scholarly journals Implementasi Master-slave pada Embedded system menggunakan komunikasi RS485

ELKHA ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 26
Author(s):  
Agusma Wajiansyah ◽  
Supriadi Supriadi

The use of multiprocessor methods in robotics systems has a significant impact on overall robot performance. The Master-slave method is a model of a multiprocessor system where there are several processors that communicate with each other to carry out the robot's overall function. RS-485 can be used as a communication model in the master-slave method. RS-485 is a development of RS-232 which has the ability to communicate with several nodes. In this research, an experiment will be conducted to implement RS-485 to support the master-slave processor communication. Stages of research began with making system design, which includes the design of embedded hardware systems, the design of data communication protocols on RS-485 networks, software design, followed by implementation and testing. The test is carried out to measure the time response of the device to three data transmission models, namely broadcast, addressing slaves without responding and addressing slaves with responses. The test results carried out on three slaves with a communication speed of 9600 bps. Measured response time on broadcast data transmission is 8ms, and address slave without response is 7ms. Whereas delivery by addressing slaves with responses, shows that the measurement method cannot be applied.

2019 ◽  
Vol 6 (2) ◽  
pp. 143
Author(s):  
Alam Rahmatulloh

<p><em>Foreign Citizens (FC) after entering Indonesian territory according to applicable legal procedures, the presence of foreigners can be anywhere. Problems also arise when parties involved in supervising foreigners cannot contact foreigners who experience immigration problems and do not know the location of the presence of current foreigners or where they were. One solution to this problem is implementing real time data communication to monitor the location of foreigners, so that foreigners can always be monitored. Before going to the residence, a consideration is needed to determine which residence of the foreigner to be visited. Knowing the distance of a foreigner's residence can be an added point in these considerations. The Haversine method is implemented by calculating the distance between parties involved in the supervision of foreigners with each address of the foreigner's residence. The comparison test results of the Haversine method with Google Maps in this study, which has an average difference of 0.039 km in terms of distance based on a straight line. Real time data communication technology using websocket is implemented into a WNA surveillance system, consisting of web-based applications and android-based applications that are interconnected into websocket networks. The average results of profiling the speed of writing data for 15 minutes from the smartphone to the real time firebase database which is 1.4 milliseconds with 10 seconds of data transmission interval from the smartphone and the results of the average speed of receiving data from firebase realtime database to the WNA monitoring system ie 0 , 36 seconds with the data receiving interval from firebase realtime database 10 seconds.</em></p><p><em><strong>Keywords</strong></em><em>: Firebase Realtime Database, Foreign Citizens</em><em>,</em><em> Haversine, Websocket</em></p><p><em>Warga Negara Asing (WNA) setelah memasuki wilayah Indonesia sesuai prosedur hukum yang berlaku, maka keberadaan WNA dapat berada dimana saja. Masalah pun timbul ketika pihak yang terlibat dalam pengawasan WNA tidak dapat menghubungi WNA yang mengalami masalah keimigrasian dan tidak mengetahui lokasi keberadaan WNA saat ini ataupun lokasi keberadaan sebelumnya. Salah satu solusi dari permasalahan tersebut yaitu mengimplementasikan komunikasi data real time untuk mengawasi lokasi keberadaan WNA, sehingga pergerakan WNA dapat selalu terawasi. Sebelum mendatangi tempat tinggal tersebut, dibutuhkan sebuah pertimbangan untuk menentukan tempat tinggal WNA mana dulu yang akan didatangi. Mengetahui jarak tempat tinggal WNA dapat menjadi poin tambah dalam pertimbangan tersebut. Metode haversine diimplementasikan dengan cara menghitung jarak antara pihak yang terlibat dalam pengawasan WNA dengan setiap alamat tempat tinggal WNA. Hasil pengujian perbandingan metode haversine dengan google maps pada penelitian ini yaitu mempunyai rata-rata selisih sebesar 0,039 km dalam hal jarak berdasarkan garis lurus. Teknologi komunikasi data real time menggunakan websocket diimplementasikan kedalam sebuah sistem pengawasan WNA, terdiri dari aplikasi berbasis web dan aplikasi berbasis android yang saling terhubung kedalam jaringan websocket. Hasil rata-rata profiling kecepatan proses tulis data selama 15 menit dari smartphone ke firebase realtime database yaitu 1,4 milidetik dengan interval pengiriman data dari smartphone 10 detik sekali dan hasil rata-rata kecepatan penerimaan data dari firebase realtime database ke sistem pengawasan WNA yaitu 0,36 detik dengan interval penerimaan data dari firebase realtime database 10 detik sekali.</em></p><em><strong>Kata kunci</strong></em><em>: Firebase Realtime Database, Haversine, Pengawasan WNA,</em><em> </em><em>Websocket</em>


2020 ◽  
Vol 3 (2) ◽  
pp. 103-113
Author(s):  
Rachmad Ikhsan ◽  
Effendi Effendi

Roasting coffee manually is widely applied by coffee producers. This process takes a very long time and is less efficient in terms of productivity for industry standards. This machine  is equipped with a thermocouple sensor as a temperature sensor that will measure the temperature in the roasting cylinder, then equipped with a timer as a reminder of roasting time that ranges from 15 minutes at a temperature of 200 degrees Celsius, this machine  is also equipped with android as a timer controller on the coffee roaster machine. This machine is also equipped with a microcontroller and Bluetooth as a media transmitter and data receiver. From the test results obtained data that Bluetooth can be used for data communication between the microcontroller and Android with a distance of 30 meters in the room, and 12 meters outside the room. If it exceeds that distance, then Bluetooth will not respond back


Vibration ◽  
2021 ◽  
Vol 4 (3) ◽  
pp. 551-584
Author(s):  
Samir Mustapha ◽  
Ye Lu ◽  
Ching-Tai Ng ◽  
Pawel Malinowski

The development of structural health monitoring (SHM) systems and their integration in actual structures has become a necessity as it can provide a robust and low-cost solution for monitoring the structural integrity of and the ability to predict the remaining life of structures. In this review, we aim at focusing on one of the important issues of SHM, the design, and implementation of sensor networks. Location and number of sensors, in any SHM system, are of high importance as they impact the system integration, system performance, and accuracy of assessment, as well as the total cost. Hence we are interested in shedding the light on the sensor networks as an essential component of SHM systems. The review discusses several important parameters including design and optimization of sensor networks, development of academic and commercial solutions, powering of sensors, data communication, data transmission, and analytics. Finally, we presented some successful case studies including the challenges and limitations associated with the sensor networks.


2010 ◽  
Vol 455 ◽  
pp. 206-210
Author(s):  
Jun Li Liu ◽  
Yan Yan Yan ◽  
G.Q. He

It discusses the reasons of the data transmission time delay and packets loss based on the theory of net data transmission. Aimed to the question of the time delay of data transmission and packets loss, the control system models are set up to analyze their influence to the performance of the control system. Based on the synchronous control model analysis with wireless data transmission, a method to control the system is reached with the state prediction when the communication error or data loss appears. It can control constantly when communication errors appear, and also it can get the most error period by numerical analysis.


2017 ◽  
Vol 13 (05) ◽  
pp. 56
Author(s):  
Yan Chen

With the progress of the times, the network has grown into the people's work and life. The limitations of the traditional wireless sensor network (WSN) have become increasingly prominent, and it is obviously unable to meet the requirements of Internet access. Therefore, the 4G mobile Android system is used as a carrier, to design an application layer gateway system for realizing wireless communication between wireless sensor networks and heterogeneous cellular networks, so as to build wireless sensor cellular network. The design and implementation of the AP module, data receiving and forwarding module, network packet loss management and retransmission of the gateway systemis the focus, and then the implemented gateway system is tested. The test results show that the design of the Android platform wireless sensor network gateway system can connect the sensor network to the cellular network, so as to realize data communication, and to ensure that the data loss rate is less than 0.1%. Through testing, it is concluded that the system can meet the actual demand


2011 ◽  
Vol 97-98 ◽  
pp. 787-793 ◽  
Author(s):  
Shen Hua Yang ◽  
Guo Quan Chen ◽  
Xing Hua Wang ◽  
Yue Bin Yang

Due to the target ship in the traditional ship handling simulator have not the ability to give way to other ships automatically to avoid collision, this paper put forward a new idea that bringing the hydraulic servo platform, six degrees of freedom ship mathematical model, the actual traffic flow, researching achievement of automatic anti-collision in research of the new pattern ship handling simulator, and successfully develop the Intelligent Ship Handling Simulator(ISHS for short). The paper focuse on the research on the network communication model of ISHS. We took the entire simulator system as three relatively independent networks, proposed a framework of communication network that combined IOCP model based on TCP with blocking model based on UDP, and gave the communication process and protocols of system. Test results indicate that this is an effective way to improve the ownship capacity of ship handling simulator and meet the need of multi-ownship configuration of desktop system of ship handling simulator.


2020 ◽  
Vol 3 (2) ◽  
pp. 128-139
Author(s):  
I Gusti Made Ngurah Desnanjaya ◽  
Mohammad Dwi Alfian

Wireless Sensor Network is a wireless network technology that includes sensor nodes and embedded systems. WSN has several advantages: it is cheaper for large-scale applications, can withstand extreme environments, and data transmission is relatively more stable. One of the WSN devices is nRF24L01+. Within the specifications given, the maximum communication distance is 1.1 km. However, the most effective distance for transmitting data in line of sight and non-line of sight is still unknown. Therefore, testing and analysis are needed so that the nRF24L01+ device can be used optimally for communication and data transmission. Through testing analysis on nRF24L01+ line of sight, Kuta beach location in Bali and non-line of sight on the STMIK STIKOM Indonesia campus. The effective communication distance of the nRF24L01+ module in line of sight is between 1 and 1000 meters. The distance of 1000 meters is the limit of the effective distance for sending data, and the packet loss rate is less than 15% which is included in the medium category. Meanwhile, in the non-line of sight, the effective distance of the nRF24L01+ communication module is 20 meters, and the packet loss is close to 15%, which is a moderate level limit. With the analysis module, nRF24L01+ can be a reference in determining the effective distance on WSN nRF24L01+ in determining remote control equipment data communication.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Zhonglin Chen ◽  
Shanzhi Chen ◽  
Hui Xu ◽  
Bo Hu

The ultradense network (UDN) is one of the most promising technologies in the fifth generation (5G) to address the network system capacity issue. It can enhance spatial reuse through the flexible, intensive deployment of small base stations. A universal 5G UDN architecture is necessary to realize the autonomous and dynamic deployment of small base stations. However, the security of the 5G UDN is still in its infancy, and the data communication security among the network entities is facing new challenges. In this paper, we proposed a new security based on implicit certificate (IC) scheme; the scheme solves the security problem among the access points (APs) in a dynamic APs group (APG) and between the AP and user equipment (UE). We present each phase regarding how two network entities obtain the Elliptic Curve Qu-Vanstone (ECQV) implicit certificate scheme, verify each other’s identity, and share keys in an UDN. Finally, we extensively analyze our lightweight security communication model in terms of security and performance. The simulation on network bandwidth evaluation is also conducted to prove the efficiency of the solution.


2001 ◽  
Vol 16 (supp01c) ◽  
pp. 1175-1177 ◽  
Author(s):  
◽  
Paul Chang

The DOIM (Dense Optical-electrical Interface Modules) is a custom-designed optical data transmission module employed in the upgrade of Silicon Vertex Detector of CDF experiment at Fermilab. Each DOIM module consists a transmitter(TX) converting electrical differential input signals to optical outputs, a middle segment of jacketed fiber ribbon cable, and a receiver (RX) which senses the light inputs and converts them back to electrical signals. The targeted operational frequency is 53 MHz, and higher rate is achievable. This article outlines the design goals, implementation methods, production test results, and radiation hardness tests of these modules.


2019 ◽  
Vol 59 (2) ◽  
pp. 126-133
Author(s):  
Haider Tarish Haider ◽  
Dhiaa Halboot Muhsen ◽  
Haider Ismael Shahadib ◽  
Ong Hang See

Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high capacity data communication model is proposed to protect the transmitted data based on identical frames between a secret and cover data. In this model, the cover data does not convey any embedded data (as in normal steganography system) or modify the secret message (as in traditional cryptography techniques). Alternatively, the proposed model sends the positions of the cover frames that are identical with the secret frames to the receiver side in order to recover the secret message. One of the significant advantages of the proposed model is the size of the secret key message which is considerably larger than the cover size, it may be even hundred times larger. Accordingly, the experimental results demonstrate a superior performance in terms of the capacity rate as compared to the traditional steganography techniques. Moreover, it has an advantage in terms of the required bandwidth to send the data or the required memory for saving when compared to the steganography methods, which need a bandwidth or memory up to 3-5 times of the original secret message. Where the length of the secret key (positions of the identical frames) that should be sent to the receiver increases by only 25% from the original secret message. This model is suitable for applications with a high level of security, high capacity rate and less bandwidth of communication or low storage devices.


Sign in / Sign up

Export Citation Format

Share Document