Skip to main content

Uses of the Stepper-Motor in Amateur Electronics Projects and Existing Functions

The stepper-motor is used in hundreds of electronics applications – anything where a precise amount of motion needs to be controlled and
arrested. Floppy disk drives (where they still exist!) use the motor to control their lasers, as do CD players; printers; slot machines; and scanners.


Because of their stepped nature, stepper-motors are also used to position valves in fluid control systems (for example inside a combustion engine, controlling the amount of oil flowing round the system); and in medical technology, they are often used to maintain the precise position of lasers and lenses.


The stepper-motor is lauded for its robustness. Unlike a servo mechanism, which is expensive and delicate, a stepper-motor can be operated in a range of harsh environments, including ones where water or sand might be a problem for the more delicately controlled servo. The stepper, which is basically a gear cog surrounded by electromagnets, can operate regardless of difficult temperatures, the presence of saline in the air or other disturbing factors – the pull of the magnet is stronger and the mechanism by which the cog moves is simpler than its more fragile cousins.


One drawback of the stepper-motor: to get more precise accuracy, you need a much bigger cog. This is because each tooth in the cog represents one stage (“step”) in the motor’s rotation. So if you need to control very small increments of positioning with a stepper-motor you need a big cog, with enough tiny teeth on it to do everything you want.

Obviously at some point the electronics hobbyist has to make a trade-off between robustness and cheapness (the stepper-motor is inexpensive), and size. Where an extraordinary degree of precision is required, or where you wish to shut down the wobble effect the electromagnets have, you may have to go for the more expensive, less sturdy option of a servo mechanism,.


The stepper-motor suffers from wobbling motion at low torque. The electromagnets around the cog are switched on in sequence to make the wheel turn. A magnetic field is strongest at pint of origin and weakens as you move away from that point. At low torque the tooth of the cog is pulled past the strongest point of magnetism, and then flicks back to settle into it. This may present problems for some applications using the stepper-motor.

At high motor speeds, the torque slackens – so the motor becomes less stable the faster it goes.


The snapping motion of the cog tooth in the magnetic field is called a detent. The subsequent vibration means that the stepper-motor is noisier than some other forms of motor. You will hear this noise when you put a new CD into your CD player, or a DVD into the tray of your DVD player. That whirring sound is the stepper-motor snapping through its detents to get the laser eye positioned at the correct band on the disc.

n hobbyist electronics, the stepper-motor is frequently chosen for its strength, reliability and relatively low cost when compared to alternative positioning arrangements.


Author Bio:

Bryony Haines is a second year electronics student at Keele University. She is currently building a CD player using a stepper-motor.

This is a guest post by Bryony Haines about the uses of Stepper motor in Amateur Electronics Projects and their existing uses. To write guest posts for us, please follow the link below.

Comments

Popular posts from this blog

Why Online Shopping Is Great for People with Busy Lifestyle?

The bane of modern living is the lack of ‘time’. Members in modern households lead a very busy lifestyle and the use of technology simplifies a lot of things, shopping being one of them. In the last couple of years, online shopping has become a mainstay in our modern lifestyle.

Protecting Yourself From Cybercriminals … a 5-Step Program

Guest Post by Kate Schneiders Most homes in America have personal computers connected to cyberspace. The Internet was a great invention … it allows us to communicate with people and businesses across the glove, access educational information, connect with friends and contacts via social media, and even get information on medical issues. Although the Internet can be a great thing, it can also be a very dangerous place to hang out. It’s easy to fall victim to cyber-predators … which is why I’m sharing these 5 tips to help keep you and your kiddos safe in cyberspace. 1. Stay Current Hackers use malicious software, called malware, to infect your computer and gain access to personal information. So, to help keep your system protected from their attacks, make sure that your antivirus software is up-to-date. With more than 100 new computer viruses being released into the wild every day, current antivirus software is crucial to your Internet safety. Also critical to your safety, is cu...

Oregon Student Loans - A Novel Solution

A recent survey has put forward the bare facts on the Oregon student loan crisis still haunting students in spite of the fact that graduates passing out from Oregon State University now have an earning potential of around $45000 at entry level while those at their mid career level have an average salary of about $86000

How to Properly Maintain Your Property

Unlike cars, which depreciate the moment they are driven out of the lot, buildings and other real estate property are investments that you count on to increase in price, or at the very least, ensure you break even when the

How to Clean Virus from PC?

Computer viruses are malicious, deceptive and dynamic. When a virus finds its way in your computer system, chances are that a time will come where in one way or another it will negatively affect your day.

Penetration testing- What it is and what it does

This is a guest post by Sachin about Penetration testing and its importance in today's world. If you work in IT support, you’ll be well aware of the potentially nightmarish situations which can be created by antiquated security systems. Penetration testing may be exactly what you need. Penetration testing is a comprehensive form of security testing for computer networks. It involves a thorough analysis of both the network and operators, and can identify weak points in any system with ease. Penetration testing, basics Penetration testing is actually a physical test of system security combined with analysis. Testing consultants systematically evaluate a network, and select targets protesting. For example, old security patches, old software with known vulnerabilities, and even phone inquiries can be used to test the strengths and weaknesses of an IT system. There are two basic types of penetration testing: 1. Internal penetration testing: Internal penetration testing finds ...

Archive

Show more