This document describes a simulation model of a DC servo motor control system using the TrueTime simulator and WirelessHART communication protocol. The model includes three nodes - a sensor, controller, and actuator - connected via a WirelessHART network. The document provides details on configuring the TrueTime kernel blocks for each node, implementing the control algorithm, and setting up the WirelessHART network simulation. Simulation results are presented showing the data transfer between the nodes for controlling the motor position.
The document provides a detailed explanation of the four generations of mobile communications including their basic concepts, components, and transmission methods. It discusses the architecture and features of 1G networks like Advanced Mobile Phone System (AMPS) and Nordic Mobile Telephony (NMT), as well as 2G networks exemplified by the Global System for Mobile Communications (GSM). The document also touches on goals and major networks of 2G and provides an introduction to 3G.
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...IJRES Journal
Ā
This paper discusses using Ethernet for real-time communication in industrial embedded applications. It first reviews using switched Ethernet to eliminate collisions and enable real-time data transmission. It then examines different industrial Ethernet technologies like EtherCAT and how priority scheduling and other techniques can enhance real-time performance. Various simulation results are presented showing the impact of parameters like packet processing rate and non-real-time traffic on latency. Finally, it concludes that industrial Ethernet networks using intelligent switching can offer advantages over traditional networks while enabling Internet connectivity if techniques like traffic shaping and multicasting are used.
Bus Data Acquisition and Remote Monitoring System Using Gsm & CanIOSR Journals
Ā
This document describes the design of a bus data acquisition and remote monitoring system using GSM and CAN networks. The system uses wireless data acquisition units connected to sensors to acquire signals wirelessly. The data is transmitted to a receiver unit using Zigbee wireless transmission. The receiver unit then sends the data to a remote monitoring service center using GSM. The system implements CAN networks within the bus to connect electronic control units and allow communication between nodes. The goal is to remotely monitor and control bus systems from an off-site location.
Channel estimation for high data rate communication in mobile wi max systemIAEME Publication
Ā
1) The document discusses channel estimation techniques for high data rate communication in mobile WiMAX systems. It evaluates the performance of two interpolation schemes: Least Square Error (LSE) and Minimum Mean Square Error (MMSE).
2) Through simulation, it is shown that MMSE outperforms LSE, providing better bit error rate performance closer to the ideal channel condition. MMSE estimation results in symbols that are less scattered than LSE when plotted, indicating it is more robust against noise.
3) The key advantage of MMSE is that it takes into account additional information like signal to noise ratio and channel statistics, allowing it to provide smoother interpolation compared to the simpler LSE technique.
This document discusses implementing security and steganography in 802.11n networks. It proposes hiding information in the cyclic prefix of OFDM symbols. Modifying the cyclic prefix does not require additional bandwidth and increases the potential hidden transmission capacity depending on the modulation scheme. Simulation results show the steganographic system does not increase costs for ordinary users and security is improved by using private keys to randomly select modified symbols.
This document describes a UDP-based wireless telemetry network and data acquisition system developed for rotary applications like helicopter rotors. The system replaces traditional slip ring technologies with a wireless network approach to overcome issues like low bandwidth, electrical noise, complex installation, and high maintenance costs of slip rings. The system collects data from sensors on static and rotating parts using mobile and static data acquisition subsystems connected via a wireless network and switch box. Synchronization of data and devices is achieved using open standards like IEEE 1588 PTP. The solution was successfully demonstrated during testing of rotary applications.
This document proposes using uplink RTS/CTS control to improve the performance of distributed station coordination (DSC) in dense wireless local area networks. It presents simulation results using the NS-3 simulator showing that selectively enabling RTS/CTS for stations based on their frame error rate can significantly increase aggregate throughput, decrease frame error rate, and improve fairness compared to DSC without RTS/CTS. The performance gains are greater for larger frame sizes. Partial usage of RTS/CTS for a subset of stations is also evaluated.
Implementation of a bit error rate tester of a wireless communication system ...eSAT Publishing House
Ā
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document provides a detailed explanation of the four generations of mobile communications including their basic concepts, components, and transmission methods. It discusses the architecture and features of 1G networks like Advanced Mobile Phone System (AMPS) and Nordic Mobile Telephony (NMT), as well as 2G networks exemplified by the Global System for Mobile Communications (GSM). The document also touches on goals and major networks of 2G and provides an introduction to 3G.
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...IJRES Journal
Ā
This paper discusses using Ethernet for real-time communication in industrial embedded applications. It first reviews using switched Ethernet to eliminate collisions and enable real-time data transmission. It then examines different industrial Ethernet technologies like EtherCAT and how priority scheduling and other techniques can enhance real-time performance. Various simulation results are presented showing the impact of parameters like packet processing rate and non-real-time traffic on latency. Finally, it concludes that industrial Ethernet networks using intelligent switching can offer advantages over traditional networks while enabling Internet connectivity if techniques like traffic shaping and multicasting are used.
Bus Data Acquisition and Remote Monitoring System Using Gsm & CanIOSR Journals
Ā
This document describes the design of a bus data acquisition and remote monitoring system using GSM and CAN networks. The system uses wireless data acquisition units connected to sensors to acquire signals wirelessly. The data is transmitted to a receiver unit using Zigbee wireless transmission. The receiver unit then sends the data to a remote monitoring service center using GSM. The system implements CAN networks within the bus to connect electronic control units and allow communication between nodes. The goal is to remotely monitor and control bus systems from an off-site location.
Channel estimation for high data rate communication in mobile wi max systemIAEME Publication
Ā
1) The document discusses channel estimation techniques for high data rate communication in mobile WiMAX systems. It evaluates the performance of two interpolation schemes: Least Square Error (LSE) and Minimum Mean Square Error (MMSE).
2) Through simulation, it is shown that MMSE outperforms LSE, providing better bit error rate performance closer to the ideal channel condition. MMSE estimation results in symbols that are less scattered than LSE when plotted, indicating it is more robust against noise.
3) The key advantage of MMSE is that it takes into account additional information like signal to noise ratio and channel statistics, allowing it to provide smoother interpolation compared to the simpler LSE technique.
This document discusses implementing security and steganography in 802.11n networks. It proposes hiding information in the cyclic prefix of OFDM symbols. Modifying the cyclic prefix does not require additional bandwidth and increases the potential hidden transmission capacity depending on the modulation scheme. Simulation results show the steganographic system does not increase costs for ordinary users and security is improved by using private keys to randomly select modified symbols.
This document describes a UDP-based wireless telemetry network and data acquisition system developed for rotary applications like helicopter rotors. The system replaces traditional slip ring technologies with a wireless network approach to overcome issues like low bandwidth, electrical noise, complex installation, and high maintenance costs of slip rings. The system collects data from sensors on static and rotating parts using mobile and static data acquisition subsystems connected via a wireless network and switch box. Synchronization of data and devices is achieved using open standards like IEEE 1588 PTP. The solution was successfully demonstrated during testing of rotary applications.
This document proposes using uplink RTS/CTS control to improve the performance of distributed station coordination (DSC) in dense wireless local area networks. It presents simulation results using the NS-3 simulator showing that selectively enabling RTS/CTS for stations based on their frame error rate can significantly increase aggregate throughput, decrease frame error rate, and improve fairness compared to DSC without RTS/CTS. The performance gains are greater for larger frame sizes. Partial usage of RTS/CTS for a subset of stations is also evaluated.
Implementation of a bit error rate tester of a wireless communication system ...eSAT Publishing House
Ā
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document discusses the OSI data link layer and its role in data transfer between machines. It describes the key functions of the data link layer, including the medium access control (MAC) sublayer and logical link control (LLC) sublayer. The MAC sublayer governs access to shared transmission mediums and provides addressing and error detection, while the LLC sublayer interfaces with higher layers and provides connection-oriented and connectionless services. Common MAC protocols discussed include Ethernet, Token Ring, and wireless LAN standards.
Various parameters in the industries can be monitored and controlled using CAN bus network integrated with Bluetooth Communication. Monitoring and controlling the industrial parameters involve a large amount of man power and time consumption. To overcome the need of huge man power and time consumption this technology was developed which makes use of single person for monitoring and controlling the entire network. This method has been implemented in order to reduce the usage of wires used for communication purpose and also to reduce the errors relating to the data transfer. In this project sensors are used to sense the variable industrial parameters and the CAN protocols are used for error free data transmission and data reception purpose along with Bluetooth, pic micro controllers are used for programming the CAN controller. The data transmission rate will be higher than other wireless systems. This application is user friendly and it can be achieved at a very low cost.
IRJET- Development of Redundant Communication Methods for Robots in Nucle...IRJET Journal
Ā
This document describes the development of redundant communication methods for robots used in nuclear applications. It aims to minimize wiring by serializing communication lines between a master control system and sub-modules like analog front ends and actuators. It implements three redundant communication methods - RS-485, optical fiber communication, and power line communication - to ensure uninterrupted data transfer even if one method fails. The methods are tested by transmitting joystick data between two microcontrollers to control a robotic arm model over each communication channel individually and combined. Results found the system works efficiently over any single channel and provides redundancy by using multiple channels.
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPEditor IJMTER
Ā
The focus of this Paper is the actual implementation of Network Router and verifies the
functionality of the four port router for network on chip using the latest verification methodologies,
Hardware Verification Languages and EDA tools and qualify the IP for synthesis and implementation.
This Router design contains three output ports and one input port, it is packet based Protocol. This Design
consists Registers and FIFO. For larger networks, where a direct-mapped approach is not feasible due to
FPGA resource limitations, a virtualized time multiplexed approach was used. Compared to the provided
software reference implementation, our direct-mapped approach achieves three orders of magnitude
speedup, while our virtualized time multiplexed approach achieves one to two orders of magnitude
speedup, depending on the network and router configuration.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...journalBEEI
Ā
IEEE 802.15.4 standard defines both media access control (MAC) and physical (PHY) layer protocols for low power consumption, low peak data rate, and low cost applications. Nowadays the most important feature of IEEE 802.15.4 is maximizing battery life. This paper is focusing how to achieve low average power consumption through assuming that the amount of data transmitted is short and that it is transmitted infrequently so as to keep a low duty cycle. The outcomes demonstrate that the phase shift estimation of Offset quadrature phase-shift keying (OQPSK) modulation has no impact on bit error rate (BER) if it is identical in the transmitter as same as in the receiver.
Marvell Network Telemetry Solutions for Data Center and Enterprise NetworksMarvell
Ā
Marvell network telemetry - which enables accurate measurement of the networkās performance in real-time. In this white paper we will discuss how network telemetry is evolving in modern data center networks. Details will then be given of how the generic approach to network telemetry that has been taken by Marvell is providing greater visibility into network performance, plus flexible support of existing telemetry protocols, as well as the future ones emerging.
To know more visit @ https://www.marvell.com/switching/
This document describes interfacing a Controller Area Network (CAN) bus with a PIC32 microcontroller. It provides an overview of CAN bus, including its data format, signaling format, and features like message-based communication, arbitration, and error detection. The document then details the hardware design of the CAN bus system using a PIC32MX795F512L microcontroller and other components like transceivers, power supplies, and programming hardware.
This chapter discusses high-speed local area networks (LANs) that have emerged to support the increasing computing power and data storage needs of modern networks. It describes technologies like Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet that operate at speeds of 100 Mbps, 1 Gbps, and 10 Gbps respectively over twisted pair and fiber cables. It also discusses Fibre Channel, a high-speed network technology that connects storage devices and provides higher performance than traditional Ethernet networks. Bridges, switches, hubs, and routers are covered as methods to interconnect multiple LANs and networks at different speeds.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes a paper presented at the 2nd IEEE International Conference on Power and Energy held in Johor Baharu, Malaysia from December 1-3, 2008. The paper discusses the development of a Supervisory Control and Data Acquisition (SCADA) based Remote Terminal Unit (RTU) for distribution automation systems. Specifically, it presents the system architecture, design requirements, RTU specifications, interface with the SCADA system, input/output modules, communication protocols, and results. The SCADA-based RTU was developed to provide fault isolation, monitoring, and control capabilities for low voltage distribution automation.
Implementation Cost Analysis of the Interpolator for the Wimax Technologyiosrjce
Ā
The design of the multirate filter (programmable) has been proposed which can be used in digital
transceivers that meets 802.16d/e (wimax) standard in the wireless communication system. Wimax is a
technology emerging in the wireless communication system in order to increase the broadband wireless internet
access. As there is wide spread need of the digital representation of the signal for the transmission and storage
which create the challenges in DSP [1]. In this paper, analysis of the implementation cost of interpolator for the
wimax technology, and cost of interpolator is analyzed on the basis of number of adders and multiplier. The
Filters are designed using the FDA (filters design and analysis) tool in MATLAB.
Overview of wireless network control protocol in smart phone deviceseSAT Publishing House
Ā
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET - Improving TCP Performance in Wireless NetworksIRJET Journal
Ā
1. The document discusses improving the performance of TCP in wireless networks. It aims to detect and avoid spurious retransmission timeouts (SRTOs) and differentiate packet loss due to congestion versus wireless losses.
2. SRTOs occur due to sudden increases in delay causing acknowledgments to arrive late, triggering timeouts. They can be detected by resolving acknowledgment ambiguity. The proposed solution modifies TCP's retransmission timeout recovery process to avoid SRTOs.
3. The performance is evaluated through simulations using the NS-3 network simulator. The results show an improvement in end-to-end delay and throughput compared to standard TCP Reno, demonstrating the effectiveness of the proposed approach.
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
Ā
Testing and performance evaluation of flight vehicles largely depends on the data gathered through telemetry. Tele-metered data describes the internal story of device under test. As the tele-metered data is transmitted to ground receiving stations through radio frequency and Inter Range Instrumentation Group (IRIG) standard data format are well known, anybody who is tuned to transmitted frequency, can receive data and minimal information about the format can reveal the total information of device under test. To deal with this situation, current trend is to encrypt the mission critical information on board before transmitting. In this paper, the authors have discussed the advantage of Local Area Network (LAN) based Telemetry base band system which provides scalability, modularity, and flexibility to the user for the analysis of encrypted data.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
The document discusses Asynchronous Transfer Mode (ATM) networking. It describes the issues driving changes to local area networks, including supporting different types of traffic like voice, video, and data. It then provides details on the ATM standard and conceptual model, including its connection-oriented nature and use of virtual paths and channels. The document also examines the ATM protocol architecture, including the different ATM adaptation layers used to package data for transmission over ATM networks.
This document discusses different types of Ethernet networking technologies and protocols. It covers IEEE 802 standards for local area networks including Ethernet, fast Ethernet, and Gigabit Ethernet. It also describes common cabling types and frame formats used in Ethernet networks. Different media access control methods are examined, such as carrier sense multiple access with collision detection.
This document discusses wireless ATM and its key components. It begins with an overview of why wireless ATM is needed to provide seamless connectivity to wired ATM networks. It then covers the basic principles of ATM, including cells, protocols, layers and reference models. Finally, it discusses the requirements and challenges of implementing wireless ATM, such as mobility management, QoS support, and adapting ATM to operate over wireless networks and radio access layers. The goal is to seamlessly integrate mobility into broadband wireless networks.
Here are the key points about guided and unguided transmission:
- Guided transmission uses physical media like wires and fiber optics to transmit signals along a directed path from transmitter to receiver. It allows for high-quality transmission but limits mobility.
- Unguided or wireless transmission converts signals to electromagnetic waves that can transmit through open space. It allows mobility as devices can communicate anywhere within range of a cell tower or access point. However, wireless signals can be interrupted by interference.
- Mobile communication involves transmission of data to/from handheld devices, with at least one being mobile. It uses wireless networks for mobility as users move around.
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET Journal
Ā
This document investigates delay and power minimization in the IEEE 802.15.4 protocol using the CSMA-CA algorithm. It analyzes the average delay and power of the Zigbee protocol with and without considering maximum retry limits. Theoretical calculations show that the average delay and power of the Zigbee protocol without maximum retry limits is greater than when maximum retry limits are considered. This is because without maximum retry limits, packets can be retransmitted indefinitely, leading to higher delays and power consumption. The analysis provides insights into optimizing the Zigbee protocol to improve quality of service parameters like delay and power usage.
Energy efficient platform designed for sdma applications in mobile wireless ...marwaeng
Ā
This document describes an energy-efficient mobile wireless sensor network platform called DataTruck that is designed to support space-division multiple access (SDMA) applications. The DataTruck node uses an ARM920T microprocessor and IEEE 802.15.4 radio to collect and relay data from static sensor nodes. It integrates a smart antenna system to concurrently receive data from multiple static nodes using the same radio frequency channel. Experiments showed that DataTruck can efficiently collect data and reduce average data transmission delay through the use of SDMA technology.
The document discusses the OSI data link layer and its role in data transfer between machines. It describes the key functions of the data link layer, including the medium access control (MAC) sublayer and logical link control (LLC) sublayer. The MAC sublayer governs access to shared transmission mediums and provides addressing and error detection, while the LLC sublayer interfaces with higher layers and provides connection-oriented and connectionless services. Common MAC protocols discussed include Ethernet, Token Ring, and wireless LAN standards.
Various parameters in the industries can be monitored and controlled using CAN bus network integrated with Bluetooth Communication. Monitoring and controlling the industrial parameters involve a large amount of man power and time consumption. To overcome the need of huge man power and time consumption this technology was developed which makes use of single person for monitoring and controlling the entire network. This method has been implemented in order to reduce the usage of wires used for communication purpose and also to reduce the errors relating to the data transfer. In this project sensors are used to sense the variable industrial parameters and the CAN protocols are used for error free data transmission and data reception purpose along with Bluetooth, pic micro controllers are used for programming the CAN controller. The data transmission rate will be higher than other wireless systems. This application is user friendly and it can be achieved at a very low cost.
IRJET- Development of Redundant Communication Methods for Robots in Nucle...IRJET Journal
Ā
This document describes the development of redundant communication methods for robots used in nuclear applications. It aims to minimize wiring by serializing communication lines between a master control system and sub-modules like analog front ends and actuators. It implements three redundant communication methods - RS-485, optical fiber communication, and power line communication - to ensure uninterrupted data transfer even if one method fails. The methods are tested by transmitting joystick data between two microcontrollers to control a robotic arm model over each communication channel individually and combined. Results found the system works efficiently over any single channel and provides redundancy by using multiple channels.
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPEditor IJMTER
Ā
The focus of this Paper is the actual implementation of Network Router and verifies the
functionality of the four port router for network on chip using the latest verification methodologies,
Hardware Verification Languages and EDA tools and qualify the IP for synthesis and implementation.
This Router design contains three output ports and one input port, it is packet based Protocol. This Design
consists Registers and FIFO. For larger networks, where a direct-mapped approach is not feasible due to
FPGA resource limitations, a virtualized time multiplexed approach was used. Compared to the provided
software reference implementation, our direct-mapped approach achieves three orders of magnitude
speedup, while our virtualized time multiplexed approach achieves one to two orders of magnitude
speedup, depending on the network and router configuration.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...journalBEEI
Ā
IEEE 802.15.4 standard defines both media access control (MAC) and physical (PHY) layer protocols for low power consumption, low peak data rate, and low cost applications. Nowadays the most important feature of IEEE 802.15.4 is maximizing battery life. This paper is focusing how to achieve low average power consumption through assuming that the amount of data transmitted is short and that it is transmitted infrequently so as to keep a low duty cycle. The outcomes demonstrate that the phase shift estimation of Offset quadrature phase-shift keying (OQPSK) modulation has no impact on bit error rate (BER) if it is identical in the transmitter as same as in the receiver.
Marvell Network Telemetry Solutions for Data Center and Enterprise NetworksMarvell
Ā
Marvell network telemetry - which enables accurate measurement of the networkās performance in real-time. In this white paper we will discuss how network telemetry is evolving in modern data center networks. Details will then be given of how the generic approach to network telemetry that has been taken by Marvell is providing greater visibility into network performance, plus flexible support of existing telemetry protocols, as well as the future ones emerging.
To know more visit @ https://www.marvell.com/switching/
This document describes interfacing a Controller Area Network (CAN) bus with a PIC32 microcontroller. It provides an overview of CAN bus, including its data format, signaling format, and features like message-based communication, arbitration, and error detection. The document then details the hardware design of the CAN bus system using a PIC32MX795F512L microcontroller and other components like transceivers, power supplies, and programming hardware.
This chapter discusses high-speed local area networks (LANs) that have emerged to support the increasing computing power and data storage needs of modern networks. It describes technologies like Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet that operate at speeds of 100 Mbps, 1 Gbps, and 10 Gbps respectively over twisted pair and fiber cables. It also discusses Fibre Channel, a high-speed network technology that connects storage devices and provides higher performance than traditional Ethernet networks. Bridges, switches, hubs, and routers are covered as methods to interconnect multiple LANs and networks at different speeds.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes a paper presented at the 2nd IEEE International Conference on Power and Energy held in Johor Baharu, Malaysia from December 1-3, 2008. The paper discusses the development of a Supervisory Control and Data Acquisition (SCADA) based Remote Terminal Unit (RTU) for distribution automation systems. Specifically, it presents the system architecture, design requirements, RTU specifications, interface with the SCADA system, input/output modules, communication protocols, and results. The SCADA-based RTU was developed to provide fault isolation, monitoring, and control capabilities for low voltage distribution automation.
Implementation Cost Analysis of the Interpolator for the Wimax Technologyiosrjce
Ā
The design of the multirate filter (programmable) has been proposed which can be used in digital
transceivers that meets 802.16d/e (wimax) standard in the wireless communication system. Wimax is a
technology emerging in the wireless communication system in order to increase the broadband wireless internet
access. As there is wide spread need of the digital representation of the signal for the transmission and storage
which create the challenges in DSP [1]. In this paper, analysis of the implementation cost of interpolator for the
wimax technology, and cost of interpolator is analyzed on the basis of number of adders and multiplier. The
Filters are designed using the FDA (filters design and analysis) tool in MATLAB.
Overview of wireless network control protocol in smart phone deviceseSAT Publishing House
Ā
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET - Improving TCP Performance in Wireless NetworksIRJET Journal
Ā
1. The document discusses improving the performance of TCP in wireless networks. It aims to detect and avoid spurious retransmission timeouts (SRTOs) and differentiate packet loss due to congestion versus wireless losses.
2. SRTOs occur due to sudden increases in delay causing acknowledgments to arrive late, triggering timeouts. They can be detected by resolving acknowledgment ambiguity. The proposed solution modifies TCP's retransmission timeout recovery process to avoid SRTOs.
3. The performance is evaluated through simulations using the NS-3 network simulator. The results show an improvement in end-to-end delay and throughput compared to standard TCP Reno, demonstrating the effectiveness of the proposed approach.
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
Ā
Testing and performance evaluation of flight vehicles largely depends on the data gathered through telemetry. Tele-metered data describes the internal story of device under test. As the tele-metered data is transmitted to ground receiving stations through radio frequency and Inter Range Instrumentation Group (IRIG) standard data format are well known, anybody who is tuned to transmitted frequency, can receive data and minimal information about the format can reveal the total information of device under test. To deal with this situation, current trend is to encrypt the mission critical information on board before transmitting. In this paper, the authors have discussed the advantage of Local Area Network (LAN) based Telemetry base band system which provides scalability, modularity, and flexibility to the user for the analysis of encrypted data.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
The document discusses Asynchronous Transfer Mode (ATM) networking. It describes the issues driving changes to local area networks, including supporting different types of traffic like voice, video, and data. It then provides details on the ATM standard and conceptual model, including its connection-oriented nature and use of virtual paths and channels. The document also examines the ATM protocol architecture, including the different ATM adaptation layers used to package data for transmission over ATM networks.
This document discusses different types of Ethernet networking technologies and protocols. It covers IEEE 802 standards for local area networks including Ethernet, fast Ethernet, and Gigabit Ethernet. It also describes common cabling types and frame formats used in Ethernet networks. Different media access control methods are examined, such as carrier sense multiple access with collision detection.
This document discusses wireless ATM and its key components. It begins with an overview of why wireless ATM is needed to provide seamless connectivity to wired ATM networks. It then covers the basic principles of ATM, including cells, protocols, layers and reference models. Finally, it discusses the requirements and challenges of implementing wireless ATM, such as mobility management, QoS support, and adapting ATM to operate over wireless networks and radio access layers. The goal is to seamlessly integrate mobility into broadband wireless networks.
Here are the key points about guided and unguided transmission:
- Guided transmission uses physical media like wires and fiber optics to transmit signals along a directed path from transmitter to receiver. It allows for high-quality transmission but limits mobility.
- Unguided or wireless transmission converts signals to electromagnetic waves that can transmit through open space. It allows mobility as devices can communicate anywhere within range of a cell tower or access point. However, wireless signals can be interrupted by interference.
- Mobile communication involves transmission of data to/from handheld devices, with at least one being mobile. It uses wireless networks for mobility as users move around.
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET Journal
Ā
This document investigates delay and power minimization in the IEEE 802.15.4 protocol using the CSMA-CA algorithm. It analyzes the average delay and power of the Zigbee protocol with and without considering maximum retry limits. Theoretical calculations show that the average delay and power of the Zigbee protocol without maximum retry limits is greater than when maximum retry limits are considered. This is because without maximum retry limits, packets can be retransmitted indefinitely, leading to higher delays and power consumption. The analysis provides insights into optimizing the Zigbee protocol to improve quality of service parameters like delay and power usage.
Energy efficient platform designed for sdma applications in mobile wireless ...marwaeng
Ā
This document describes an energy-efficient mobile wireless sensor network platform called DataTruck that is designed to support space-division multiple access (SDMA) applications. The DataTruck node uses an ARM920T microprocessor and IEEE 802.15.4 radio to collect and relay data from static sensor nodes. It integrates a smart antenna system to concurrently receive data from multiple static nodes using the same radio frequency channel. Experiments showed that DataTruck can efficiently collect data and reduce average data transmission delay through the use of SDMA technology.
The document describes a wireless data acquisition system using an ARM Cortex M-3 processor. The system collects data from gas, humidity, and temperature sensors and transmits the data wirelessly via Bluetooth to a host computer. The ARM processor samples the sensor data using its analog-to-digital converter and transmits the digital values to the host computer in real-time. The host computer receives the data using a Bluetooth receiver and displays the measurements graphically using MATLAB for monitoring and analysis purposes. The system provides wireless short-range data collection and is suitable for applications like industrial monitoring and mobile meter reading.
Wireless Data Acquisition System Using ARM Cortex M-3IOSR Journals
Ā
The document describes a wireless data acquisition system using an ARM Cortex M-3 processor. The system collects data from gas, humidity, and temperature sensors and transmits the data wirelessly via Bluetooth to a host computer. The host computer uses virtual instrument software to process and display the received data in real-time. The system provides wireless and real-time data collection that can be used in applications like industrial monitoring and mobile meter reading.
In this paper, we examine WiMAX ā based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
Ā
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
A novel Ethernet based processing system for remote source harmonic detectionTELKOMNIKA JOURNAL
Ā
This work is carried out to objectively establish a new method to detect harmonics and measure the total harmonic distortion (THD) in a remote source, such as a high voltage transformer. The proposed approach utilized embedded design techniques to construct an embedded processor system with Ethernet intellectual property core to acquire data from a remote harmonics source. The designed system has several notable merits, namely, it is portable that can be applied in the work field, and it avoids workers from being subject to a hazard high voltage shock as well as its simplicity and high accuracy. The harmonics detection and analysis are achieved by inserting a microcontroller system near the high voltage transformer to acquire the necessary data and transmit it to a remote embedded processor system that is used to detect and analyze the harmonics. The microcontroller and the processor systems are connected by a wide-area network (WAN) through Ethernet and transmission control protocol/internet protocol (TCP/IP) protocols. The processor system is accommodated to perform 128 points fast Fourier transform for harmonics detection. Matlab simulations are used to validate the results. It is found that the results match very accurately the simulation results with an error of less than 0.02%.
This document provides an overview of Asynchronous Transfer Mode (ATM) technology. It describes ATM as offering high bandwidth networks capable of carrying mixed data, voice, and video traffic through a unified LAN/WAN model. The document outlines the three stages of ATM data transfer: call setup, data transfer, and call termination. It also defines ATM connections as virtual circuits and describes permanent and switched virtual circuits. Additionally, it covers ATM classes of service, quality of service parameters, signaling, and adaptation layers. The goal of the document is to help readers understand ATM concepts, terminology, and how it can be applied in enterprise networks.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
Ā
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
Ā
This document compares the performance of two mobile ad hoc network (MANET) routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The protocols were evaluated using the Network Simulator 2 (NS2) across three simulation scenarios with varying time durations. The results showed that AODV had lower initial packet loss compared to DSR. However, at longer simulation times both protocols performed similarly with comparable packet delivery ratios. In conclusion, AODV is more suitable when the MANET needs to be established quickly, while both protocols can be used for longer-term MANETs as their performance converges over time.
The document describes a robust and trusted routing scheme (RTS) for IoT-based mobile wireless mesh networks. The RTS aims to improve network reliability and security. It consists of two main techniques: (1) a network infrastructure using multi-hop connectivity between mesh clients, routers and gateways; and (2) secure and trusted data routing between devices using RSA cryptography with public/private keys. The RTS allows for self-configuration, coverage expansion, and recovery from failures while preventing various security attacks.
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Jaipal Dhobale
Ā
This document summarizes the performance evaluation of wired and wireless computer networks using the OMNeT++ simulation environment. The performance is evaluated based on throughput. For the wired network simulation, the Nclients application from INET is used, while the Wireless Host to Host application is used for the wireless network simulation. Throughput is measured for both networks by varying the data rate and number of clients. The results show that throughput from the wired server generally increases with more clients, while throughput from the wireless server is highest with a lower number of clients. Throughput to the server is observed to increase with data rate for both networks.
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
Ā
This document proposes a structureless and efficient data aggregation technique for wireless sensor networks that ensures data integrity with low transmission overhead. It introduces a concept where the base station can recover individual sensor data even after aggregation by cluster heads. This allows the base station to verify data integrity and authenticity, as well as perform any desired aggregation functions. It then proposes a structure-free scheme using intracluster and intercluster encryption and aggregation procedures. This scheme aims to address limitations of previous work such as high transmission costs and inability to query individual data values, while maintaining security and scalability. The document analyzes security and scalability aspects and argues the proposed scheme offers improved performance and efficiency for data aggregation in wireless sensor networks.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
Ā
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
Chapter 8 the role of networking in manufacturingN. A. Sutisna
Ā
This document discusses data communication and networking in manufacturing systems. It covers local area network concepts like topologies, protocols, and addressing. The most common high-level network topologies for manufacturing are bus structures and star networks. Bus networks offer flexibility in cable utilization but contention is an issue. Ring and star networks are also discussed along with techniques for resolving contention like CSMA/CD and token passing.
This document summarizes a study on the performance of real-time and non-real-time traffic in IEEE 802.11 wireless local area networks (WLANs) using the network simulator NS2. The study evaluates the impact of the distributed coordination function (DCF) on throughput, packet loss, and delay. It describes simulations with various traffic types, including voice, video, and data, under different load conditions. The results show the packet loss, throughput, and delay for each simulation case.
Process monitoring, controlling and load management system in an induction motoreSAT Publishing House
Ā
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ATM is a cell relay protocol designed to optimize fiber optic networks. It breaks data into fixed-size cells for uniform transmission. ATM aims to maximize bandwidth, interface existing systems, be inexpensive, support telecom hierarchies, ensure reliable delivery, and minimize software functions. Connections between endpoints are established through virtual paths and circuits identified by header fields. Cells contain a 5-byte header and 48-byte payload. Connections can be permanent or switched. ATM defines layers for applications, cell processing, and physical transmission. It supports various quality of service levels through parameters like cell error and loss rates.
This document summarizes a research paper that evaluates the performance of wired and wireless local area networks using simulation. It describes simulating Ethernet and IEEE 802.11 wireless LANs in OPNET with varying numbers of users. Key performance metrics for wired networks like collision count, throughput, and delay were analyzed. For wireless, metrics like data dropped, throughput, and access delay were studied. As the number of users increased, throughput decreased more for wireless than wired due to transmission limitations in wireless. The paper concludes wireless performs better than wired for small user numbers but degrades more with increasing loads.
Development of A web and GSM Based Monitoring and Controlling System for PLC ...ijsrd.com
Ā
In this paper we have developed a platform to remotely monitor and control PLC-based processes over web and GSM network. It will be great benefit if we control the process plant through remote monitoring and controlling. In recent years the development of industrial automation through remote monitoring and controlling has been increased. The proposed system is made possible by the use of PLC, Microcontroller, GSM modem, Ethernet Module, and other elements. The main aim of the remote monitoring and controlling is when a critical failure occurs notifications are generated and send to the expert via SMS and internet message with the help of GSM modem and through internet. The remote controlling of process is now much required control to use expert man power. The challenge here is to establish a proper serial and Ethernet communication between PLC and Microcontroller via appropriate protocol and also to integrate conventional process with recent communication technologies along with advancements in wireless and internet technology.
Similar to Simulation model of dc servo motor control (20)
Energy profile for environmental monitoring wireless sensor networksEvans Marshall
Ā
This document summarizes a research paper that analyzed the energy consumption profile of wireless sensor nodes in an environmental monitoring network deployed outdoors. It found significant differences in energy use between nodes with external sensors attached compared to those without. The energy profile was also affected by network dynamics. By understanding how energy is consumed, researchers can better optimize wireless sensor network applications for environmental monitoring, where the external environment impacts performance and energy use.
Surface classification using conformal structuresEvans Marshall
Ā
This paper introduces a novel method for classifying 3D surfaces using their conformal structures. Conformal structures are intrinsic to a surface's geometry and invariant to transformations like triangulation. The paper represents a surface's conformal structure using matrices called period matrices that describe the shapes of parallelograms surfaces are conformally mapped to. An algorithm is presented to compute these conformal structures and classify surfaces based on whether they have equivalent conformal structures. This approach is more discriminating for classification than topological approaches while being more robust than methods based on exact geometry.
Review of analysis of textile squeezing rollerEvans Marshall
Ā
This document provides a literature review on techniques for analyzing and reducing deflection in long rollers used in textile machines. It discusses various methods that have been studied to minimize roller deflection, including using profiled roller shapes, crowning rollers according to deflection levels, and roller shifting systems. It also reviews different wet pick-up processes used to remove excess water from fabrics, such as squeezing between rollers, vacuum extraction, and air jet ejectors. The goal of the literature review is to better understand how to obtain even squeezing of wet fabrics through rollers and reduce production losses.
This document summarizes an approach for object retrieval in videos using techniques from text retrieval. Regions of interest in video frames are detected and described using invariant descriptors. The descriptors are then vector quantized to form a "visual vocabulary" of words. Frames are represented as vectors of word frequencies and ranked based on similarity to query frames. The method is evaluated on two feature films, demonstrating immediate retrieval of all frames containing a queried object throughout the videos.
The study of pattern auto generation system based on silk fabric propertiesEvans Marshall
Ā
This document describes a study on developing an auto-generation system for pattern making based on silk fabric properties. Key points:
- The study establishes regression models between silk fabric properties (e.g. weight, thickness) and pattern parameters (e.g. sleeve easing) based on instrument tests of 3 silk fabrics and wear trials of pattern samples.
- A process is described for realizing an auto-generation system that uses the mathematical models to generate patterns customized for different silk fabrics.
- The system allows for intelligent, parametric analysis of armhole and sleeve cap patterns and building corresponding mathematical models to enable intelligent pattern operations for silk garments.
The application of fuzzy pid and multi-neuron adaptive pid control algorithm ...Evans Marshall
Ā
This document discusses the application of fuzzy-PID and multi-neuron adaptive PID control algorithms to control warp tension in a rapier loom. It presents simulations comparing the two algorithms. The results show that the multi-neuron adaptive PID control algorithm provides faster response and smaller overshoot than the fuzzy-PID control algorithm or traditional PID control algorithm.
Tandem wet on-wet foam application of both crease-resist and antistatic finishesEvans Marshall
Ā
The document describes a study on applying crease-resistant and antistatic finishes to fabric using successive foam treatments without drying in between (tandem wet-on-wet foam application). This method could significantly reduce effluent waste and energy usage compared to conventional pad-mangle application. The study tested different dwell times between applying the two finishes by foam. Results showed the foam method was as effective as pad-mangle application in terms of finish performance, and longer dwell times improved some properties like shrinkage resistance while potentially reducing others like abrasion resistance.
Speed measurement of a general dc brushed motor based on sensorless methodEvans Marshall
Ā
This document proposes a new sensorless method for measuring the speed of a DC brushed motor based on analyzing the frequency of current ripples in the motor. It begins by discussing limitations of conventional speed measurement methods that require coupling a speed sensor to the motor shaft. It then reviews the commutation principle of DC motors to explain how motor current is related to speed. An experiment is described that compares speed measurements from the proposed sensorless method to those from a conventional sensor-based method on an electric spray pump, finding the sensorless method to be feasible.
This document discusses motor calculations, including:
- Calculating mechanical power requirements by multiplying torque by angular velocity.
- Plotting torque-speed curves to show motor characteristics like speed, current, power, and efficiency at different torque loads.
- Describing the process to generate torque-speed curves for a small DC motor through measurements and calculations.
This document describes a method for measuring the moment of inertia of an electric motor rotor using a physical pendulum technique. A cylinder of known mass and radius is attached to the rotor at a fixed distance to create a physical pendulum. The period of oscillation of this physical pendulum is measured, and the moment of inertia of the rotor is calculated using the measured period along with known values of the cylinder's mass, radius, and attachment distance. The document provides detailed equations for relating the physical pendulum's period of oscillation to the moment of inertia being measured and describes the experimental apparatus used to perform the oscillation period measurements.
The document provides information about Sensirion's SHT1x family of surface mountable relative humidity and temperature sensors. It describes the sensors' key features such as fully calibrated digital output, low power consumption, and excellent long term stability. The document also provides detailed specifications for the sensors' performance, electrical characteristics, operating conditions, packaging, and calibration process.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
Ā
An English š¬š§ translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech šØšæ version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Ā
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Ā
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Ā
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Ā
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
Ā
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power gridās behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
Ā
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of whatās possible in finance.
In summary, DeFi in 2024 is not just a trend; itās a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Ā
Are you ready to revolutionize how you handle data? Join us for a webinar where weāll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, weāll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sourcesāfrom PDF floorplans to web pagesāusing FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether itās populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
Weāll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
Ā
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Ā
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Fueling AI with Great Data with Airbyte WebinarZilliz
Ā
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Ā
Inconsistent user experience and siloed data, high costs, and changing customer expectations ā Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their āmodern digital bankā experiences.
2. suitable MATLAB MEX interfaces. Some of the functions
make possible by simulation creation of tasks, manually
interrupting, surveillance, timers, etc. The other functions
are real-time which are called by the code during
execution of task and enable AD/DA conversion, sending
and receiving of messages, etc.
Fig. 2. The TrueTime 2.0 block library
TrueTime has been developed in Simulink, which takes
care of the managing system in the meaning of
performances, stability and endurance, and primarily has
been intended for usage together with the
MATLAB/Simulink [4].
III. ADJUSTMENT OF KERNEL AND WIRELESS NETWORK
BLOCK
Configuration of the TrueTime Kernel has been
presented in the Fig. 3., where the input ports āInterruptsā
and āRcvā are connected with grounding which is in
āSourcesā menu of Simulink library. Output ports āSnd,
āMonitorsā and āPā are connected with terminators which
are in āSinksā menu of Simulink library. Output port
āScheduleā has been connected with the oscilloscope
which has been marked with āScheduleā and is in āSinksā
menu of Simulink library.
Fig. 3. Configuration of TrueTime Kernel ports
A/D input port has been connected with two input ports
marked with r and y, via the multiplexer which is in
āSignal Routingā menu of Simulink library, and D/A
output port of kernel has been connected on output port
and marked with āuā.
Wireless Network block makes possible simulation of
communication between two nodes, and in the original
TrueTime simulator have been supported two
communication protocols: IEEE 802.11b/g (WLAN) and
IEEE 802.15.4 (ZigBee), while the WirelessHART
protocol has been subsequently added [4].
IV. CONTROL PERFORMANCES OF WIRELESSHART
Already two decades HART communication presents
the standard for the simplicity, safety and reliability in the
process industry. WirelessHART has been designed
primarily to cover very wide range of needs in the process
industry from the simple supervision to the control in
closed loops [5]. Testing and experiments in the field with
wireless appliances and devices have shown that these
appliances provide correctness of communications,
stability, reliability and that can satisfy all needs of
supervision and control in industrial processes.
Control applications require periodical samples and on
this occasion appear disturbances and delays which
especially appear in WirelessHART technology. Actually,
control performances with WirelessHART can be
compared with the wired system that uses conventional
field bus highway. Farther have been presented the some
of the factors which appear in uses of WirelessHART.
Sampling speed for WirelessHART is determined from
the condition that needs to be fulfilled on the basis of the
requirement of concrete control loop while it is necessary
at the same time to minimize influence of energy
consumption of field appliances which can be supplied
using batteries. Usual rule based on experience from
practical systems of control is that the feedback control
information is taken 4 to 10 times faster than is the speed
of process response, where the time of response of process
is equal to sum of time constant and dead time of process.
Measuring systems are often unsynchronized with the
control system and measured values are usually sampled 2
to 10 times faster than is the answer of process on the
change of parameter. In wireless systems it is desirable to
reduce the sampling frequency and speed of
communication with the measuring device in order to
extend the life cycle of battery.
Communication using WirelessHART protocol is
realized without endangering the reliability of control [6].
Fig. 4. shows two methods that are used by the sampling:
Fig. 4. Synchronized sampling of time slots
1) Synchronized. Samples are taken only when it is
necessary control above the process.
2) Synchronized with exception reporting. Samples are
taken for beforehand envisaged intervals, for example 4 to
10 times faster than is the response time of process, but
transfer is performed only if it is changed measured value
T7-11
3. or if it is run out the time which was beforehand defined
as the time between sending of two messages.
More frequent sending of measured values is possible
as well as by the appliances and devices in the wired
network. In the case of appliances which use batteries or
the appliances where important is to preserve energy,
WirelessHART offers users possibility to use the optimal
balance at searching of compromise between speed of
communication and lifetime of battery.
V. SAFETY OF WIRELESSHART NETWORKS
As in other wireless networks, key management is very
difficult and important aspect of network security.
WirelessHART networks use network manager as a
central authority to distribute keys and for other network
management functions. Automatic key management is
very important in any network security system.
In the past, the lack of automatic control keys was a
major lack of cancellation of some network security
solutions. One good example is WEP (Wired Equivalent
Privacy) algorithm for secure communication via the
IEEE 802.11 wireless networks. While the introduction of
WEP in 1997. the idea was to ensure the security of
wireless communication, the same as what is in wired
networks, but due to manual distribution of keys and the
weak algorithm, today is enough a few minutes to break
WEP security.
Modern cryptology algorithms are based on secret
infornation, so-called keys and only using them can be
carryed out the functions of encryption of original
information and the inverse decryption function
Encryption algorithms must be such that security and
confidentiality of encrypted information not depend on the
encryption algorithm, but only of secret keys used.
Secrecy of keys is a basic assumption of the application of
cryptology algorithms in the realization of security
services. In symmetric encryption algorithms it is
necessary that one key is secret and known only to the
partners in communication.
Problem of need for a large number of main keys for all
comunnicating entities can be solved by introducing one
unique center for distribution of the keys KDC (Key
Distribution Center). Using this concept all entities in a
safe manner are taking their main key from the KDC,
which provides them communication with KDC. Entities
who wish to communicate do not possess mutual main
keys and at no time know them, but communicate only by
using the session key generated and assigned by the KDC.
Disadvantage of this protocol is the existence of a single
center which contains all the keys, to whom all a priori
absolutely believe and whose safety at no time should be
questioned. Violation of safety of such center
compromises communication of all entities.
In order to satisfy the security requirements of wireless
media standard for WirelessHART network determines
needs of security managers, who then acts as centralised
KDC which is easy and safe way to manage keys. Under
the management of keys is implied:
1) Generation of keys,
2) Storage of keys,
3) Distribution of keys,
4) Restoring of keys,
5) Withdrawal of keys,
6) Check of keys.
Network manager is obtaining keys from the security
manager by sending request for keys, which is then
distributed to the appropriate device to ensure secure
wireless communication.
VI. TRUETIME SIMULATION MODEL OF NETWORKED
CONTROL SYSTEM
To analyze WirelessHART protocol in the industrial
plant it will be shown simulation of networked control
system whose scheme has been presented in Fig. 5.
Simulations have been made in the Simulink surrounding
using the modified TrueTime dissembler.
Fig 5. Model of control system
Model of simulation may be described in the following
way: Sensor periodically converts analog signal from the
process into digital value and sends it to controller.
Controller, after taking message from the sensor,
calculates the output according to appropriate control
algorithms and sends the control signal to the actuator
using WirelessHART network (Fig. 6). Actuator converts
the control signal into analog and sends it in the process.
Fig. 6. Scheme of communication between devices
T7-12
4. VII. ADJUSTMENT OF SIMULATION ENVIRONMENT
In the TrueTime simulation model which has been
presented in the Fig. 5. has been designed the networked
control system where have been connected three network
devices using communication via WirelessHART network
[7]. Double-click on Wireless Network block (Fig. 7.)
opens the dialog window in which we put the number of
devices/knots (three) and select the WirelessHART
protocol.
Fig. 7. TrueTime Wireless Network block
A. Initialization of sensor
Network devices/nodes have been simulated in the
subsystem with the TrueTime kernel block. Details of
subsystem for sensor/node1 have been given in the Fig.8.
Sensor/node1 uses one A/D converter in the input part and
one network output (Snd) at the output.
Fig. 8. TrueTime kernel block of sensor
B. Initialization of actuator
Details of subsystem for actuator/node2 have been
given in Fig. 9. Actuator/node2 uses one network input
(Rcv) in the input part and one D/A converter on the
output.
Fig. 9. TrueTime kernel block for actuator
C. Initialization of controller
Controller receives messages from the sensor and sends
data back on the network i.e. to the actuator. Details of
subsystem for the controller/node have been given in Fig.
10., where is used one A/D converter and one network
input (Rcv) on the input part and one network output
(Snd) on the output part.
Fig. 10. TrueTime kernel block of controller
After adjusting parameters of kernel block it is
necessary to create m-file ctrlcode (Fig. 11.) which
calculates the control output signal and uses equations for
PD controllers.
When are connected all previously given Simulink
blocks it is obtained the model of control system (like in
Fig. 5.) whose the wireless communication is realized by
the WirelessHART protocol [7].
T7-13
5. Fig. 11. Ctrlcode function
VIII.SIMULATION RESULTS
If the simulator does not report errors on the occasion
of starting simulation, by double-click in the model (Fig.
5) on the oscilloscope opens the window like in Fig. 12.
The new opened window makes possible to follow results
of simulation of data transfer using WirelessHART
protocol implemented on the model of control system for
DC servo motor control. Results of simulation of
described model have been presented in Fig.12.
Fig. 12. Simulation results of simple TrueTime control
IX. CONCLUSION
In the paper has been described the new way of
implementation of WirelessHART with the modified
TrueTime simulator based on the MATLAB/Simulink
which can simulate the control device in the execution of
tasks in real-time systems, networks and dynamic plants.
WirelessHART protocol makes possible secure, high
reliable communication with small delay without
influence on the throughput range and performances of
process. All this possibilities are integrated in
WirelessHART standard in order to enable: simplicity,
reliability and safety.
In details have been explained all phases of adjusting
TrueTime simulation surrounding necessary for the
analysis of behavior of WirelessHART protocol
implemented on the example of control system with three
nodes for control of DC servo motor. Also, in the form of
graphs have been illustrated results of simulations for
control and scheduling of executions of tasks in
WirelessHART network.
REFERENCES
[1] HART Communication Foundation, Control with WirelessHART,
HCF LIT-127, Revision 1.0, June30, 2008.
[2] HART Communication Foundation, System Redundancy with
WirelessHART, HCF LIT-128, Revision 1.0, June30, 2008.
[3] HART Communication Foundation, Peer-to-Peer Communication
with Wireless HART, HCF LIT-129, Revision 1.0, September 5,
2008.
[4] A. Cervin, D. Henriksson, M. Ohlin, TrueTime 2.0 beta-Reference
Manual, Department of Automatic Control, Lund University,
Lund, Sweden, January 2009.
[5] M. KostadinoviÄ, M. StojÄev, Z. Bundalo, D. Bundalo,
āManagement of WirelessHART networkā, Symposium
INFOTEH2009., Jahorina, Bosnia and Herzegovina, Vol. 8, Ref.
A-16, pp. 71-75, March 2009.
[6] M. KostadinoviÄ, M. StojÄev, Z. Bundalo, D. Bundalo, āDesign,
Implementation and Simulation of WirelessHart Networkā, 9th
International Conference on Telecommunications in Modern
Satellite, Cable and Broadcasting Services TELSIKS 2009., NiÅ”,
Serbia, October 2009, pp. 556-559.
[7] M. KostadinoviÄ, M. StojÄev, Z. Bundalo, D. Bundalo,
āApplication of modified TrueTime simulator in control of
WirelessHart networksā, Proceedings of Intrenational Symposium
Ee 2009., Novi Sad, Serbia, October, 2009, Paper No. T4-2.5, pp.
1-5.
T7-14