The Application and Design of the Smart Home Wireless Bus Protocol Based on the NRF24L01

2011 ◽  
Vol 271-273 ◽  
pp. 991-994
Author(s):  
Qing Fu Huang ◽  
Jian Wu Yang ◽  
Zhi Cheng Chen

With the development of the technology and society, the resolution of the wireless LAN would be the direction which is leading the smart home LAN’s construction, the IR, RF, Bluetooth, Zigbee, GPRS, and others wireless methods have been applied in the smart home smoothly, like the control, security, data transmission, now it is time to specified the rules for the wireless technology in the smart home, this paper introduces a kind of the smart home wireless bus protocol that based on the Modbus protocol, and the hardware and PC software have been designed for it, the project achieved the operation and communication among the nodes, the test realizes that it has the better data transmission mechanism when adopting the wireless bus protocol, and make sure the reliability of the data transmission between the nodes in the smart home.

2020 ◽  
Vol 21 (1) ◽  
pp. 6-12
Author(s):  
Javier Pinzón Castellanos ◽  
Miguel Antonio Cadena Carter

Fog Computing is the distributed computing layer that lies between the user and the cloud. A successful fog architecture reduces delay or latency and increases efficiency. This paper describes the development and implementation of a distributed computing architecture applied to an automation environment that uses Fog Computing as an intermediary with the cloud computing layer. This study used a Raspberry Pi V3 board connected to end control elements such as servomotors and relays, indicators and thermal sensors. All is controlled by an automation framework that receives orders from Siri and executes them through predetermined instructions. The cloud connection benefits from a reduced amount of data transmission, because it only receives relevant information for analysis.


Author(s):  
Lang Ruan ◽  
Jin Chen ◽  
Qiuju Guo ◽  
Han Jiang ◽  
Yuli Zhang ◽  
...  

UAV cooperative control has been an important issue in UAV-assisted sensor network, thanks to the considerable benefit obtained from cooperative mechanism of UAVs being applied as a flying base station. In coverage scenario, the tradeoff between coverage performance and transmission performance often makes deployment of UAVs fall into a dilemma, since both indexes are related to the distance between UAVs. To address this issue, UAV coverage and data transmission mechanism is analyzed in this paper, then an efficient multi-UAV cooperative deployment model is proposed. The problem is also modeled as a coalition formation game (CFG). The CFG with Pareto order is proved to have a stable partition. Then, an effective approach consisting of coverage deployment and coalition selection is designed, wherein UAVs can decide strategies cooperatively to achieve better coverage performance. Combining analysis of game approach, a coalition selection and position deployment algorithm based on Pareto order (CSPDA-PO) is designed to execute coverage deployment and coalition selection. Finally, simulation results are shown to validate the proposed approach based on efficient multi-UAV cooperative deployment model.


IEEE Network ◽  
2018 ◽  
Vol 32 (5) ◽  
pp. 118-123 ◽  
Author(s):  
Jiajie Zhang ◽  
Jian Weng ◽  
Weiqi Luo ◽  
Jia-Nan Liu ◽  
Anjia Yang ◽  
...  

2008 ◽  
pp. 1349-1360
Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Jonny Karlsson

In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data-transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003).


Author(s):  
Keyurkumar J. Patel

Wireless Technology is growing at a phenomenal rate. Of the many present challenges highlighted by the author, increased security is one of the main challenges for both developers and end users. This chapter presents this important security aspect of implementing a mobile solution in the context of Sydney International airport. After tackling initial challenges and issues faced during the implementation of wireless technology, this chapter demonstrates how security issues and wireless application were implemented at this mobile-intense airport organization. The decision to deploy and manage the wireless spectrum throughout the Airport campus meant that the wireless LAN had to share the medium with public users, tenants and aircraft communications on the same bandwidth. Therefore, this case study also demonstrates invaluable approach to protect unintended users from breach of existing security policies adopted by their corporate network. Authentication and data privacy challenges, as well as complete WLAN connectivity for tenants, public and corporate usage is presented in this case study.


Sign in / Sign up

Export Citation Format

Share Document