scholarly journals Implementation of Lossless Voice Data Communication using Network Streams on Embedded System

Author(s):  
Barlian Henryranu Prasetio ◽  
Dahnial Syauqy

Smart home refers to the use of computers and information technology to control home appliances. The smart home system occupies sensors to acquire data for monitoring. One of the most important factors in designing a smart home system was the communication between devices that will be used. It requires high throughput and low latency communication so that monitoring can be done in real time and lossless. The communication network was designed to optimize the stream monitoring for smart home by reviewing the system throughput and latency. Lab-VIEW programming on My-RIO embedded systems was used to acquire accelerometer and voice data readings and send them to personal computer wirelessly. The network communication was designed by implementing network stream protocols between two applications which were planted in the personal computer and My-RIO system. The test results indicate that the network stream protocol did not require normalization of sensor data types while transmitting and receiving. The throughput values were affected by increasing buffer size but on certain conditions saturated throughput were experienced. The value of the latency is always stable with an average value of 13 ms even though the size of the buffer is enlarged.

2018 ◽  
Vol 154 ◽  
pp. 03001
Author(s):  
Barlian Henryranu Prasetio ◽  
Dahnial Syauqy ◽  
Rizal Maulana ◽  
Gembong Edhi Setyawan

In this paper, we implement a voice data communications between sender and receiver through Wi-Fi. The system was designed and implemented using network stream protocol which was developed by National Instruments on Lab-VIEW between two devices. The device which acts as the sender was My-RIO board and the receiver device was Personal Computer. The voice data communication system was tested by observing the effect of various buffer sizes on the throughput, latency and CPU usage. The result showed that the larger the buffer size being used, the throughput values were also getting bigger. However, particular buffer size made the throughput became saturated. The change on the buffer size also directly affects CPU usage. It seemed that the buffer size did not affect latency significantly. It showed that the latency was stable with an average of 13 milliseconds on voice data transmission.


Author(s):  
Tao Tao ◽  
Isaac Amundson ◽  
Kenneth D. Frampton

The early promise of centralized active control technologies to improve the performance of large scale, complex systems has not been realized largely due to the inability of centralized control systems to “scale up”; that is, the inability to continue to perform well when the number of sensors and actuators becomes large. Now, recent advances in Micro-electro-mechanical systems (MEMS), microprocessor developments and the breakthroughs in embedded systems technologies, decentralized control systems may see these promises through. A networked embedded system consists of many nodes that possess limited computational capability, sensors, actuators and the ability to communicate with each other over a network. The aim of this decentralized control system is to control the vibration of a structure by using such an embedded system backbone. The key attributes of such control architectures are that they be scalable and that they be effective within the constraints of embedded systems. Toward this end, the decentralized vibration control of a simply supported beam has been implemented experimentally. The experiments demonstrate that the reduction of the system vibration is realized with the decentralized control strategy while meeting the embedded system constraints, such as a minimum of internode sensor data communication, robustness to delays in sensor data and scalability.


2013 ◽  
Vol 475-476 ◽  
pp. 1150-1153 ◽  
Author(s):  
Yan Zeng Gao ◽  
Ling Yan Wei

Smart home can apply new internet of things concepts along cloud service technologies. This paper introduces a novel method for smart home system building. The system is driven by use case and it is composed of home control center, zigbee end devices, smart phone applications and cloud server. The home control center is based on arm-linux embedded system, it is the relay of cloud server and home devices. Wireless network of smart home devices was designed according to zigbee. A smart phone application was developed as the role of the user interface.


2021 ◽  
Author(s):  
Archana Bhat ◽  
Geetha V

Abstract IPv6 Routing Protocol for low power and lossy networks (RPL) is a standardized and default routing protocol for low power lossy networks. However, this is basically designed for sensor networks with scalar data and not optimised for the networks with multi-modal sensors. The data rate of each multi-modal sensor varies based on various applications. RPL suffers from packet drops and re-transmissions which results in packet loss and energy consumption in case of multi-modal data transmission. Hence, the routing strategy implemented in RPL needs better scheduling strategy at parent node for forwarding packets based on various parameters. In this paper, relevant Objective Functions for multi-modal sensor data communication is proposed based on various parameters identified and a weighted ranking based scheduling strategy is proposed for multi-modal data communication called R-RPL. The goal of proposed ranking based RPL (R-RPL) is to increase the throughput and reduce the loss in terms of energy and delay based on proposed scheduling strategy for parent selection. The performance of the proposed R-RPL is evaluated in the contiki based Cooja simulator and compared with RPL protocol. The analysis shows that the R-RPL performs better compared to RPL with respect to packet delivery ratio and energy consumption.


2021 ◽  
Author(s):  
Jonathan B. Chan

System on Programmable Chip (SoPC) based embedded system development has been increasing, aiming for improved system design, testing, and cost savings in the workflow for Application Specific ICs (ASIC). We examine the development of Smart Home embedded systems, which have been traditionally based on a fixed processor and memory, with inflexible configuration. We investigate how more ability can be added by updating firmware without the burden of updating hardware, or using a full (but dedicated) general purpose computer system. Our development and implementation of the smart home controller is based on the SoPC development environment from Altera. The development board includes all the necessary parts such as processor, memory, and various communication interfaces. The initial implementation includes a simple protocol for communication between home appliances or devices and controller. This protocol allows data transfer between home appliances or devices and the controller, in turn allowing both to support more features. We have investigated and developed a home resource management application. The main resources being managed in this project are hot and cold water, electricity, and gas. We have introduced a number of expert rules to manage these resources. Additionally, we have developed a home simulator, with virtual appliances and devices, that communicates with the home controller. The simulator interacts with the SoPC based smart home embedded system developed in this project by generating messages representing a number of smart appliances in the home. It provides a useful testing environment for the smart home embedded system to verify its design goals.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Honggang Wang ◽  
Ruixue Yu ◽  
Ruoyu Pan ◽  
Mengyuan Liu ◽  
Qiongdan Huang ◽  
...  

Purpose In manufacturing environments, mobile radio frequency identification (RFID) robots need to quickly identify and collect various types of passive tag and active tag sensor data. The purpose of this paper is to design a robot system compatible with ultra high frequency (UHF) band passive and active RFID applications and to propose a new anti-collision protocol to improve identification efficiency for active tag data collection. Design/methodology/approach A new UHF RFID robot system based on a cloud platform is designed and verified. For the active RFID system, a grouping reservation–based anti-collision algorithm is proposed in which an inventory round is divided into reservation period and polling period. The reservation period is divided into multiple sub-slots. Grouped tags complete sub-slot by randomly transmitting a short reservation frame. Then, in the polling period, the reader accesses each tag by polling. When tags’ reply collision occurs, the reader tries to re-query collided tags once, and the pre-reply tags avoid collisions through random back-off and channel activity detection. Findings The proposed algorithm achieves a maximum theoretical system throughput of about 0.94, and very few tag data frame transmissions overhead. The capture effect and channel activity detection in physical layer can effectively improve system throughput and reduce tag data transmission. Originality/value In this paper, the authors design and verify the UHF band passive and active hybrid RFID robot architecture based on cloud collaboration. And, the proposed anti-collision algorithm would improve active tag data collection speed and reduce tag transmission overhead in complex manufacturing environments.


Author(s):  
Christos Baloukas ◽  
Marijn Temmerman ◽  
Anne Keller ◽  
Stylianos Mamagkakis ◽  
Francky Catthoor ◽  
...  

An embedded system is a special-purpose system that performs predefined tasks, usually with very specific requirements. Since the system is dedicated to a specific task, design engineers can optimize it by exploiting very specialized knowledge, deriving an optimally customized system. Low energy consumption and high performance are both valid optimization targets to increase the value and mobility of the final system. Traditionally, conceptual embedded software models are built irrespectively of the underlying hardware platform, whereas embedded-system specialists typically start their optimization crusade from the executable code. This practice results in suboptimal implementations on the embedded platform because at the source-code level not all the inefficiencies introduced at the modelling level can be removed. In this book chapter, we describe both novel UML transformations at the modelling level and C/C++ transformations at the software implementation level. The transformations at both design abstraction levels target the data types of dynamic embedded software applications and provide optimizations guided by the relevant cost factors. Using a real life case study, we show how our transformations result in significant improvement in memory footprint, performance and energy consumption with respect to the initial implementation. Moreover, thanks to our holistic approach, we are able to identify new and non-trivial solutions that could hardly be found with the traditional design methods.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5463 ◽  
Author(s):  
Po-Wen Chi ◽  
Ming-Hung Wang

Cloud-assisted cyber–physical systems (CCPSs) integrate the physical space with cloud computing. To do so, sensors on the field collect real-life data and forward it to clouds for further data analysis and decision-making. Since multiple services may be accessed at the same time, sensor data should be forwarded to different cloud service providers (CSPs). In this scenario, attribute-based encryption (ABE) is an appropriate technique for securing data communication between sensors and clouds. Each cloud has its own attributes and a broker can determine which cloud is authorized to access data by the requirements set at the time of encryption. In this paper, we propose a privacy-preserving broker-ABE scheme for multiple CCPSs (MCCPS). The ABE separates the policy embedding job from the ABE task. To ease the computational burden of the sensors, this scheme leaves the policy embedding task to the broker, which is generally more powerful than the sensors. Moreover, the proposed scheme provides a way for CSPs to protect data privacy from outside coercion.


Sign in / Sign up

Export Citation Format

Share Document