Thursday, April 28, 2016

A semi autonomous home defense system will require a PLC



Programmable logic controllers provide dependable, high-speed control and monitoring demanded by a wide variety of automated applications.
Programmable logic controllers(PLCs) have gained a substantial hold in the industrial manufacturing arena, and we would be remiss if this technology were not given the due attention it has earned. As such, we are featuring a series of articles based on the fundamentals of PLCs in this new EC&M department covering the technology of solid-state industrial automation. Throughout this series on PLC fundamentals, we'll cover PLC hardware modules; software capabilities; current applications; installation parameters; testing and troubleshooting; and hardware/software maintenance.
What is a PLC?
The National Electrical Manufacturers Association (NEMA) defines a PLC as a "digitally operating electronic apparatus which uses a programmable memory for the internal storage of instructions by implementing specific functions, such as logic, sequencing, timing, counting, and arithmetic to control through digital or analog I/O modules various types of machines or processes."
One PLC manufacturer defines it as a "solid-state industrial control device which receives signals from user supplied controlled devices, such as senors and switches, implements them in a precise pattern determined by ladder-diagram-based application progress stored in user memory, and provides outputs for control of processes or user-supplied devices, such as relays or motor starters."
Basically, it's a solid-state, programmable electrical/electronic interface that can manipulate, execute, and/or monitor, at a very fast rate, the state of a process or communication system. It operates on the basis of programmable data contained in an integral microprocessor-based system.
A PLC is able to receive (input) and transmit (output) various types of electrical and electronic signals and can control and monitor practically any kind of mechanical and/or electrical system. Therefore, it has enormous flexibility in interfacing with computers, machines, and many other peripheral systems or devices.
It's usually programmed in relay ladder logic and is designed to operate in an industrial environment.
What's it look like?
PLCs come in various sizes. Generally, the space or size that a PLC occupies is in direct relation to the user systems and input/output requirements as well as the chosen manufacturer's design/packaging capabilities.
Image result for PLC pic
The chassis of a PLC may be of the open or enclosed type. The individual modules plug into the back plane of the chassis.
The electronic components are mounted on printed circuit boards (PCBs) that are contained within a module.
Where did it come from?
The first PLC was introduced in the late 1960s and was an outgrowth of the programmable controller or PC (not to be confused with the notation as used for the personal computer). PCs have been around the industry since the early 60s.
The need for better and faster control relays that fit into less space as well as the frustration over program inflexibility (hard-wired relays, stepping switches, and drum programmers) gave birth to the PC.
Although the PC and PLC have been interchanged in speech, the difference between them is that a PC is dedicated to control functions in a fixed program, similar in a sense to the past problem of limited ability. A PLC, on the other hand, only requires that its software logic be rewritten to meet any new demands of the system being controlled. Thus, a PLC can adapt to changes in many processes or monitoring application requirements.
How does a PLC work?
Image result for I/O pic
To know how the PLC works, it is essential that we have an understanding of its central processing unit's (CPU's) scan sequence. The methodology basically is the same for all PLCs. However, as special hardware modules are added into the system, additional scanning cycles are required.
Here's one simple scanning process that involves every PLC. First, the I/O hardware modules are scanned by the ladder logic software program as follows.
Upon power-up, the processor scans the input module and transfers the data contents to the input's image table or register. Data from the output image table is transferred to the output module.
Next, the software program is scanned, and each statement is checked to see if the condition has been met. If the conditions are met, the processor writes a digital bit "1" into the output image table, and a peripheral device will be energized. If the conditions are not met, the processor writes a "0" into the output image table, and a peripheral device (using "positive logic") remains deenergized.
A PLC interfaces numerous types of external electrical and electronic signals. These signals can be AC or DC currents or voltages. Typically, they range from 4 to 20 milliamperes (mA) or 0 to 120VAC, and 0 to 48VDC. These signals are referred to as I/O (input/output) points. Their total is called the PLC's I/O capability. From an electronic point-of-view, this number is based on how many points the PLC's CPU is able to look at, or scan, in a specified amount of time. This performance characteristic is called scan time. From the practical perspective of the user, however, the number of I/O modules needed as well as the number of I/O points contained on each I/O module will drive what the system's I/O capability should be.
It's important to have sufficient I/O capability in your PLC system. It's better to have more than less so that, when more I/O points are required at a future time, it's easier to write the existing spare I/O points into the software (since the hardware is already there). There's no harm to the operating system in having spare I/O points; the software can be programmed to ignore them, and these points will have a negligible effect on the PLC's scan time.
The PLC's software program
The software program is the heart of a PLC and is written by a programmer who uses elements, functions, and instructions to design the system that the PLC is to control or monitor. These elements are placed on individually numbered rungs in the relay ladder logic (RLL). The software's RLL is executed by the processor in the CPU module or controller module (same module, different name).
There are many types of PLC software design packages available. One frequently selected software package is of the RLL format and includes contacts, coils, timers, counters, registers, digital comparison blocks, and other types of special data handling functions. Using these elements, the programmer designs the control system. The external devices and components are then wired into the system identical to that of the programmer's software ladder logic. Not all of the software elements will have a hard-wired, physical counterpart, however.
As the PLC's processor scans (topdown) through the software program (rung-by-rung), each rung of RLL is executed. The hard-wired device that the software is mirroring then becomes active. The software is thus the controlling device and provides the programmer or technician the flexibility to either "force a state" or "block a device" from the system operation. For example, a coil or contact can be made to operate directly from the software (independent of the control cabinet's hard-wiring to source or field input devices). Or, a device can be made to appear invisible (removed from the system's operation), even though it's electrically hard-wired and physically in place.
Individual PLC sections
Common to all PLCs are four sections, each of which can be subdivided into smaller but equally important sections. These primary sections include the power supply section, which provides the operating DC power to the PLC and I/O base modules and includes battery backup; the program software section; the CPU module, which contains the processor and holds the memory; and the I/O section, which controls peripheral devices and contains the input and output modules.
Power supply section. The power supply (PS) section gets its input power from an external 120VAC or 240VAC source (line voltage), which is usually fused and fed through a control relay and filter external to the PS. In addition, the PS has its own integral AC input fuse.
This line voltage is then stepped-down, rectified, filtered, regulated, voltage- and current-protected, and status-monitored, with status indication displayed on the front of the PS in the form of several LEDs (light-emitting diodes). The PS can have a key switch for protecting the memory or selecting a particular programming mode.
The output of the PS provides low DC voltage(s) to the PLC's various modules (typically, with a total current capability of 20A or 50A) as well as to its integral lithium battery, which is used for the memory backup. Should the PS fail or its input line voltage drop below a specific value, the memory contents will not change from what they were prior to the failure.
The PS output provides power to every module in the PLC; however, it does not provide the DC voltages to the PLC's peripheral I/O devices.
CPU module. "CPU," "controller," or "processor" are all terms used by different manufacturers to denote the same module that performs basically the same functions. The CPU module can be divided into two sections: the processor section and the memory section.
The processor section makes the decisions needed by the PLC so that it can operate and communicate with other modules. It communicates along either a serial or parallel data-bus. An I/O base interface module or individual on-board interface I/O circuitry provides the signal conditioning required to communicate with the processor. The processor section also executes the programmer's RLL software program.
The memory section stores (electronically) retrievable digital information in three dedicated locations of the memory. These memory locations are routinely scanned by the processor. The memory will receive ("write" mode) digital information or have digital information accessed ("read" mode) by the processor. This read/write (R/W) capability provides an easy way to make program changes.
The memory contains data for several types of information. Usually, the data tables, or image registers, and the software program RLL are in the CPU module's memory. The program messages may or may not be resident with the other memory data.
A battery backup is used by some manufacturers to protect the memory contents from being lost should there be a power or memory module failure. Still others use various integrated circuit (IC) memory technologies and design schemes that will protect the memory contents without the use of a battery backup.
A typical memory section of the CPU module has a memory size of 96,000 (96K) bytes. This size tells us how many locations are available in the memory for storage. Additional memory modules can be added to your PLC system as the need arises for greater memory size. These expansion modules are added to the PLC system as the quantity of I/O modules are added or the software program becomes larger. When this is done, the memory size can be as high as 1,024,000 (1024K) bytes.
Manufacturers will state memory size in either "bytes" or "words." A byte is eight bits, and a bit is the smallest digit in the binary code. It's either a logic "1" or a logic "0." A word is equal in length to two bytes or 16 bits. Not all manufacturers use 16-bit words, so be aware of what your PLC manufacturer has defined as its memory word bit size.
Software program. The PLC not only requires electronic components to operate, it also needs a software program. The PLC programmer is not limited to writing software in one format. There are many types available, each lending itself more readily to one application over and above another. Typical is the RLL type previously discussed. Other S/W programs include "C," State Language, and SFC (Sequential Function Charts).
Regardless of which software is chosen, it will be executed by the PLC's CPU module. The software can be written and executed with the processor in an online state (while the PLC is actually running) or in the off-line state (whereby the S/W execution does not affect current operation of the I/O base).
In the RLL software program, we find several types of programming elements and functions to control processes both internal to the PLC (memory and register) as well as external (field) devices. Listed below are some of the more common types of elements, functions, and instructions:
* Contacts (can be either normally opened or closed; highlighted on the monitor means they are active).
* Coils (can be normal or latched; highlighted means they are energized).
* Timers (coil can either be ON or OFF for the specified delay).
* Counters (can count by increments either up or down).
* Bit shift registers (can shift data by one bit when active).
* One-shot (meaning active for one scan time; useful for pulse timer).
* Drums (can be sequenced based on a time or event).
* Data manipulation instructions (enable movement, comparison of digital values).
* Arithmetic instructions (enable addition, subtraction, multiplication, and division of digital values).
Peripheral devices
Peripheral devices to the PLC and its I/O base(s) can be anything from a host computer and control console to a motor drive unit or field limit switch. Printers and industrial terminals used for programming are also peripheral devices.
Peripheral devices can generate or receive AC or DC voltages and currents as well as digital pulse trains or single pulses of quick length (pulse width).
These external operating devices, with their sometimes harsh and/or fast signal characteristics, must be able to interface with the PLC's sensitive microprocessor. Various types of I/O modules (using the proper shielded cabling) are available to do this job.
Input module
The input module has two functions: reception of an external signal and status display of that input point. In other words, it receives the peripheral sensing unit's signal and provides signal conditioning, termination, isolation and/or indication for that signal's state.
The input to an input module is in either a discrete or analog form. If the input is an ON-OFF type, such as with a push button or limit switch, the signal is considered to be of a discrete nature. If, on the other hand, the input varies, such as with temperature, pressure, or level, the signal is analog in nature.
Peripheral devices sending signals to input modules that describe external conditions can be switches (limit, proximity, pressure, or temperature), push buttons, or logic, binary coded decimal (BCD) or analog-to-digital (A/D) circuits. These input signal points are scanned, and their status is communicated through the interface module or circuitry within each individual PLC and I/O base. Some typical types of input modules are listed below.
* DC voltage (110, 220, 14, 24, 48, 15-30V) or current (4-20 mA).
* AC voltage (110, 240, 24, 48V) or current (4-20 mA).
* TTL (transistor transistor logic) input (3-15VDC).
* Analog input (12-bit).
* Word input (16-bit/parallel).
* Thermocouple input.
* Resistance temperature detector.
* High current relay.
* Low current relay.
* Latching input (24VDC/110VAC).
* Isolated input (24VDC/85-132VAC).
* Intelligent input (contains a microprocessor).
* Positioning input.
* PID (proportional, intregal, differentiation) input.
* High-speed pulse.
Output module
The output module transmits discrete or analog signals to activate various devices such as hydraulic actuators, solenoids, motor starters, and displays the status (through the use of LEDs) of the connected output points. Signal conditioning, termination, and isolation are also part of the output module's functions. The output module is treated in the same manner as the input module by the processor.
Some typical output modules available today include the following:
* DC voltage (24, 48,110V) or current (4-20 mA).
* AC voltage (110, 240v) or current (4-20 mA).
* Isolated (24VDC).
* Analog output (12-bit).
* Word output (16-bit/parallel).
* Intelligent output.
* ASCII output.
* Dual communication port.
TERMS TO KNOW
A/D: A device or module that transforms an analog signal into a digital word.
Address: A numbered location (storage number) in the PLC's memory to store information.
Analog input: A varying signal supplying process change information to the analog input module.
Analog output: A varying signal transmitting process change information from the analog output module.
Baud rate: The number of bits per second that is either transmitted or received; also the speed of digital transmission acceptable by a device.
BCD: Binary coded decimal. A method used to express the 0-thru-9 (base 10) numbering system as a binary (base 2) equivalent.
Bit: A single binary digit.
Byte: Eight bits.
Central Processing Unit (CPU): An integrated circuit (IC) that interprets, decides, and executes instructions.
D/A: A device or module that transforms a digital word into an analog signal
Electrically Erasable Programmable Read-Only Memory (EEPROM): Same as EPROM but can be erased electrically.
Erasable Programmable Read-Only Memory (EPROM): A memory that a user can erase and load with new data many times, but when used in application, it functions as a ROM. EPROMs will not lose data during the loss of electrical power. They are nanvolatile memories.
Image register/image table: A dedicated memory location reserved for I/O bit status.
Input module: Processes digital or analog signals from field devices.
I/O points: Terminal points on I/O modules that connect the input and output field devices.
Millisecond: One thousandth of a second (1/1000 sec, 0.001 sec).
Modem: Modem is an acronym for modulator/demodulator. This is a device that modulates (mixes) and demodulates (separates) signals.
Operator interface: Devices that allow the system operators to have access to PLC and I/O base conditions.
Output module: Controls field devices.
Parallel data: Data whose bytes or words are transmitted or received with all their bits present at the same time.
Program: One or more instructions or statements that accomplish a task.
Programming device: A device used to tell a PLC what to do and when it should be done.
Random Access Memory (RAM): A memory where data can be accessed at any address without having to read a number of sequential addresses. Data can be read from and written to storage locations. RAM has volatile memory, meaning a loss of power will cause the contents in the RAM to be lost.
Read-Only Memory (ROM): A memory from which data can be read but not written. ROMs are often used to keep programs or data from being destroyed due to user intervention.
Software: One or more programs that control a process.
Robert B. Hee is an electronic/electrical engineer in private practice in Virginia Beach, Va.

11.3 Testing Basic Connectivity



The ping command tests whether a remote host can be reached from your computer. This simple function is extremely useful for testing the network connection, independent of the application in which the original problem was detected. ping allows you to determine whether further testing should be directed toward the network connection (the lower layers) or the application (the upper layers). If ping shows that packets can travel to the remote system and back, the user's problem is probably in the upper layers. If packets can't make the round trip, lower protocol layers are probably at fault.
Frequently a user reports a network problem by stating that he can't telnet (or ftp, or send email, or whatever) to some remote host. He then immediately qualifies this statement with the announcement that it worked before. In cases like this, where the ability to connect to the remote host is in question, ping is a very useful tool.
Using the hostname provided by the user, ping the remote host. If your ping is successful, have the user ping the host. If the user's ping is also successful, concentrate your further analysis on the specific application that the user is having trouble with. Perhaps the user is attempting to telnet to a host that only provides anonymous ftp. Perhaps the host was down when the user tried his application. Have the user try it again, while you watch or listen to every detail of what he is doing. If he is doing everything right and the application still fails, detailed analysis of the application withsnoop and coordination with the remote system administrator may be needed.
If your ping is successful and the user's ping fails, concentrate testing on the user's system configuration, and on those things that are different about the user's path to the remote host, when compared to your path to the remote host.
If your ping fails, or the user's ping fails, pay close attention to any error messages. The error messages displayed by ping are helpful guides for planning further testing. The details of the messages may vary from implementation to implementation, but there are only a few basic types of errors:
Unknown host
The remote host's name cannot be resolved by name service into an IP address. The name servers could be at fault (either your local server or the remote system's server), the name could be incorrect, or something could be wrong with the network between your system and the remote server. If you know the remote host's IP address, try to ping that. If you can reach the host using its IP address, the problem is with name service. Use nslookup or dig to test the local and remote servers, and to check the accuracy of the host name the user gave you.
Network unreachable
The local system does not have a route to the remote system. If the numeric IP address was used on the ping command line, re-enter the ping command using the hostname. This eliminates the possibility that the IP address was entered incorrectly, or that you were given the wrong address. If a routing protocol is being used, make sure it is running and check the routing table withnetstat. If RIP is being used, ripquery will check the contents of the RIP updates being received. If a static default route is being used, re-install it. If everything seems fine on the host, check its default gateway for routing problems.
No answer
The remote system did not respond. Most network utilities have some version of this message. Some ping implementations print the message "100% packet loss." telnet prints the message "Connection timed out" and sendmail returns the error "cannot connect." All of these errors mean the same thing. The local system has a route to the remote system, but it receives no response from the remote system to any of the packets it sends.
There are many possible causes of this problem. The remote host may be down. Either the local or the remote host may be configured incorrectly. A gateway or circuit between the local host and the remote host may be down. The remote host may have routing problems. Only additional testing can isolate the cause of the problem. Carefully check the local configuration using netstat andifconfig. Check the route to the remote system with traceroute. Contact the administrator of the remote system and report the problem.
All of the tools mentioned here will be discussed later in this chapter. However, before leaving ping, let's look more closely at the command and the statistics it displays.

11.3.1 The ping Command

The basic format of the ping command on a Solaris system is: [2]
[2] Check your system's documentation. ping varies slightly from system to system. On Linux, the format shown above would be: ping [-c count] [-s packetsizehost
ping host [packetsize] [count]
host
The hostname or IP address of the remote host being tested. Use the hostname or address provided by the user in the trouble report.
packetsize
Defines the size in bytes of the test packets. This field is required only if the count field is going to be used. Use the default packetsize of 56 bytes.
count
The number of packets to be sent in the test. Use the count field, and set the value low. Otherwise, the ping command may continue to send test packets until you interrupt it, usually by pressing CTRL-C (^C). Sending excessive numbers of test packets is not a good use of network bandwidth and system resources. Usually five packets are sufficient for a test.
To check that ns.uu.net can be reached from almond, we send five 56-byte packets with the following command:
% ping -s ns.uu.net 56 5
PING ns.uu.net: 56 data bytes
64 bytes from ns.uu.net (137.39.1.3): icmp_seq=0. time=32.8 ms
64 bytes from ns.uu.net (137.39.1.3): icmp_seq=1. time=15.3 ms
64 bytes from ns.uu.net (137.39.1.3): icmp_seq=2. time=13.1 ms
64 bytes from ns.uu.net (137.39.1.3): icmp_seq=3. time=32.4 ms
64 bytes from ns.uu.net (137.39.1.3): icmp_seq=4. time=28.1 ms

----ns.uu.net PING Statistics----
5 packets transmitted, 5 packets received, 0% packet loss
round-trip (ms)  min/avg/max = 13.1/24.3/32.8

The -s option is included because almond is a Solaris workstation, and we want packet-by-packet statistics. Without the -s option, Sun's ping command only prints a summary line saying "ns.uu.net is alive." Other ping implementations do not require the -s option; they display the statistics by default.
This test shows an extremely good wide area network link to ns.uu.net with no packet loss and a fast response. The round-trip between peanut and ns.uu.net took an average of only 24.3 milliseconds. A small packet loss, and a round-trip time an order of magnitude higher, would not be abnormal for a connection made across a wide area network. The statistics displayed by the ping command can indicate low-level network problems. The key statistics are:
  • The sequence in which the packets are arriving, as shown by the ICMP sequence number (icmp_seq) displayed for each packet.
  • How long it takes a packet to make the round trip, displayed in milliseconds after the string time=.
  • The percentage of packets lost, displayed in a summary line at the end of the ping output.
If the packet loss is high, the response time is very slow, or packets are arriving out of order, there could be a network hardware problem. If you see these conditions when communicating over great distances on a wide area network, there is nothing to worry about. TCP/IP was designed to deal with unreliable networks, and some wide area networks suffer a lot of packet loss. But if these problems are seen on a local area network, they indicate trouble.
On a local network cable segment, the round-trip time should be near 0, there should be little or no packet loss, and the packets should arrive in order. If these things are not true, there is a problem with the network hardware. On an Ethernet the problem could be improper cable termination, a bad cable segment, or a bad piece of "active" hardware, such as a hub, switch, or transceiver. Check the cable with a cable tester as described earlier. Good hubs and switches often have built-in diagnostic software that can be checked. Cheap hubs and transceivers may require the "brute force" method of disconnecting individual pieces of hardware until the problem goes away.
The results of a simple ping test, even if the ping is successful, can help you direct further testing toward the most likely causes of the problem. But other diagnostic tools are needed to examine the problem more closely and find the underlying cause.


Previous: 11.2 Diagnostic Tools TCP/IP Network AdministrationNext: 11.4 Troubleshooting Network Access
11.2 Diagnostic ToolsBook Index11.4 Troubleshooting Network Access

15 Quotes That Will Inspire You to Pursue Your Dreams


Following your dreams isn't always all it's cracked up to be. Watch a movie about someone following his/her dreams, and the conventional narrative formula leads you to believe that, after one or two hiccups and a couple of hours, you'll eventually get exactly what you wanted. The real world operates somewhat differently; for some people, this dream path may pan out, but for most of us, the road to our dreams is long, challenging, and unexpected.
Of course, none of this means that the pursuit isn't worthwhile--in fact, the experience of pursuing your dreams is often more rewarding and more enlightening than the achievement of your dreams themselves.
In trying to put the pursuit of dreams into perspective, below is a list of insightful, inspiring, and in some cases, amusing quotes:

1. "You have to dream before your dreams can come true." -- A. P. J. Abdul Kalam.
Some people throttle their potential by refusing to think "what if?" and ignoring what's truly important to them in life. You have to start dreaming before you can achieve anything.
2. "I have lots of things to prove to myself. One is that I can live my life fearlessly." -Oprah Winfrey.
Fear is a limiting factor, and it's present in all of us, but moving past that fear is essential for success.
3. "Don't give up on your dreams, or your dreams will give up on you." -- John Wooden.
The moment you believe you can't do it, everything else begins to crumble. Never stop believing.
4. "You will never find time for anything. You must make it." -- Charles Buxton. M
any people convince themselves they'll have time for their dreams in the future--but there's never a better time than now. Make time for your dreams.
5. "Never be ashamed! There's some who will hold it against you, but they are not worth bothering with." -- J. K. Rowling.

If your dreams are big, people will mock you for them. Forget those people; they will not help you succeed.
6. "To be a human being is to be in a state of tension between your appetites and your dreams, and the social realities around you and your obligations to your fellow man." -John Updike.
Our dreams are often at odds with our realities, demanding freedoms and resources we may not have. But this doesn't make them impossible to achieve.
7. "Press on. Nothing in the world can take the place of persistence. Talent will not; nothing is more common than unsuccessful men with talent. Genius will not; the world is full of educated derelicts. Persistence and determination alone are omnipotent." -- Ray Kroc.
Persistence is much of what separates the successful from the pure wishful thinkers. Distinguish yourself by staying motivated even in the toughest of circumstances.
8. "Once in a while it really hits people that they don't have to experience the world in the way they have been told." -- Alan Keightley.

This is the realization that fuels most people to follow their dreams relentlessly. Staying complacent never led anybody to greatness.
9. "I can't imagine a person becoming a success who doesn't give this game of life everything he's got." -- Walter Cronkite.
You can't follow your dreams at a leisurely pace. You need to give them 100 percent of your effort if you want to achieve them.
10. "When you reach an obstacle, turn it into an opportunity. You have the choice. You can overcome and be a winner, or you can allow it to overcome you and be a loser. The choice is yours and yours alone. Refuse to throw in the towel. Go that extra mile that failures refuse to travel. It is far better to be exhausted from success than to be rested from failure." -- Mary Kay Ash.
Following your dreams is an exhausting, draining effort--but the rewards are well worth it all.
11. "Love what you do and do what you love. Don't listen to anyone else who tells you not to do it. You do what you want, what you love. Imagination should be the center of your life." -- Ray Bradbury.
Ignore everybody who tries to tell you what to do or think. Follow your own instincts and goals.
12. "I don't focus on what I'm up against. I focus on my goals and I try to ignore the rest." -- Venus Williams.
It's easy to get lost in thinking only about the challenges and obstacles before you. Instead, think only about your ultimate destination.
13. "It is better to risk starving to death than surrender. If you give up on your dreams, what's left?" -- Jim Carrey.
This quote may be a bit extreme, but it carries a great point; your dreams define you. If you abandon them, what else could possibly motivate you?
14. "Remember to celebrate milestones as you prepare for the road ahead." -- Nelson Mandela.
Every milestone is a miniature victory in the road to achieving your goals. Don't neglect or underestimate them.
15. "The only thing worse than starting something and failing... is not starting something." -- Seth Godin.
In some cases, failure is inevitable. Don't let that stop you from starting something new.
Be sure to consult this list the next time you feel challenged or disillusioned in the pursuit of your dreams. By adopting the perspectives of people who have already achieved their dreams, you can wrap your mind around the challenges you face in your own life, and remain resolved in accomplishing your goals.
*Your doubters and naysayers are only conveying "their" limitations. No caged human being wishes to see you free.

Back to the basics, "Just for Us"

*I began my career by taking apart my mother's radios and televisions. I stayed to myself, played with hammers, nails and wood in her basement.
 My highest grade of diploma was the 8th. I went on to college via a GED and graduated none of the 3 colleges I attended.
 I am a stationary electrical systems engineer that met all the requirements as set forth by the state of MD via IBM & Grubb & Ellis
 I say this to tell you, "Let no one's negative / destructive opinion of you have meaning". A "friend" nurtures your wildest dreams while most that you commonly socialize with will do nothing but knock you. Misery and ignorance are lonely, don't be their company.

 I'm getting ready to depart for Asia where I'll sit with the heads of departments at technical universities to sell the "ideas" conveyed in the last 4 or 5 posts. I may also visit S Korea and do the exact same thing.
 No matter who you are, find your passion, find your love and make it profitable.

Let's begin where this blog began: Oct 2015'

"Just for Us"

Contents

 [hide

What is AC voltage?

AC voltage is voltage that does not have a Plus and Minus terminal on the supply.
AC voltage symbol: NO plus min power.PNG
Other names for AC voltage:
  • Directed power or voltage
  • Sine wave power or voltage
  • Inverter type of power or voltage

AC voltage safety[edit]

AC electricity with a voltage less than 50 V (RMS) is called Extra Low Voltage. This voltage is unlikely to give a human being a dangerous electric shock.

What is low voltage?[edit]

Other names for low voltage:
  • Shock free power or voltage

What is DC voltage?[edit]

DC voltage is voltage that has a Plus and Minus terminal.
DC voltage symbol: Plus min power.PNG
Other names for DC voltage:
  • DC power or voltage
  • Battery type of power or voltage
  • Plus-minus power or voltage


Electric DC polarity: plus and minus[edit]

For most kinds of devices it is important to have the right voltage and polarity. Wrong voltage or polarity can destroy a device
How to mark the plus or to find the plus pole:
  • Red is always plus.
  • Painted line on the plus wire, no painted line on the min.
  • Square wire is plus, round wire is minus.
  • Sharp edge is plus, round wire is minus.
  • Knot is plus, no knot is minus.
  • Mark on the plus wire, the plus wire is special.
  • and so on, the plus wire is special or not normal than a normal wire.

These must be in good working order to save your electric material:
  • The voltage.
  • The amperage.
  • The plus and minus position.
  • The type of power, AC or DC.
  • The type of low voltage coax connector.
  • Protect your plug and connector against mechanical pulling force.
  • Take your time to check these 6 items.


Moving forward / home defense systems

As technology in the security sector advances, so does the intelligence of the burglars in beating this technology. Gone are the days when a simple alarm system, connected to your phone line, was sufficient to protect you from potential intrusions. Criminals have figured out a way around it – Cut the phone lines, and render the security system practically useless.

So what now?

Now is the time for bringing cellular technology into the picture.

What is a Cellular Alarm System?

Cellular alarm systems are a replacement of the traditional wired phone line security networks. These systems work just like your cell phone. A cellular module is installed in the main control panel and it sends signals, without the use of wires, to the monitoring station.  The cellular signal is sent via the data part of a cellular signal, much like a text message.

How Does a Cellular Alarm System Work

  • Emergency Occurs: The first step requires the occurrence of an emergency. This could include a variety of situations, such as a break-in through a window or a door, a fire or a gas leak or even someone trying to force open a security safe.

  • Sensor Triggered: Sensors can be placed anywhere in your house.  Whenever there is an instance of emergency, the relevant sensor picks up the unusual activity and is triggered.

  • Control Panel: The control panel serves more than one purpose:

  • Sounding the Alarm: The triggered sensor sends a cellular signal to the main control panel, where it is registered to sound the alarm. The alarm could be in the form of high-pitched sirens, turning on and off lights, in or around the house or flashing probe lights.

  • Alerting the Authorities: The control panel simultaneously sends a cellular signal to the monitoring service at the back end. The monitoring service, subsequently, informs the relevant authorities. In case of a fire, this would be the fire rescue services; in case of a break-in, it would be the local Police and so on.

  • Help Arrives: Typically it takes a few minutes for emergency services to arrive at the scene. Depending on the efficiency of your monitoring service and the local authorities, help should arrive soon and deal with the potential threats.

Added Benefits:

  • Emergency Notification: It can be programmed to notify you of an emergency via text, call or email.

  • Remote Monitoring: It allows you to monitor your house remotely. Even if you are far away from your home, you can still look at what’s going on inside the house. All you have to do is simply access the cameras from your phone and keep a check for any unusual activities while you are not around.

  • Simple Installation: One of the best parts about going for wireless technology with your home security is that you don’t have to go through the process of an extensive rewiring of your entire house.   The installation procedure is also very simple. 

  • Peace of Mind: With cellular technology securing your house, you don’t have to worry about power outages or even burglars cutting your phone lines. In addition to that, wireless systems are safer and more dependable, giving you a genuine sense of security.

Will the Cell Service Make a Difference?

A common misconception about cellular alarm system revolves around the strength of signals of the cellular service. To clarify, as long as you can make calls and send texts with your cell service at home, you are good to go. And in case the cell service coverage is not very strong at your home, you can always request for having a particular provider’s cellular module inserted.

What About Burglars Using Jammers?

Jammers can easily scramble the communication channel and disrupt cellular signals, giving the burglars a window of opportunity to rob your house. With a jammer in place, the burglar can simply break-in to your house and there would be no notification generated via your alarm system and therefore the monitoring service would not have any knowledge of an intrusion.

To combat this, a lot of alarm companies use a ‘dedicated channel’ to communicate with your alarm system’s control panel. This ensures that there is no disruption in services due to consumer cell phone signal outages. So, be sure to ask your carrier whether or not it provides this service.  

A Quick Word of Caution:

With a cellular alarm system, there are a few things you should keep in mind:

  • Batteries: Since these systems operate on batteries, you should be cautious about when the batteries die out. Most alarm systems would beep to notify you, but ideally, you should check the batteries after every few weeks.

  • Potential Signal Disruption: There might be other appliances in the house that can cause disruption. Keep an eye out for any equipment in the house that uses radio wave technology including microwave ovens and wireless internet. Try and ensure that your cellular alarm system’s range is not affected by the presence of these appliances.

  • Cost: Wireless systems are usually more expensive than wired systems, due to the more advance technology and the convenience they offer.

  • Security: Some of the relatively cheaper and low quality versions of cellular alarm systems operate with a narrow band of security codes.  Other users with the same model may be able to disarm the system with nothing more than a remote control. For this purpose, when you go out to the market, make sure you buy your security products from a trusted supplier that offers a warranty for its products.

  • Installation: Many homeowners tend to go for wireless systems due to the ease of installation factor. However, keep in mind that a non-professional installation might actually leave the system vulnerable to tampering, and unintentional damage.

  • ://www.excite.com/content/home-security/how-does-a-cellular-alarm-system-wohttp://www.excite.com/content/home-security/how-does-a-cellular-alarm-system-work

Featured Posts

Rental Properties for Sale, Santa Marianita, Ecuador

  Beautiful rental with beach access. Utilities and WiFi are included, just bring your food and move in. *Be sure to ask about our long-term...

Popular Posts