Posts | Comments

Planet Arduino

Archive for the ‘nRF24L01+’ Category

[Markus Gritsch] and his son had a fun Sunday putting together a little toy airboat from a kit. They fired it up and it occurred to [Markus] that it was pretty lame. It went forward and sometimes sideward when a stray current influenced its trajectory, but it had no will of its own.

The boat was extracted from water before it could wander off and find itself lost forever. [Markus] did a mental inventory of his hacker bench and decided this was a quickly rectified design shortcoming. He applied a cheap knock-off arduino, equally cheap nRF24L01+ chip of dubious parentage, and their equivalent hobby servo to the problem.

Some quick coding later, assisted by prior work from other RC enthusiasts, the little boat was significantly upgraded. Now the boat could be brought back to shore using any R/C controller that supported the, “Bayang,” protocol. He wouldn’t have to face the future in which he’d have to explain to his son that the boat, like treacherous helium balloons, was just gone. Video after the break.


Filed under: Arduino Hacks, toy hacks

If you’ve never seen a Strandbeest before, you’re going to want to watch the video after the break. Invented by [Theo Jansen], a Strandbeest is a kinematic work of art. An eight legged structure that walks around under wind power — or if you’re clever, an Arduino and some motors.

For a weekend project, [Remet0n] decided to motorize a toy version of the Strandbeest, and make it remote-controlled. The toy is normally powered by a propeller spun by the wind — making it very easy to replace with motors. You can pick them up for under $10 on eBay.

Using an Arduino Nano, two small 3V motors , a wireless chip (NRF24L01) and a L9110 H-bridge, he was able to create this awesome little remote-controlled device:

As far as remote-controlled Strandbeests go though, we love this Sphero controlled Strandbeest — I mean, who even thinks about coming up with something like that? Maybe I should make one for my Sphero…


Filed under: Arduino Hacks

Learning becomes interesting when you make it fun, interactive and entertaining. [Arkadi] built ShakeIt – an interactive game for the Mini MakerFaire in Jerusalem to demonstrate to kids and grownups how light colors are mixed. It is a follow up to his earlier project – Smart juggling balls which we featured earlier.

The juggling balls consist of a 6 dof sensor (MPU 6050), a micro controller, transmitter (NRF24L01+), some addressable RGB LED’s and a LiPo battery. An external magnet activates a reed switch inside the balls and triggers them in to action. The ShakeIt light fixture consists of an Arduino Nano clone, NRF24L01+ with SMA Antenna, buck converter, 74 addressable RGB LED’s, and a bluetooth module. The bluetooth module connects to a smartphone app.

[Arkadi] starts out by handing three juggling balls, each with a predefined color (Red, Green, Blue). When the ball is shaken, the light inside the ball becomes stronger. The ShakeIt light fixture is used as a mixer. It communicates with the balls and receives the value of how strong the light inside each of the smart balls is, mixing them up, and generating the mixed color.

The fun starts when the interactive game mode is enabled. Instead of just mixing the light, the Light fixture generates patterns based on how strong the balls are shaken. At first the light fixture shows all three colors filling up the central ball. The three contenders then fight out to get their color to fill up the sphere completely until only one color remains and the winner is declared.

The kids might be learning some color theory here, but it seems the adults are having a “ball” playing the crazy game. If you’d like to build your own shoulder dislocating ShakeIt game, head over to [Arkadi]’s github repository for the ShakeIt and the Juggling Balls. Check the video below to see the adults having fun.


Filed under: Arduino Hacks, led hacks
Ott
13

BORAT: Bathroom Monitor for the Future

arduino, arduino hacks, Bathroom Monitor, Borat, nRF24L01+ Commenti disabilitati su BORAT: Bathroom Monitor for the Future 

borat1

A recent company move has left [kigster] and his 35 coworkers in a frustrating situation. Their new building only has two single occupancy bathrooms. To make matters worse, the bathrooms are located on two different floors. Heading to one bathroom, finding it occupied, then running upstairs to find the second bathroom also occupied became an all to common and frustrating occurrence at the office.

It was obvious the office needed some sort of bathroom occupancy monitoring system – much like those available on commercial aircraft. [kigster] asked for a budget of about $200 to build such a system. His request was quickly granted it by office management. They must have been on their way to the bathroom at the time.

[kigsteborat2r] began work on BORAT: Bathroom Occupancy Remote Awareness Technology. The initial problem was detecting bathroom occupancy. The easiest method would be to use door locks with embedded switches, much those used in aircraft. Unfortunately, modifying or changing the locks in a rented office space is a big no-no. Several other human detection systems were suggested and rejected. The final solution was a hybrid. Sonar, Passive Infrared (PIR), and light sensors work in concert to detect if a person is in the bathroom. While we think the final “observer unit” is rather cool looking, we’re sure unsuspecting visitors to the office may be wondering why a two eyed robot is staring at them on the throne.

The display side of the system was easy. The entire system communicates with the venerable nRF24L01+ radio modules, so the display just needed a radio module, an arduino, and a way of displaying bathroom status. Two LED matrices took care of that issue.

We really like this hack. Not only is it a great use of technology to solve a common problem, but it’s also an open source system. BORAT’s source code is available on [kigster's] github.

Want to know more about BORAT? Kigster is answering questions over on his thread in the Arduino subreddit.


Filed under: Arduino Hacks

Strobe Remote

If you want to take a photograph with a professional look, proper lighting is going to be critical. [Richard] has been using a commercial lighting solution in his studio. His Lencarta UltraPro 300 studio strobes provide adequate lighting and also have the ability to have various settings adjusted remotely. A single remote can control different lights setting each to its own parameters. [Richard] likes to automate as much as possible in his studio, so he thought that maybe he would be able to reverse engineer the remote control so he can more easily control his lighting.

[Richard] started by opening up the remote and taking a look at the radio circuitry. He discovered the circuit uses a nRF24L01+ chip. He had previously picked up a couple of these on eBay, so his first thought was to just promiscuously snoop on the communications over the air. Unfortunately the chips can only listen in on up to six addresses at a time, and with a 40-bit address, this approach may have taken a while.

Not one to give up easily, [Richard] chose a new method of attack. First, he knew that the radio chip communicates to a master microcontroller via SPI. Second, he knew that the radio chip had no built-in memory. Therefore, the microcontroller must save the address in its own memory and then send it to the radio chip via the SPI bus. [Richard] figured if he could snoop on the SPI bus, he could find the address of the remote. With that information, he would be able to build another radio circuit to listen in over the air.

Using an Open Logic Sniffer, [Richard] was able to capture some of the SPI communications. Then, using the datasheet as a reference, he was able to isolate the communications that stored information int the radio chip’s address register. This same technique was used to decipher the radio channel. There was a bit more trial and error involved, as [Richard] later discovered that there were a few other important registers. He also discovered that the remote changed the address when actually transmitting data, so he had to update his receiver code to reflect this.

The receiver was built using another nRF24L01+ chip and an Arduino. Once the address and other registers were configured properly, [Richard's] custom radio was able to pick up the radio commands being sent from the lighting remote. All [Richard] had to do at this point was press each button and record the communications data which resulted. The Arduino code for the receiver is available on the project page.

[Richard] took it an extra step and wrote his own library to talk to the flashes. He has made his library available on github for anyone who is interested.


Filed under: Arduino Hacks, radio hacks
Ott
01

Strobe Remote

If you want to take a photograph with a professional look, proper lighting is going to be critical. [Richard] has been using a commercial lighting solution in his studio. His Lencarta UltraPro 300 studio strobes provide adequate lighting and also have the ability to have various settings adjusted remotely. A single remote can control different lights setting each to its own parameters. [Richard] likes to automate as much as possible in his studio, so he thought that maybe he would be able to reverse engineer the remote control so he can more easily control his lighting.

[Richard] started by opening up the remote and taking a look at the radio circuitry. He discovered the circuit uses a nRF24L01+ chip. He had previously picked up a couple of these on eBay, so his first thought was to just promiscuously snoop on the communications over the air. Unfortunately the chips can only listen in on up to six addresses at a time, and with a 40-bit address, this approach may have taken a while.

Not one to give up easily, [Richard] chose a new method of attack. First, he knew that the radio chip communicates to a master microcontroller via SPI. Second, he knew that the radio chip had no built-in memory. Therefore, the microcontroller must save the address in its own memory and then send it to the radio chip via the SPI bus. [Richard] figured if he could snoop on the SPI bus, he could find the address of the remote. With that information, he would be able to build another radio circuit to listen in over the air.

Using an Open Logic Sniffer, [Richard] was able to capture some of the SPI communications. Then, using the datasheet as a reference, he was able to isolate the communications that stored information int the radio chip’s address register. This same technique was used to decipher the radio channel. There was a bit more trial and error involved, as [Richard] later discovered that there were a few other important registers. He also discovered that the remote changed the address when actually transmitting data, so he had to update his receiver code to reflect this.

The receiver was built using another nRF24L01+ chip and an Arduino. Once the address and other registers were configured properly, [Richard's] custom radio was able to pick up the radio commands being sent from the lighting remote. All [Richard] had to do at this point was press each button and record the communications data which resulted. The Arduino code for the receiver is available on the project page.

[Richard] took it an extra step and wrote his own library to talk to the flashes. He has made his library available on github for anyone who is interested.


Filed under: Arduino Hacks, radio hacks
Ago
28

BridgeDuino: A wireless Arduino HUB and shield

arduino, arduino uno, BridgeDuino, FS1000A, hc-05, HC-06, nRF24L01+, RF433Mhz Commenti disabilitati su BridgeDuino: A wireless Arduino HUB and shield 

6793067_orig-600x436

TechBitar shared his latest project the BridgeDuino with boards from DirtyPCBs:

BridgeDuino is a Swiss army knife PCB for rapid networking of inexpensive wireless communication modules. Breadboards are super for one-off experiments. But after prototyping half a dozen wireless prototypes involving more than just two Arduinos, the wiring mistakes and associated debugging grew more time consuming.
I also wanted a PCB that can act as a shield to Arduino Uno as well as work with the inexpensive and low-power Arduino ProMini.

As of this release, BridgeDuino supports the following wireless technologies/modules:
IR Transmiter LED 940nm
IR Receive 38Khz
RF433Mhz Receiver
RF433Mhz FS1000A Transmitter
Bluetooth HC-06 & HC-05
Nrf24L01+

[via]

BridgeDuino: A wireless Arduino HUB and shield - [Link]

Ago
06

Sniffing nRF24L01+ Traffic with Wireshark

arduino hacks, nRF24L01+, sniffing, wireless hacks, wireshark Commenti disabilitati su Sniffing nRF24L01+ Traffic with Wireshark 

Wireshark trace

We’re sure that some of our readers are familiar with the difficult task that debugging/sniffing nRF24L01+ communications can be. Well, [Ivo] developed a sniffing platform based on an Arduino Uno, a single nRF24L01+ module and a computer running the popular network protocol analyzer Wireshark (part1, part2, part3 of his write-up).

As these very cheap modules don’t include a promiscuous mode to listen to all frames being sent on a particular channel, [Ivo] uses for his application a variation of [Travis Goodspeed]‘s technique to sniff Enhance Shockburst messages. In short, it consists in setting a shorter than usual address, setting a fix payload length and deactivating the CRC feature. The Arduino Uno connected to the nRF24L01+ is therefore in charge of forwarding the sniffed frames to the computer. An application that [Ivo] wrote parses the received data and forwards it to wireshark, on which can be set various filters to only display the information you’re interested in.


Filed under: Arduino Hacks, wireless hacks
Dic
27

Elinchrom EL-Skyport Triggered by Arduino

arduino hacks, camera, flash, nRF2402G, nRF24L01+, Photography Commenti disabilitati su Elinchrom EL-Skyport Triggered by Arduino 

Screenshot 2013-12-25 08.39.33

[Toby] has an Elinchrom EL-Skyport, which is a wireless flash trigger. He decided to see if he could trigger it using an Arduino, and came up with a nice proof of concept. This little device was not meant to be user serviceable, as can be seen in what [Toby] uncovered while taking it apart. But once he had it disassembled, he cataloged everything inside, and then he awesomely went to the trouble of drawing up a schematic. With that knowledge, he began reverse engineering the SPI protocol used, which almost deserves an article by itself.

It was a long road to get there, but in the end [Toby] built a prototype Arduino shield that houses an nRF24L01+ module. These are very cheap to pick up on eBay. He gives us the details on hooking up the module, though he had to go through extra hoops since he was using the Arduino Leonardo. Still, once you’re up and running, you can make use of one of the existing libraries specifically for this module.

Thanks to his effort, the rest of us have one more device to hack on. Thanks [Toby]!


Filed under: Arduino Hacks


  • Newsletter

    Sign up for the PlanetArduino Newsletter, which delivers the most popular articles via e-mail to your inbox every week. Just fill in the information below and submit.

  • Like Us on Facebook