[Don] wanted to bring his alarm system into the modern age. He figured that making it more connected would do the trick. Specifically, he wanted his alarm system to send him an SMS message whenever the alarm was tripped.
[Don] first had to figure out a way to trigger an event when the alarm sounds. He found a screw terminal that lead to the siren. When the alarm is tripped, this screw terminal outputs 12V to enable the siren. This would be a good place to monitor for an alarm trip.
[Don] is using an Arduino nano to monitor the alarm signal. This meant that the 12V signal needed to be stepped down. He ran it through a resistor and a Zener diode to lower the voltage to something the Arduino can handle. Once the Arduino detects a signal, it uses an ESP8266 WiFi module to send an email. The address [Don] used is the email-to-SMS address which results in a text message hitting his phone over the cell network.
The Arduino also needed power. [Don] found a screw terminal on the alarm system circuit board that provided a regulated 12V output. He ran this to another power regulator board to lower the voltage to a steady 5V. This provides just the amount of juice the Arduino needs to run, and it doesn’t rely on batteries. [Don] provides a good explanation of the system in the video below. Continue reading “Adding WiFi and SMS to an Alarm System”
It’s only been a few months since the ESP8266 rolled out of some factory in China, and already the community is moving from simply getting custom firmware to work on the device to making the development tools easy to use. That’s huge – the barrier to entry is lowered, getting even more people on board with this very cool Internet of Things thing.
While the majority of the community is settling on using the Lua interpreter firmware, there’s still the matter of getting this firmware uploaded to the ESP. [Peter Jennings] of Microchess fame has been working on a Windows app to upload firmware to the ESP via a serial interface. There’s not much to it, but this will allow you to upload the community-created Lua firmware, set the WiFi credentials, toggle GPIO pins, and give you the ability to write a little bit of Lua in the same window.
If you’re looking for something that isn’t designed exclusively for Windows, there’s an alternative firmware flasher over on the nodemcu Github. This flasher also connects the ESP8266 to a network and uploads firmware. It’s a stripped-down programmer without a serial terminal or the ability to toggle pins, but there are plans for making this programmer cross-platform.
[Ray] is in a bit of a pickle. All appeared well when he began selling an ESP8266-based product, but shortly thereafter some of them got hot and let the smoke out. Not to worry, he recommends ignoring the problem since once the faulty components have vaporized the device will be fine.
The symptom lies in the onboard red power indicator LED smoking. (Probably) nothing is wrong with the LED, because upon testing the batch he discovered its current limiting resistor is sometimes a little bit low to spec. Off by a hair of, oh, call it an even 1000x.
Yep, the 4700 ohm resistor is sometimes replaced with a 4.7 ohm. Right across the power rail. That poor little LED is trying to dissipate half a watt on a pinhead. Like a sparrow trying to slow a sledgehammer, it does not end well. Try not to be too critical, pick ‘n place machines have rough days now and then too and everyone knows those reels look practically the same!
The good news is that the LED and resistor begin a thermal race and whoever wins escapes in the breeze. Soon as the connection cuts the heat issue disappears and power draw drops back to normal. Everything is fine unless you needed that indicator light. Behold – there are not many repairs you can make with zero tools, zero effort, and only a few seconds of your time.
[Ray] also recommends measuring and desoldering the resistor or LED if you are one of the unlucky few, or, if worst comes to worst, he has of course offered to replace the product too. He did his best to buy from authentic vendors and apologizes to the few customers affected. As far as he knows no one else has had this problem yet so he wanted to share it with the community here on Hackaday as soon as possible. Keep an eye out.
If you have never seen
smoke ISO9001-certified electronics repair before, there is a short video of this particular disaster upgrade caught live on tape after the break.
Continue reading “Faulty ESP8266s Release Smoke, Then Keep Working?”
The ESP8266 is the latest and greatest way to get a project connected to the Internet, but so far we haven’t seen many projects that actually do something with this very cool chip. Yes, there are a few people pinging away with AT commands, and there is a thriving community building interpreters and flashing new code on this chip, but not much in the way of actual projects. [Martin] is the exception. He’s come up with two projects that use the ESP8266.
The first project is one that puts the readings from a DHT22 temperature/humidity sensor up on the Internet. Following the spirit of all the recent development of the ESP8266, [Martin] isn’t using an external microcontroller. Instead, he’s using the SDK to run an HTTP daemon using [Sprite_TM]’s code. This web server provides an interface to turn an LED on and off, and reports the temperature and humidity readings from the DHT22. It’s simple, but it’s easy to see how this tiny chip could become the basis for a smart thermostat.
If lighting up LEDs isn’t enough, [Martin] has another project that includes three solid state relays. This one is a bit more complex with MQTT support, a fancy jQuery interface, and support for network time. [Martin] isn’t quite ready to publish the complete code for this project, but that’s only because there are a few features he’d like to implement before making it public. These include dynamic DNS, scheduling functionality, and support for an I2C status display. Even without these fancy features, it’s still a great project that’s still extremely capable for an Internet of Things thing. You can check out [Martin]’s video demo of this board below.
Continue reading “Making Something Useful With The ESP8266″
From the great minds behind the NodeMCU Lua interpreter for the ESP8266 comes a proper dev board for the WiFi platform of 2015. They are calling it, the NodeMCU-devkit, and it’s a reasonable, cheap, and breadboardable breakout board for the ESP8266.
The version of ESP8266 used in this project is the ESP-12, the newer, fancier model with RF shielding, a questionable FCC logo, and every single one of the GPIOs exposed on castellated connectors. The rest of the board is a USB to serial converter (the CH340G – probably the cheapest USB to serial chip out there), a few passives, and a USB micro connector. It’s simple, cheap, and open source. You can’t do better than that.
This dev board is explicitly designed to work with the NodeMCU firmware, a Lua-based firmware for the ESP. Already we’ve seen some projects make the Hackaday front page with this firmware. Sure, it’s just a garage door opener, but that’s extremely impressive for a chip that’s only a few months old.
Thanks [Baboon] for the tip.
“We want to get this done quick, not right.”
[CNLohr]’s favorite desk lamp broke, so he gave himself a challenge: convert the lamp to LED and control it via WiFi within 5 hours, from scratch. He video recorded and narrated the whole process and did a nice job of explaining the tricky parts and failures along the way, fast forwarding us through the slow parts.
Some bits and pieces were simple and obvious: gut the old bulb, wire some LEDs, add a few power resistors, toss in a power supply from “like a monitor or something, don’t care” for the LEDs, add in what looks like an LM2596 adjustable power supply for the logic, some kind of ATMega, that new ESP8266 (Wi07C), splice on a power cord, etc. Standard stuff.
To our readers who’s hacks tend to start with soldering irons and screwdrivers, the video shows harder parts of designing an electronics project: creating the PCB in software (he used KiCad), lithographically transferring the circuit to a PCB, bismuth solderpasting & populating the board, and writing and documenting his code on Github. Perhaps most reassuringly, he also showed the consequences of every greedy shortcut and the process of troubleshooting around them.
If you have ever tried to follow a recipe from a cooking show and noticed how easy it all seems when everything is measured and prepped beforehand – and then what a disaster it is when you try it – the same is revealed here. Overall, it is a very thorough demonstration of what it actually takes to design a project – not just perfect circuits and perfect steps to follow.
In the end he got it done
in the nick of time an hour late because he cannot add. Close enough.
Thanks [gokkor] for the tip.
Whilst the original Sting glowed blue as a defensive alert, Spark’s “WarSting” is all about aggression. The project hacks a toy Hobbit sword and teaches it to glow blue when vulnerable WiFi is detected. Once alerted, combat ensues. If its bearer slashes, the sword will battle the helpless network, swinging and clanging until it acquires an IP from the defeated DHCP server. Once conquered, the sword publishes a “Vanquished” message to Spark’s cloud, teaching the sword to ignore it from thenceforth.
While “wardriving” has not really been a thing since the first Lord of the Rings movie came out, the last time we saw someone do something similar the hardware was limited to detecting WiFi, not connecting.
Spark CEO [Zach] chose the particular sword because it could be disassembled without being cut apart and already came equipped with easily-hackable LEDs, motion control, and sound effects. Naturally he added one of his own products – the Spark Core – to the hilt to graft WiFi features onto the weapon (a cheaper alternative would be an MCU of your choice and the new ESP8266). The project then hijacks the LED lighting, sound, and hit detection sensor. Our readers can probably come up with some more imaginative actions to take once connected, though the project’s existing code for the Core is published on Github. As-is, in many jurisdictions even merely connecting to an unsecured WiFi these days is unlawful so beware your local restrictions.
Lots of companies could simply advertise the easy way and while obviously an ad, the WarSting is still a creative and fun hack.
See the video below for the sword in action and a Spark’s lore regarding the hack. Thanks [Chris] for the tip.
Continue reading “Hobbit Sword Glows Blue, Vanquishes Unprotected Wifi”