1.1 Introduction About The Project:: Smart Health Care Monitoring System Using Iot
1.1 Introduction About The Project:: Smart Health Care Monitoring System Using Iot
CHAPTER 1
INTRODUCTION
architecture model. The objective of this model was that resources to be distributed among
multiple WSN and to execute over different wireless devices independently.
Various networks from different wireless technologies can also be connected using
this model. In Infrared (IR) sensor based system was used. IR based monitoring system was
installed in house to collect motion values of the patient and different feature values like
activity level, mobility level and non response level. To differentiate normal and abnormal
behaviors, Support Vector Data Description (SVDD) method was used. To classify the
behavior patterns, behavior pattern classification algorithm was used here. The need for a PC
was eliminated in The WSN was installed home. These nodes are then connected to the hospital
sever through internet. Here number of sensors was used to collect only ECG signals. The ECG
signals were first sampled and transmitted to the access point placed in patient’s home.
Then these signals were transmitted to the hospital through internet and analyzed to detect
heart related diseases.
Patient monitoring with the help of mobile phones Mobile phone takes important
role in patient monitoring to receive, process and transmit patient details. Health Net
mobile monitoring was proposed in . BSN (Body Sensor Network) embedded in clothes,
collect body parameters and communicates with patient’s mobile phone. Sensor and central
hub were embedded in patient’s shirt. The vital signals were collected by the sensors and
transmit them to the central hub. Central node then communicates with mobile phone
through Bluetooth link. Here confidentiality was achieved by AES128 and authentication was
achieved by SHA. A novel Wearable Mobility Monitoring System (WMMS) was introduced in
This model was established based on smart phone approach. This system is easily wearable
on patient’s belt and it monitors patient’s mobility and takes photograph during any change
of state. For analysis, these photographs were used.
we have presented the u-healthcare system in the Internet of Things (IoT) environment
with the support of the mobile gateway which makes it possible for integration. We have
presented here the mobile gateway architecture in which the main purpose is to receive the
sensing data and make a local analysis and generate keywords and then will be sent to remote
medical server for analysis. IoT devices can be used to enable remote health monitoring and
emergency notification systems. These health monitoring devices can range from blood pressure
and heart rate monitors to advanced devices capable of monitoring specialized implants, such as
pacemakers or advanced hearing aids. Specialized sensors can also be equipped within living
spaces to monitor the health and general well-being of senior citizens, while also ensuring that
proper treatment is being administered and assisting people regain lost mobility via therapy as
well. Other consumer devices to encourage healthy living, such as, connected scales or wearable
heart monitors, are also a possibility with the IoT. More and more end-to-end health monitoring
IoT platforms are coming up for antenatal and chronic patients, helping one manage health vitals
and recurring medication requirements. Distinct advantages over similar products from the US
and Europe are cost-effectiveness and personalization for chronic patients. Doctors can monitor
the health of their patients on their smartphones after the patient gets discharged from the
hospital.
For the satisfactory information transmission of the mobile healthcare, seamless data
transfer must be supported. To construct a seamless data flow, the heterogeneous network
integration, the disconnected operations and the communication link redundancy are important
issues. Sensor mobile gateway should ideally be hosted on a small and portable device, suitable
for daily use, such as a smart phone or PDA. The majority of smartphones and PDAs currently
do not support typical WSN or Near Field Communication interfaces, but there already are some
exceptions which are announcing their comprehensive implementation.
The idea is applied to u-healthcare to improve access and interconnection of devices used
in u-healthcare. Embedded technologies will take an important role to deliver healthcare to
people in remote locations and monitoring system that provide a continuous stream of accurate
data for better healthcare decisions. As the technology for collecting, analyzing and transmitting
data, IoT continue to improve; the IoT-driven healthcare applications and systems emerge. In the
Internet of Things (IoT), devices gather and share information directly with each other and the
cloud, making it possible to collect record and analyze new data streams faster and more
accurately. That suggests all sorts of interesting possibilities across a range of industries: cars
that sense wear and tear and self schedule maintenance or trains that dynamically calculate and
report projected arrival times to waiting passengers. Communications are via sorts of long-and
short-range wired or wireless devices in different kinds of networking environments such as
Intranet, extranet, and Internet that are supported by technologies such as cloud computing,
SaaS, and SOA based on regulated data formats and transmission standards
The IoT can be used in clinical care where hospitalized patients whose physiological
status requires close attention can be constantly monitored using IoT -driven, noninvasive
monitoring. This requires sensors to collect comprehensive physiological information and uses
gateways and the cloud to analyze and store the information and then send the analyzed data
wirelessly to caregivers for further analysis and review. This paper studies the u-healthcare
system with respect to the Internet of Things (IoT) perspective. Mainly, the mover of IoT for u-
healthcare is the integration of different technologies and computing system. These include
sensor devices to gather patient’s physiological data, healthcare cloud server and wireless
technologies.
systems are controlled by one or more main processing cores that are typically either
microcontrollers or digital signal processors (DSP). The key characteristic, however, is
being dedicated to handle a particular task, which may require very powerful processors. For
example, air traffic control systems may usefully be viewed as embedded, even though
they involve mainframe computers and dedicated regional and national networks between
airports and radar sites. (Each radar probably includes one or more embedded systems of
its own.)
Since the embedded system is dedicated to specific tasks, design engineers can optimize
it to reduce the size and cost of the product and increase the reliability and performance.
Some embedded systems are mass-produced, benefiting from economies of scale.
Physically embedded systems range from portable devices such as digital watches
and MP3 players, to large stationary installations like traffic lights, factory controllers, or
the systems controlling nuclear power plants. Complexity varies from low, with a single
microcontroller chip, to very high with multiple units, peripherals and networks mounted inside a
large chassis or enclosure.
even if the system as a whole is "designed to perform one or a few dedicated functions", and is
thus appropriate to call "embedded".
Labeled parts include microprocessor (4), RAM (6), flash memory (7).Embedded
systems programming is not like normal PC programming. In many ways, for the system is
usually chosen to make the device as cheap as possible. Spending an extra dollar a unit in
order to make things easier to program can cost millions. Hiring a programmer for an
extra month is cheap in comparison. This means the programmer must make do with slow
processors and low memory, while at the same time battling a need for efficiency not seen in
most PC applications. Below is a list of issues specific to the embedded field
1.2.1 History:
In the earliest years of computers in the 1930–40s, computers were sometimes dedicated
to a single task, but were far too large and expensive for most kinds of tasks performed by
embedded computers of today. Over time however, the concept of programmable controllers
evolved from traditional electromechanical sequencers, via solid state devices, to the use of
computer technology.
One of the first recognizably modern embedded systems was the Apollo Guidance
Computer, developed by Charles Stark Draper at the MIT Instrumentation Laboratory. At the
project's inception, the Apollo guidance computer was considered the riskiest item in the Apollo
project as it employed the then newly developed monolithic integrated circuits to reduce the size
and weight. An early mass-produced embedded system was the Autonetics D-17 guidance
computer for the Minuteman missile, released in 1961. It was built from transistor logic and had
a hard disk for main memory. When the Minuteman II went into production in 1966, the D-17
was replaced with a new computer that was the first high volume use of integrated circuits.
1.2.2 Tools:
Embedded development makes up a small fraction of total programming. There's also a
large number of embedded architectures, unlike the PC world where 1 instruction set rules, and
the UNIX world where there's only 3 or 4 major ones. This means that the tools are more
expensive. It also means that they're lowering featured, and less developed. On a major
embedded project, at some point you will almost always find a compiler bug of some sort.
Debugging tools are another issue. Since you can't always run general programs on your
embedded processor, you can't always run a debugger on it. This makes fixing your program
difficult. Special hardware such as JTAG ports can overcome this issue in part. However, if you
stop on a breakpoint when your system is controlling real world hardware (such as a motor),
permanent equipment damage can occur. As a result, people doing embedded programming
quickly become masters at using serial IO channels and error message style debugging.
1.2.3 Resources
To save costs, embedded systems frequently have the cheapest processors that can do the
job. This means your programs need to be written as efficiently as possible. When dealing with
large data sets, issues like memory cache misses that never matter in PC programming can
hurt you. Luckily, this won't happen too often- use reasonably efficient algorithms to start,
and optimize only when necessary. Of course, normal profilers won't work well, due to the same
reason debuggers don't work well. Memory is also an issue. For the same cost savings reasons,
embedded systems usually have the least memory they can get away with. That means their
algorithms must be memory efficient (unlike in PC programs, you will frequently sacrifice
processor time for memory, rather than the reverse). It also means you can't afford to
leak memory. Embedded applications generally use deterministic memory techniques and avoid
the default "new" and "malloc" functions, so that leaks can be found and eliminated more
easily. Other resources programmers expect may not even exist. For example, most
embedded processors do not have hardware FPUs (Floating-Point Processing Unit). These
resources either need to be emulated in software, or avoided altogether.
becomes a very trivial task indeed. From an implementation viewpoint, there is a major
difference between a computer and an embedded system. Embedded systems are often
required to provide Real Time response. The main elements that make embedded systems
unique are its reliability and ease in debugging.
1.3.1 Debugging:
Embedded debugging may be performed at different levels, depending on the
facilities available. From simplest to most sophisticated they can be roughly grouped into
the following areas.
Interactive resident debugging, using the simple shell provided by the embedded
operating system (e.g. Forth and Basic) External debugging using logging or serial port output to
trace operation using either a monitor in flash or using a debug server like the Remedy
Debugger which even works for heterogeneous multi core systems. An in-circuit debugger
(ICD), a hardware device that connects to the microprocessor via a JTAG or Nexus interface.
This allows the operation of the microprocessor to be controlled externally, but is typically
restricted to specific debugging capabilities in the processor. An in-circuit emulator replaces
the microprocessor with a simulated equivalent, providing full control over all aspects of the
microprocessor. A complete emulator provides a simulation of all aspects of the hardware,
allowing all of it to be controlled and modified and allowing debugging on a normal PC.
Unless restricted to external debugging, the programmer can typically load and run
software through the tools, view the code running in the processor, and start or stop its operation.
The view of the code may be as assembly code or source-code. Because an embedded system is
often composed of a wide variety of elements, the debugging strategy may vary. For instance,
debugging a software(and microprocessor) centric embedded system is different from
debugging an embedded system where most of the processing is performed by peripherals
(DSP, FAGAN, co-processor). An increasing number of embedded systems today use more
than one single processor core. A common problem with multi-core development is the proper
synchronization of software execution. In such a case, the embedded system design may
wish to check the data traffic on the busses between the processor cores, which requires
very low-level debugging, at signal/bus level, with a logic analyzer, for instance.
1.3.2 Reliability:
Embedded systems often reside in machines that are expected to run continuously for
years without errors and in some cases recover by themselves if an error occurs.
Therefore the software is usually developed and tested more carefully than that for personal
computers, and unreliable mechanical moving parts such as disk drives, switches or buttons are
avoided. Specific reliability issues may include: The system cannot safely be shut down for
repair, or it is too inaccessible to repair. Examples include space systems, undersea cables,
navigational beacons, bore-hole systems, and automobiles.
The system must be kept running for safety reasons. "Limp modes" are less tolerable.
Often backup s are selected by an operator. Examples include aircraft navigation, reactor
control systems, safety-critical chemical factory controls, train signals, engines on single-engine
aircraft. The system will lose large amounts of money when shut down: Telephone switches,
factory controls, bridge and elevator controls, funds transfer and market making,
automated sales and service. A variety of techniques are used, sometimes in combination, to
recover from errors—both software bugs such as memory leaks, and also soft errors in the
hardware: Watchdog timer that resets the computer unless the software periodically notifies the
watchdog Subsystems with redundant spares that can be switched over to software "limp modes"
that provide partial function
In this design, the software simply has a loop. The loop calls subroutines, each
of which manages a part of the hardware or software.
Some embedded systems are predominantly interrupting controlled. This means that
tasks performed by the system are triggered by different kinds of events. An interrupt
could be generated for example by a timer in a predefined frequency, or by a serial port
controller receiving a byte. These kinds of systems are used if event handlers need low latency
and the event handlers are short and simple. Usually these kinds of systems run a simple task in a
main loop also, but this task is not very sensitive to unexpected delays. Sometimes the
interrupt handler will add longer tasks to a queue structure. Later, after the interrupt handler
has finished, these tasks are executed by the main loop. This method brings the system close
to a multitasking kernel with discrete processes.
Cooperative Multitasking:
Primitive Multitasking:
In this type of system, a low-level piece of code switches between tasks or threads based
on a timer (connected to an interrupt). This is the level at which the system is generally
considered to have a "operating system" kernel. Depending on how much functionality is
required, it introduces more or less of the complexities of managing multiple tasks running
conceptually in parallel. As any code can potentially damage the data of another task (except in
larger systems using an MMU) programs must be carefully designed and tested, and access to
shared data must be controlled by some synchronization strategy, such as message queues,
semaphores or a non blocking synchronization scheme. Because of these complexities, it is
common for organizations to buy a real-time operating system, allowing the application
programmers to concentrate on device functionality rather than operating system services, at
least for large systems; smaller systems often cannot afford the overhead associated with a
generic real time system, due to limitations regarding memory size, performance, and/or battery
life. A microkernel is a logical step up from a real-time OS. The usual arrangement is that
the operating system kernel allocates memory and switches the CPU to different threads
of execution. User mode processes implement major functions such as file systems, network
interfaces, etc. In general, micro kernels succeed when the task switching and inter task
communication is fast, and fail when they are slow. Exo-kernels communicate efficiently by
normal subroutine calls. The hardware and all the software in the system are available to,
and extensible by application programmers. Based on performance, functionality,
requirement the embedded systems are divided into three categories:
These systems takes the input in the form of electrical signals from transducers or
commands from human beings such as pressing of a button etc.., process them and
produces desired output. This entire process of taking input, processing it and giving
output is done in standalone mode. Such embedded systems comes under stand alone
embedded systems Eg: microwave oven, air conditioner etc.
Embedded systems which are used to perform a specific task or operation in a specific
time period those systems are called as real-time embedded systems. There are two types of real
time embedded systems.
These embedded systems follow an absolute dead line time period i.e.., if the tasking is
not done in a particular time period then there is a cause of damage to the entire equipment. Eg:
consider a system in which we have to open a valve within 30 milliseconds. If this valve is not
opened in 30 ms this may cause damage to the entire equipment. So in such cases we use
embedded systems for doing automatic operations.
Eg: Consider a TV remote control system ,if the remote control takes a few
milliseconds delay it will not cause damage either to the TV or to the remote control. These
systems which will not cause damage when they are not operated at considerable time period
those systems comes under soft real-time embedded systems.
The central processing unit (c.p.u) can be any one of the following
microprocessor, microcontroller, digital signal processing. Among these Microcontroller is of
low cost processor and one of the main advantage of microcontrollers is, the components such
as memory, serial communication interfaces, analog to digital converters etc.., all these are
built on a single chip. The numbers of external components that are connected to it are very
less according to the application. Microprocessors are more powerful than microcontrollers.
They are used in major applications with a number of tasking requirements. But the
microprocessor requires many external components like memory, serial communication, hard
disk, input output ports etc.., so the power consumption is also very high when compared
to microcontrollers. Digital signal processing is used mainly for the applications that
particularly involved with processing of signals. control, vcd players, dvd players, camera etc….
Embedded systems are electronic devices that incorporate microprocessors with in Their
implementations. The main purposes of the microprocessors are to simplify the system design
and provide flexibility. Having a microprocessor in the device means that removing the bugs,
making modifications, or adding new features are only matters of rewriting the software that
controls the device. Or in other words embedded computer systems are electronic systems that
include a microcomputer to perform a specific dedicated application. The computer is hidden
inside these products. Embedded systems are ubiquitous. Every week millions of tiny computer
chips come pouring out of factories finding their way into our everyday products.
Embedded systems are self-contained programs that are embedded within a piece of
hardware. Whereas a regular computer has many different applications and software that can be
applied to various tasks, embedded systems are usually set to a specific task that cannot be
altered without physically manipulating the circuitry. Another way to think of an embedded
system is as a computer system that is created with optimal efficiency, thereby allowing it to
complete specific functions as quickly as possible.
Embedded systems technologies are usually fairly expensive due to the necessary
development time and built in efficiencies, but they are also highly valued in specific industries.
Smaller businesses may wish to hire a consultant to determine what sort of embedded systems
will add value to your organization
The very simplest embedded systems are capable of performing only a single function or
set of functions to meet a single predetermined purpose. In more complex systems an application
program that enables the embedded system to be used for a particular purpose in a specific
application determines the functioning of the embedded system. The ability to have programs
means that the same embedded system can be used for a variety of different purposes. In some
cases a microprocessor may be designed in such a way that application software for a particular
purpose can be added to the basic software in a second process, after which it is not possible to
make further changes. Design of embedded systems
The electronics usually uses either a microprocessor or a micro controller. Some large or
old systems use general-purpose mainframes computers or minicomputers. Start-up All
embedded systems have start-up code. Usually it disables interrupts, sets up the electronics, tests
the computer (RAM, CPU and software), and then starts the application code. Many embedded
systems recover from short-term power failures by restarting (without recent self-tests). Restart
times under a tenth of a second are common. Many designers have found one of more hardware
plus software-controlled LEDs useful to indicate errors during development (and in some
instances, after product release, to produce troubleshooting diagnostics). A common scheme is to
have the electronics turn off the LED(s) at reset, whereupon the software turns it on at the first
opportunity, to prove that the hardware and start-up software have performed their job so far.
After that, the software blinks the LED(s) or sets up light patterns during normal operation, to
indicate program execution progress and/or errors. This serves to reassure most
technicians/engineers and some users.
The control loop In this design, the software simply has a loop. The loop calls
subroutines. Each subroutine manages a part of the hardware or software. Interrupts generally set
flags, or update counters that are read by the rest of the software. A simple API disables and
enables interrupts. Done right, it handles nested calls in nested subroutines, and restores the
preceding interrupt state in the outermost enable. This is one of the simplest methods of creating
an exokernel. Typically, there some sort of subroutine in the loop to manage list of software
timers, using a periodic real time interrupt. When a timer expires, an associated subroutine is run,
or flag is set. Any expected hardware event should be backed-up with a software timer.
Hardware events fail about once in a trillion times. That about once a year with modern
hardware. With a million mass-produced devices, leaving out a software timer is a business
disaster State machines may be implemented with a function-pointer per state-machine (in C++,
C or assembly, anyway). A change of state stores a different function into the pointer. The
function pointer is executed every time the loop runs.
Many designers recommend reading each IO device once per loop, and storing the result
so the logic acts on consistent values. Many designers prefer to design their state machines to
check only one or two things per sta. Usually this is a hardware event, and a software timer.
Designers recommend that hierarchical state machines should run the lower-level state machines
before the higher, so the higher run with accurate information. Complex functions like internal
combustion controls are often handled with multi-imension tables. Instead of complex
calculations, the code looks up the values. The software caninter polate between entries, to keep
the tables small and cheap One major weakness of this system is that it does not guarantee a time
to respond to any particular hardware event. Careful coding can easily assure that nothing
disables interrupts for long. Thus interrupt code can run at very precise timings. Another major
weakness of this system is that it can become complex to add new features. Algorithms that take
a long time to run must be carefully broken down so only a little piece gets done each time
through the main loop. This system strength is its simplicity, and on small pieces of software the
loop is usually so fast that nobody cares that it is not predictable. Another advantage is that this
system guarantees that the software will run. There is no mysterious operating system to blame
for bad behavior. User interfaces User interfaces for embedded systems vary wildly, and thus
deserve some special comment.
Designers recommend testing the user interface for usability at the earliest possible
instant. A quick, dirty test is to ask an executive secretary to use cardboard models drawn with
magic markers, and manipulated by an engineer. The video taped result is likely to be both
humorous and very educational. In the tapes, every time the engineer talk, the interface has
failed: It would cause a service call. Exactly one person should approve the user interface.
Ideally, this should be a customer, the major distributor or someone directly responsible for
selling the system. The decision maker should be able to decide. The problem is that a committee
will never make up its mind, and neither will some people.
Not doing this causes avoidable, expensive delays. A usability test is more important
than any number of opinions. Interface designers at PARC, Apple Computer, Boeing and HP
minimize the number of types of user actions. For example, use two buttons (the absolute
minimum) to control a menu system (just to be clear, one button should be "a; next menu
entry & the other button should be "select this menu entry"). A touch-screen or
screen-edge buttons also minimize the types of user actions. Another basic trick is to minimize
and simplify the type of output. Designs should consider using a status light for each interface
plug, or failure condition, to tell what failed. A cheap variation is to have two light bars with a
printed matrix of errors that they select- the user can glue on the labels for the language that she
speaks. For example, Boeing standard test interface is a button and some lights. When you press
the button, all the lights turn on.
When you release the button, the lights with failures stay on. The labels are in Basic
English. For another example, look at a small computer printer. You might have one next to
your computer. Notice that the lights are labeled with stick-on labels that can be printed in any
language. Really look at it. Designers use colors. Red means the users can get hurt- think of
blood. Yellow means something might be wrong. Green means everything OK. Another essential
trick is to make any modes absolutely clear on the user display. If an interface has modes, they
must be reversible in an obvious way. Most designers prefer the display to respond to the user.
The display should change immediately after a user action. If the machine is going to do
anything, it should start within 7 seconds, or give progress reports. If a design needs a screen,
many designers use plain text. It can be sold as a temporary expedient. Why is it better than
pictures? Users have been reading signs for years.
A GUI is pretty and can do anything, but typically adds a year from artist, approval and
translator delays and one or two programmers to a project cost, without adding any value. Often,
a clever GUI actually confuses users. If a design needs to point to parts of the machine (as in
copiers), these are labeled with numbers on the actual machine, that are visible with the doors
closed. A network interface is just a remote screen.
It needs the same caution as any other user interface. One of the most successful general-
purpose screen-based interfaces is the two menu buttons and a line of text in the user native
language used in pagers, medium-priced printers, network switches, and other medium-priced
situations that require complex behavior from users When there text, there are languages. The
default language should be the one most widely understood. Right now this is English. French
and Spanish follow. Most designers recommend that one use the native character sets, no matter
how painful. People with peculiar character sets feel coddled and loved when their language
hows up on machinery they use. Text should be translated by professional translators, even if
native speakers are on staff. Marketing staff have to be able to tell foreign distributors that the
translations are professional. A foreign organization should give the highest-volume distributor
the duty to review and correct any translations in his native language. This stops critiques by
other native speakers, who tend to believe that no foreign organization will ever know their
language as well as they.
The primary difference between Harvard architecture and the Von Neumann architecture
is in the Von Neumann architecture data and programs are stored in the same memory and
managed by the same information handling system. Whereas the Harvard architecture stores data
and programs in separate memory devices and they are handled by different subsystems.
In a computer using the Von-Neumann architecture without cache; the central processing
unit (CPU) can either be reading and instruction or writing/reading data to/from the memory.
Both of these operations cannot occur simultaneously as the data and instructions use the same
system bus.
In a computer using the Harvard architecture the CPU can both read an instruction and
access data memory at the same time without cache. This means that a computer with Harvard
architecture can potentially be faster for a given circuit complexity because data access and
instruction fetches do not contend for use of a single memory path
Control Loop:
Today, the vast majority of computers are designed and built using the Von Neumann
architecture template primarily because of the dynamic capabilities and efficiencies gained in
designing, implementing, operating one memory system as opposed to two. Von Neumann
architecture may be somewhat slower than the contrasting Harvard Architecture for certain
specific tasks, but it is much more flexible and allows for many concepts unavailable to Harvard
architecture such as self programming, word processing and so on. Harvard architectures are
typically only used in either specialized systems or for very specific uses.
It is used in specialized digital signal processing (DSP), typically for video and audio processing
products. It is also used in many small microcontrollers used in electronics applications such as
Advanced RISC Machine (ARM) based products for many vendors.
1. Microprocessor (µp)
Microprocessor (µp):
A silicon chip that contains a CPU. In the world of personal computers, the terms
microprocessor and CPU are used interchangeably. At the heart of all personal computers and
most workstations sits a microprocessor. Microprocessors also control.
1. Instruction set: The set of instructions that the microprocessor can execute.
2. Bandwidth : The number of bits processed in a single instruction.
3. Clock speed : Given in megahertz (MHz), the clock speed determines how many
instructions per second the processor can execute.
In both cases, the higher the value, the more powerful the CPU. For example, a 32-bit
microprocessor that runs at 50MHz is more powerful than a 16-bit microprocessor that runs at
25MHz. In addition to bandwidth and clock speed, microprocessors are classified as being either
RISC (reduced instruction set computer) or CISC (complex instruction set computer).
A microprocessor has three basic elements, as shown above. The ALU performs all
arithmetic computations, such as addition, subtraction and logic operations (AND, OR, etc). It is
controlled by the Control Unit and receives its data from the Register Array. The Register Array
is a set of registers used for storing data. These registers can be accessed by the ALU very
quickly. Some registers have specific functions - we will deal with these later. The Control Unit
controls the entire process. It provides the timing and a control signal for getting data into and
out of the registers and the ALU and it synchronizes the execution of instructions (we will deal
with instruction execution at a later date).
Digital Signal Processors is one which performs scientific and mathematical operation.
Digital Signal Processor chips - specialized microprocessors with architectures designed
specifically for the types of operations required in digital signal processing. Like a general-
purpose microprocessor, a DSP is a programmable device, with its own native instruction code.
DSP chips are capable of carrying out millions of floating point operations per second, and like
their better-known general-purpose cousins, faster and more powerful versions are continually
being introduced. DSPs can also be embedded within complex "system-on-chip" devices, often
containing both analog and digital circuit.
ASIC is a combination of digital and analog circuits packed into an IC to achieve the desired
control/computation function
There are two different types of computer instruction set there are:
Besides performance improvement, some advantages of RISC and related design improvements
are:
1. A new microprocessor can be developed and tested more quickly if one of its aims is to
be less complicated.
2. Operating system and application programmers who use the microprocessor's instructions
will find it easier to develop code with a smaller instruction set.
3. The simplicity of RISC allows more freedom to choose how to use the space on a
microprocessor.
4. Higher-level language compilers produce more efficient code than formerly because they
have always tended to use the smaller set of instructions to be found in a RISC computer.
RISC characteristics:
CISC, which stands for Complex Instruction Set Computer, is a philosophy for
designing chips that are easy to program and which make efficient use of memory. Each
instruction in a CISC instruction set might perform a series of operations inside the processor.
This reduces the number of instructions required to implement a given program, and allows the
programmer to learn a small but flexible set of instructions.
CHAPTER 2
This heart beat sensor is designed to give digital output of heat beat when a finger is
placed inside it. When the heart detector is working, the top-most LED flashes in unison with
each heart beat. This digital output can be connected to microcontroller directly to measure the
Beats Per Minute (BPM) rate. It works on the principle of light modulation by blood flow
through finger at each pulse.
2.1.1 Features:
2.1.2 Applications:
2.2 Working:
The sensor consists of a super bright red LED and light detector. The LED needs to be
super bright as the light must pass through finger and detected at other end. Now, when the heart
pumps a pulse of blood through the blood vessels, the finger becomes slightly more opaque and
so less light reached the detector. With each heart pulse the detector signal varies. This variation
is converted to electrical pulse.
This signal is amplified and triggered through an amplifier which outputs +5V logic
level signal. The output signal is also indicated on top by a LED which blinks on each heart beat.
Following figure shows signal of heart beat and sensor signal output graph. Heart beat received
by detector (Yellow) and trigger point of sensor (Red) after which sensor outputs digital signal
(Blue) at 5V leveL
For amplification, we use IC LM 358. Pulse rate is sensed by using a high intensity type
LED and LDR. The finger is inserted in probe and red light from high intensity LED is allowed
to fall on the finger. The amount of red light absorbed by finger varies according to the pulsatile
blood flow in the finger. Therefore the amount of light transmitted varies according to the blood
flow
The LDR placed on opposite side of LED detects the transmitted light. With increase in
transmitted light its resistance decreases and vice-versa. A voltage divider circuit is employed to
get a voltage signal proportional to the resistance of the LDR.
The magnitude of the DC components is almost 100-1000 times higher than the AC
components. Hence they need to be removed in order for the AC components to be conditioned
properly further on. Therefore, a high pass filter circuit is employed after the voltage divider
network to block the DC components of the signal.
The AC signal is now amplified from mV range to V range. The amplified signal is given
to a comparator where it is compared against a set threshold value. The comparator o/p consists
of positive pulses corresponding to blood pulses. The comparator output is given to the PIC.
The PIC calculates the time duration between 2 successive pulses and then computes the
instantaneous heart rate. The PIC then proceeds to display the calculated heart rate on the LCD
display
Accurate, fast and reliable ceramic moisture sensor for the measurement of absolute
humidity in process air and gases. The principle of operation is quite simple. Operation of the
sensor depends upon the adsorption of water vapour into a porous non-conducting “sandwich”
between two conductive layers built on top of a base ceramic substrate. The active sensor layer is
very thin – less than one micron (a millionth of a metre) and the porous top conductor that allows
transmission of water vapour into the sensor is less than 0.1 micron thick. Therefore the sensor
responds very rapidly to changes in applied moisture, both when being dried (on process start-
up) and when called into action if there is moisture ingress into a process.
The resistance or impedance of the sensor ceramic layers changes with the water vapour applied
to it. Finally converting the change in impedance will give us the humidity value.
CHAPTER 3
COMPONENT DESCRIPTION
3.1 Nodemcu:
It can be programmed directly through USB port using LUA programming or Arduino
IDE. By simple programming we can establish a WiFi connection and define input/output pins
according to your needs exactly like arduino, turning into a web server and a lot more.
NodeMCU is the WiFi equivalent of ethernet module. It combines the features of WiFi
access point and station + microcontroller. These features make the NodeMCU extremely
powerful tool for WiFi networking. It can be used as access point and/or station, host a web
server or connect to internet to fetch or upload data.
3.2. Features:
Finally, programmable WiFi module. Arduino-like (software defined) hardware IO. Can
be programmed with the simple and powerful Lua programming language or Arduino IDE.USB-
TTL included, plug & play.10 GPIOs D0-D10, PWM functionality, IIC and SPI communication,
1-Wire and ADC A0 etc. all in one board. Wifi networking (can be used as access point and/or
station, host a web server), connect to internet to fetch or upload data. Event-driven API for
network applications. PCB antenna.
NodeMCU has general purpose input output pins on its board as shown in above pinout
diagram. We can make it digital high/low and control things like LED or switch on it. Also, we
can generate PWM signal on these GPIO pins.
NodeMCU based ESP8266 has Hardware SPI (HSPI) with four pins available for SPI
communication. It also has SPI pins for Quad-SPI communication. With this SPI interface, we
can connect any SPI enabled device with NodeMCU and make communication possible with it.
NodeMCU has I2C functionality support on ESP8266 GPIO pins. Due to internal
functionality on ESP-12E we cannot use all its GPIOs for I2C functionality. So, do tests before
using any GPIO for I2C applications.
NodeMCU based ESP8266 has two UART interfaces, UART0 and UART1. Since
UART0 (RXD0 & TXD0) is used to upload firmware/codes to board, we can’t use them in
applications while uploading firmware/codes.
We can make difference in 1st and 2nd version of NodeMCU Development board by
their boards design and ESP modules on it.In 1st version of NodeMCUDev Kit v0.9, CH341SER
USB to Serial converter is used whereas in 2nd version of NodeMCUDev Kit v1.0, CP2102 USB
to Serial converter is used.1st version uses ESP-12 and 2nd version uses ESP-12E (Enhanced
version).Extra 6 pins (MTDO, MTDI, SD_3, MTMS, MTCK, SD_2) brought out on ESP-12E
version of ESP-12 modules as shown in below figure.
Though Quad SPI pins are brought out, they are internally used for flash memory access.
Also, there is slight antenna design difference in ESP-12 versions like ESP12-E & ESP-12F
CHAPTER 4
data with the help of various existing technologies and then autonomously flow the data between
other devices. Current market examples include home automation (also known as smart home
devices) such as the control and automation of lighting, heating (like smart thermostat),
ventilation, air conditioning (HVAC) systems, and appliances such as washer/dryers, robotic
vacuums, air purifiers, ovens or refrigerators/freezers that use Wi-Fi for remote monitoring.
The concept of the Internet of Things was invented by and term coined by Peter T. Lewis
in September 1985 in a speech he delivered at a U.S. Federal comunication comission (FCC)
supported session at the 15th Legislative Weekend Conference
wifi a mechanism for wirelessly connecting electronic devices. A device enabled with
Ethernet, such as a personal computer, video game console, smart phone, or digital audio player,
can connect to the via a wireless network HYPERLINK access point. An access point
HYPERLINK (or hotspot) has a range of about 20 meters (65 ft) indoors and a greater range
outdoors. Multiple overlapping access points can cover large areas.
A Ethernet enabled device such as a PC, video game console, mobile phone, MP3 player
or PDA can connect to the Internet when within range of a wireless network connected to the
Internet. The coverage of one or more interconnected access points — called a hotspot can
comprise an area as small as a single room with wireless-opaque walls or as large as many
square miles covered by overlapping access points. "Ethernet" is a trademark HYPERLINK
"http://en.wikipedia.org/wiki/Trademark" of the Ethernet Alliance and the brand name for
products using the family of standards. Ethernet is used by over 700 million people. There are
over four million hotspots (places with Ethernet Internet connectivity) around the world, and
about 800 million new Ethernet devices are sold every year. Ethernet products that complete
Ethernet Alliance interoperability certification testing successfully may use the "Ethernet
CERTIFIED" designation and trademark.
4.2.1 History:
The name of a popular wireless networking technology that uses radio waves to provide
wireless high-speed Internet HYPERLINK "http://www.webopedia.com/TERM/I/Internet.html"
and network HYPERLINK "http://www.webopedia.com/TERM/N/network.html" connections.
The Ethernet Alliance, the organization that owns the Ethernet (registered trademark) term
specifically defines Ethernet as any "wireless local area network (WLAN) products that are
based on the Institute of Electrical and Electronics Engineers' 802.11 standards."
These days you will find many areas around town that offer free WiFi internet access, but
the most common use for WiFi is in the home. If you have high speed Internet (DSL, Cable,
Satellite, etc) and have a piece of equipment that is called a wireless router, then you have WiFi.
Initially, Ethernet was used in place of only the 2.4GHz standard, however the Ethernet
Alliance HYPERLINK has expanded the generic use of the Ethernet term to include any type of
network or WLAN product based on any of the 802 standars, including dual-band, and so on, in
an attempt to stop confusion about wireless LAN interoperability.
Ethernet works with no physical wired connection between sender and receiver by using
radio frequency (RF) technology, a frequency within the electromagnetic spectrum associated
with radio wave propagation. When an RF current is supplied to an antenna, an electromagnetic
field is created that then is able to propagate through space. The cornerstone of any wireless
network is an access point (AP). The primary job of an access point is to broadcast a wireless
signal that computers can detect and "tune" into. In order to connect to an access point and join a
wireless network, computers and devices must be equipped with wireless network adapters.
electronics. Any products that are tested and approved as "Ethernet Certified" (a registered
trademark) by the Ethernet Alliance HYPERLINK are certified as interoperable HYPERLINK
with each other, even if they are from different manufacturers. For example, a user with a
Ethernet Certified product can use any brand of access point HYPERLINK with any other brand
of client hardware that also is also "Ethernet Certified". Products that pass this certification are
required to carry an identifying seal on their packaging that states "Ethernet Certified" and
indicates the radiofrequency band used (2.5GHz)
In the illustration above you will see what equipment is used in a typical home WiFi
network. In some cases an Internet service provider will supply a wireless router/modem
combination when you subscribe to their service.
The main benefit of WiFi is cordless internet access. Many electronic devices have WiFi
built-in and can access the internet anywhere within range of your wireless router. This means
that while using a WiFi laptop computer you can browse the internet from your couch. If you
own a Wifiyou can listen to over 14,000 stations in your bedroom, kitchen, or bathroom. Some
cell phones have WiFi internet access also.
WiFi works using two-way communication between devices. For example: When you
type "CCrane" into the Google search bar and press "Go", you are sending a request from your
computer to your router using WiFi. The router uses it's WiFi to receive your request and
forward it over the internet to Google. When Google replies, they send you the results of your
request back over the internet to your router. Your router then forwards the results via WiFi back
to your laptop computer. In this scenario the use of WiFi communication takes place only
between your computer and the router.
There are several different types of WiFi, but the end result is still the same, wireless
communication. In the technical world WiFi is translated to 802.11, which is a group of
standards created by the Institute of Electrical and Electronics Engineers (IEEE). Listed below
are several different types of WiFi.
A common misconception is that the term Ethernet is short for "wireless fidelity,"
however this is not the case. Ethernet is simply a trademarked term meaning IEEE 802.11x.
The fast paced technology has changed the world as well as its habitants. In Today’s global
village there is no need to grab the telephone receiver and dial a specific number to transmit
voice through cables merely to hear the voice of a beloved. Now each of us carries our own
handsets with a built-in phonebook and text messages. The facilities like Ethernet have further
improved the standard of communications by cutting down expenditure and increasing
availability.
No matter where you are, you can access the world of web through your handsets and
your laptops and your iPads. You might not have noticed what it is but the technology that
enables you to plug in internet without any wires whether you are in a cafe, a library, a shopping
mall or an airport is Ethernet – the also known as 802.11. The circumference where wireless
technology is present and available to the users is known as Hotspot. The inexpensive, user-
friendly WiFi networks are also obtrusive; if you do not need one you would not know there
exists any. Ethernet could be also installed in home or offices in order to transmit information
over the air without the aid of wires. In near future you would find wireless networking available
in every nook and corner.
Ethernet is derived from the decades old term Hi-Fi that stands for the output’s type
produced by quality music hardware. WiFi Technology is WIRELESS FIDELITY and stands for
all those technologies that fall under the specifications of IEEE 802.11 including 802.11a,
802.11b and 802.11g. The association of the term Ethernet with various technologies is merely
because of the promotions made by the Ethernet Alliance.
Ethernet is also associated with 802.11 networking. The reference is derived from IEEE –
Institute of Electrical and Electronics Engineers uses the numbering system for classifying a
range of technological protocols.
Ethernet steps into the boots of TV and radio in order to transmit data through radio
waves. The two-way radio communication: the wireless adapter translates data into a radio signal
then transmits it via antenna; and the signal is received and decoded by the wireless router that
uses a tangible wired Ethernet connection to send information to the internet. The equation is
reversed when wireless router receives data from the internet and translates it into a signal where
the wireless adaptor receives the signal and decodes it.
Ethernet communication devices are extended forms of radios used for cell phones and
walkie-talkies: they simultaneously transmit and receive radio waves and convert 1s to 0s into
the radio waves along with reconverting the radio waves into 1s and 0s, however the Ethernet
radios enjoy some exceptional features.
Technology has developed far more than our expectations – none of us could perceive the
developments in approaching future. With features like Ethernet, earth would turn into a world
wide web where every user is omnipresent and active.
Wireless technology has change the way for us to connect to internet, local and remote
computers, it has enabled the implementation of imagination beyond the limits. There are two
most common modes by which we connect to Ethernet for connectivity for accessing internet or
other computer for file sharing etc.
Infrastructure mode is one of the two methods for connecting to wireless networks with
Ethernet enabled devices such as laptops, Pda’s I-phone etc. These devices are connected to
wireless network with the help of Access point (AP). Wireless Access Points are usually routers
or switches which are connected to internet by Ethernet port.
UN authorized access to WLAN. The Access point is then connected to wire network (Internet)
to provide wireless internet connectivity to clients. Multiple access points can be added in the
WLAN, this increases the reach of infrastructure for supporting many number of wireless clients.
1. Infrastructure mode
2. Ad hoc Mode
Setting up infrastructure mode for wireless connectivity is not that hard, all we are
require follow number of steps which will do the job. We need to make sure that Internet cable is
plugged in Ethernet port, second step is to configure AP (Access point). http://192.168.1.1 is
usually the access panel address. Write this URL at your Internet browser, username and
password window will appear, default settings are usually, admin username and admin password.
We name the connection name which will appear to all wireless devices, then we enable
infrastructure mode and also assign SSID in the switch/router for it broadcast
Now we scan wireless adaptor to see if any wireless network is available to connect,
when configured network is appear, click and connect and provide SSID information, here you
should be able to connect to the network for internet browsing and file sharing.
1. Ad hoc Mode:
There is another mode of connectivity available for Ethernet connectivity. This mode is
known to be ad hoc mode. By using ad hoc mode, devices are capable for communicating
directly with each other. No Access point (routers / switches) is required for communication
between devices and all devices in the range connect in peer to peer communication mode.
For setting up ad hoc mode, wireless adaptors of all devices are required to be configured
manually at ad hoc mode instead of infrastructure mode. It is also important to use same channel
name and configuring all wireless adaptors using same SSID for making connection live.
First of all you need to list the equipment and hardware thetas is required for installing
Wifi uh as router or compatible gateway different models are available one of the common is DI
version 624 and Extreme G 802, 802.11 routers which are highly compatible with the Wifi at
present. Second is the wireless adapter that is required or connecting the network. wireless
adapters also comes in many specification such as DWL G650 is card adapter that is compatible
with the windows operating system and note books and Personal computers ,it is also equally
reliable for the windows Xp home based systems. Next you need a connection like broad band to
access the internet which comes typically with the dialing modem or DSL modems. In case of
static IP address Ethernet cable is also required. if your connection is DSL then you must require
provide username and password by the service providers more specifically ISP
Another requirement is the usable Mac address that will support all the connected
wireless network adapters. It is recommended to keep a notebook and pen to write down the
MAC and IP setting s and addressee because you may need it further during Wifi configuration.
1. Install wireless adapter in the system that are required to be connected to the attached
router.
2. if you are using the Card adapter you may require to install the software for support
before starting hardware installation. This require complete shutdown of the system,
install adapter and reboot the complete computer to make it ready for installing wireless.
To avoid the computer reboot it is recommended to use wireless adapters which are
independent of additional software installations.
3. When system is restarted automatically new hardware wizard will run which will
atomically activate the adapter and it become ready to use.
Configuring Wifi:
If the system doesn’t automatically detect the Wifi network you may need to perform few
more steps.
For configuring click networking icon that is available in the system tab .From appeared dialog
box of Wireless Network Connection click “advanced” and choose the Wireless
networktab.Select my wireless network setting ok system will be restarted. now set security
parameters to activate the secure connection by accessing IP address to the browser Configure
the network for changing the name SSID by simply clicking wireless button present in the
network setting in control panel. Enable the Wifi network encryption to stay protected from
hackers and data stealers, wireless adapter offers WPA protected access encryption technique for
the Wifi security through the wired Equivalent Privacy encryption algorithms. next step is the
Mac address filtration .for extra safety apply the limit the Mac address by fix the router routines
.enter Mac address in Wifi adapter and save it For improving the performance choose 802.11 for
all the available wireless system in the network. This mode will help you speed up the
communication. Next step is saving and exit the step the wireless network is activated.
WiFi has brought a new aspect in the ground of networking. The broadcast of data is
completed via radio waves and the cost of cables for network lying down. Ethernet enable a user
to get access to internet anywhere in the given location. Now you can make a network in Hotels,
Libraries, colleges, universities, campus, private institutes, and coffee shops and even on a public
place to make your business more profitable and connect with their client any time. WiFi makes
waves for business with their highly effective cable less media.
WIFI technology supports two types, one is called “infrastructure” other one is “Ad hoc”
In ad hoc Ethernet network can be connected without central device known as router or access
point Ad hoc mode is always preferred over infrastructure mode, however ad hoc networks have
following issues Ethernet devices configure on Ad hoc mode offers nominal security against
network intruders. Ad hock WiFi configured devices cannot disable SSID broadcast in contrast
to infrastructure mode. Network attackers will not required much of effort to prevail in Ad hoc
Network.
WIFI technology supports two types, one is called “infrastructure” other one is “Ad hoc”
In ad hoc Ethernet network can be connected without central device known as router or access
point Ad hoc mode is always preferred over infrastructure mode, however ad hoc networks have
following issues Ethernet devices configure on Ad hoc mode offers nominal security against
network intruders. Ad hock WiFi configured devices cannot disable SSID broadcast in contrast
to infrastructure mode. Network attackers will not required much of effort to prevail in Ad hoc
Network.
Using Ad hoc mode signals issues can experienced where as using alternative
infrastructure mode will provide full strength singles. Ethernet networking standard including
802.11g requires ad hoc mode of communication supports which 11Mbps bandwidth.Ethernet
devices when configured to infrastructure mode can transfer data up to 54 Mbps, where as using
ad hoc mode only 11 mbps can be achieved. Ad hoc mode is considered slower in comparison to
infrastructure for this reason.
Security concerns:
It is simple to set Ethernet network but keeping it secure takes much more effort, Access
points of Ethernet do not deploy encryption methods. It is required to be done as network is
enabled. Secure Ethernet network can be easily attacked by hackers to steal private information.
Guests who are not potentially harmful can still utilize the network resources and minimize the
performance.
Ethernet transmits data at 2.4 GHz making susceptible to interfere Bluetooth enabled
devices, mobile phones, cordless, Microwaves and other communication devices, closer the
interfering devices are the poor communication will be and vice versa.
Today’s fastest Ethernet standards are pushed beyond their limit when trying to view
high end media. High definition video and audios cannot be viewed flawlessly because of lower
transfer rate; things can be much more worst if other clients are accessing the same access points.
Even the fastest current Ethernet standards are pushed beyond their limit when trying to
handle some of today's high-end media. High-definition audio and video files are timely-
delivery-intensive, and typical wireless networks have neither the transfer speeds nor the
consistency to transfer them flawlessly. This problem is further compounded if there are multiple
devices connected to the same because the bandwidth must be divided between all of the
equipment.
4.9 Types:
WIFI technology supports two types, one is called “infrastructure” other one is “Ad hoc”
In ad hoc Ethernet network can be connected without central device known as router or access
point Ad hoc mode is always preferred over infrastructure mode, however ad hoc networks have
following issues Ethernet devices configure on Ad hoc mode offers nominal security against
network intruders. Ad hock WiFi configured devices cannot disable SSID broadcast in contrast
to infrastructure mode. Network attackers will not required much of effort to prevail in Ad hoc
Network
Using Ad hoc mode signals issues can experienced where as using alternative
infrastructure mode will provide full strength singles. Ethernet networking standard including
802.11g requires ad hoc mode of communication supports which 11Mbps bandwidth.Ethernet
devices when configured to infrastructure mode can transfer data up to 54 Mbps, where as using
ad hoc mode only 11 mbps can be achieved. Ad hoc mode is considered slower in comparison to
infrastructure for this reason.
It is simple to set Ethernet network but keeping it secure takes much more effort, Access
points of Ethernet do not deploy encryption methods. It is required to be done as network is
enabled. Secure Ethernet network can be easily attacked by hackers to steal private information.
Guests who are not potentially harmful can still utilize the network resources and minimize the
performance.
There are three most important items which makes Ethernet working in your laptop or desktop.
These are:
1. Radio Signals
2. Ethernet Card which fits in your laptop or computer.
3. Hotspots which create Ethernet Network.
Radio Signals are the keys which make WiFi networking possible. These radio signals
transmitted from Ethernet antennas are picked up by WiFi receivers such as computers and cell
phones that are equipped with WiFi cards. Whenever a computer receives any of the signals
within the range of a WiFi network which is usually 300 - 500 feet for antennas, the WiFi card
will read the signals and thus create an internet connection between the user and the network
without the use of a cord.
Access points which consist of antennas and routers are the main source which transmit
and receive radio waves. Antennas work stronger and have a longer radio transmission with a
radius of 300-500 feet which are used in public areas while the weaker yet effective router is
more suitable for homes with a radio transmission of 100-150 feet.
1. Ethernet Cards:
You can think WiFi card as being an invisible cord that connects your computer to the
antenna for a direct connection to the internet.
WiFi cards can be external or internal, meaning that if a WiFi card is not installed in your
computer, you may purchase a USB antenna attachment and have it externally connect to your
USB port, or have an antenna-equipped expansion card installed directly to the computer. For
laptops, this card will be a PCMCIA card in which you insert to the PCMCIA slot on the laptop.
2. Ethernet Hotspots:
Most hotspots are located in places that are readily accessible to the public, like airports,
coffee shops, hotels, book stores and campus environments. 802.11b is the most common
specification for hotspots worldwide. The 802.11g standard is backwards compatible with .11b
but .11a uses a different frequency range and requires separate hardware such as an a, a/g, or
a/b/g adapter. The largest public Ethernet networks are provided by private internet service
providers (ISPs) that charge a fee for users to connect to the internet.
Hotspots are increasingly developing around the world. In fact, T-mobile USA controls
more than 4,100 hotspots located in public locations such as Starbucks, Borders, Kinko.s, and the
airline clubs of Delta, United, and US Airways. Even select McDonald.s restaurants now feature
Ethernet hotspot access.
Any notebook computer with integrated wireless, a wireless adapter attached to the
motherboard by the manufacturer, or a wireless adapter such as a PCMCIA card can access a
wireless network. Furthermore, all Pocket PCs or Palm units with Compact Flash, SD I/O
support, or built-in Ethernet, can access hotspots.
Coverage difference:
The major purpose of the Bluetooth technology is to create the connection between the
user device and network over the short distances. Their ranges are limited to the one meter or 2
meter hardly. The device outside this renege cannot be connected with the help of Bluetooth
where asWifi has no such small distance limitation as compared to Bluetooth devices. Wifi has
the ability to create and provide its users and wireless internet facility over the long distances,
they can link multiple computer at the time. Although Bluetooth can also connect multiple
device at a time but coverage area difference is huge which makes wifi a better approach than
Bluetooth.
Bluetooth Technology:
Both Wifi and Bluetooth are the network creation technologies PAN Personal Area
Networks are created by the Bluetooth by utilizing radio wave so flow frequency which lows the
Bluetooth device to instantly connect the connation device in the specific are to develop a pair.
For instant cell phone with blue tooth technology ,iPods and PDAs.
carrying Most frequency Bluetooth is used for immediately sending files for m laptop to
laptop desktop, hand set to hand set, and hand set to Desktop from the source like printer .when
the device that you are using for the communication does not contain the Bluetooth feature then
it contains the built in adapters to support the transfer feature. Most common of thee adapters are
the USB’s Universal Serial Buses that are extensive in use folder data.
1. Wifi Technology
Wifi use the same radio frequency technology. But it has one main advantage over
Bluetooth which is the dynamic protocol which can connect various computers over long
distance through wireless. Wifi permit the computer within the wireless network to communicate
and send message without any plugged cable. It just matches the radio frequency omitted by the
service provider boosters which ultimately save money and time effort. Because huge installation
are not required Computer that uses Local area Networks Wifi can share, send files, codes and
document over the Wifi network and can also share the resource like printers, fax machines and
scanning devices .internet facility and also be shared and no specific type of LAN is required for
this purpose too.
2. File swapping:
File swapping is enjoyable task when using Wifi Bluetooth or button devices both of
them can easily transfer the related files to your near by computer system any time by activating
wireless connection. No complex installation and configuration is required for this purpose. Both
of them only require some allocation of resource for sharing the files.
3. Protocol specification:
There is no extensive protocol specification for the Wifi and Bluetooth, both of them
follow the typical standards designed by the manufacturer to become compatible with the
hardware and to communicate with interoperable products the current protocol standard for the
Bluetooth is 2.0 and for Wifi standard for networking protocol is 802.extension to 802 , 802.11 is
also in great fame these days..
1. Many Ethernet networks support roaming, in which a mobile client station such as a
laptop computer can move from one access point to another as the user moves around a
building or area.
2. Many access points and network interfaces support various degrees of encryption to
protect traffic from interception. Ethernet is a global set of standards. Unlike cellular
carriers, the same Ethernet client works in different countries around the world.
3. Allows LANs to be deployed without cabling, potentially reducing the costs of network
deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and
historical buildings, can host wireless LANs.
4. Ethernet silicon pricing continues to come down, making Ethernet a very economical
networking option and driving inclusion of Ethernet in an ever-widening array of devices.
Ethernet products are widely available in the market. Different brands of access points
and client network interfaces are interoperable at a basic level of service. Products
designated as Ethernet CERTIFIED by the Ethernet Alliance are interoperable and
include WPA2 security.
5. Widely available in more than 100 thousand public hot spots and millions of homes and
corporate campuses worldwide
6. Ethernet networks support roaming, in which a mobile client station such as a laptop
computer can move from one access point to another as the user moves around a building
or area. Ethernet is a global set of standards. Unlike cellular carriers, the same Ethernet
client works in different countries around the world.
7. WiFi uses unlicensed radio spectrum and does not require regulatory approval for
individual deployers.
8. It allows local area networks (LANs) to be setup with cabling. The can reduce associated
costs of network connection and expansions. Places where cables cannot be run, such as
outdoor areas and historical buildings can use wireless LANs.
9. WiFi products are extensively available in the market. There are different brands of
access points and user's network interfaces are able to inter-operate at a very basic service
level.
10. Prices are considerably lower as competition amongst vendors' increases.
11. WiFi networks can support roaming. This allows mobile users with laptop computer to be
able to move from one access point to another.
12. Numerous access points and network interfaces support various degrees of encryption to
protect traffic from interception.
13. WiFi has a set of global standards. Not like the cellular carriers, the same WiFi users can
work in different countries around the world at all time.
sensor logging applications, location tracking applications, and a social network of things with
status updates".
One such IoT application platform that offers a wide variety of analysis, monitoring and counter-
action capabilities is ‘ThingSpeak’. Let us consider ThingSpeak in detail.
ThingSpeak is a platform providing various services exclusively targeted for building IoT
applications. It offers the capabilities of real-time data collection, visualizing the collected data
in the form of charts, ability to create plugins and apps for collaborating with web services,
social network and other APIs. We will consider each of these features in detail below.
The core element of ThingSpeak is a ‘ThingSpeak Channel’. A channel stores the data that we
send to ThingSpeak and comprises of the below elements:
Eight fields for storing data of any type - These can be used to store the data from a sensor or
from an embedded device.
Three location fields - Can be used to store the latitude, longitude and the elevation. These
are very useful for tracking a moving device.
Onestatus field - A short message to describe the data stored in the channel.
To use ThingSpeak, we need to signup and create a channel. Once we have a channel, we
can send the data, allow ThingSpeak to process it and also retrieve the same. Let us start
exploring ThingSpeak by signing up and setting up a channel.
Getting Started
Now you should see a page with a confirmation that the account was successfully created. The
confirmation message disappears after a few seconds and the final page should look as in the
below screen.
You can change the name to fit your need and you can add a description corresponding to
the channel. You can add any other useful description into the metadata field. In the same page,
you should see the fields for Latitude, Longitude and Elevation. Also, when you scroll down you
should see a check box that says ‘Make Public?’. Let us consider the significance of the various
fields and the tabs:
Latitude, longitude and elevation - These fields correspond to the location of a ‘thing’ and are
especially significant for moving things.
Make Public? - If the channel is made public, anyone can view the channel's data feed and the
corresponding charts. If this check box is not checked, the channel is private, which means for
every read or write operation, the user has to pass a corresponding API key.
URL - This can be the URL of your blog or website and if specified, will appear on the public
view of the channel.
Video ID - This is the ID corresponding to your YouTube or Vimeo ID. If specified, the video
appears on the public view of the channel.
Fields 1 to 8 - These are the fields which correspond to the data sent by a sensor or a ‘thing’.
A field has to be added before it can be used to store data. By default, Field 1 is added. In case
you try posting to fields that you have not added, your request will still be successful, but you
will not be able to see the field in the charts and the corresponding data. You can click on the
small box before the ‘add field’ text corresponding to each field to add it. Once you click the
‘add field’ box, a default label name appears in the text box corresponding to each field and the
‘add field’ text changes to ‘remove field’. You can edit the field text that appears by default
when a field is added to make more sense. For example, in the below screen, I have modified the
text for Field 2 to ‘Sensor Input’. To remove a field which is added, just check on the ‘remove
field’ box. Once you click this, the text ‘remove field’ changes back to ‘add field’ and the
corresponding field text is cleared.
Once you have edited the fields, click on ‘Save Channel’ button. You should now see a page like
the below in which the ‘Private View’ tab is defaulted:
The Private View shows a chart corresponding to each of the fields that we have added.
Now click on the ‘Public View’ tab. This should look exactly similar to the what we see in the
‘Private View’ tab since our channel is public. In case your channel is not public('make public'
check box not checked in the ‘channel settings’ tab), the public view tab shows a message that
‘This channel is not public’.
Now click on the ‘API Keys’ tab. You should see a screen similar to the below. The write
API key is used for sending data to the channel and the read API key(s) is used to read the
channel data. When we create a channel, by default, a write API key is generated. We generate
read API keys by clicking the ‘Generate New Read API Key’ button under this tab. You can also
add a note corresponding to each of the read API keys.
Note: Please note that clicking on the ‘Generate New Write API Key’ will over-write the
previous key. You will only have one Write API key at any point of time. Also, in case your
channel is private, others can only view the channel’s feed and charts by using a Read API key.
Please share the Read API keys with people who are approved and authorized to view your
channel.
Now click on the ‘Data Import/Export’ tab and you should see a screen similar to the
below. This tab is used to import the ‘Comma Separated Values(CSV)’ data from a file into the
channel. You can also download the channel’s feed from here in CSV format. This tab also
outlines how to send and view data by providing the URIs to the send and view APIs.
Now that we have come this far, let us get into some action. Let us try updating the fields
in our channel using C# and .NET. I have used Visual Studio 2013 Express for Web, but the
code relatively works the same with other versions too.
Open Visual Studio and Create a new project. In case you are prompted for a template, choose an
empty web application.
In the solution explorer, right click on the project, Add --> New Item and choose Web Form.
Once the form gets added, add the below code inside the form tag:
This label is used to display an error message in case we run into any exceptions
try
stringstrUpdateBase = "http://api.thingspeak.com/update";
HttpWebRequestThingsSpeakReq;
HttpWebResponseThingsSpeakResp;
ThingsSpeakReq = (HttpWebRequest)WebRequest.Create(strUpdateURI);
ThingsSpeakResp = (HttpWebResponse)ThingsSpeakReq.GetResponse();
if(!(string.Equals(ThingsSpeakResp.StatusDescription,"OK")))
lblError.InnerText = ex.Message;
lblError.Style.Add("display", "block");
throw;
I have started with building the URI for updating the fields. The initial URIis
http://api.thingspeak.com/update HYPERLINK "http://api.thingspeak.com/update" to which the
key has to be appended. Please note that you need to replace the string YOUR_KEY with the
actual write API key which you will get once you sign up and create a channel.After that I have
declared two constants which I will be pushing to my ThingSpeak channel. After that I am
appending these fields to the URL under the parameters field1 and field2. You can push the other
fields until field8 similarly. After this, I am creating aHTTPWebRequest object corresponding to
this URI by using the ‘WebRequest.Create’ method. After this, I am retrieving the response
using the GetResponse method and assigning the same to the response object. In case the data
was successfully sent to the channel, the resulting Status Description will be ‘OK’. I am
checking for any non-OK status descriptions and just in case of an error, I am throwing an
exception and displaying the resultant message in a label.
1. After a series of updates, the charts in the private view tab for each of the fields will look like
the
Each of the dots correspond to the value and the time at which the value was posted to the
channel. Place the mouse over a dot to get more details on the exact date and the GMT offset
from which the value was posted.
Please note that in the above example, I have sent some sample values to the channel.
You can send any data here, say the periodic readings from a temperature sensor or RPM values
from a motor. The Y-axis show the names that we specified to each of the labels.
Thing Tweet - This allows you to post messages to twitter via ThingSpeak. In essence,
this is a Twitter Proxy which re-directs your posts to twitter.
Thing HTTP - This allows you to connect to web services and supports GET, PUT, POST
and DELETE methods of HTTP.
Tweet Control - Using this, you can monitor your Twitter feeds for a specific key word and
then process the request. Once the specific keyword is found in the twitter feed, you can then use
Thing HTTP to connect to a different web service or execute a specific action.
React - Send a tweet or trigger a ThingHTTP request when the Channel meets a certain
condition.
TalkBack - Use this app to queue up commands and then allow a device to act upon these
queued commands.
As Arduino.cc began developing new MCU boards based on non-AVR processors like
the ARM/SAM MCU and used in the Arduino Due, they needed to modify the Arduino IDE so
that it would be relatively easy to change the IDE to support alternate toolchains to allow
Arduino C/C++ to be compiled for these new processors. They did this with the introduction of
the Board Manager and the SAM Core. A "core" is the collection of software components
required by the Board Manager and the Arduino IDE to compile an Arduino C/C++ source file
for the target MCU's machine language. Some ESP8266 enthusiasts developed an Arduino core
for the ESP8266 WiFiSoC, popularly called the "ESP8266 Core for the Arduino IDE".[16] This
has become a leading software development platform for the various ESP8266-based modules
and development boards, including NodeMCUs.
NodeMCU provides access to the GPIO (General Purpose Input/Output) and a pin
mapping table is part of the API documentation.
I/O ESP8266
index pin
0 [*] GPIO16
1 GPIO5
2 GPIO4
3 GPIO0
4 GPIO2
5 GPIO14
6 GPIO12
7 GPIO13
8 GPIO15
9 GPIO3
10 GPIO1
11 GPIO9
12 GPIO10
D0 (GPIO16) can only be used for GPIO read/write. It does not support open-
drain/interrupt/PWM/I²C or 1-Wire.
Development Supports Cloud Server Development / SDK for custom firmware development
Network Protocols IPv4, TCP/UDP/HTTP/FTP
Ultra Low Power Technology ESP8266EX has been designed for mobile, wearable
electronics and Internet of Things applications with the aim of achieving the lowest power
consumption with a combination of several proprietary techniques. The power saving
architecture operates mainly in 3 modes: active mode, sleep mode and deep sleep mode. By
using advance power management techniques and logic to power-down functions not required
and to control switching between sleep and active modes, ESP8266EX consumes about than
60uA in deep sleep mode (with RTC clock still running) and less than 1.0mA (DTIM=3) or less
than 0.5mA (DTIM=10) to stay connected to the access point. When in sleep mode, only the
calibrated real-time clock and watchdog remains active. The real-time clock can be programmed
to wake up the ESP8266EX at any required interval. The ESP8266EX can be programmed to
wake up when a specified condition is detected. This minimal wake-up time feature of the
ESP8266EX can be utilized by mobile device SOCs, allowing them to remain in the low-power
standby mode until WiFi is needed. In order to satisfy the power demand of mobile and wearable
electronics, ESP8266EX can be programmed to reduce the output power of the PA to fit various
application profiles, by trading off range for power consumption.
SOURCE CODE:
#include "DHTesp.h"
#include <ESP8266WiFi.h>
String apiKey ="N69XSWI5IZ19W6P2"; // Enter your Write API key from ThingSpeak
const char *ssid = "AndroidAP_1323"; // replace with your wifissid and wpa2 key
const char *pass = "12345678";
const char* server = "api.thingspeak.com";
DHTespdht;
WiFiClient client;
void setup()
{
int p=analogRead(A0);
Serial.begin(115200);
delay(10);
Serial.println("Connecting to ");
Serial.println(ssid);
WiFi.begin(ssid, pass);
void loop()
{
float h = dht.getHumidity();
float t = dht.getTemperature();
if (isnan(h) || isnan(t))
{
Serial.println("Failed to read from DHT sensor!");
return;
int p;
String postStr = apiKey;
postStr +="&field1=";
postStr += String(t);
postStr +="&field2=";
postStr += String(h);
postStr +="&field3=";
postStr += String(p);
postStr += "\r\n\r\n";
client.print("POST /update HTTP/1.1\n");
client.print("Host: api.thingspeak.com\n");
client.print("Connection: close\n");
client.print("X-THINGSPEAKAPIKEY: "+apiKey+"\n");
client.print("Content-Type: application/x-www-form-urlencoded\n");
client.print("Content-Length: ");
client.print(postStr.length());
client.print("\n\n");
client.print(postStr);
p=analogRead(A0);
Serial.print("Temperature: ");
Serial.print(t);
Serial.print(" degrees Celcius, Humidity: ");
Serial.print(h);
Serial.print("Heart beat range:");
Serial.print(p);
Serial.println("%. Send to Thingspeak.");
}
client.stop();
Serial.println("Waiting...");
// thingspeak needs minimum 15 sec delay between updates, i've set it to 30 seconds
delay(10000);
CHAPTER 5
5.1 RESULTS :
The project “implement of smart health care monitoring system using mobile iot and
cloud computing technology” was designed to help for a friendly hardware interaction for the
user.
5.2 CONCLUSION
Integrating features of all the hardware components used have been developed in it.
Presence of every module has been reasoned out and placed carefully, thus contributing to the
best working of the unit. Secondly, using highly advanced IC’s with the help of growing
technology, the project has been successfully implemented. Thus the project has been
successfully designed and tested.
Our project “implement of smart health care monitoring system using mobile iot and
cloud computing technology”” is mainly intended to provide an complete industrial automation
with the help of multiple sensors, GEM and ARM industrial microcontroller. This system
continuously monitoring the sensor data and displays on the LCD, if any sensor activated /
detected the ARM microcontroller compared and takes immediate respective action through
relays and this alert information send to technician/user through GEM.
We can use real time sensors and modules to increase the system performance and we
can add some shocking systems to add more safety.
REFERENCES
[5] ShamikaKshirsagar, Mr.D.E. Upasani, “Energy Management System for Smart Home”,
International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 06
June-2016.
[7] Ms. HlaingThidaOo Dr. Khin Than Mya Ms. NyainNyainLwin,” IoT based Home Energy
Management system for Rural Area in Myanmar”, ICT Virtual Organization of ASEAN
Institutes.
Microprocessors in embedded systems provide a central processing capability that simplifies system design and enhances flexibility. By enabling software changes rather than hardware modifications for updates, they allow for quick bug fixes and feature additions. This reduces development time and cost while maintaining efficiency, as systems are optimized for specific tasks with considerations for performance and resource constraints .
Advancements such as the decline in Ethernet silicon pricing and the expansion of WiFi hotspots facilitate widespread adoption, allowing consumers to access internet services globally. The economic benefits for businesses include reduced network deployment costs and flexibility in wireless environments. WiFi's interoperability and enhanced security with WPA2 further support its global adoption, encouraging inclusivity in devices and applications .
Standalone embedded systems operate independently and process input from transducers or commands from users without any real-time constraints. In contrast, real-time embedded systems are time-sensitive, ensuring tasks are performed within a specific period to prevent system damage. These systems are categorized as hard real-time, which adhere strictly to deadlines, and soft real-time, which are less strict .
Primitive multitasking can lead to challenges such as data corruption due to unrestricted access among tasks and increased complexity in managing tasks running in parallel. Real-time operating systems mitigate these issues by implementing structured task switching, inter-task communication via message queues or semaphores, and memory protection through MMUs in larger systems, ensuring task-specific functionality is maintained without interference .
Embedded systems achieve a balance between performance optimization and programmability by initially designing hardware tailored for specific tasks to enhance efficiency. Programmability is introduced at a software level, allowing for specific application programming, which enables flexibility, such that the same system can serve multiple purposes or adapt to different applications. This balance is crucial for both single-function devices and complex systems requiring diverse application support .
Ethernet principles applied through WiFi have changed user interaction by enabling wireless internet access, promoting mobility and flexibility. Users can now seamlessly connect anywhere within WiFi hotspots. This has redefined user expectations, making wireless connectivity an integral part of daily life, allowing uninterrupted interaction with internet technologies across various devices and environments .
Organizations may opt for a microkernel to separate core system functionalities from user-level services, enhancing security and maintainability. It allows for efficient task switching and inter-process communication, minimizing system crashes. However, the trade-offs involve potential performance overhead due to frequent context switching and possible slower execution of user-level services compared to monolithic systems .
Wireless technology, particularly WiFi, has transformed data communication by enabling internet connectivity without cables, facilitating access in diverse environments such as cafes and airports through hotspots. This shift has lowered deployment costs by eliminating extensive cabling, making LANs feasible in spaces where cables cannot be run, like historical buildings. WiFi also supports roaming, allowing devices to connect across access points, enhancing mobility and flexibility for users .
The integration of IoT technologies in u-healthcare systems enhances functionality by allowing continuous collection of comprehensive physiological data through sensors. This data is transmitted to a cloud server where it is stored and analyzed. The analyzed information is then sent wirelessly to caregivers for review and decision-making . The IoT framework addresses interoperability challenges by utilizing mobile gateway architecture and different technological tiers, optimizing the system for dedicated healthcare tasks .
In infrastructure mode, devices connect to a network through a central Wireless Access Point (AP), which routes data to and from the internet, requiring configuration with a shared SSID for security. In contrast, ad hoc mode allows devices to connect directly to each other without an AP, forming a peer-to-peer network, suitable for temporary connections but lacks the centralized internet access provided by infrastructure mode .