It’s strange my version works with SdFat as the key to manage the connection, not SdFs, but I think It can be the style of programming that determines the problem; the interaction method must be the same as the library.
Thanks again Renzo
Hi g0730n,
you must create a repeater specified for your kind of network.
If you create a transparent transmission network, you must use a transparent transmission and set the devices on the same ADDH ADDL and CHAN, but every time you repeat a message also, the sender receives It.
For the fixed transmission you must create/manage a protocol or similar.
For example, you want to repeat a message that all devices must read: you must send the message to the repeater, and the repeater sends a broadcast message.
If you want to send a message to a specified device, you must send the message to the repeater (or broadcast), and the repeater reads some information inside and sends a specified message.
There isn’t a specified solution.
For example, E22 has the repeater function, but It’s quite complex; here is a schema.
I’d also like to ask you if you have some problems with the interoperation of MicroPyton and Arduino env because @Woto opened a topic on this forum with some encoding communication problem that I can’t replicate, can you give some advise to he please.
Yes, there is a memory leak. You must discover which part of the code generates that.
Normally I’m going to add a lot a Serial.print to examine every part of the code.
But, when you program, also in the embedded env, It’s a best practice to encapsulate every functionality in functions because when the function ends, It works, and every variable inside is released.
Hi L33t331,
It seems to be a memory leak problem; try to examine the memory usage and give me feedback.
Check also the power supply, but It isn’t probably.
Bye Renzo
I don’t know if I explain well.
Suppose you put the code with the operation of sending and relative variables inside a function. In that case, all the variables and operations executed and allocated inside the function remain inside the function (like Fight Club).
So this can prevent the memory leak.
Bye Renzo
If you put all sending and receiving process inside a function, theoretically when function end all allocated variable and memory will be free.
Or you can malloc inside memory.
Bye Renzo
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.