Remote Tool Health Monitoring Using Wireless Sensors on Rotational Machinery

Author(s):  
Mark D. Rynders ◽  
David R. Loker ◽  
John T. Roth

A key concern in modern day manufacturing is developing a reliable method for monitoring tool health. This involves not only establishing a mathematical method for deriving tool failure, but also developing a reliable method for collecting and transmitting this information. This paper presents a reliable wireless network for collecting, analyzing, and predicting tool failure. The wireless network consists of three remote nodes and one coordinator node. Each remote node is mounted on a 1″ R8 mill tool holder and consists of three major components: an accelerometer, microcontroller, and wireless transceiver. These wireless nodes transmit the Z-axis acceleration (the machines vertical Z-axis) as seen by the tool holder back to a central computer. This computer utilizes LabVIEW in order to collect and analyze the acceleration data. The LabVIEW program also acts as a simple user interface for indicating states of tool failure, along with providing a means for publishing the information to the internet for process monitoring by remote users. The wireless network discussed in this paper is robust, inexpensive, and was found to reliably monitor and predict tool health conditions. The innovative aspect of this work is the ability to use commercial-off-the-shelf wireless sensors to remotely monitor multiple rotational machines from a single location on site and over the internet to off-site locations.

2011 ◽  
Vol 121-126 ◽  
pp. 1259-1263
Author(s):  
Zhong Min Yao ◽  
Xi Guang Liu ◽  
Ya Zhen Wang

With the application scale and area of the building PV power station continuous extension, data transmission and monitoring management of the building PV power station have become increasingly important.This paper introduces a kind of data delivering and distributed monitoring management system of the building PV power station based on ZigBee wireless network,this system has information transmission modules based on ZigBee wireless network, region monitoring and magement module and remote access module. ZigBee wireless network could deliver datas of the building PV power station to the center of region monitoring and management system,ultimately,the datas were deposited in the database of region monitoring and management system,The Electricity Regulatory Office and The Power Company used remote transmission and monitoring system by remote access system on the Internet, to access data reports of the building PV power station in the database of region monitoring and magement system.System test results can carry out the building PV power station’s data transmission, monitoring system’s data management and remote access by the Internet.


Media Iuris ◽  
2020 ◽  
Vol 3 (1) ◽  
pp. 1
Author(s):  
Chrisna Arwiandra Leuwol ◽  
Ludevikus Limdianda ◽  
Arjuna Rizky Dwi Krisnayana

The development of advanced technology and faster, ease of accessing the virtual world leads to equal public access to information collected on the internet, one of which is a song, a recording of rhythmic sound that was originally shaped physics from the record vinyl then to become a tape cassette for radio tape and now evolved along with technology into digital media like DVD, Flash disk, and Hard disk. The Internet connects the global world to a single location. Based on this case KEMENKOMINFO (Ministry of Communication and Informatics) has attempted to enforce the closure of a number of sites that commit illegal acts such as uploading, downloading and reproduction of songs on the internet without the permission of the author and copyright holder. From the problematic law is written this thesis about copyright protection of songs on the internet, what the copyright standards of songs on the internet together with the form of copyright infringement of songs on the internet and recovery efforts.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


2016 ◽  
pp. 749-777
Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.


Author(s):  
S. Sundar ◽  
Piyush Arora ◽  
Sarthak Agrawal ◽  
R. Kumar ◽  
Harish M. Kittur

<p>In the last few years,there has been big interest in adhoc wireless network as they have tremendous military and commercial potential[1].Traditionally to test various parameters in the MANET , the most popular approach is to use mobile phone and Laptops and use the popular WIFI based protocol . But in the recent years there is a huge attraction towards the Internet Of things and specifically wireless sensor network. In this paper we are going to test the MANET protocol using zigbee based XBee modules specifally to determine the Range and Throughput of the Xbee netowork using XCTU Software . The sensor network will be deployed in the car parking application to see the parameters in the real time and dynamically see the sustainability of the network .The network is being designed keeping in mind that the nodes are mobile and at the same time the network does not require a standard infrastructure.</p>


2010 ◽  
Vol 29-32 ◽  
pp. 824-828 ◽  
Author(s):  
Yi Feng Jiang ◽  
Yu Sun ◽  
Lin Na Hu

TCP is the most widely used protocol in internet which provides the reliable end to end data communications for users, and the TCP congestion control is one of the key technology that ensures the internet normal functions. However, TCP was designed on the terms of wire network at first, in which congestion was the only reason for division lost and accordingly TCP control was made. In the wireless network there are many error codes, the transfer mistakes easily make division lost and the network congestion is not the only reason for data lost any more, so if we continue to use the traditional TCP control, the transfer speed and the network function will be down. This paper offers a DS-TCP solution based on mobile algorithm that can efficiently reduce the data packet lost in the wireless network, increase the TCP throughput and network utilization and improve the TCP functions in the mobile IP wireless network.


2010 ◽  
Vol 143-144 ◽  
pp. 1406-1409
Author(s):  
Dong Lu ◽  
Jian Guo Dai

Moves the multimedia studies is one kind of new study form. Today which in the Internet high speed development, the multimedia technologies renew unceasingly, use wireless network merit, constructs the transportable multimedia digital classroom, by “scientific style” the way helps the school solution training facilities to reform the question, has enlarged the school educational reform step.


1993 ◽  
Vol 2 (3) ◽  
pp. 244-258 ◽  
Author(s):  
Michael Zyda ◽  
David Pratt ◽  
John Falby ◽  
Paul Barham ◽  
Kristen Kelleher

The Naval Postgraduate School Networked Vehicle Simulator IV (NPSNET-IV) is a low-cost, student-written, real-time networked vehicle simulator that runs on commercial, off-the-shelf workstations (the Silicon Graphics IRIS family of computers). NPSNET-IV has been developed at the Naval Postgraduate School's (NPS) Department of Computer Science in the Graphics and Video Laboratory. It utilizes Simulation Network (SIMNET) databases and SIMNET and Distributed Interactive Simulation (DIS) networking formats. The DIS networking format is flexible enough to allow multiple players to game over the Internet. The availability of NPSNET-IV lowers the entry costs of researchers wanting to work with SIMNET, DIS, and follow-on systems. Without the contributions of the department's M.S. and Ph.D. candidates, the NPSNET project would be impossible to maintain and continue. The diversity of their interests accounts for the broad range of research areas within the project.


2021 ◽  
Author(s):  
Piñeres -Espitia Gabriel ◽  
shariq aziz butt ◽  
Estévez -Ortiz Francisco ◽  
Cama -Pinto Alejandro

Abstract The Internet of Things (IoT) is growing rapidly due to the wireless network that provides connectivity to devices at anytime and anywhere. Currently, the wireless sensor network is involved in many research fields like smart health monitoring, smart cities, and smart industries. From all of these, flood monitoring is the most important field in the IoT wireless network to alert about the occurrence of any abnormalities. To monitor the environment wireless sensor network needs a decision-making protocol that sense and route the information timely. The present work includes numerous use of Low Power Wireless Personal Area Networks (6LoWPAN) with IPv6 protocol defined by the Internet Engineering Task Force (IETF) due to its different test conditions, analysing static and dynamic routing and its impact on different performance metrics such as latency and packet losses for their application in monitoring system of the flash floods in any region. In this study, we are using IPv6 6LoWPAN to develop a wireless warning system before a flood event in “The Brigade” in Barranquilla city. The basic purpose for making system is to secure the city from costly damage and life loss. Different types of traffic and different 1-/2-hops scenarios have been considered. In order to implement our system, we use the well-known TelosB platform jointly with TinyOS, BLIP 2.0 and LPL. The experiment result shows that time on 512 ms and 1024 ms with a packet of 120 B obtain good performance on the metrics used for the tests.


Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


Sign in / Sign up

Export Citation Format

Share Document