality issues caused by harmonics from nonlinear loads. Active power filters inject harmonic currents to cancel out load harmonics. The document describes shunt and series active power filters and their control methods. Simulation results show that a shunt active power filter can reduce the voltage THD from 17.92% to 11.46% and current THD from 0.53% to 0.46% for an AC-DC converter feeding an R-L load. Thus, active power filters are effective in mitigating harmonics and improving power quality.
This document summarizes a numerical study that examines the effects of fin spacing, fin material, and jet velocity on the heat transfer performance of plate fin heat sinks cooled by impinging air jets. The study considers fin spacings of 2mm, 3mm, and 4mm, and fin materials of aluminum, copper, and steel. Jet velocities of 5m/s, 10m/s, and 15m/s are examined. The results show that heat transfer rate increases with decreasing fin spacing, higher thermal conductivity fin materials like copper, and increasing jet velocity. Copper fins achieved the highest heat transfer rates but are heavier and more expensive than aluminum. A fin spacing of 2mm with aluminum fins and a jet velocity of 15
This document summarizes research on visual cryptography for securing black and white images. It discusses how visual cryptography works by breaking up a secret image into shares such that stacking the shares reveals the secret image to the human visual system without computation. The document also outlines Naor and Shamir's original (2,2) visual cryptography scheme and discusses extensions to the scheme including supporting multiple secrets and improving image quality and size. Finally, it notes that visual cryptography provides robust security for images while eliminating the need for computers during decryption.
The document details the author's journey from having his football career cut short due to injury to pursuing a degree in computer graphics. It describes his struggles with changing paths, including facing doubts from family. However, he was determined to achieve his goals. After graduating soon, he will be the first in his family to earn a college degree, showing that success is achieving one's goals through perseverance.
This document summarizes the synthesis and characterization of thin films of pure TiO2 and Sr-doped TiO2 prepared by spin coating technique. Transparent thin films were prepared on glass substrates and annealed at different temperatures from 3000C to 6000C. Structural analysis using GIXRD and Raman spectroscopy confirmed the anatase phase of TiO2. AFM showed a homogeneous globular surface morphology. UV-Vis analysis demonstrated that the optical band gap increased with higher annealing temperatures. Photoluminescence study showed variation in emission peaks for different annealing temperatures and Sr concentrations. Electrical, gas sensing, wettability and self-cleaning properties were also investigated.
This document discusses training and development in human resource management. It defines training and development as imparting specific skills, abilities, and knowledge to employees. The goal is to improve employee performance by increasing their ability to perform through learning and changing attitudes or skills. Training needs are determined by comparing standard and actual employee performance. The document differentiates between training, education, and development, noting that training imparts specific skills, education is theoretical classroom learning, and development provides general knowledge and attitudes. It also outlines objectives, inputs, and effective methods for training to provide a competitive advantage through improved employee performance.
This document summarizes the plant-mediated synthesis and characterization of silver nanoparticles using extracts from Ocimum sanctum (Tulsi) and Parthenium hysterophorous (Congress grass) plant leaves. Silver nanoparticles were synthesized using aqueous extracts of the two plants reacted with silver nitrate solutions. The synthesized nanoparticles were characterized using UV-Vis spectroscopy, SEM, EDX and DLS. UV-Vis analysis showed surface plasmon resonance peaks between 406-446 nm indicating silver nanoparticle formation. SEM images showed uniformly distributed nanoparticles on average sizes of 68.74 nm and 108.6 nm for Tulsi and Congress grass samples respectively, which was confirmed by DLS and EDX showed presence of silver. Applications testing of
This document describes a secure file hosting application that uses encryption and compression algorithms. The application allows users to upload files from their device without needing a web browser. The uploaded files are encrypted and compressed before being stored on the server. When users want to download a file, the reverse process of decompression and decryption is performed. The architecture involves a server to store encrypted user files and a client application for file uploads and downloads. Security mechanisms like AES encryption are used to securely transmit files between client and server.
This document summarizes a research paper on visual cryptography, which is a technique that allows information like images and text to be encrypted in a way that can be decrypted by the human visual system without using computers. It discusses how visual cryptography works by splitting a secret image into random shares, such that overlaying the shares reveals the original secret image. The document then describes the specific SDS algorithm used in the paper for keyless image encryption by sieving, dividing, and shuffling the image pixels into multiple random shares. It concludes by discussing potential applications and areas for further research on visual cryptography.
This document describes a computer-independent device for USB data transfer. The device allows transferring data between two USB flash drives without needing a computer. It uses a system with an ARM7 development board that acts as a USB host, connecting to the two flash drives. A touchscreen displays the files and allows selecting files for copying from one drive to the other. The device provides portable and battery-powered USB transfer anywhere without a computer.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Abstract: In present days, computers and laptops have become an inseparable part of our busy lives. One of the commonly
used devices for data transfers is Universal Serial Bus (USB) flash drives. Due to emerging technology, USB devices are
shrinking in size day by day, but not the equipment’s which is required to access them. Data transfer using portable devices is
the most important factor in today's scenario. Data transfer between two pen drives is generally done using laptops or desktops.
But it is not always possible to carry such a large size device to the particular location. So, to overcome this problem, we are
designing a hardware which is more compact to carry anywhere. With the help of this project we cannot only transfer the data
between devices but also, we can see the transfer of the particular file which we want to send by using LCD display. This
system pen drive to pen drive data transfer without PC is done by using Raspberry Pi. The pen drives are connected to USB
module through USB hub, the communication between two pen drives is done by using Raspberry Pi. Using this System, the
data transfer can be done from any place in the world.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Pendrive to pendrive data transfer without pcVishnu Kudumula
The document describes a device that allows for data transfer between USB drives without the need for a computer. The device contains a microcontroller, USB host controller, LCD screen, keypad, and power supply. It has three modules - a user interface controller, file system controller, and USB controller. The user interface controller manages the LCD and navigation. The file system controller handles file management and access to the FAT file system. The USB controller interfaces with the USB drives and handles data transfer. The aim is to develop an intelligent, small, and portable device for backup and data transfer between digital devices.
USB 3.0, also known as SuperSpeed USB, brings significant enhancements to the USB standard including a maximum transfer rate of 5Gbps, which is about 10 times faster than the previous USB 2.0 standard. It provides backward compatibility with existing USB devices while also including new features such as increased power delivery and cable specifications to support the higher data transfer speeds. The specification defines new connector types and maintains compatibility with existing USB connectors.
The document discusses the history and features of USB technology. It explains that USB was designed to standardize connections between computers and peripherals. It has become popular due to features like plug-and-play capability, allowing up to 127 devices to connect to a single bus using a standardized interface. The document outlines the increasing speeds of USB standards over time from USB 1.0 to USB 2.0 to USB 3.0 (SuperSpeed USB), which provides transfer speeds up to 10 times faster than USB 2.0. It also describes USB 3.0's dual-bus architecture and backward compatibility.
The document discusses USB (Universal Serial Bus) concepts including:
- USB has a host-device model where devices can act as either host or slave. The host has a root hub and ports to connect devices.
- Devices are classified as hubs or functions. USB uses a tiered star topology with 7 tiers maximum.
- The author implemented a USB host on an Altera Cyclone V FPGA including enabling support for hubs and improving performance. Challenges included getting large file transfers and multiple devices to work reliably.
This document provides an overview of USB (Universal Serial Bus). It discusses what USB is, the need for USB, versions of USB including USB 1.x, 2.0, 3.0 and 3.1, types of USB ports, the USB architecture including devices, hosts and interconnects, data transmission over USB using transactions between endpoints and pipes, USB descriptors that provide device information, and common USB usages.
This document describes a LiFi-based system for bidirectional data transfer between two Android mobile devices using visible light communication. The system uses a USB interface module connected to the mobile devices to transmit data signals to LED lights and receive data from photodiodes. It allows the mobile devices to exchange local data files with each other simultaneously. The system hardware includes a USB interface chip and LED/photodiode components. The software application manages the data transmission between the mobile devices over the USB interface and visible light channels.
This document provides an overview and summary of the USB standard to help readers understand its key aspects without having to read the entire 650-page specification. It discusses the various chapters and topics covered in the standard, highlighting those most relevant to hardware designers and software developers. These include device enumeration, transfer types, connector and electrical specifications. The document aims to explain USB's fundamental principles at a high level in order to develop a basic grasp of how to implement USB devices.
This report summarizes the key components of networking, including different types of cables, IP addresses, network protocols, topologies, standards, and cabling categories. It discusses the basic elements used to establish a network, such as switches, routers, and client computers. It also explains concepts like TCP/IP, UDP, DHCP, LANs, WANs, the OSI model and more. Tables and diagrams are provided to illustrate networking concepts and components.
This document discusses issues to consider when adding USB capabilities to an embedded system design. USB is complex to implement properly at the hardware and software levels. Key factors to evaluate include available processor bandwidth, memory requirements, interrupt handling capabilities, and whether existing real-time operating systems include adequate USB stack software. Third-party USB controller vendors can provide hardware and drivers to simplify integration, but full support may require licensing additional software. Proper planning is needed to ensure a USB solution meets performance needs and is maintainable for future projects.
USB (Universal Serial Bus) is a standard interface that provides connectivity for devices through a serial bus, allowing for simple and low-cost connection of peripherals like keyboards, mice and printers. The USB standard defines the communication protocols and connectors between a host such as a personal computer and peripheral devices. USB supports various data transfer types and has become popular in embedded systems by offering a standardized interface for connecting additional functionality to devices.
This document defines and compares common networking devices and terms. It discusses hubs, switches, routers, bridges, gateways, network interface cards (NICs), and modems. Hubs are basic devices that connect networked devices but do not monitor traffic or activity. Switches are more intelligent devices that can direct traffic to specific ports. Routers connect different networks and use routing tables to determine the best path for traffic. Bridges and gateways also connect different networks using different protocols.
A Microcontroller Framework For PC Based Electrical Appliance Control SystemStephen Faucher
This document describes a framework for controlling electrical appliances in a home or office using a personal computer. A microcontroller interfaces between the PC and appliances through a USB connection. Relays are used to control power to appliances and are regulated by the microcontroller. A program developed in C# allows the PC to turn appliances on and off via the graphical user interface, overriding any manual controls. The system aims to make appliance control easier for people with physical disabilities.
Wireless USB products are finally arriving at the market and in this article you will learn more about this technology and see some usage examples. The goals of wireless USB is to connect peripherals such as printers, externals hard disk drives, sound cards, media players and even video monitors to the PC wirelessly. This can be done by to forms.
If the PC and the device don’t have native support to WUSB, you must install a dongle to convert are standard USB ports in to WUSB.
The maximum theoretical transfer rate from WUSB in this same as USB 2.0:480mpbs if the device is within 3 meters from the PC or 110mpbs from the PC. As you can see, the more distant the devices are from the PC, lower is the transfer rate.
Bluetooth is another wireless technology that allows the connection between the PC and peripherals without wires. At this time, however, Bluetooth is targeted to low speed devices only, as its maximum transfer rate is of 1 Mpbs (128 kb\s) or 3Mpbs (384MB\s), depending on the Bluetooth generation.
The next Bluetooth generation is scheduled to have the same transfer rate as WUSB, but this technology is not yet available. Wireless USB works on the UWB frequency range, while Bluetooth technology works on 2.4GHz frequency, the same use by IEEE 802.11 wireless network.
The document is a seminar report on Wireless USB presented by Soumyodeep Karmakar. It discusses the key details of Wireless USB including its high-level architecture, radio environment using UWB, WiMedia PHY and MAC layers, topology, power management, and performance capabilities. The report provides an overview of Wireless USB as an evolution of wired USB that enables wireless connectivity while maintaining compatibility and delivering high speeds of up to 480 Mbps initially.
This document summarizes a research paper that examines pricing strategy in a two-stage supply chain consisting of a supplier and retailer. The supplier offers a credit period to the retailer, who then offers credit to customers. A mathematical model is formulated to maximize total profit for the integrated supply chain system. The model considers three cases based on the relative lengths of the credit periods offered at each stage. Equations are developed to represent the profit functions for the supplier, retailer and overall system in each case. The goal is to determine the optimal selling price that maximizes total integrated profit.
The document discusses melanoma skin cancer detection using a computer-aided diagnosis system based on dermoscopic images. It begins with an introduction to skin cancer and melanoma. It then reviews existing literature on automated melanoma detection systems that use techniques like image preprocessing, segmentation, feature extraction and classification. Features extracted in other studies include asymmetry, border irregularity, color, diameter and texture-based features. The proposed system collects dermoscopic images and performs preprocessing, segmentation, extracts 9 features based on the ABCD rule, and classifies images using a neural network classifier to detect melanoma. It aims to develop an automated diagnosis system to eliminate invasive biopsy procedures.
This document summarizes various techniques for image segmentation that have been studied and proposed in previous research. It discusses edge-based, threshold-based, region-based, clustering-based, and other common segmentation methods. It also reviews applications of segmentation in medical imaging, plant disease detection, and other fields. While no single technique can segment all images perfectly, hybrid and adaptive methods combining multiple approaches may provide better results. Overall, image segmentation remains an important but challenging task in digital image processing and computer vision.
This document presents a test for detecting a single upper outlier in a sample from a Johnson SB distribution when the parameters of the distribution are unknown. The test statistic proposed is based on maximum likelihood estimates of the four parameters (location, scale, and two shape) of the Johnson SB distribution. Critical values of the test statistic are obtained through simulation for different sample sizes. The performance of the test is investigated through simulation, showing it performs well at detecting outliers when the contaminant observation represents a large shift from the original distribution parameters. An example application to census data is also provided.
This document summarizes a research paper that proposes a portable device called the "Disha Device" to improve women's safety. The device has features like live location tracking, audio/video recording, automatic messaging to emergency contacts, a buzzer, flashlight, and pepper spray. It is designed using an Arduino microcontroller connected to GPS and GSM modules. When the button is pressed, it sends an alert message with the woman's location, sets off an alarm, activates the flashlight and pepper spray for self-defense. The goal is to provide women a compact, one-click safety system to help them escape dangerous situations or call for help with just a single press of a button.
- The document describes a study that constructed physical fitness norms for female students attending social welfare schools in Andhra Pradesh, India.
- Researchers tested 339 students in classes 6-10 on speed, strength, agility and flexibility tests. Tests included 50m run, bend and reach, medicine ball throw, broad jump, shuttle run, and vertical jump.
- The results showed that 9th class students had the best average time for the 50m run. 10th class students had the highest flexibility on average. Strength and performance generally improved with increased class level.
This document summarizes research on downdraft gasification of biomass. It discusses how downdraft gasifiers effectively convert solid biomass into a combustible producer gas. The gasification process involves pyrolysis and reactions between hot char and gases that produce CO, H2, and CH4. Downdraft gasifiers are well-suited for biomass gasification due to their simple design and ability to manage the gasification process with low tar production. The document also reviews previous studies on gasifier configuration upgrades and their impact on performance, and the principles of downdraft gasifier operation.
This document summarizes the design and manufacturing of a twin spindle drilling attachment. Key points:
- The attachment allows a drilling machine to simultaneously drill two holes in a single setting, improving productivity over a single spindle setup.
- It uses a sun and planet gear arrangement to transmit power from the main spindle to two drilling spindles.
- Components like gears, shafts, and housing were designed using Creo software and manufactured. Drill chucks, bearings, and bits were purchased.
- The attachment was assembled and installed on a vertical drilling machine. It is aimed at improving productivity in mass production applications by combining two drilling operations into one setup.
The document presents a comparative study of different gantry girder profiles for various crane capacities and gantry spans. Bending moments, shear forces, and section properties are calculated and tabulated for 'I'-section with top and bottom plates, symmetrical plate girder, 'I'-section with 'C'-section top flange, plate girder with rolled 'C'-section top flange, and unsymmetrical plate girder sections. Graphs of steel weight required per meter length are presented. The 'I'-section with 'C'-section top flange profile is found to be optimized for biaxial bending but rolled sections may not be available for all spans.
This document summarizes research on analyzing the first ply failure of laminated composite skew plates under concentrated load using finite element analysis. It first describes how a finite element model was developed using shell elements to analyze skew plates of varying skew angles, laminations, and boundary conditions. Three failure criteria (maximum stress, maximum strain, Tsai-Wu) were used to evaluate first ply failure loads. The minimum load from the criteria was taken as the governing failure load. The research aims to determine the effects of various parameters on first ply failure loads and validate the numerical approach through benchmark problems.
This document summarizes a study that investigated the larvicidal effects of Aegle marmelos (bael tree) leaf extracts on Aedes aegypti mosquitoes. Specifically, it assessed the efficacy of methanol extracts from A. marmelos leaves in killing A. aegypti larvae (at the third instar stage) and altering their midgut proteins. The study found that the leaf extract achieved 50% larval mortality (LC50) at a concentration of 49 ppm. Proteomic analysis of larval midguts revealed changes in protein expression levels after exposure to the extract, suggesting its bioactive compounds can disrupt the midgut. The aim is to identify specific inhibitor proteins in the midg
This document presents a system for classifying electrocardiogram (ECG) signals using a convolutional neural network (CNN). The system first preprocesses raw ECG data by removing noise and segmenting the signals. It then uses a CNN to extract features directly from the ECG data and classify arrhythmias without requiring complex feature engineering. The CNN architecture contains 11 convolutional layers and is optimized using techniques like batch normalization and dropout. The system was tested on ECG datasets and achieved classification accuracy of over 93%, demonstrating its effectiveness at automated ECG classification.
This document presents a new algorithm for extracting and summarizing news from online newspapers. The algorithm first extracts news related to the topic using keyword matching. It then distinguishes different types of news about the same topic. A term frequency-based summarization method is used to generate summaries. Sentences are scored based on term frequency and the highest scoring sentences are selected for the summary. The algorithm was evaluated on news datasets from various newspapers and showed good performance in intrinsic evaluation metrics like precision, recall and F-score. Thus, the proposed method can effectively extract and summarize online news for a given keyword or topic.
1. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
422
USB Driver Embedded Controller Using Embedded C
Ms. Sneha Jaiswal1, Sushma Dakh2, Mr. Swapnil M. Sonawane 3,
E & TC Dept Department1, 2, 3,
Genba Sopanrao Moze College of Engg, Balewadi, pune 1, 2 R.M.D Singad College Of Engg Pune 3,
University Of Pune1, 2, 3
Pune, Maharasthra1, 2, 3
Email: Sneha6665@gmail.com 1 , sushmadakh@gmail.com 2, Swapnilsnw@gmail.com, 3
Abstract— USB driver controller stands for USB host. Function of host is to identify USB client. USB O-T-G (ON-THE-GO)
allows two USB devices to talk each other without requiring services of pc’s. All the same OTG appears to be a type of network
which interconnected nodes share resources amongst each other without the use of a centralized administrative system Instead,
OTG introduces the dual-role device (DRD), capable of functioning either host or peripheral. The perfect charm of OTG is that
host and peripheral exchange roles if necessary. Earlier concept of OTG, idea of embedded host was already introduced in world
of USB[14] making them better suited to embedded environment than pc with its huge resources, infinite capacity for drivers
and application software. USB was developed as solution to pc interconnectivity. USB most popular application for data transfer
from system or computer to another. The demand for these products is increasing day by day with popularity; there is necessity
for them to transmit both with USB peripherals and directly with each other when PC not available.
Fig1 - OTG UNIVERSE
Key words—Targeted host, USB O-T-G, embedded host, attach detection protocol (ADP), session request protocol(SRP) , host
negotiation protocol(HNP)
1. INTRODUCTION
USB is a new type of I/O interface standard promoted by
Compaq, Microsoft, IBM, DEC and ot2her companies n
1995[2,3]
USB has become one of the most popular interface for
exchanging data between a host PC and its peripherals. This
idea prospered in the mid-1990s defining the cables,
connectors and protocols used for connection, communication
and power supply between computers and electronic devices.
USB has effectively replaced a variety of earlier interfaces,
such as serial and parallel ports, as well as separate power
chargers for portable devices.[4]
Initially we know to gather the data from any
machine or any application we use the serial communication
method. Fig. 2 shows a data logger system using serial
communication In this method we have to connect the
computer or laptop near by the application system for that we
have to provide extra power supply to the computer as well as
we have to allocate some special place for mounting of the
computer, so the system becomes costly as well as it’s not
easy to mount the computer all the time because of many
2. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
423
conditions like whether or temperature these conditions can
harm the computer, which requires regular maintenance.
Fig. 2 Data logger system
There is several such controller which works
on the transfer mediums like GPS, GSM or by using other
wireless protocols like Bluetooth, Zig-bee. But they have
some limitations like the range of the device from the server,
computer where all the data from the several machines is
collected for the analysis process. As well as using such
systems in the remote areas is quite challenging where the
problem of network for the GPS and GSM model occurs.
But as per our design the USB embedded
controller is a portable device which can be easily mounted on
any application system. As we have used the PIC
microcontroller which is having inbuilt memory, provides the
storage for the data collected from the application system. It
becomes very simple and easy to take the back up from one of
the machine just by applying the pen drive to the USB
embedded controller. One more advantage is this controller is
user friendly and the person handling the device does not
require the knowledge of the whole computer. Here the data is
transferred just by pressing one switch after applying the pen
drive. We have chosen PIC microcontroller of family
PIC24FJ128GB110.
USB is most popular application for the data transfer from a
system or a computer to another. Today many devices that are
many PCs in the classic sense have a need to connect directly
to peripherals. Printers connect directly with cameras, for
example, or mobile phones may need to connect to the USB
headsets. These non-PCs have the computing resources to
manage a USB host function, but they need to function in
ways that differ from standard PC hosts. Although they will
provide host capability for some devices, it’s unreasonable to
require them to support the full range of USB peripherals.
A targeteted host is only required to support the peripherals
on its Targeted Peripheral List.
There are two categories of Targeted Hosts:
Embedded Hosts: A product that has a Standard-A receptacle
supported by a USB Host Controller. Embedded Hosts have a
particular set of targeted peripherals, as described in their
targeted peripheral list(TPL).
OTG: Device that provides both host and peripheral
capabilities over a single Micro-AB receptacle, as outlined in
USBOTG&EHv2.0
So here with the help of PIC microcontroller we are trying to
prepare an embedded host. This can be connected rather to
connect to the application systems whose backup p the
analyzed data is necessary to be taken for the study purpose or
for the further processing.
The USB On-The-Go and Embedded Host Supplement to the
USB 2.0 specification introduced three new protocols, Attach
Detection Protocol (ADP), Session Request Protocol (SRP)
and Host Negotiation Protocol (HNP)[2]
2 . Architecture
Standard USB uses a master/slave architecture; in this a USB
host plays the role as a the protocol master, and a USB
'Device' plays the role as the slave. The Host only can
schedule the configuration and data transfers over the link.
Data transfers cannot be initiated by the device, they can only
respond to requests given by a host.
OTG throws a light on the concept that a 'Device' can perform
both the master and slave roles, and so equally changes the
terminology. With OTG, a 'Device' can act as either a 'Host'
(acting as the link master) or a 'Peripheral' (acting as the link
slave). The Device connected to the 'A' end of the cable at
start-up (known as the A-device) acts as the Default Host,
while the 'B' end acts as the Default Peripheral (known as the
B-device).
3. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
424
USB On-The-Go describes Host/Peripheral role swapping
only for the case of a one-to-one connection where two OTG
devices are directly connected. Role swapping does not work
through a standard hub, as one device will act as the Host and
the other as the Peripheral until they are disconnected.
2.1 Specifications
USB OTG is part of a supplement to the USB 2.0 [6]
specification originally agreed upon in late 2001 and later
revised [7]. The latest version of this supplement also defines
behavior for an Embedded Host which has targeted
capabilities and the same USB Standard-A port used by PCs.
Super Speed OTG devices, Embedded Hosts and peripherals
are supported through the USB On-The-Go and Embedded
Host Supplement [8] to the USB 3.0 specification.
2.2 Protocols
The USB On-The-Go and Embedded Host Supplement to the
USB 2.0 specification introduced three new
protocols[12,13,14], Attach Detection Protocol (ADP),
Session Request Protocol (SRP) and Host Negotiation
Protocol (HNP).
· ADP allows an OTG device, embedded host or USB
device to find or determine attachment or connection
status in the absence of power on the USB bus. It
enables both insertion based behavior and the
possibility for a device to display attachment status. It
periodically measuring the capacitance on the USB
port to check whether there is another device
attached, a dangling cable or no cable. When a
change in capacitance is determined, this change
should be large enough to indicate device attachment
is detected then an A-device will provide power to
the USB bus and look for device connection. A B-device
will generate SRP and wait for the USB bus to
become powered.
· SRP request host to start a session, the host activates
power bus for the peripheral, and the sessions
commence or start. Fig 3 shows the session between
the host and the device
Fig. 3 Session request protocol (SRP)
· HNP starts as a host and interrogates the peripheral.
If peripheral is device, then it remains host and vice
versa that is if the peripheral is host then it becomes
device. Fig.4 shows the HNP session
Fig 4. Host Negotiation Protocol (HNP) session
One of the important functions of HNP is to accommodate
users who have connected the A and B devices in the wrong
direction for the task they want to perform. For example, a
printer is connected as the A-device (host), but cannot
function as a host for a particular camera, since it doesn't
understand the camera's representation of print jobs. When
that camera knows how to talk to the printer, the printer will
use HNP to switch to the slave role, making the camera the
4. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
425
host to the printer so that the user's pictures will get printed
without juggling cables.
The USB On-The-Go and Embedded Host Supplement to the
USB 3.0 specification introduce an additional protocol, Role
Swap Protocol (RSP). This achieves the same purpose as HNP
(i.e. role swapping) by extending standard mechanisms
provided by the USB 3.0 specification. Products following the
USB On-The-Go and Embedded Host Supplement to the USB
3.0 specification are also required to follow the USB 2.0
supplement in order to maintain backwards compatibility.
2.2.1 Device roles
USB OTG states two roles of devices: OTG A-device and
OTG B-device. This term defines which side supplies power
to the link, and which is initially the host. The OTG A-device
is a power supplier, and an OTG B-device is a power
consumer. The default link configuration is that A-device act
as USB Host and B-device is a USB Peripheral. The host and
peripheral modes may be exchanged later by using HNP.
Because every OTG controller supports both roles, they are
often called "Dual-Role" controllers rather than "OTG
controllers".
For IC designers, an attraction of USB OTG is the ability to
get more USB capabilities with fewer gates. This means many
gates to test and debug. Also, most gadgets need to be just a
Host, or just a Device. OTG hardware design merges all of
these controllers into a single.
2.2.2Backward compatibility
USB OTG devices are backward-compatible with USB 2.0
[13] (USB 3.0 for Super Speed OTG devices) and will behave
as standard USB Hosts or Devices when connected to standard
(non-OTG) USB devices.
The main exception is that OTG hosts are only
required to provide enough power for the products listed on
the TPL, which may or may not be enough to connect to a
peripheral which is not listed. A powered USB hub may
sidestep the issue if supported since this will then provide its
own power according to either the USB 2.0 or USB 3.0
specifications.
3. USB IMPLEMANTATION
As per the block diagram shown in Fig 4, it consists of
Fig4: Block diagram of USB Driver Controller.
Microcontroller, LCD display, keypad, USB interface and
USB client (pen drive), LED.
Microcontroller is the heart of the embedded controller system
which we are going to design.
We have used PIC24FJ128GB110 microcontroller to design
the embedded controller. This microcontroller has USB
interface and can be act as USB host.
16x2 LCD display is used to show the status of the data being
sent to the pen drive from the microcontroller memory which
is inputted by the keypad which is interfaced to the
microcontroller.
LED is used to indicate the dataflow or the operations done by
the microcontroller.
When we give any input from the keypad, that data will be
stored in the microcontroller memory in the form of a file.
Then when we connect the pen drive to the USB embedded
controller the data will be sent to the pen drive.
This transfer of data is the main purpose of our USB
embedded controller (USB host). This transfer of data is done
by the method of file handling, as we have programmed the
microcontroller for this particular operation. The entire code is
written in the embedded C language.
A 5V power supply is given to the microcontroller by a pow
supply connected externally.
5. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
426
Reset pin is also connected to the embedded controller to reset
the microcontroller as well as LCD display.
SOFTWARE: In our project we are going to write our code in
embedded C in MPLAB X which runs on Windows® OS,
MAC® OS and Linux. The below is the algorithm for the
implementation of the above idea when developed into a kit.
1) Start the application machine.
2) Power on the circuit.
3) Insert the USB client (pen drive) in the USB slot.
4) When USB gets detected press reset button.
5) Remove USB client (pen drive) from the kit.
6) We can read the log file for analysis using computers.
4. DEVELOPMENT OF USB DEVICE DRIVER
USB devices are having some interfaces [ 2,9,11]. In the USB
protocol,here the interface is made up of a number of
endpoints representing a basic function and is also which an
object USB drvice driver controls.
In this paper, as shown
in Fig. 5 the interaction of usb driver with application kit .
Here the I/O operation of a user mode program wants to say,
read or collect some data from a device can be described as
follows [8, 9, 10].
Firstly it calls for windows application
programming interface (API) to create file to open the device
and create the connection to the device. In the next stage then
the subsystem module implements this API by invoking some
platform-dependent system service interface to reach a kernel-mode
routine.
Then the I/O manager will surround the device
driver and then it will create an IRP according to the request
information applications will interact with the device and
which passes to an entry point in some device driver.
I/O request Packet (IRP) embodies and calls control
code to create an IRP (I/O request Packet) with an I/O control
code and then calls driver to send the I/O request Packet (IRP)
to the USB bus driver.
The USB bus driver subdivides USB request Block
(URB) into packets, conveys to the USB bus and sends them
to the USB host controller driver.
Drivers even though execute in kernel mode and can
therefore talk directly to their hardware using facilities
provided by the hardware abstraction layer(HAL) to access the
hardware.
hus USB controller will control the communication
between the host controller and the USB devices through HAL
function calls. Lastly, this operation results to the application
in the reverse order after a driver has finished with the I/O
operation.
Fig.5 interaction of usb driver with application
The advantages of the above kit when developed are as
follows
It can be used for remote areas where installation of
pc is not possible.
Power is saved as we don’t need to supply any extra
power supply to the pc.
Also space is saved as there is no need to allocate any
special space.
It is a portable device and thus can be easily mounted
on any application.
It does not require maintenance.
They are not expensive.
They don’t have limitation like the range of the
device from the server computer as in case of
Bluetooth, Zig-bee, GSM, and GPS.
5. RESULT
We have prepared USB driver controller using embedded C
which acts as USB host shown in fig 5
We are trying to develop the best driver circuit helpful in data
logging in various industries.
The communication between client and host was completed
through USB medium.
The circuit requires lower cost than computers for its use. We
earned a lot of knowledge on micro-controllers, a deeper
clearer view of the architecture, ports all other functional
blocks was achieved.
We did a lot of research on USB drivers, USB host and client
and also on USB OTG technologies.
6. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
427
We had a peek look at all simple functional parts of the
project like the crystal oscillator, reset circuit and their
working.
Fig. driver controller using embedded C
6. CONCLUSION
The purpose of the project is to create a USB driver
controller which acts as host and helps peripheral to gather
data from several applications. This system will be
deployed in industries such as data logger where mounting
of a computer is not possible. Our circuit will help in
reducing the overhead cost and maintenance which is
usually required for the installation of computer. An
external secondary memory can be added to the circuit to
increase the memory capacity of the device so that it can
store or transfer data depending on the application
7. FUTURE SCOPE
We have used IC PIC24FJ128GB110 which is having 16384
bytes data memory and 128kb program memory so we can
directly use it for industrial purpose for data logging. With the
help of this microcontroller IC family we are planning to
prepare a universal driver circuit which can be used in various
industrial applications such as I2C data logger, USB data
logger, SPI data logger and many more.
As our device is portable and doesn’t required separate power
supply it can be easily mount in the remote areas for data
logging in the projects like wind mill power generation plants.
REFERENCES
[1] www.usb.org/developers/onthego
[2] Anderson D. Universal serial bus architecture. Addison
Wesley publishing company, pp. 13-24,1999
[3] Wright Nick, Judd Bob. Using USB as a data acquisition
interface. Journal of evaluation engineering . Vol. 43, No.
6, pp. 20-26, 2004
[4] SuperSpeed USB 3.0: More Details Emerge. 6 Jan
2009.
[5] ^ On-The-Go and Embedded Host Supplement to the USB 2.0
Specification Revision 2.0 plus ECN and errata, July 14, 2011
[6] USB-On-the-Go-Specification Settled. Heise.de, Heinz
Heise.[dead link]
[7] On-The-Go and Embedded Host Supplement to the USB 3.0
Specification Revision 1.0, July 1, 2011
[8] Gereaux, Dean A. USB Device driver. Journal of dr.
Dobb, vol. 29, no.4, pp. 60-64, April 2004
[9] Y. P. Su The design of WDM driver based on USb bus.
Journal of computer knowledge and technology, No. 36,
pp. 142-144 , 2005
[10]Nadolny, Jim, Kelly, Kieran. USB interfaces and EMC.
Journal of compliance engineering, vol. 16N.4 pp. 5-10,
1999
[11]Compaq, Hewlett-packard, Intel , lucent, . universal serial
bus specification 2.0. Implementers Forum, 2000
[12] Universal Serial Bus Revision 2.0 specification. Universal
Serial Bus Micro-USB Cables and Connectors Specification.
USB Implementers Forum, Inc. 4 April 2009.
[13]www.maximintegated.com
[14]www.usb.org