SlideShare a Scribd company logo
Simulation model of DC servo motor control
Miroslav Kostadinovićāˆ—
, Mile Stojčevāˆ—āˆ—
, Zlatko Bundaloāˆ—āˆ—āˆ—
, DuÅ”anka Bundaloāˆ—āˆ—āˆ—āˆ—
* University of East Sarajevo, Faculty of Traffic and Transportation, Doboj, Bosnia and Herzegovina, e-mail:
kostadinovicm@gmail.com
**
University of NiÅ”, Faculty of Electronic Engineering, NiÅ”, Serbia, e-mail: mile.stojcev@elfak.ni.ac.rs
***
University of Banja Luka, Faculty of Electrical Engineering, Banja Luka, Bosnia and Herzegovina, e-mail:
zbundalo@etfbl.net
****
UniCredit Bank, Banja Luka, Bosnia and Herzegovina, e-mail: zbundalo@etfbl.net
Abstractā€”In the paper are explained in details all phases
of adjusting TrueTime simulation surrounding necessary
for analysis of behavior of WirelessHART protocol
implemented on the example of control system with three
nodes for control of DC servo motor. At the end of paper
are given obtained results of simulation for control and
planing of execution tasks in WirelessHART network.
Keywordsā€”DC machine, Industrial communications,
Modelling, Sensor, Simulation.
I. INTRODUCTION
WirelessHART protocol has relatively low speed of
data transfer in the comparison with the IEEE 802.11g
standard for computer wireless networks. This protocol
works on the frequency of 2.4GHz in the ISM radio range
using the Time Division Multiple Access (TDMA) for
access to communication medium [1]. The complete time
of communications executes inside of predetermined time
slot of 10 ms. Series of the time slots form superframe for
the data transfer and WirelessHART makes possible the
hopping between communication channels in order to
avoid interference and reduce multi-path fading effect.
One or more appliances or devices which send data and
one or more appliances or devices which receive data can
be determined that communicate mutually in one
beforehand envisaged time slot. Time slot may be
reserved for communication of only one appliance or can
support dividing of data transfer across one time slot [2].
WirelessHART is communication protocol that is
organized like the ISO/OSI 7 communication model. Data
transfer from all communication appliances in
WirelessHart network passes across the gateway (Fig. 1).
It can be seen that gateway must direct packages towards
beforehand quoted given destination. Gateway uses
standard HART commands for communication with
network devices and host applications. The network
manager creates start superframe and configures Gateway
[3].
II. SIMULATOR DESCRIPTION
Here is described the usage of original simulator
(dissembler) TrueTime based on the MATLAB/Simulink,
which simulates regulating and control mechanism in
execution of tasks in real-time systems, networks (wired
or wireless) and dynamic plants.
Originally have been implemented two types of
communication protocols, 802.11b/g (WLAN) and
802.15.4 (ZigBee), and the usage possibility of
WirelessHart has been added later. Aim of WirelessHart
development is to establish standard for wireless
communication for usage in process automatics.
WirelessHart makes possible cheap and relatively slow, in
the comparison with 802.11b/g, wireless connection with
HART-enabled devices. The WirelessHART network
protocol is time divided into slots where every slot lasts
10ms. Slots can be dedicated to one node and use TDMA
technique for access to the medium or can be divided
between a few nodes and use CSMA/CA technique for
access to the medium.
Fig. 1. Structure of WirelessHART network
TrueTime consists of the library of blocks as shown in
the Fig. 2. with following functions:
1) TrueTime Kernel: Executes user defined tasks and
interrupts which for example present input/output tasks,
control algorithms and network interfaces.
2) TrueTime Network: This block is used to simulate
access to the medium and transfer of packages according
to the chosen network model.
3) TrueTime Wireless Network: Function of this block
is similar as of the TrueTime Network block, but instead
of wire network it uses wireless network.
4) TrueTime Battery: This block is used to simulate the
battery-powered supply.
5) ttGetMsg: It is used for reception of messages from
the network.
6) ttSendMsg: It is used for sending messages on the
network.
TrueTime is not compose only from library blocks (Fig.
2) but also of collections of C++ functions with the
14th International Power Electronics and Motion Control Conference, EPE-PEMC 2010
978-1-4244-7855-2/10/$26.00 Ā©2010 IEEE T7-10
suitable MATLAB MEX interfaces. Some of the functions
make possible by simulation creation of tasks, manually
interrupting, surveillance, timers, etc. The other functions
are real-time which are called by the code during
execution of task and enable AD/DA conversion, sending
and receiving of messages, etc.
Fig. 2. The TrueTime 2.0 block library
TrueTime has been developed in Simulink, which takes
care of the managing system in the meaning of
performances, stability and endurance, and primarily has
been intended for usage together with the
MATLAB/Simulink [4].
III. ADJUSTMENT OF KERNEL AND WIRELESS NETWORK
BLOCK
Configuration of the TrueTime Kernel has been
presented in the Fig. 3., where the input ports ā€žInterruptsā€œ
and ā€žRcvā€œ are connected with grounding which is in
ā€žSourcesā€œ menu of Simulink library. Output ports ā€žSnd,
ā€žMonitorsā€ and ā€žPā€œ are connected with terminators which
are in ā€žSinksā€œ menu of Simulink library. Output port
ā€žScheduleā€œ has been connected with the oscilloscope
which has been marked with ā€žScheduleā€œ and is in ā€žSinksā€œ
menu of Simulink library.
Fig. 3. Configuration of TrueTime Kernel ports
A/D input port has been connected with two input ports
marked with r and y, via the multiplexer which is in
ā€žSignal Routingā€œ menu of Simulink library, and D/A
output port of kernel has been connected on output port
and marked with ā€žuā€œ.
Wireless Network block makes possible simulation of
communication between two nodes, and in the original
TrueTime simulator have been supported two
communication protocols: IEEE 802.11b/g (WLAN) and
IEEE 802.15.4 (ZigBee), while the WirelessHART
protocol has been subsequently added [4].
IV. CONTROL PERFORMANCES OF WIRELESSHART
Already two decades HART communication presents
the standard for the simplicity, safety and reliability in the
process industry. WirelessHART has been designed
primarily to cover very wide range of needs in the process
industry from the simple supervision to the control in
closed loops [5]. Testing and experiments in the field with
wireless appliances and devices have shown that these
appliances provide correctness of communications,
stability, reliability and that can satisfy all needs of
supervision and control in industrial processes.
Control applications require periodical samples and on
this occasion appear disturbances and delays which
especially appear in WirelessHART technology. Actually,
control performances with WirelessHART can be
compared with the wired system that uses conventional
field bus highway. Farther have been presented the some
of the factors which appear in uses of WirelessHART.
Sampling speed for WirelessHART is determined from
the condition that needs to be fulfilled on the basis of the
requirement of concrete control loop while it is necessary
at the same time to minimize influence of energy
consumption of field appliances which can be supplied
using batteries. Usual rule based on experience from
practical systems of control is that the feedback control
information is taken 4 to 10 times faster than is the speed
of process response, where the time of response of process
is equal to sum of time constant and dead time of process.
Measuring systems are often unsynchronized with the
control system and measured values are usually sampled 2
to 10 times faster than is the answer of process on the
change of parameter. In wireless systems it is desirable to
reduce the sampling frequency and speed of
communication with the measuring device in order to
extend the life cycle of battery.
Communication using WirelessHART protocol is
realized without endangering the reliability of control [6].
Fig. 4. shows two methods that are used by the sampling:
Fig. 4. Synchronized sampling of time slots
1) Synchronized. Samples are taken only when it is
necessary control above the process.
2) Synchronized with exception reporting. Samples are
taken for beforehand envisaged intervals, for example 4 to
10 times faster than is the response time of process, but
transfer is performed only if it is changed measured value
T7-11
or if it is run out the time which was beforehand defined
as the time between sending of two messages.
More frequent sending of measured values is possible
as well as by the appliances and devices in the wired
network. In the case of appliances which use batteries or
the appliances where important is to preserve energy,
WirelessHART offers users possibility to use the optimal
balance at searching of compromise between speed of
communication and lifetime of battery.
V. SAFETY OF WIRELESSHART NETWORKS
As in other wireless networks, key management is very
difficult and important aspect of network security.
WirelessHART networks use network manager as a
central authority to distribute keys and for other network
management functions. Automatic key management is
very important in any network security system.
In the past, the lack of automatic control keys was a
major lack of cancellation of some network security
solutions. One good example is WEP (Wired Equivalent
Privacy) algorithm for secure communication via the
IEEE 802.11 wireless networks. While the introduction of
WEP in 1997. the idea was to ensure the security of
wireless communication, the same as what is in wired
networks, but due to manual distribution of keys and the
weak algorithm, today is enough a few minutes to break
WEP security.
Modern cryptology algorithms are based on secret
infornation, so-called keys and only using them can be
carryed out the functions of encryption of original
information and the inverse decryption function
Encryption algorithms must be such that security and
confidentiality of encrypted information not depend on the
encryption algorithm, but only of secret keys used.
Secrecy of keys is a basic assumption of the application of
cryptology algorithms in the realization of security
services. In symmetric encryption algorithms it is
necessary that one key is secret and known only to the
partners in communication.
Problem of need for a large number of main keys for all
comunnicating entities can be solved by introducing one
unique center for distribution of the keys KDC (Key
Distribution Center). Using this concept all entities in a
safe manner are taking their main key from the KDC,
which provides them communication with KDC. Entities
who wish to communicate do not possess mutual main
keys and at no time know them, but communicate only by
using the session key generated and assigned by the KDC.
Disadvantage of this protocol is the existence of a single
center which contains all the keys, to whom all a priori
absolutely believe and whose safety at no time should be
questioned. Violation of safety of such center
compromises communication of all entities.
In order to satisfy the security requirements of wireless
media standard for WirelessHART network determines
needs of security managers, who then acts as centralised
KDC which is easy and safe way to manage keys. Under
the management of keys is implied:
1) Generation of keys,
2) Storage of keys,
3) Distribution of keys,
4) Restoring of keys,
5) Withdrawal of keys,
6) Check of keys.
Network manager is obtaining keys from the security
manager by sending request for keys, which is then
distributed to the appropriate device to ensure secure
wireless communication.
VI. TRUETIME SIMULATION MODEL OF NETWORKED
CONTROL SYSTEM
To analyze WirelessHART protocol in the industrial
plant it will be shown simulation of networked control
system whose scheme has been presented in Fig. 5.
Simulations have been made in the Simulink surrounding
using the modified TrueTime dissembler.
Fig 5. Model of control system
Model of simulation may be described in the following
way: Sensor periodically converts analog signal from the
process into digital value and sends it to controller.
Controller, after taking message from the sensor,
calculates the output according to appropriate control
algorithms and sends the control signal to the actuator
using WirelessHART network (Fig. 6). Actuator converts
the control signal into analog and sends it in the process.
Fig. 6. Scheme of communication between devices
T7-12
VII. ADJUSTMENT OF SIMULATION ENVIRONMENT
In the TrueTime simulation model which has been
presented in the Fig. 5. has been designed the networked
control system where have been connected three network
devices using communication via WirelessHART network
[7]. Double-click on Wireless Network block (Fig. 7.)
opens the dialog window in which we put the number of
devices/knots (three) and select the WirelessHART
protocol.
Fig. 7. TrueTime Wireless Network block
A. Initialization of sensor
Network devices/nodes have been simulated in the
subsystem with the TrueTime kernel block. Details of
subsystem for sensor/node1 have been given in the Fig.8.
Sensor/node1 uses one A/D converter in the input part and
one network output (Snd) at the output.
Fig. 8. TrueTime kernel block of sensor
B. Initialization of actuator
Details of subsystem for actuator/node2 have been
given in Fig. 9. Actuator/node2 uses one network input
(Rcv) in the input part and one D/A converter on the
output.
Fig. 9. TrueTime kernel block for actuator
C. Initialization of controller
Controller receives messages from the sensor and sends
data back on the network i.e. to the actuator. Details of
subsystem for the controller/node have been given in Fig.
10., where is used one A/D converter and one network
input (Rcv) on the input part and one network output
(Snd) on the output part.
Fig. 10. TrueTime kernel block of controller
After adjusting parameters of kernel block it is
necessary to create m-file ctrlcode (Fig. 11.) which
calculates the control output signal and uses equations for
PD controllers.
When are connected all previously given Simulink
blocks it is obtained the model of control system (like in
Fig. 5.) whose the wireless communication is realized by
the WirelessHART protocol [7].
T7-13
Fig. 11. Ctrlcode function
VIII.SIMULATION RESULTS
If the simulator does not report errors on the occasion
of starting simulation, by double-click in the model (Fig.
5) on the oscilloscope opens the window like in Fig. 12.
The new opened window makes possible to follow results
of simulation of data transfer using WirelessHART
protocol implemented on the model of control system for
DC servo motor control. Results of simulation of
described model have been presented in Fig.12.
Fig. 12. Simulation results of simple TrueTime control
IX. CONCLUSION
In the paper has been described the new way of
implementation of WirelessHART with the modified
TrueTime simulator based on the MATLAB/Simulink
which can simulate the control device in the execution of
tasks in real-time systems, networks and dynamic plants.
WirelessHART protocol makes possible secure, high
reliable communication with small delay without
influence on the throughput range and performances of
process. All this possibilities are integrated in
WirelessHART standard in order to enable: simplicity,
reliability and safety.
In details have been explained all phases of adjusting
TrueTime simulation surrounding necessary for the
analysis of behavior of WirelessHART protocol
implemented on the example of control system with three
nodes for control of DC servo motor. Also, in the form of
graphs have been illustrated results of simulations for
control and scheduling of executions of tasks in
WirelessHART network.
REFERENCES
[1] HART Communication Foundation, Control with WirelessHART,
HCF LIT-127, Revision 1.0, June30, 2008.
[2] HART Communication Foundation, System Redundancy with
WirelessHART, HCF LIT-128, Revision 1.0, June30, 2008.
[3] HART Communication Foundation, Peer-to-Peer Communication
with Wireless HART, HCF LIT-129, Revision 1.0, September 5,
2008.
[4] A. Cervin, D. Henriksson, M. Ohlin, TrueTime 2.0 beta-Reference
Manual, Department of Automatic Control, Lund University,
Lund, Sweden, January 2009.
[5] M. Kostadinović, M. Stojčev, Z. Bundalo, D. Bundalo,
ā€œManagement of WirelessHART networkā€, Symposium
INFOTEH2009., Jahorina, Bosnia and Herzegovina, Vol. 8, Ref.
A-16, pp. 71-75, March 2009.
[6] M. Kostadinović, M. Stojčev, Z. Bundalo, D. Bundalo, ā€œDesign,
Implementation and Simulation of WirelessHart Networkā€, 9th
International Conference on Telecommunications in Modern
Satellite, Cable and Broadcasting Services TELSIKS 2009., NiÅ”,
Serbia, October 2009, pp. 556-559.
[7] M. Kostadinović, M. Stojčev, Z. Bundalo, D. Bundalo,
ā€œApplication of modified TrueTime simulator in control of
WirelessHart networksā€, Proceedings of Intrenational Symposium
Ee 2009., Novi Sad, Serbia, October, 2009, Paper No. T4-2.5, pp.
1-5.
T7-14

More Related Content

What's hot

Introduction to Data link layer
Introduction to Data link layerIntroduction to Data link layer
Introduction to Data link layer
jagdish25
Ā 
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
International Journal of Science and Research (IJSR)
Ā 
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
IRJET Journal
Ā 
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPVERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
Editor IJMTER
Ā 
Design of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilogDesign of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilog
eSAT Publishing House
Ā 
Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...
Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...
Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...
journalBEEI
Ā 
Marvell Network Telemetry Solutions for Data Center and Enterprise Networks
Marvell Network Telemetry Solutions for Data Center and Enterprise NetworksMarvell Network Telemetry Solutions for Data Center and Enterprise Networks
Marvell Network Telemetry Solutions for Data Center and Enterprise Networks
Marvell
Ā 
Dl34689693
Dl34689693Dl34689693
Dl34689693
IJERA Editor
Ā 
high speed network
high speed networkhigh speed network
high speed network
John Berkmans
Ā 
B0530714
B0530714B0530714
B0530714
IOSR Journals
Ā 
scada
scadascada
scada
edzam
Ā 
Implementation Cost Analysis of the Interpolator for the Wimax Technology
Implementation Cost Analysis of the Interpolator for the Wimax TechnologyImplementation Cost Analysis of the Interpolator for the Wimax Technology
Implementation Cost Analysis of the Interpolator for the Wimax Technology
iosrjce
Ā 
Overview of wireless network control protocol in smart phone devices
Overview of wireless network control protocol in smart phone devicesOverview of wireless network control protocol in smart phone devices
Overview of wireless network control protocol in smart phone devices
eSAT Publishing House
Ā 
IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless Networks
IRJET Journal
Ā 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
Priyasloka Arya
Ā 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ankur Kumar
Ā 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
Vinil Patel
Ā 
Netwrok - Tanen Chapter4-2
Netwrok - Tanen Chapter4-2Netwrok - Tanen Chapter4-2
Netwrok - Tanen Chapter4-2
Nima Ghaedsharafi
Ā 
C08 wireless atm[1]
C08 wireless atm[1]C08 wireless atm[1]
C08 wireless atm[1]
Rio Nguyen
Ā 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
SDMCET DHARWAD
Ā 

What's hot (20)

Introduction to Data link layer
Introduction to Data link layerIntroduction to Data link layer
Introduction to Data link layer
Ā 
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Ā 
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
Ā 
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPVERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
Ā 
Design of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilogDesign of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilog
Ā 
Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...
Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...
Influence of low power consumption on IEEE 802.15.4 in wireless networks perf...
Ā 
Marvell Network Telemetry Solutions for Data Center and Enterprise Networks
Marvell Network Telemetry Solutions for Data Center and Enterprise NetworksMarvell Network Telemetry Solutions for Data Center and Enterprise Networks
Marvell Network Telemetry Solutions for Data Center and Enterprise Networks
Ā 
Dl34689693
Dl34689693Dl34689693
Dl34689693
Ā 
high speed network
high speed networkhigh speed network
high speed network
Ā 
B0530714
B0530714B0530714
B0530714
Ā 
scada
scadascada
scada
Ā 
Implementation Cost Analysis of the Interpolator for the Wimax Technology
Implementation Cost Analysis of the Interpolator for the Wimax TechnologyImplementation Cost Analysis of the Interpolator for the Wimax Technology
Implementation Cost Analysis of the Interpolator for the Wimax Technology
Ā 
Overview of wireless network control protocol in smart phone devices
Overview of wireless network control protocol in smart phone devicesOverview of wireless network control protocol in smart phone devices
Overview of wireless network control protocol in smart phone devices
Ā 
IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless Networks
Ā 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
Ā 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ā 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
Ā 
Netwrok - Tanen Chapter4-2
Netwrok - Tanen Chapter4-2Netwrok - Tanen Chapter4-2
Netwrok - Tanen Chapter4-2
Ā 
C08 wireless atm[1]
C08 wireless atm[1]C08 wireless atm[1]
C08 wireless atm[1]
Ā 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
Ā 

Similar to Simulation model of dc servo motor control

IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET Journal
Ā 
Energy efficient platform designed for sdma applications in mobile wireless ...
Energy efficient platform designed for sdma applications in mobile  wireless ...Energy efficient platform designed for sdma applications in mobile  wireless ...
Energy efficient platform designed for sdma applications in mobile wireless ...
marwaeng
Ā 
E010113235
E010113235E010113235
E010113235
IOSR Journals
Ā 
Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3
IOSR Journals
Ā 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
caijjournal
Ā 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
journalBEEI
Ā 
A novel Ethernet based processing system for remote source harmonic detection
A novel Ethernet based processing system for remote source harmonic detectionA novel Ethernet based processing system for remote source harmonic detection
A novel Ethernet based processing system for remote source harmonic detection
TELKOMNIKA JOURNAL
Ā 
ATM - A Technology Perspective
ATM - A Technology PerspectiveATM - A Technology Perspective
ATM - A Technology Perspective
Ronald Bartels
Ā 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
IJCNCJournal
Ā 
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET Journal
Ā 
Seminar PPT-4.pptx
Seminar PPT-4.pptxSeminar PPT-4.pptx
Seminar PPT-4.pptx
GunnalaSoumya
Ā 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Jaipal Dhobale
Ā 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
Ā 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
CSCJournals
Ā 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
N. A. Sutisna
Ā 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
IJRAT
Ā 
Process monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motorProcess monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motor
eSAT Publishing House
Ā 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
Nishant Munjal
Ā 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
Ā 
Development of A web and GSM Based Monitoring and Controlling System for PLC ...
Development of A web and GSM Based Monitoring and Controlling System for PLC ...Development of A web and GSM Based Monitoring and Controlling System for PLC ...
Development of A web and GSM Based Monitoring and Controlling System for PLC ...
ijsrd.com
Ā 

Similar to Simulation model of dc servo motor control (20)

IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
Ā 
Energy efficient platform designed for sdma applications in mobile wireless ...
Energy efficient platform designed for sdma applications in mobile  wireless ...Energy efficient platform designed for sdma applications in mobile  wireless ...
Energy efficient platform designed for sdma applications in mobile wireless ...
Ā 
E010113235
E010113235E010113235
E010113235
Ā 
Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3
Ā 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
Ā 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
Ā 
A novel Ethernet based processing system for remote source harmonic detection
A novel Ethernet based processing system for remote source harmonic detectionA novel Ethernet based processing system for remote source harmonic detection
A novel Ethernet based processing system for remote source harmonic detection
Ā 
ATM - A Technology Perspective
ATM - A Technology PerspectiveATM - A Technology Perspective
ATM - A Technology Perspective
Ā 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
Ā 
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
Ā 
Seminar PPT-4.pptx
Seminar PPT-4.pptxSeminar PPT-4.pptx
Seminar PPT-4.pptx
Ā 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Ā 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
Ā 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
Ā 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
Ā 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
Ā 
Process monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motorProcess monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motor
Ā 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
Ā 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
Ā 
Development of A web and GSM Based Monitoring and Controlling System for PLC ...
Development of A web and GSM Based Monitoring and Controlling System for PLC ...Development of A web and GSM Based Monitoring and Controlling System for PLC ...
Development of A web and GSM Based Monitoring and Controlling System for PLC ...
Ā 

More from Evans Marshall

Energy profile for environmental monitoring wireless sensor networks
Energy profile for environmental monitoring wireless sensor networksEnergy profile for environmental monitoring wireless sensor networks
Energy profile for environmental monitoring wireless sensor networks
Evans Marshall
Ā 
Surface classification using conformal structures
Surface classification using conformal structuresSurface classification using conformal structures
Surface classification using conformal structures
Evans Marshall
Ā 
Review of analysis of textile squeezing roller
Review of analysis of textile squeezing rollerReview of analysis of textile squeezing roller
Review of analysis of textile squeezing roller
Evans Marshall
Ā 
Dochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videos
Dochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videosDochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videos
Dochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videos
Evans Marshall
Ā 
The study of pattern auto generation system based on silk fabric properties
The study of pattern auto generation system based on silk fabric propertiesThe study of pattern auto generation system based on silk fabric properties
The study of pattern auto generation system based on silk fabric properties
Evans Marshall
Ā 
The application of fuzzy pid and multi-neuron adaptive pid control algorithm ...
The application of fuzzy pid and multi-neuron adaptive pid control algorithm ...The application of fuzzy pid and multi-neuron adaptive pid control algorithm ...
The application of fuzzy pid and multi-neuron adaptive pid control algorithm ...
Evans Marshall
Ā 
Tandem wet on-wet foam application of both crease-resist and antistatic finishes
Tandem wet on-wet foam application of both crease-resist and antistatic finishesTandem wet on-wet foam application of both crease-resist and antistatic finishes
Tandem wet on-wet foam application of both crease-resist and antistatic finishes
Evans Marshall
Ā 
Speed measurement of a general dc brushed motor based on sensorless method
Speed measurement of a general dc brushed motor based on sensorless methodSpeed measurement of a general dc brushed motor based on sensorless method
Speed measurement of a general dc brushed motor based on sensorless method
Evans Marshall
Ā 
Dc motor calculations
Dc motor calculationsDc motor calculations
Dc motor calculations
Evans Marshall
Ā 
moment of inertia
moment of inertiamoment of inertia
moment of inertia
Evans Marshall
Ā 
Sensirion humidity sensors_sht1x_datasheet_v5
Sensirion humidity sensors_sht1x_datasheet_v5Sensirion humidity sensors_sht1x_datasheet_v5
Sensirion humidity sensors_sht1x_datasheet_v5
Evans Marshall
Ā 

More from Evans Marshall (11)

Energy profile for environmental monitoring wireless sensor networks
Energy profile for environmental monitoring wireless sensor networksEnergy profile for environmental monitoring wireless sensor networks
Energy profile for environmental monitoring wireless sensor networks
Ā 
Surface classification using conformal structures
Surface classification using conformal structuresSurface classification using conformal structures
Surface classification using conformal structures
Ā 
Review of analysis of textile squeezing roller
Review of analysis of textile squeezing rollerReview of analysis of textile squeezing roller
Review of analysis of textile squeezing roller
Ā 
Dochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videos
Dochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videosDochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videos
Dochelp.net-video-google-a-text-retrieval-approach-to-object-matching-in-videos
Ā 
The study of pattern auto generation system based on silk fabric properties
The study of pattern auto generation system based on silk fabric propertiesThe study of pattern auto generation system based on silk fabric properties
The study of pattern auto generation system based on silk fabric properties
Ā 
The application of fuzzy pid and multi-neuron adaptive pid control algorithm ...
The application of fuzzy pid and multi-neuron adaptive pid control algorithm ...The application of fuzzy pid and multi-neuron adaptive pid control algorithm ...
The application of fuzzy pid and multi-neuron adaptive pid control algorithm ...
Ā 
Tandem wet on-wet foam application of both crease-resist and antistatic finishes
Tandem wet on-wet foam application of both crease-resist and antistatic finishesTandem wet on-wet foam application of both crease-resist and antistatic finishes
Tandem wet on-wet foam application of both crease-resist and antistatic finishes
Ā 
Speed measurement of a general dc brushed motor based on sensorless method
Speed measurement of a general dc brushed motor based on sensorless methodSpeed measurement of a general dc brushed motor based on sensorless method
Speed measurement of a general dc brushed motor based on sensorless method
Ā 
Dc motor calculations
Dc motor calculationsDc motor calculations
Dc motor calculations
Ā 
moment of inertia
moment of inertiamoment of inertia
moment of inertia
Ā 
Sensirion humidity sensors_sht1x_datasheet_v5
Sensirion humidity sensors_sht1x_datasheet_v5Sensirion humidity sensors_sht1x_datasheet_v5
Sensirion humidity sensors_sht1x_datasheet_v5
Ā 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
Ā 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
Ā 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
Ā 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
Ā 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
Ā 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
Ā 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
Ā 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
Ā 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-UniversitƤt
Ā 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
Ā 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
Ā 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
Ā 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
Ā 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
Ā 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
Ā 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
Ā 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
Ā 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
Ā 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
Ā 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
Ā 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Ā 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Ā 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Ā 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Ā 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Ā 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
Ā 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Ā 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Ā 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Ā 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
Ā 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
Ā 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
Ā 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Ā 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Ā 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Ā 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Ā 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Ā 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Ā 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Ā 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Ā 

Simulation model of dc servo motor control

  • 1. Simulation model of DC servo motor control Miroslav Kostadinovićāˆ— , Mile Stojčevāˆ—āˆ— , Zlatko Bundaloāˆ—āˆ—āˆ— , DuÅ”anka Bundaloāˆ—āˆ—āˆ—āˆ— * University of East Sarajevo, Faculty of Traffic and Transportation, Doboj, Bosnia and Herzegovina, e-mail: kostadinovicm@gmail.com ** University of NiÅ”, Faculty of Electronic Engineering, NiÅ”, Serbia, e-mail: mile.stojcev@elfak.ni.ac.rs *** University of Banja Luka, Faculty of Electrical Engineering, Banja Luka, Bosnia and Herzegovina, e-mail: zbundalo@etfbl.net **** UniCredit Bank, Banja Luka, Bosnia and Herzegovina, e-mail: zbundalo@etfbl.net Abstractā€”In the paper are explained in details all phases of adjusting TrueTime simulation surrounding necessary for analysis of behavior of WirelessHART protocol implemented on the example of control system with three nodes for control of DC servo motor. At the end of paper are given obtained results of simulation for control and planing of execution tasks in WirelessHART network. Keywordsā€”DC machine, Industrial communications, Modelling, Sensor, Simulation. I. INTRODUCTION WirelessHART protocol has relatively low speed of data transfer in the comparison with the IEEE 802.11g standard for computer wireless networks. This protocol works on the frequency of 2.4GHz in the ISM radio range using the Time Division Multiple Access (TDMA) for access to communication medium [1]. The complete time of communications executes inside of predetermined time slot of 10 ms. Series of the time slots form superframe for the data transfer and WirelessHART makes possible the hopping between communication channels in order to avoid interference and reduce multi-path fading effect. One or more appliances or devices which send data and one or more appliances or devices which receive data can be determined that communicate mutually in one beforehand envisaged time slot. Time slot may be reserved for communication of only one appliance or can support dividing of data transfer across one time slot [2]. WirelessHART is communication protocol that is organized like the ISO/OSI 7 communication model. Data transfer from all communication appliances in WirelessHart network passes across the gateway (Fig. 1). It can be seen that gateway must direct packages towards beforehand quoted given destination. Gateway uses standard HART commands for communication with network devices and host applications. The network manager creates start superframe and configures Gateway [3]. II. SIMULATOR DESCRIPTION Here is described the usage of original simulator (dissembler) TrueTime based on the MATLAB/Simulink, which simulates regulating and control mechanism in execution of tasks in real-time systems, networks (wired or wireless) and dynamic plants. Originally have been implemented two types of communication protocols, 802.11b/g (WLAN) and 802.15.4 (ZigBee), and the usage possibility of WirelessHart has been added later. Aim of WirelessHart development is to establish standard for wireless communication for usage in process automatics. WirelessHart makes possible cheap and relatively slow, in the comparison with 802.11b/g, wireless connection with HART-enabled devices. The WirelessHART network protocol is time divided into slots where every slot lasts 10ms. Slots can be dedicated to one node and use TDMA technique for access to the medium or can be divided between a few nodes and use CSMA/CA technique for access to the medium. Fig. 1. Structure of WirelessHART network TrueTime consists of the library of blocks as shown in the Fig. 2. with following functions: 1) TrueTime Kernel: Executes user defined tasks and interrupts which for example present input/output tasks, control algorithms and network interfaces. 2) TrueTime Network: This block is used to simulate access to the medium and transfer of packages according to the chosen network model. 3) TrueTime Wireless Network: Function of this block is similar as of the TrueTime Network block, but instead of wire network it uses wireless network. 4) TrueTime Battery: This block is used to simulate the battery-powered supply. 5) ttGetMsg: It is used for reception of messages from the network. 6) ttSendMsg: It is used for sending messages on the network. TrueTime is not compose only from library blocks (Fig. 2) but also of collections of C++ functions with the 14th International Power Electronics and Motion Control Conference, EPE-PEMC 2010 978-1-4244-7855-2/10/$26.00 Ā©2010 IEEE T7-10
  • 2. suitable MATLAB MEX interfaces. Some of the functions make possible by simulation creation of tasks, manually interrupting, surveillance, timers, etc. The other functions are real-time which are called by the code during execution of task and enable AD/DA conversion, sending and receiving of messages, etc. Fig. 2. The TrueTime 2.0 block library TrueTime has been developed in Simulink, which takes care of the managing system in the meaning of performances, stability and endurance, and primarily has been intended for usage together with the MATLAB/Simulink [4]. III. ADJUSTMENT OF KERNEL AND WIRELESS NETWORK BLOCK Configuration of the TrueTime Kernel has been presented in the Fig. 3., where the input ports ā€žInterruptsā€œ and ā€žRcvā€œ are connected with grounding which is in ā€žSourcesā€œ menu of Simulink library. Output ports ā€žSnd, ā€žMonitorsā€ and ā€žPā€œ are connected with terminators which are in ā€žSinksā€œ menu of Simulink library. Output port ā€žScheduleā€œ has been connected with the oscilloscope which has been marked with ā€žScheduleā€œ and is in ā€žSinksā€œ menu of Simulink library. Fig. 3. Configuration of TrueTime Kernel ports A/D input port has been connected with two input ports marked with r and y, via the multiplexer which is in ā€žSignal Routingā€œ menu of Simulink library, and D/A output port of kernel has been connected on output port and marked with ā€žuā€œ. Wireless Network block makes possible simulation of communication between two nodes, and in the original TrueTime simulator have been supported two communication protocols: IEEE 802.11b/g (WLAN) and IEEE 802.15.4 (ZigBee), while the WirelessHART protocol has been subsequently added [4]. IV. CONTROL PERFORMANCES OF WIRELESSHART Already two decades HART communication presents the standard for the simplicity, safety and reliability in the process industry. WirelessHART has been designed primarily to cover very wide range of needs in the process industry from the simple supervision to the control in closed loops [5]. Testing and experiments in the field with wireless appliances and devices have shown that these appliances provide correctness of communications, stability, reliability and that can satisfy all needs of supervision and control in industrial processes. Control applications require periodical samples and on this occasion appear disturbances and delays which especially appear in WirelessHART technology. Actually, control performances with WirelessHART can be compared with the wired system that uses conventional field bus highway. Farther have been presented the some of the factors which appear in uses of WirelessHART. Sampling speed for WirelessHART is determined from the condition that needs to be fulfilled on the basis of the requirement of concrete control loop while it is necessary at the same time to minimize influence of energy consumption of field appliances which can be supplied using batteries. Usual rule based on experience from practical systems of control is that the feedback control information is taken 4 to 10 times faster than is the speed of process response, where the time of response of process is equal to sum of time constant and dead time of process. Measuring systems are often unsynchronized with the control system and measured values are usually sampled 2 to 10 times faster than is the answer of process on the change of parameter. In wireless systems it is desirable to reduce the sampling frequency and speed of communication with the measuring device in order to extend the life cycle of battery. Communication using WirelessHART protocol is realized without endangering the reliability of control [6]. Fig. 4. shows two methods that are used by the sampling: Fig. 4. Synchronized sampling of time slots 1) Synchronized. Samples are taken only when it is necessary control above the process. 2) Synchronized with exception reporting. Samples are taken for beforehand envisaged intervals, for example 4 to 10 times faster than is the response time of process, but transfer is performed only if it is changed measured value T7-11
  • 3. or if it is run out the time which was beforehand defined as the time between sending of two messages. More frequent sending of measured values is possible as well as by the appliances and devices in the wired network. In the case of appliances which use batteries or the appliances where important is to preserve energy, WirelessHART offers users possibility to use the optimal balance at searching of compromise between speed of communication and lifetime of battery. V. SAFETY OF WIRELESSHART NETWORKS As in other wireless networks, key management is very difficult and important aspect of network security. WirelessHART networks use network manager as a central authority to distribute keys and for other network management functions. Automatic key management is very important in any network security system. In the past, the lack of automatic control keys was a major lack of cancellation of some network security solutions. One good example is WEP (Wired Equivalent Privacy) algorithm for secure communication via the IEEE 802.11 wireless networks. While the introduction of WEP in 1997. the idea was to ensure the security of wireless communication, the same as what is in wired networks, but due to manual distribution of keys and the weak algorithm, today is enough a few minutes to break WEP security. Modern cryptology algorithms are based on secret infornation, so-called keys and only using them can be carryed out the functions of encryption of original information and the inverse decryption function Encryption algorithms must be such that security and confidentiality of encrypted information not depend on the encryption algorithm, but only of secret keys used. Secrecy of keys is a basic assumption of the application of cryptology algorithms in the realization of security services. In symmetric encryption algorithms it is necessary that one key is secret and known only to the partners in communication. Problem of need for a large number of main keys for all comunnicating entities can be solved by introducing one unique center for distribution of the keys KDC (Key Distribution Center). Using this concept all entities in a safe manner are taking their main key from the KDC, which provides them communication with KDC. Entities who wish to communicate do not possess mutual main keys and at no time know them, but communicate only by using the session key generated and assigned by the KDC. Disadvantage of this protocol is the existence of a single center which contains all the keys, to whom all a priori absolutely believe and whose safety at no time should be questioned. Violation of safety of such center compromises communication of all entities. In order to satisfy the security requirements of wireless media standard for WirelessHART network determines needs of security managers, who then acts as centralised KDC which is easy and safe way to manage keys. Under the management of keys is implied: 1) Generation of keys, 2) Storage of keys, 3) Distribution of keys, 4) Restoring of keys, 5) Withdrawal of keys, 6) Check of keys. Network manager is obtaining keys from the security manager by sending request for keys, which is then distributed to the appropriate device to ensure secure wireless communication. VI. TRUETIME SIMULATION MODEL OF NETWORKED CONTROL SYSTEM To analyze WirelessHART protocol in the industrial plant it will be shown simulation of networked control system whose scheme has been presented in Fig. 5. Simulations have been made in the Simulink surrounding using the modified TrueTime dissembler. Fig 5. Model of control system Model of simulation may be described in the following way: Sensor periodically converts analog signal from the process into digital value and sends it to controller. Controller, after taking message from the sensor, calculates the output according to appropriate control algorithms and sends the control signal to the actuator using WirelessHART network (Fig. 6). Actuator converts the control signal into analog and sends it in the process. Fig. 6. Scheme of communication between devices T7-12
  • 4. VII. ADJUSTMENT OF SIMULATION ENVIRONMENT In the TrueTime simulation model which has been presented in the Fig. 5. has been designed the networked control system where have been connected three network devices using communication via WirelessHART network [7]. Double-click on Wireless Network block (Fig. 7.) opens the dialog window in which we put the number of devices/knots (three) and select the WirelessHART protocol. Fig. 7. TrueTime Wireless Network block A. Initialization of sensor Network devices/nodes have been simulated in the subsystem with the TrueTime kernel block. Details of subsystem for sensor/node1 have been given in the Fig.8. Sensor/node1 uses one A/D converter in the input part and one network output (Snd) at the output. Fig. 8. TrueTime kernel block of sensor B. Initialization of actuator Details of subsystem for actuator/node2 have been given in Fig. 9. Actuator/node2 uses one network input (Rcv) in the input part and one D/A converter on the output. Fig. 9. TrueTime kernel block for actuator C. Initialization of controller Controller receives messages from the sensor and sends data back on the network i.e. to the actuator. Details of subsystem for the controller/node have been given in Fig. 10., where is used one A/D converter and one network input (Rcv) on the input part and one network output (Snd) on the output part. Fig. 10. TrueTime kernel block of controller After adjusting parameters of kernel block it is necessary to create m-file ctrlcode (Fig. 11.) which calculates the control output signal and uses equations for PD controllers. When are connected all previously given Simulink blocks it is obtained the model of control system (like in Fig. 5.) whose the wireless communication is realized by the WirelessHART protocol [7]. T7-13
  • 5. Fig. 11. Ctrlcode function VIII.SIMULATION RESULTS If the simulator does not report errors on the occasion of starting simulation, by double-click in the model (Fig. 5) on the oscilloscope opens the window like in Fig. 12. The new opened window makes possible to follow results of simulation of data transfer using WirelessHART protocol implemented on the model of control system for DC servo motor control. Results of simulation of described model have been presented in Fig.12. Fig. 12. Simulation results of simple TrueTime control IX. CONCLUSION In the paper has been described the new way of implementation of WirelessHART with the modified TrueTime simulator based on the MATLAB/Simulink which can simulate the control device in the execution of tasks in real-time systems, networks and dynamic plants. WirelessHART protocol makes possible secure, high reliable communication with small delay without influence on the throughput range and performances of process. All this possibilities are integrated in WirelessHART standard in order to enable: simplicity, reliability and safety. In details have been explained all phases of adjusting TrueTime simulation surrounding necessary for the analysis of behavior of WirelessHART protocol implemented on the example of control system with three nodes for control of DC servo motor. Also, in the form of graphs have been illustrated results of simulations for control and scheduling of executions of tasks in WirelessHART network. REFERENCES [1] HART Communication Foundation, Control with WirelessHART, HCF LIT-127, Revision 1.0, June30, 2008. [2] HART Communication Foundation, System Redundancy with WirelessHART, HCF LIT-128, Revision 1.0, June30, 2008. [3] HART Communication Foundation, Peer-to-Peer Communication with Wireless HART, HCF LIT-129, Revision 1.0, September 5, 2008. [4] A. Cervin, D. Henriksson, M. Ohlin, TrueTime 2.0 beta-Reference Manual, Department of Automatic Control, Lund University, Lund, Sweden, January 2009. [5] M. Kostadinović, M. Stojčev, Z. Bundalo, D. Bundalo, ā€œManagement of WirelessHART networkā€, Symposium INFOTEH2009., Jahorina, Bosnia and Herzegovina, Vol. 8, Ref. A-16, pp. 71-75, March 2009. [6] M. Kostadinović, M. Stojčev, Z. Bundalo, D. Bundalo, ā€œDesign, Implementation and Simulation of WirelessHart Networkā€, 9th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services TELSIKS 2009., NiÅ”, Serbia, October 2009, pp. 556-559. [7] M. Kostadinović, M. Stojčev, Z. Bundalo, D. Bundalo, ā€œApplication of modified TrueTime simulator in control of WirelessHart networksā€, Proceedings of Intrenational Symposium Ee 2009., Novi Sad, Serbia, October, 2009, Paper No. T4-2.5, pp. 1-5. T7-14