SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 6, December 2018, pp. 5342~5350
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp5342-5350  5342
Journal homepage: http://iaescore.com/journals/index.php/IJECE
UDP Pervasive Protocol Integration with IoT for Smart
Home Environment using LabVIEW
Mochammad Hannats Hanafi Ichsan, Wijaya Kurniawan, Sabriansyah Rizqika Akbar
Computer Engineering, Computer System and Robotics Laboratory, Brawijaya University, Indonesia
Article Info ABSTRACT
Article history:
Received Jan 2, 2018
Revised Jun 11, 2018
Accepted Jun 28, 2018
Pervasive computing is an environment which is used and integrated into
every object and activities to meet human needs and its existence isn’t
perceived as something specific. The concept of Smart Home is to assist
human needs in an everyday object that performs controls or being
controlled. Based on previous research the used communication protocol is
UDP (User Datagram Protocol) and the programming language is LabVIEW.
UDP is used because it does not require handshaking in the broadcast
process, as well as on the use of memory more efficient than other protocols.
Devices which perform controls called Host and which is controlled called
Client. Both of them (Things) have an ability to send data to the Internet
without any human interaction. So this research wants to conduct pervasive
protocol between Host and Client which each device is integrated with the
Internet of Things (IoT). Data are posted at dweet.io that is a cloud server
website that contains a simple online data submission which has free
services. This research is conducted to measure the communication
performance between host to client, host to cloud server and client to cloud
server that represents household equipment.
Keyword:
Internet of Things
LabVIEW
Pervasive Protocols
Smart Home
UDP
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Mochammad Hannats Hanafi Ichsan,
Computer Engineering, Faculty of Computer Science,
Brawijaya University,
Jl. Veteran no 8, Ketawanggede, Kec. Lowokwaru, Malang, Jawa Timur, Indonesia.
Email: hanas.hanafi@ub.ac.id
1. INTRODUCTION
Pervasive computing is not only like desktop computing, but also could integrate with any device,
any location, anytime and any data format across any network environment [1]. That device could perform
any task such as monitoring and controlling other device [2]. Pervasive computing is used in many areas for
its usability mobility usage, method and computation size of the pervasive device [3]. One of six technologies
that continuously evolve until 2025 is the Internet of Things (IoT) [4]. IoT could be utilized to any
environment such as a home. Lighting, heat, or another device that can be controlled remotely via the internet
is Smart Home concept [5]. Smart Home is a very suitable object that can be implemented by pervasive
computing, because these technologies should not felt and has interference with human activities [6]. Daily
used household equipment like television, air conditioner, rice cooker etc. is very convergence, the used
sensor, used hardware is very convergence and called a Things. Identified things and personalities should
connect and communicate with the user, environment, and social user context [7].
The use of sensors and distribution of raw data is also increasing. The communication protocol is
used to transmit, collect and process data [8]. Based on previous research, the used communication protocol
is UDP [9]. UDP could perform data transmission at any device such as Host and Client. The Host could
communicate with the Client with several rules. UDP is used because Smart Home environment does not
Int J Elec & Comp Eng ISSN: 2088-8708 
UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan)
5343
need a large amount of data [10]. It also very efficient because does not need to validate data that is sent to
the Host or the Client.
LabVIEW is used because it can easily connect with devices such as Arduino, microcontroller even
computer networks [11] and could perform simulated input/output as well as real hardware [12]. At industrial
words they have such as MyRIO, CompactRIO, and Elvis etc. to develop prototyped systems [13]. Pervasive
computing sometimes is called by ubiquitous computing that has difficult task which is how to become an
automatic identification from the distributed environment such as computation, communication and its
process. It needs storage on the cloud where the data from either the Host or the Client being saved and
visualized. One of the most cloud that free to save the data is dweet.io. Dweet.io is a free web service/cloud
server that has facilitation to save simple data format online from every device that is connected [14].
Simpler data transfer format that used by dweet.io is JSON which include a timestamp, device ID and
data value [15].
Previous research is conducted by designing and implementing UDP Pervasive on LabVIEW [9]
and implementing on MyRIO [16] this research is originally extended from that previous system that
communicate over cloud server. This system is designed by having a Host and a Client. The Host is designed
by one device that could connect with many clients. The Client could communicate pervasively to the host.
Our research is to measure the communication between Host, Client and dweet.io. Each of the Host and the
Client will communicate with dweet.io by the internet and between Host and Client will be communicating
locally so it can be measured how the service provided and are affected by the complexity of the network
configuration and architecture.
2. RESEARCH METHOD
This section will explain about the communication design between the Client, the Host and
dweet.io. Based on previous research, a pervasive discovery protocol is performed between Client and Host
[9]. After both of Client and Host connected, they will communicate each other and both of them will send
data to dweet.io. Each step by step state will be explained in this section, started from Client performing a
broadcasted data until they can communicate. At communication state, a parallel process will be performing
to send data to dweet.io and data format which is used is JSON. Then the communication between Client
and Host; Client and dweet.io; and Host and dweet.io will be measured.
3.1. Network Design
The used standard design is from ETSI [17] M2M (Machine to Machine) area network domain and
at this research that design will be extended to communicate via the internet. The pervasive service discovery
protocol using UDP is shown in
Figure 1 which has Client and Host and several communication states. Start from the Client
performing broadcast, until the broadcast are listened by the Host. Data which is sent during the broadcast
process is Client Name, IP and Service that the Client has. After host listen the broadcast, the Host performs
checking about device duplication. If the client is already known, it will give the same IP. But if the Client is
not already known, the Host would give a new IP to the Client at Send ACK process. Send ACK process is a
process that Host replying broadcast for the Client. A client receiving data from the host and the Client turn
of broadcast process. After several processes completely performed, they will communicate which is
performed by Data Transfer.
The data transfer process is performed periodically. The delay is set for 2 seconds. While the Host
and the Client perform data transfer, both of them transfer the data to dweet.io. Parallel Process paradigm is
used in this communication method. Its process will run if the communication success, while the Client send
data to Host, at the same time the Client is also send data to a cloud server, the Host perform that process in
the same way. One of any web service that provides free cloud server is dweet.io. Data is sent to dweet.io in
JSON format. In
Figure 2 is an example of JSON data which is sent from Host to cloud server. That data contains
data status explains with “this”, “getting” and “dweets” [18] explains data transmission status between
success or not. On the data that is sent, contain “thing”, the “thing” is written by the thing names. The other is
“created”, the “created” data contains date and time which indicated the time when the data is sent by
"thing". The last structure is “content”, the “content” contains data sent or generated by "thing". The “date”
format that sent by Host is milliseconds precision.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350
5344
Client Host
Cloud
Server
Broadcast :
Client Name, IP, Service
Send ACK,
Host Name, IP
Broadcast Turn Off
Broadcast Listen
Check Client Duplication
Data Transfer
Data Transfer
Host Data Process
Dweet Responses
Client Data Process
Dweet Responses
Transfer
Periodically
Figure 1. Machine to machine area network (Extended) [17]
Figure 2. Data sent from host to dweet.io
After dweet.io received the data, they will send response data to Host. Data that is sent by dweet.io
has JSON format too. The data contains “date”, the “date” represent the date and time when dweet.io sent a
response in
Figure 3. When the Host disconnect with the Client, the entire process is stopped. The host will not
send data to Client and cloud server, so does the Client. The host would be back on the broadcast process, the
client back to listen process. If client have been detected, the Host will check duplication for the Client. If
there is no duplication, Host will perform sent ACK etc. But if there is duplication client, the Host will clear
his memory, the Host will perform broadcast again. The detail of the scheme is explained in next section.
Figure 3. Dweet.io responses to host
Int J Elec & Comp Eng ISSN: 2088-8708 
UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan)
5345
In this research, network which is used between Host and Client is connected locally. But they will
be doing communication to cloud server via internet. This research is focused to measure availability
between Host to Client, Host to dweet.io and Client to dweet.io. Between the Hosts to Client it will measure
their availability and their delay with milliseconds time precision.
3.2. Host and Client Design
This design on this section is the resulting design from previous research [9]. That design on
Figure 4 has already tested by functional testing scenario and works well. Between expected output
and the real output, it matches. But the previous research doesn’t measure the availability of host and client.
At this research the design is extended so it has some feature which is:
1. Idle: this process is turning on the Host and performs opening UDP port. After port opened, the Host
sending broadcast data.
2. Listening: at this state, the host listen is there any data returned from the client. If the data returned by
the client, it goes to Check Device Duplication state. But if the host doesn’t receive any data, it will stay
at Wait for Broadcast State.
3. Check Device Duplication: this state is checking Client. Did the Client was known before, if the Client
has not been connected to the Host, then the Host sending ACK and goes to ACK Sent state. If the
client has been known before, the Host directly goes to Control Process state.
4. Send ACK: this state performing for checking Client hardware status. The process of what services are
owned by the Client. ACK that is sent contains Host Name and Host IP.
5. Control Process: this state is when the Host performing control Client.
6. Dweet.io: this state is extending state from previous research. This state is working parallel with Control
Process State when the Host connected with the Client. If the Client disconnected from the Host then
this state stops working too.
Idle
Listen Wait For
Broadcast
Check
Device
Duplicati
on
Control
Process
Check
Appliance
Data Status ACK
Sentdweet.io
Action : Sent Processed Data
Event : Sent Real Time Data Host
Action : Sent responseAction : Display Data
Event : Device Turn On
Action : Send Broadcast
Listening Port
Event : Wait for Appliance Device Data
Action : Receive Broadcast
Event : Receive Device & Service Info
Action : Check Appliance Device Duplication
Event : Receive Device & Service Info
Action : Sent ACK Data
Event : Appliance Device
Duplication
Action : Ignore Device & Service Info
Event : Check Appliance Device
Action : Sent Alive Request
Event : Control Appliance Device
Action : Send Control Data
Event : Control Appliance Device
Action : Send Control Data
Event : No Appliance Device Data
Action : Listen Device Data
Figure 4. Host state machine diagram
One cycle of processes is performed in number 1 until 5 by the Host is the entire process that
described. Every cycle is performed to identify one Client. If there is more than one client, the other client
should wait the previous cycle is completed. The 6th
state, the dweet.io state is performed to send data that
generated by the Host. The data contains a host name, dweet status, and data that received from the client.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350
5346
Broadcast
Idle
Wait for
ACK
Check
Control
Device
Event : Inform
Control Device
Action : Send
Broadcast
Listening Port
Event : Wait ACK
Action : Time Start ()
Send Device & Service Info
Event : Timer Expired
Action : Timer-Restart()
Event : Control Device Down
Action : Send Device & Service Info
Event : Check Control Device Status
Action : Sent Alive Data
Wait
Control
Message
Event : IO Control
Action : Wait Host
Sent Control
dweet.io
Event : Control Process
Action : Service Provide
Action : Sent
response
Event : Sent Response
Action : Sent dweet response
Action : Display
Client Data
Figure 5. Client state machine diagram
Figure 5 representing state machine for the Client. The Client design is an extended design from
previous research too. The Client has several states that specifically describes and already tested. The Client
state which has been designed is:
1. Idle: this state was designed when the Client turned on. In this state, the client performs preparation
process to perform broadcast data. The broadcasted data are Service Name, IP Client and Service
Number.
2. Broadcast: in this state, the Client broadcast data for 250 milliseconds. Then it will move to wait for
ACK State.
3. Wait for ACK: while the Client went to this state, the Broadcast process is turned off. If the Client
receiving an ACK, then goes to Check Control Device state. But if the Client doesn’t receive ACK after
several seconds, the Client goes back to Broadcast State.
4. Check Control Device: this state is checking the services that owned by the Client itself. If the services
ready to control, the Client sent data to the host about the Client status.
5. Wait for Control Message: in this state, the Client waiting for the Host to be controlled. If the Client has
data that is not to be controlled such as gyro meter or accelerometer, the Client directly sent data to the
Host. This state is performed when the Client communicates with the Host.
6. Dweet.io: as done by the Host, the Client will send data to dweet.io. This process is parallel with Wait
Control state. If disconnected with the Host, the Client would not send data to dweet.io as a cloud
server. Cloud server would send data status if they received data from the Client such as the Host do.
3. RESULTS AND TESTING
Implementation of the Host and the Client interface has been rebuild based on system design. There
are several changes to user interface such as time, data which is sent to cloud server, cloud server responses
etc. This section would be described the user interface that contains much information about system
development (the Host and the Client) and contains system testing. System testing would be conducted to
measure the availability of the systems between the Host, the Client and cloud server.
3.1. Result
Based on previous research and the extended methods that created in this research, interface
implementation would be explained in this chapter.
Figure 6 represent Host user interface that has feature and function based on system design. The
host has the ability to control more than one device at one time. Each feature which is owned by the Client
could pervasively control and monitored by the Host.
Int J Elec & Comp Eng ISSN: 2088-8708 
UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan)
5347
Figure 6. The Host user interface
At this research, the feature that is owned by the Client represents by 2 LED, 1 accelerometer sensor
and 1 gyroscope sensor. If the client doesn’t have one of several sensors, the Client service would not appear
on the Host interface. To measure the availability of the Host, it provided the time that represents when data
is executed and sent from the client. To measure communication time of cloud server, it provided two text
boxes. First text box “sent to dweet.io” is data that sent by the Host to cloud server which contains the Host
time. “Dweet.io Response” is responses from cloud sensor that contain time when data is sent by cloud
server. Accelerometer and gyroscope sensor is represented by waveform chart that generated by the Client.
At the Host, the process of sending data was done in the parallel process while sending data to the
Client and Dweet.io.
Figure 7 is Client user interface that has feature and function based on system design and is
extended from previous research. The Client provided services that could monitor and controlled by the Host
and could receive a message from the Host. At this research, the client has 2 LED, 1 generated XYZ signal
for each gyroscope and accelerometer sensors. Such as the Host, the Client has “sent to dweet.io” feature that
indicates the Client could communicate with a cloud server. The message which is sent to cloud server are
same with the message that sent to the Host that works parallels too. Then “Dweet.io response” is a function
that sent by cloud server to the Client. So it can measure communication time between the Clients with a
cloud server. “Halo Host exec” is used to display message from the host, it contains time that is sent by the
Host that used to measure communication delay. So it can measure availability between the Host – the Client,
the Host – cloud server and the Client – cloud server.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350
5348
Figure 7. The Client user interface
3.2. Testing
This research conducted by two experiment scenario that all testing scenario ignore network
condition. The first experiment scenario conducted by the Client sent to each Host and Cloud server. A data
transfer that are measured is 15 (fifteen) times and each data conducted by different data sizes. Based on first
experiment scenario, the average amount of data sent by the Client is 436.47 bytes, the biggest data is 453
bytes and the smallest data that is produced by the client is 421 bytes. The data that sent to the Host has an
average delay 14.33 milliseconds which has maximum time 17 milliseconds and the smallest time that
received by the host is 11 milliseconds. The data that is sent to Cloud Server is 1.093 second which the
maximum time is 1.336 second and the smallest time that receives by Cloud server is 0.785 second that could
be seen at Table 1.
The second testing scenario is conducted by the Host sent data to each Client and Cloud Server, data
transfer that is measured are 15 (fifteen) times and each data conducted by different data sizes. The data that
produced by the Host have an average 270.93 bytes with the biggest data size is 173 bytes and the smallest
data size is 268 bytes
Table 1. Client Sent data to Host and to Cloud Server
No
Client to Host Cloud Server
Data Size (bytes) Delay (Milliseconds) Delay (Second)
1 440 12 0.785
2 438 14 1.209
3 436 13 1.199
4 435 12 1.206
5 453 17 1.106
6 440 16 1.186
7 452 11 0.816
8 447 15 1.054
9 440 14 1.186
10 431 13 1.181
11 433 15 1.193
Int J Elec & Comp Eng ISSN: 2088-8708 
UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan)
5349
No
Client to Host Cloud Server
Data Size (bytes) Delay (Milliseconds) Delay (Second)
12 430 15 1.229
13 427 15 1.264
14 424 16 1.301
15 421 17 1.336
Average 436.47 14.33 1.093
The data that received by the Client have an average delay is 64.6 milliseconds with the biggest
delay is 81 second and the smallest delay is 49 milliseconds. The data that received by Cloud server has a
delay too with average 0.869 seconds, the biggest delay is 0.881 second and the smallest delay is 0.84 second
that could see in Table 2.
Table 2. Host Sent Data to The Client and Cloud Server
No
Host to Client Cloud Server
Data Size (bytes) Delay (Milliseconds) Delay (Second)
1 270 63 0.852
2 269 49 0.949
3 269 51 0.861
4 271 56 0.863
5 270 59 0.881
6 269 61 0.868
7 268 55 0.935
8 271 65 0.829
9 274 60 0.872
10 269 72 0.874
11 272 70 0.861
12 272 73 0.855
13 273 76 0.85
14 273 78 0.845
15 274 81 0.84
Average 270.93 64.6 0.869
4. CONCLUSION AND FUTURE WORK
This research is successfully developed UDP Pervasive service and discovery protocol using
LabVIEW. This research was conducted by one Host and one Client, each of them could communicate
pervasively. When the Host and the Client communicate, each of them has parallel communication with the
Cloud Server. The experience scenario conducted to measure availability between Host, Client and Cloud
Server that ignore the network condition. Between two testing scenario it can be seen that the delay in data
transmission between the Host to the Client (average delay 14.33 millisecond) bigger that the Client to the
Host (average 64.6 millisecond) even though the data that sent is smaller. Average data size that sent by
client is 436 bytes and average data size that the Host sent 270.93 bytes. This is due to when the Host sent
data to the Client, the Client would accomplish his task first then receiving data from the Host. The state
machine design take effect on the delay that resulting from the Client and the Host.
The Client sent data to Host, the data contains data sensor which simulated by gyroscope sensor,
accelerometer sensor and LED. The Host sent data to Host contains it too which simulated by LED. Each
experiment scenario is successfully sent each service that sent to Cloud Server too. Cloud Server just stored
data that sent them. This research could continue with bigger and ubiquitous environment. The pervasive
discovery protocol using UDP could be implemented in several embedded device such as Arduino, raspberry
or MyRIO. The embedded device could represent household equipment that could be installed such as smart
device. So the user would not cause to be experienced with the existence of smart device
at daily household equipment.
ACKNOWLEDGEMENTS
The team thanks to the Computer System and Robotics Laboratory, Computer Engineering
Department, Faculty of Computer Science, Brawijaya University. This paper is an extension of work
originally published and reported in “IAES 2016: International Conference on Electrical Engineering,
Computer Science and Informatics (EECSI 2016)” at Semarang, East Java, Indonesia 22-25 November 2016,
with the title “Lightweight UDP Pervasive Protocol in Smart Home Environment based on LabVIEW”.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350
5350
REFERENCES
[1] S.R. Akbar, W. Kurniawan, M.H.H. Ichsan, I. Arwani, M.T. Handono, "Pervasive Device and Service Discovery
Protocol In XBee Sensor Network," in ICACSIS, Malang, Indonesia, 2016.
[2] J. Froehlich, L. Findlater and J. Landay, "The Design of Eco-Feedback Technologu," in Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA, 2010.
[3] P. Dourish and G. Bell, Divining A Digital Future - Mess and Mythology in Ubiquitous Computing, London,
England: The MIT Press, 2011.
[4] L. Atzori, A. Iera and G. Morabito, ""The Internet of Things: A survey"," Elsevier Computer Networks, pp. 2787-
2805, 2010.
[5] O. Vermesan and P. Friess, Internet of Things - Global Technological and Societal Trends, Aalborg, Denmark:
River Publisher, 2011.
[6] J. Ma, T.L. Yang, B.O. Apduhan, R. Huang, L. Barolli and M. Takizawa, "Towards a Smart World and Ubiquitous
Intelligence: A Walkthrough from Smart Things to Smart Hyperspaces and UbicKids," International Journal of
Pervasive Computing and Communications, vol. 1, no. 1, pp. 53-68, 2005.
[7] C. Aggarwal, N. Ashish and A. Sheth, The Internet of Things: A Survey from The Data-Centric Perspective, Book
Chapter in "Managing and Mining Sensor Data", Springer, 2013.
[8] G. Tripathi, D. Singh and K. K. Loo, "EOI: Entity of Interest Based Network Fusion for Future Services," in ICHIT
2011: Convergence and Hybrid Information Technology, 2011.
[9] W. Kurniawan, M.H.H. Ichsan, S. R. Akbar and I. Arwani, "Lightweight UDP Pervasive Protocol in Smart Home
Environment Based on Labview," in IAES International Conference on Electrical Engineering, Computer Science
and Informatics, Semarang, Indonesia, 2016.
[10] A. Ford, C. Raiciu, M. Handley and O. Bonaventure, TCP Extensions for Multipath Operation with Multiple
Addresses, RFC 6824, 2013.
[11] F.J. Jimenez and D.J. Frutos, "Virtual Instrument for Measurement, Processing Data, and Visualization of Vibration
Patterns of Piezoelectric Devices," Elsevier, vol. 27, no. 6, pp. 653-663, 2005.
[12] M.H.H Ichsan, W. Kurniawan and M. Huda, "Water Quality Monitoring with Fuzzy Logic Control Based on
Graphical Programming," TELKOMNIKA, vol. 14, no. 4, p. 1446~1453, 2016.
[13] L. Vanfretti, V. H. Aarstrand, M. S. Almas, V. S. Perić and J. O. Gjerde, "A software development toolkit for real-
time synchrophasor applications," in IEEE Grenoble Conference, Grenoble, 2013.
[14] K. Fysarakis and S. Ntamapiras, "Hardware implementation of a system classifying the optoacoustic signature of
insect wing flap," in Conference: 22nd International Congress on Sound and Vibration (ICSV22), Florence, Italy,
2015.
[15] A. Halldorsson, "IIoT data collection for OEE measurements," Reykjavík University Library, 2016.
[16] W. Kurniawan, M.H.H. Ichsan and S. R. Akbar, "UDP Pervasive Protocol Implementation for Smart Home
Environment on MyRIO using LabVIEW," International Journal of Electrical and Computer Engineering (IJECE),
vol. 8, no. 1, pp. 113-123, 2018.
[17] e. a. J. Holler, "From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence," in
Elsevier, Waltham, MA, 2014.
[18] I. Bug Labs, "dweet.io," 2017. [Online]. Available: http://dweet.io/. [Accessed 1 11 2017].

More Related Content

PDF
A Survey: DDOS Attack on Internet of Things
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
Cloud Security and Data Integrity with Client Accountability Framework
PDF
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
PDF
KANSA: high interoperability e-KTP decentralised database network using distr...
PDF
Automated hierarchical classification of scanned documents using convolutiona...
PDF
Remote data integrity checking with a third party auditor in public cloud usi...
PDF
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
A Survey: DDOS Attack on Internet of Things
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Cloud Security and Data Integrity with Client Accountability Framework
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
KANSA: high interoperability e-KTP decentralised database network using distr...
Automated hierarchical classification of scanned documents using convolutiona...
Remote data integrity checking with a third party auditor in public cloud usi...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...

What's hot (19)

PDF
J018145862
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
5.[40 44]enhancing security in cloud computing
PDF
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PDF
Ej24856861
PDF
Privacy-Preserving Updates to Anonymous and Confidential Database
PDF
Groupchain
PDF
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
DOCX
Secure distributed deduplication systems with improved reliability
PDF
The soap based mechanism for home environment using web services
PDF
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PDF
G017424448
PDF
Security Issues related with cloud computing
PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
PDF
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
PDF
E041212224
PDF
How io t is changing our world
PDF
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
J018145862
Secure Data Sharing In an Untrusted Cloud
5.[40 44]enhancing security in cloud computing
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Ej24856861
Privacy-Preserving Updates to Anonymous and Confidential Database
Groupchain
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
Secure distributed deduplication systems with improved reliability
The soap based mechanism for home environment using web services
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
G017424448
Security Issues related with cloud computing
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
E041212224
How io t is changing our world
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
Ad

Similar to UDP Pervasive Protocol Integration with IoT for Smart Home Environment using LabVIEW (20)

PDF
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
PDF
Bridging IoT infrastructure and cloud application using cellular-based intern...
PDF
30 9137 e implementation of cloud connected smart plug (edit lafi)
PDF
Architectural design of IoT-cloud computing integration platform
PDF
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
PDF
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
PDF
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
PPTX
Cloud of things (IoT + Cloud Computing)
PDF
H017113842
PDF
An in-building multi-server cloud system based on shortest Path algorithm dep...
PDF
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
PDF
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
ODP
Internet of things
PDF
Iot lecture notes_hyd
PDF
IOT.pdf
DOCX
IOT-Monograph .docx
PDF
A review on orchestration distributed systems for IoT smart services in fog c...
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
PDF
Development of web-based surveillance system for Internet of Things (IoT) app...
PDF
IOT_LECTURE_NOTEs.pdf Internet of Things
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
Bridging IoT infrastructure and cloud application using cellular-based intern...
30 9137 e implementation of cloud connected smart plug (edit lafi)
Architectural design of IoT-cloud computing integration platform
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
Cloud of things (IoT + Cloud Computing)
H017113842
An in-building multi-server cloud system based on shortest Path algorithm dep...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
Internet of things
Iot lecture notes_hyd
IOT.pdf
IOT-Monograph .docx
A review on orchestration distributed systems for IoT smart services in fog c...
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
Development of web-based surveillance system for Internet of Things (IoT) app...
IOT_LECTURE_NOTEs.pdf Internet of Things
Ad

More from IJECEIAES (20)

PDF
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
PDF
Embedded machine learning-based road conditions and driving behavior monitoring
PDF
Advanced control scheme of doubly fed induction generator for wind turbine us...
PDF
Neural network optimizer of proportional-integral-differential controller par...
PDF
An improved modulation technique suitable for a three level flying capacitor ...
PDF
A review on features and methods of potential fishing zone
PDF
Electrical signal interference minimization using appropriate core material f...
PDF
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
PDF
Bibliometric analysis highlighting the role of women in addressing climate ch...
PDF
Voltage and frequency control of microgrid in presence of micro-turbine inter...
PDF
Enhancing battery system identification: nonlinear autoregressive modeling fo...
PDF
Smart grid deployment: from a bibliometric analysis to a survey
PDF
Use of analytical hierarchy process for selecting and prioritizing islanding ...
PDF
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
PDF
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
PDF
Adaptive synchronous sliding control for a robot manipulator based on neural ...
PDF
Remote field-programmable gate array laboratory for signal acquisition and de...
PDF
Detecting and resolving feature envy through automated machine learning and m...
PDF
Smart monitoring technique for solar cell systems using internet of things ba...
PDF
An efficient security framework for intrusion detection and prevention in int...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Embedded machine learning-based road conditions and driving behavior monitoring
Advanced control scheme of doubly fed induction generator for wind turbine us...
Neural network optimizer of proportional-integral-differential controller par...
An improved modulation technique suitable for a three level flying capacitor ...
A review on features and methods of potential fishing zone
Electrical signal interference minimization using appropriate core material f...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Bibliometric analysis highlighting the role of women in addressing climate ch...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Smart grid deployment: from a bibliometric analysis to a survey
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Remote field-programmable gate array laboratory for signal acquisition and de...
Detecting and resolving feature envy through automated machine learning and m...
Smart monitoring technique for solar cell systems using internet of things ba...
An efficient security framework for intrusion detection and prevention in int...

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
additive manufacturing of ss316l using mig welding
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
composite construction of structures.pdf
PPTX
Construction Project Organization Group 2.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
573137875-Attendance-Management-System-original
OOP with Java - Java Introduction (Basics)
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
additive manufacturing of ss316l using mig welding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
bas. eng. economics group 4 presentation 1.pptx
Internet of Things (IOT) - A guide to understanding
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Embodied AI: Ushering in the Next Era of Intelligent Systems
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
composite construction of structures.pdf
Construction Project Organization Group 2.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

UDP Pervasive Protocol Integration with IoT for Smart Home Environment using LabVIEW

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 6, December 2018, pp. 5342~5350 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp5342-5350  5342 Journal homepage: http://iaescore.com/journals/index.php/IJECE UDP Pervasive Protocol Integration with IoT for Smart Home Environment using LabVIEW Mochammad Hannats Hanafi Ichsan, Wijaya Kurniawan, Sabriansyah Rizqika Akbar Computer Engineering, Computer System and Robotics Laboratory, Brawijaya University, Indonesia Article Info ABSTRACT Article history: Received Jan 2, 2018 Revised Jun 11, 2018 Accepted Jun 28, 2018 Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment. Keyword: Internet of Things LabVIEW Pervasive Protocols Smart Home UDP Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Mochammad Hannats Hanafi Ichsan, Computer Engineering, Faculty of Computer Science, Brawijaya University, Jl. Veteran no 8, Ketawanggede, Kec. Lowokwaru, Malang, Jawa Timur, Indonesia. Email: hanas.hanafi@ub.ac.id 1. INTRODUCTION Pervasive computing is not only like desktop computing, but also could integrate with any device, any location, anytime and any data format across any network environment [1]. That device could perform any task such as monitoring and controlling other device [2]. Pervasive computing is used in many areas for its usability mobility usage, method and computation size of the pervasive device [3]. One of six technologies that continuously evolve until 2025 is the Internet of Things (IoT) [4]. IoT could be utilized to any environment such as a home. Lighting, heat, or another device that can be controlled remotely via the internet is Smart Home concept [5]. Smart Home is a very suitable object that can be implemented by pervasive computing, because these technologies should not felt and has interference with human activities [6]. Daily used household equipment like television, air conditioner, rice cooker etc. is very convergence, the used sensor, used hardware is very convergence and called a Things. Identified things and personalities should connect and communicate with the user, environment, and social user context [7]. The use of sensors and distribution of raw data is also increasing. The communication protocol is used to transmit, collect and process data [8]. Based on previous research, the used communication protocol is UDP [9]. UDP could perform data transmission at any device such as Host and Client. The Host could communicate with the Client with several rules. UDP is used because Smart Home environment does not
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan) 5343 need a large amount of data [10]. It also very efficient because does not need to validate data that is sent to the Host or the Client. LabVIEW is used because it can easily connect with devices such as Arduino, microcontroller even computer networks [11] and could perform simulated input/output as well as real hardware [12]. At industrial words they have such as MyRIO, CompactRIO, and Elvis etc. to develop prototyped systems [13]. Pervasive computing sometimes is called by ubiquitous computing that has difficult task which is how to become an automatic identification from the distributed environment such as computation, communication and its process. It needs storage on the cloud where the data from either the Host or the Client being saved and visualized. One of the most cloud that free to save the data is dweet.io. Dweet.io is a free web service/cloud server that has facilitation to save simple data format online from every device that is connected [14]. Simpler data transfer format that used by dweet.io is JSON which include a timestamp, device ID and data value [15]. Previous research is conducted by designing and implementing UDP Pervasive on LabVIEW [9] and implementing on MyRIO [16] this research is originally extended from that previous system that communicate over cloud server. This system is designed by having a Host and a Client. The Host is designed by one device that could connect with many clients. The Client could communicate pervasively to the host. Our research is to measure the communication between Host, Client and dweet.io. Each of the Host and the Client will communicate with dweet.io by the internet and between Host and Client will be communicating locally so it can be measured how the service provided and are affected by the complexity of the network configuration and architecture. 2. RESEARCH METHOD This section will explain about the communication design between the Client, the Host and dweet.io. Based on previous research, a pervasive discovery protocol is performed between Client and Host [9]. After both of Client and Host connected, they will communicate each other and both of them will send data to dweet.io. Each step by step state will be explained in this section, started from Client performing a broadcasted data until they can communicate. At communication state, a parallel process will be performing to send data to dweet.io and data format which is used is JSON. Then the communication between Client and Host; Client and dweet.io; and Host and dweet.io will be measured. 3.1. Network Design The used standard design is from ETSI [17] M2M (Machine to Machine) area network domain and at this research that design will be extended to communicate via the internet. The pervasive service discovery protocol using UDP is shown in Figure 1 which has Client and Host and several communication states. Start from the Client performing broadcast, until the broadcast are listened by the Host. Data which is sent during the broadcast process is Client Name, IP and Service that the Client has. After host listen the broadcast, the Host performs checking about device duplication. If the client is already known, it will give the same IP. But if the Client is not already known, the Host would give a new IP to the Client at Send ACK process. Send ACK process is a process that Host replying broadcast for the Client. A client receiving data from the host and the Client turn of broadcast process. After several processes completely performed, they will communicate which is performed by Data Transfer. The data transfer process is performed periodically. The delay is set for 2 seconds. While the Host and the Client perform data transfer, both of them transfer the data to dweet.io. Parallel Process paradigm is used in this communication method. Its process will run if the communication success, while the Client send data to Host, at the same time the Client is also send data to a cloud server, the Host perform that process in the same way. One of any web service that provides free cloud server is dweet.io. Data is sent to dweet.io in JSON format. In Figure 2 is an example of JSON data which is sent from Host to cloud server. That data contains data status explains with “this”, “getting” and “dweets” [18] explains data transmission status between success or not. On the data that is sent, contain “thing”, the “thing” is written by the thing names. The other is “created”, the “created” data contains date and time which indicated the time when the data is sent by "thing". The last structure is “content”, the “content” contains data sent or generated by "thing". The “date” format that sent by Host is milliseconds precision.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350 5344 Client Host Cloud Server Broadcast : Client Name, IP, Service Send ACK, Host Name, IP Broadcast Turn Off Broadcast Listen Check Client Duplication Data Transfer Data Transfer Host Data Process Dweet Responses Client Data Process Dweet Responses Transfer Periodically Figure 1. Machine to machine area network (Extended) [17] Figure 2. Data sent from host to dweet.io After dweet.io received the data, they will send response data to Host. Data that is sent by dweet.io has JSON format too. The data contains “date”, the “date” represent the date and time when dweet.io sent a response in Figure 3. When the Host disconnect with the Client, the entire process is stopped. The host will not send data to Client and cloud server, so does the Client. The host would be back on the broadcast process, the client back to listen process. If client have been detected, the Host will check duplication for the Client. If there is no duplication, Host will perform sent ACK etc. But if there is duplication client, the Host will clear his memory, the Host will perform broadcast again. The detail of the scheme is explained in next section. Figure 3. Dweet.io responses to host
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan) 5345 In this research, network which is used between Host and Client is connected locally. But they will be doing communication to cloud server via internet. This research is focused to measure availability between Host to Client, Host to dweet.io and Client to dweet.io. Between the Hosts to Client it will measure their availability and their delay with milliseconds time precision. 3.2. Host and Client Design This design on this section is the resulting design from previous research [9]. That design on Figure 4 has already tested by functional testing scenario and works well. Between expected output and the real output, it matches. But the previous research doesn’t measure the availability of host and client. At this research the design is extended so it has some feature which is: 1. Idle: this process is turning on the Host and performs opening UDP port. After port opened, the Host sending broadcast data. 2. Listening: at this state, the host listen is there any data returned from the client. If the data returned by the client, it goes to Check Device Duplication state. But if the host doesn’t receive any data, it will stay at Wait for Broadcast State. 3. Check Device Duplication: this state is checking Client. Did the Client was known before, if the Client has not been connected to the Host, then the Host sending ACK and goes to ACK Sent state. If the client has been known before, the Host directly goes to Control Process state. 4. Send ACK: this state performing for checking Client hardware status. The process of what services are owned by the Client. ACK that is sent contains Host Name and Host IP. 5. Control Process: this state is when the Host performing control Client. 6. Dweet.io: this state is extending state from previous research. This state is working parallel with Control Process State when the Host connected with the Client. If the Client disconnected from the Host then this state stops working too. Idle Listen Wait For Broadcast Check Device Duplicati on Control Process Check Appliance Data Status ACK Sentdweet.io Action : Sent Processed Data Event : Sent Real Time Data Host Action : Sent responseAction : Display Data Event : Device Turn On Action : Send Broadcast Listening Port Event : Wait for Appliance Device Data Action : Receive Broadcast Event : Receive Device & Service Info Action : Check Appliance Device Duplication Event : Receive Device & Service Info Action : Sent ACK Data Event : Appliance Device Duplication Action : Ignore Device & Service Info Event : Check Appliance Device Action : Sent Alive Request Event : Control Appliance Device Action : Send Control Data Event : Control Appliance Device Action : Send Control Data Event : No Appliance Device Data Action : Listen Device Data Figure 4. Host state machine diagram One cycle of processes is performed in number 1 until 5 by the Host is the entire process that described. Every cycle is performed to identify one Client. If there is more than one client, the other client should wait the previous cycle is completed. The 6th state, the dweet.io state is performed to send data that generated by the Host. The data contains a host name, dweet status, and data that received from the client.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350 5346 Broadcast Idle Wait for ACK Check Control Device Event : Inform Control Device Action : Send Broadcast Listening Port Event : Wait ACK Action : Time Start () Send Device & Service Info Event : Timer Expired Action : Timer-Restart() Event : Control Device Down Action : Send Device & Service Info Event : Check Control Device Status Action : Sent Alive Data Wait Control Message Event : IO Control Action : Wait Host Sent Control dweet.io Event : Control Process Action : Service Provide Action : Sent response Event : Sent Response Action : Sent dweet response Action : Display Client Data Figure 5. Client state machine diagram Figure 5 representing state machine for the Client. The Client design is an extended design from previous research too. The Client has several states that specifically describes and already tested. The Client state which has been designed is: 1. Idle: this state was designed when the Client turned on. In this state, the client performs preparation process to perform broadcast data. The broadcasted data are Service Name, IP Client and Service Number. 2. Broadcast: in this state, the Client broadcast data for 250 milliseconds. Then it will move to wait for ACK State. 3. Wait for ACK: while the Client went to this state, the Broadcast process is turned off. If the Client receiving an ACK, then goes to Check Control Device state. But if the Client doesn’t receive ACK after several seconds, the Client goes back to Broadcast State. 4. Check Control Device: this state is checking the services that owned by the Client itself. If the services ready to control, the Client sent data to the host about the Client status. 5. Wait for Control Message: in this state, the Client waiting for the Host to be controlled. If the Client has data that is not to be controlled such as gyro meter or accelerometer, the Client directly sent data to the Host. This state is performed when the Client communicates with the Host. 6. Dweet.io: as done by the Host, the Client will send data to dweet.io. This process is parallel with Wait Control state. If disconnected with the Host, the Client would not send data to dweet.io as a cloud server. Cloud server would send data status if they received data from the Client such as the Host do. 3. RESULTS AND TESTING Implementation of the Host and the Client interface has been rebuild based on system design. There are several changes to user interface such as time, data which is sent to cloud server, cloud server responses etc. This section would be described the user interface that contains much information about system development (the Host and the Client) and contains system testing. System testing would be conducted to measure the availability of the systems between the Host, the Client and cloud server. 3.1. Result Based on previous research and the extended methods that created in this research, interface implementation would be explained in this chapter. Figure 6 represent Host user interface that has feature and function based on system design. The host has the ability to control more than one device at one time. Each feature which is owned by the Client could pervasively control and monitored by the Host.
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan) 5347 Figure 6. The Host user interface At this research, the feature that is owned by the Client represents by 2 LED, 1 accelerometer sensor and 1 gyroscope sensor. If the client doesn’t have one of several sensors, the Client service would not appear on the Host interface. To measure the availability of the Host, it provided the time that represents when data is executed and sent from the client. To measure communication time of cloud server, it provided two text boxes. First text box “sent to dweet.io” is data that sent by the Host to cloud server which contains the Host time. “Dweet.io Response” is responses from cloud sensor that contain time when data is sent by cloud server. Accelerometer and gyroscope sensor is represented by waveform chart that generated by the Client. At the Host, the process of sending data was done in the parallel process while sending data to the Client and Dweet.io. Figure 7 is Client user interface that has feature and function based on system design and is extended from previous research. The Client provided services that could monitor and controlled by the Host and could receive a message from the Host. At this research, the client has 2 LED, 1 generated XYZ signal for each gyroscope and accelerometer sensors. Such as the Host, the Client has “sent to dweet.io” feature that indicates the Client could communicate with a cloud server. The message which is sent to cloud server are same with the message that sent to the Host that works parallels too. Then “Dweet.io response” is a function that sent by cloud server to the Client. So it can measure communication time between the Clients with a cloud server. “Halo Host exec” is used to display message from the host, it contains time that is sent by the Host that used to measure communication delay. So it can measure availability between the Host – the Client, the Host – cloud server and the Client – cloud server.
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350 5348 Figure 7. The Client user interface 3.2. Testing This research conducted by two experiment scenario that all testing scenario ignore network condition. The first experiment scenario conducted by the Client sent to each Host and Cloud server. A data transfer that are measured is 15 (fifteen) times and each data conducted by different data sizes. Based on first experiment scenario, the average amount of data sent by the Client is 436.47 bytes, the biggest data is 453 bytes and the smallest data that is produced by the client is 421 bytes. The data that sent to the Host has an average delay 14.33 milliseconds which has maximum time 17 milliseconds and the smallest time that received by the host is 11 milliseconds. The data that is sent to Cloud Server is 1.093 second which the maximum time is 1.336 second and the smallest time that receives by Cloud server is 0.785 second that could be seen at Table 1. The second testing scenario is conducted by the Host sent data to each Client and Cloud Server, data transfer that is measured are 15 (fifteen) times and each data conducted by different data sizes. The data that produced by the Host have an average 270.93 bytes with the biggest data size is 173 bytes and the smallest data size is 268 bytes Table 1. Client Sent data to Host and to Cloud Server No Client to Host Cloud Server Data Size (bytes) Delay (Milliseconds) Delay (Second) 1 440 12 0.785 2 438 14 1.209 3 436 13 1.199 4 435 12 1.206 5 453 17 1.106 6 440 16 1.186 7 452 11 0.816 8 447 15 1.054 9 440 14 1.186 10 431 13 1.181 11 433 15 1.193
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan) 5349 No Client to Host Cloud Server Data Size (bytes) Delay (Milliseconds) Delay (Second) 12 430 15 1.229 13 427 15 1.264 14 424 16 1.301 15 421 17 1.336 Average 436.47 14.33 1.093 The data that received by the Client have an average delay is 64.6 milliseconds with the biggest delay is 81 second and the smallest delay is 49 milliseconds. The data that received by Cloud server has a delay too with average 0.869 seconds, the biggest delay is 0.881 second and the smallest delay is 0.84 second that could see in Table 2. Table 2. Host Sent Data to The Client and Cloud Server No Host to Client Cloud Server Data Size (bytes) Delay (Milliseconds) Delay (Second) 1 270 63 0.852 2 269 49 0.949 3 269 51 0.861 4 271 56 0.863 5 270 59 0.881 6 269 61 0.868 7 268 55 0.935 8 271 65 0.829 9 274 60 0.872 10 269 72 0.874 11 272 70 0.861 12 272 73 0.855 13 273 76 0.85 14 273 78 0.845 15 274 81 0.84 Average 270.93 64.6 0.869 4. CONCLUSION AND FUTURE WORK This research is successfully developed UDP Pervasive service and discovery protocol using LabVIEW. This research was conducted by one Host and one Client, each of them could communicate pervasively. When the Host and the Client communicate, each of them has parallel communication with the Cloud Server. The experience scenario conducted to measure availability between Host, Client and Cloud Server that ignore the network condition. Between two testing scenario it can be seen that the delay in data transmission between the Host to the Client (average delay 14.33 millisecond) bigger that the Client to the Host (average 64.6 millisecond) even though the data that sent is smaller. Average data size that sent by client is 436 bytes and average data size that the Host sent 270.93 bytes. This is due to when the Host sent data to the Client, the Client would accomplish his task first then receiving data from the Host. The state machine design take effect on the delay that resulting from the Client and the Host. The Client sent data to Host, the data contains data sensor which simulated by gyroscope sensor, accelerometer sensor and LED. The Host sent data to Host contains it too which simulated by LED. Each experiment scenario is successfully sent each service that sent to Cloud Server too. Cloud Server just stored data that sent them. This research could continue with bigger and ubiquitous environment. The pervasive discovery protocol using UDP could be implemented in several embedded device such as Arduino, raspberry or MyRIO. The embedded device could represent household equipment that could be installed such as smart device. So the user would not cause to be experienced with the existence of smart device at daily household equipment. ACKNOWLEDGEMENTS The team thanks to the Computer System and Robotics Laboratory, Computer Engineering Department, Faculty of Computer Science, Brawijaya University. This paper is an extension of work originally published and reported in “IAES 2016: International Conference on Electrical Engineering, Computer Science and Informatics (EECSI 2016)” at Semarang, East Java, Indonesia 22-25 November 2016, with the title “Lightweight UDP Pervasive Protocol in Smart Home Environment based on LabVIEW”.
  • 9.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350 5350 REFERENCES [1] S.R. Akbar, W. Kurniawan, M.H.H. Ichsan, I. Arwani, M.T. Handono, "Pervasive Device and Service Discovery Protocol In XBee Sensor Network," in ICACSIS, Malang, Indonesia, 2016. [2] J. Froehlich, L. Findlater and J. Landay, "The Design of Eco-Feedback Technologu," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA, 2010. [3] P. Dourish and G. Bell, Divining A Digital Future - Mess and Mythology in Ubiquitous Computing, London, England: The MIT Press, 2011. [4] L. Atzori, A. Iera and G. Morabito, ""The Internet of Things: A survey"," Elsevier Computer Networks, pp. 2787- 2805, 2010. [5] O. Vermesan and P. Friess, Internet of Things - Global Technological and Societal Trends, Aalborg, Denmark: River Publisher, 2011. [6] J. Ma, T.L. Yang, B.O. Apduhan, R. Huang, L. Barolli and M. Takizawa, "Towards a Smart World and Ubiquitous Intelligence: A Walkthrough from Smart Things to Smart Hyperspaces and UbicKids," International Journal of Pervasive Computing and Communications, vol. 1, no. 1, pp. 53-68, 2005. [7] C. Aggarwal, N. Ashish and A. Sheth, The Internet of Things: A Survey from The Data-Centric Perspective, Book Chapter in "Managing and Mining Sensor Data", Springer, 2013. [8] G. Tripathi, D. Singh and K. K. Loo, "EOI: Entity of Interest Based Network Fusion for Future Services," in ICHIT 2011: Convergence and Hybrid Information Technology, 2011. [9] W. Kurniawan, M.H.H. Ichsan, S. R. Akbar and I. Arwani, "Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview," in IAES International Conference on Electrical Engineering, Computer Science and Informatics, Semarang, Indonesia, 2016. [10] A. Ford, C. Raiciu, M. Handley and O. Bonaventure, TCP Extensions for Multipath Operation with Multiple Addresses, RFC 6824, 2013. [11] F.J. Jimenez and D.J. Frutos, "Virtual Instrument for Measurement, Processing Data, and Visualization of Vibration Patterns of Piezoelectric Devices," Elsevier, vol. 27, no. 6, pp. 653-663, 2005. [12] M.H.H Ichsan, W. Kurniawan and M. Huda, "Water Quality Monitoring with Fuzzy Logic Control Based on Graphical Programming," TELKOMNIKA, vol. 14, no. 4, p. 1446~1453, 2016. [13] L. Vanfretti, V. H. Aarstrand, M. S. Almas, V. S. Perić and J. O. Gjerde, "A software development toolkit for real- time synchrophasor applications," in IEEE Grenoble Conference, Grenoble, 2013. [14] K. Fysarakis and S. Ntamapiras, "Hardware implementation of a system classifying the optoacoustic signature of insect wing flap," in Conference: 22nd International Congress on Sound and Vibration (ICSV22), Florence, Italy, 2015. [15] A. Halldorsson, "IIoT data collection for OEE measurements," Reykjavík University Library, 2016. [16] W. Kurniawan, M.H.H. Ichsan and S. R. Akbar, "UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO using LabVIEW," International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 1, pp. 113-123, 2018. [17] e. a. J. Holler, "From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence," in Elsevier, Waltham, MA, 2014. [18] I. Bug Labs, "dweet.io," 2017. [Online]. Available: http://dweet.io/. [Accessed 1 11 2017].