128
ABSTRACT i

read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Embed Size (px)

Citation preview

Page 1: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

ABSTRACT

i

Page 2: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

ABSTRACT

In this proposed embedded car security system, FDS (Face Detection

System) is used to detect the face of the driver and compare it with the

predefined face. For example, in the night when the car’s owner is sleeping and

someone theft the car then FDS obtains images by one tiny web camera which

can be hidden easily in somewhere in the car. FDS compares the obtained

image with the predefined images if the image doesn’t match, then the

information is sent to the owner through MMS.

So now owner can obtain the image of the thief in his mobile as well as

he can trace the location through GPS. The location of the car as well as its

speed can be displayed to the owner through SMS. So by using this system,

owner can identify the thief image as well as the location of the car.

ii

Page 3: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

TABLE OF CONTENTS

iii

Page 4: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

TABLE OF CONTENTS

CHAPTER NO. TITLE PAGE NO.

ABSTRACT vii

LIST OF FIGURES xiii

LIST OF ABBREVATION xiv

1. INTRODUCTION 02

1.1 Block Diagram Description 02

1.2 Block Diagram

03

1.3 Circuit Diagram 04

1.4 Circuit Diagram Description 05

2. POWER SUPPLY UNIT 07

2.1 Circuit Diagram 07

2.1.1 Working Principle 07

2.1.2 Transformer 08

2.1.3 Bridge Rectifier 08

2.1.4 IC Voltage Regulators 10

iv

Page 5: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

3. MICROCONTROLLER 12

3.1 Description 12

3.2 Pin Diagram 14

3.2.1 8051 Pin Functions 15

3.2.1.1 I/O PORTS 15

3.2.1.2 Port0 15

3.2.1.3 Port1 16

3.2.1.4 Port2 16

3.2.1.5 Port3 17

3.2.1.6 Oscillator inputs 19

3.2.1.7 RESET Line (RST) 19

3.2.1.8Address Latch Enable (ALE) 19

3.2.1.9 Program Store Enable (PSEN) 20

3.2.1.10 External Access (EA) 20

3.2.1.11 Memory Organization 21

3.2.1.12 Common Memory Space 25

3.3 Block Diagram 26

3.3.1Oscillator characteristics 26

3.3.2 8051 CLOCK 27

3.3.3 IDLE mode 27

v

Page 6: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

3.3.4 Power down mode 28

3.3.5 8051 RESET 28

3.3.6 Central Processing Unit 29

3.3.7 The Accumulator 29

3.3.8 The "R" Register 29

3.3.9 The "B" Register 30

3.3.10 The Program Counters (PC) 31

3.3.11 The Data Pointer (DPTR) 31

3.3.12 The Stack Pointer (SP) 32

3.3.13 Input/Output ports 32

3.3.14 Timers/Counters 33

3.3.15 Interrupts 34

3.3.16 Serial port 35

3.3.17 Applications 36

4. SERIAL COMMUNICATION 38

4.1 Introduction 38

4.2 Null MODEM 41

4.3 RS232 42

vi

Page 7: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

4.4 Null MODEM without Handshaking 43

4.5 Compatibility issues 44

5. SOFTWARE CODING 47

6. SOFTWARE TOOLS 56

6.1 Types of Tools 56

6.1.1 KEIL C 56

6.1.2 Flash Magic 57

6.1.3 ORCAD 58

6.1.4 Design flow of ORCAD 59

7. HARDWARE TOOLS 61

7.1 GPS Module 61

7.2 GPS Segments 62

7.3 Space segments 63

7.3.1 Satellite movement 63

7.3.2 GPS Satellites 64

7.3.2.1 Construction of satellites 64

7.3.2.2 Generating the satellite signal 64

7.3.2.2.1 Simplified block diagram 64

vii

Page 8: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

7.4 Control segments 65

7.5 User segments 66

7.6 GSM MODEM 66

7.6.1 Definition 66

7.6.2 The GSM Network 67

7.6.3 GSM MODEM 67

7.6.4 GSM MODEM Applications 69

7.6.5 Facts and applications of GSM/GPRS

MODEM 69

7.6.6 Applications 70

7.7 Application suitable for GSM communication 71

8. CONCLUSION 75

9. APPENDIX 77

10. REFERENCES 79

LIST OF FIGURESFIGURE NO. TITLE PAGE NO.

1.1 Block diagram 03

1.2 Circuit Diagram 04

viii

Page 9: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

2.1 Circuit diagram of power supply 07

2.2 Block Diagram of power supply 08

3.1 Pin Diagram of 8051 14

3.2 Program Memory 22

3.3 Main Memory 23

3.4 Internal Data Memory 24

3.5 Block Diagram of the 8051 Core 26

3.6 8051 CLOCK 27

3.7 8051 RESET 28

3.8 Block diagram of timers/counters 34

4.1 Simple null modem without handshaking 44

6.1 Design window of ORCAD 58

7.1 GPS segments 62

7.2 Position of the 28 GPS satellites at 12.00 hrs UTC 63

7.3 GPS Satellite 64

7.4 Block diagram of satellite 65

LIST OF ABBREVATIONS

MCU Micro Controller Unit

RMS Root Mean Square

ix

Page 10: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CMOS Complementary Metal Oxide Semiconductor

CPU Central Processing Unit

RAM Random Access Memory

ALU Arithmetic Logic Unit

SP Stack Pointer

PSW Program Status Word

PC Program Counter

DPTR Data Pointer Register

UART Universal Asynchronous Receiver Transmitter

CD Carrier Detect Signal

RI Ring Indicator

DSR Data Set Ready

CTS Clear To Send

DTR Data Terminal Ready

DCE Data Communication Equipment

RX Receiver

TX Transmitter

x

Page 11: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

xi

Page 12: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-1

CHAPTER-1

INTRODUCTION

The main aim of this project is to offer an advance security system in

automotives, in which consists of a face detection subsystem, a GPS (Global

Positioning System) module, a GSM (Global System for Mobile

Communications) module and a control platform. The face detection subsystem

bases on optimized AdaBoost algorithm and can detect faces in cars during the

period in which nobody should be in the car, and make an alarm loudly or

xii

Page 13: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

soundlessly. The other modules transmit necessary information to users and

help to keep eyes on cars all the time, even when the car is lost.

This system prototype is built on the base of one embedded platform in

which one SoC named “SEP4020” (works at 100MHz) controls all the

processes. Experimental results illuminate the validity of this car security

system.

1.1 BLOCK DIAGRAM DESCRIPTION:

It consists of PC memory unit it stores the different driver image.

FDS (face detection subsystem) is used to detect the face of the driver

and compare it with the predefined image.

If the image doesn’t match then the information is send to the owner

through MMS.

Owner can trace the location through GPS. This system owner can

identify the theft image as well as the location of the car.

1.2 BLOCK DIAGRAM:

Embedded Control Platform

GPS

Power supply

GSM

IGNITION UNIT

xiii

Page 14: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Fig.1.1. Block diagram of smart car security system

1.3 CIRCUIT DIAGRAM:

IGNITION UNIT

xiv

Page 15: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

V C C _ B A R

R XD

TXD

TXD

C 5

4 7 0 u F / 2 5 V

- +

D 1

D B 1 0 6

1

2

3

4

P 1

SERIA

L PORT

594837261

C 3

1 0 u F

C 4

1 0 u F

C 5

1 0 u F

R 2

R E S I S TO R

P 1

SERIA

L PORT

594837261

L S 1

1

2Q 1

B C 5 4 7

12

3

D 3

S S F -L XH 1 0 1

9 V A C

121

2 R 3

3 3 0 EC 6

100u

F/1

6V

U 1

M A X2 3 2

1 38

1 11 0

1

3

4

5

2

6

1 29

1 47

16

15

R 1 I NR 2 I N

T1 I NT2 I N

C +

C 1 -

C 2 +

C 2 -

V+

V -

R 1 O U TR 2 O U T

T1 O U TT2 O U TV

CC

GND

U 1

D S 8 9 C 4 5 0

2 93 0

4 0 2 0

3 1

1 91 8

9

3 93 83 73 63 53 43 33 2

12345678

2 12 22 32 42 52 62 72 8

1 01 11 21 31 41 51 61 7

P S E NA L E

V C C G N D

E A

X1X2

R S T

P 0 . 0 / A D 0P 0 . 1 / A D 1P 0 . 2 / A D 2P 0 . 3 / A D 3P 0 . 4 / A D 4P 0 . 5 / A D 5P 0 . 6 / A D 6P 0 . 7 / A D 7

P 1 . 0P 1 . 1P 1 . 2 / R XD 1P 1 . 3 / TXD 1P 1 . 4P 1 . 5P 1 . 6P 1 . 7

P 2 . 0 / A 8P 2 . 1 / A 9

P 2 . 2 / A 1 0P 2 . 3 / A 1 1P 2 . 4 / A 1 2P 2 . 5 / A 1 3P 2 . 6 / A 1 4P 2 . 7 / A 1 5

P 3 . 0 / R XD 0P 3 . 1 / TXD 0P 3 . 2 / I N T0P 3 . 3 / I N T1

P 3 . 4 / T0P 3 . 5 / T1

P 3 . 6 / W RP 3 . 7 / R D

C 11 0 u F

IN OUTGND7805

A c tuator

Fig1.2 circuit diagram

xv

Page 16: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

1.4 CIRCUIT DESCRIPTION:

POWER SUPPLY UNIT:

The AC voltage, typically 220v rms is connected to a transformer which steps

that AC voltage down to the level of the desired DC output.a diode rectifier then

provides a full wave rectified voltage that is initially filtered by a simple capacitor

filter to produce a DC voltage. this resulting dc voltage usually some ripple or AC

voltage variation.

MICROCONTROLLER UNIT:

It contain four ports, port0 port1 port2 port3.where port 0 is an external port

and other three ports are internal ports. heavy devices like motor, alarm devices etc..

are connected to the port0.

This microcontroller used to transmit and receive the data’s.

SERIAL COMMUNICATION UNIT:

The serial communication unit contains MAX 232 IC and two serial ports. one

serial port connects the GSM module and another port connects the GPS module.

Serial communication is basically the transmission or reception of data one bit at a

time. Today's computers generally address data in bytes or some multiple thereof. A

byte contains 8 bits. A bit is basically either a logical 1 or zero. Every character on

this page is actually expressed internally as one byte. The serial port is used to

convert each byte to a stream of ones and zeroes as well as to convert a stream of

ones and zeroes to bytes. The serial port contains a electronic chip called a Universal

Asynchronous Receiver/Transmitter (UART) that actually does the conversion.

xvi

Page 17: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-2

CHAPTER-2

POWER SUPPLY UNIT

xvii

Page 18: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

2.1 CIRCUIT DIAGRAM:

Fig.2.1. Circuit Diagram of Power Supply

2.1.1 WORKING PRINCIPLE:

The AC voltage, typically 220V rms, is connected to a transformer, which

steps that ac voltage down to the level of the desired DC output. A diode

rectifier then provides a full-wave rectified voltage that is initially filtered by a

simple capacitor filter to produce a dc voltage. This resulting dc voltage usually

has some ripple or ac voltage variation.

A regulator circuit removes the ripples and also remains the same dc value

even if the input dc voltage varies, or the load connected to the output dc

voltage changes.

2.1Block Diagram:

xviii

Page 19: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

TRANSFORMER RECTIFIER FILTER IC REGULATOR LOAD

Fig.2.. Block diagram of power supply

2.1.2 TRANSFORMER:

The potential transformer will step down the power supply voltage (0-230V)

to (0-6V) level. Then the secondary of the potential transformer will be

connected to the precision rectifier, which is constructed with the help of op–

amp. The advantages of using precision rectifier are it will give peak voltage

output as DC, rest of the circuits will give only RMS output.

2.1.3 BRIDGE RECTIFIER:

When four diodes are connected as shown in figure, the circuit is called as

bridge rectifier. The input to the circuit is applied to the diagonally opposite

corners of the network, and the output is taken from the remaining two corners.

Let us assume that the transformer is working properly and there is a positive

potential, at point A and a negative potential at point B. the positive potential at

point A will forward bias D3 and reverse bias D4.

The negative potential at point B will forward bias D1 and reverse D2. At

this time D3 and D1 are forward biased and will allow current flow to pass

through them; D4 and D2 are reverse biased and will block current flow.

xix

Page 20: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

The path for current flow is from point B through D1, up through RL,

through D3, through the secondary of the transformer back to point B. this path

is indicated by the solid arrows. Waveforms (1) and (2) can be observed across

D1 and D3.

One-half cycle later the polarity across the secondary of the transformer

reverse, forward biasing D2 and D4 and reverse biasing D1 and D3. Current

flow will now be from point A through D4, up through RL, through D2, through

the secondary of T1, and back to point A. This path is indicated by the broken

arrows. Waveforms (3) and (4) can be observed across D2 and D4. The current

flow through RL is always in the same direction.

In flowing through RL this current develops a voltage corresponding to that

shown waveform (5). Since current flows through the load (RL) during both

half cycles of the applied voltage, this bridge rectifier is a full-wave rectifier.

One advantage of a bridge rectifier over a conventional full-wave rectifier is

that with a given transformer the bridge rectifier produces a voltage output that

is nearly twice that of the conventional full-wave circuit.

This may be shown by assigning values to some of the components

shown in views A and B. assume that the same transformer is used in both

circuits. The peak voltage developed between points X and y is 1000 volts in

both circuits. In the conventional full-wave circuit shown—in view A, the peak

voltage from the center tap to either X or Y is 500 volts.

Since only one diode can conduct at any instant, the maximum voltage that

can be rectified at any instant is 500 volts.

xx

Page 21: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

The maximum voltage that appears across the load resistor is nearly-but

never exceeds-500 v0lts, as result of the small voltage drop across the diode. In

the bridge rectifier shown in view B, the maximum voltage that can be rectified

is the full secondary voltage, which is 1000 volts. Therefore, the peak output

voltage across the load resistor is nearly 1000 volts. With both circuits using the

same transformer, the bridge rectifier circuit produces a higher output voltage

than the conventional full-wave rectifier circuit.

2.1.4 IC VOLTAGE REGULATORS:

Voltage regulators comprise a class of widely used ICs. Regulator IC units

contain the circuitry for reference source, comparator amplifier, control device,

and overload protection all in a single IC. IC units provide regulation of either a

fixed positive voltage, a fixed negative voltage, or an adjustably set voltage.

The regulators can be selected for operation with load currents from hundreds of

milli amperes to tens of amperes, corresponding to power ratings from milli

watts to tens of watts.

A fixed three-terminal voltage regulator has an unregulated dc input

voltage, Vi, applied to one input terminal, a regulated dc output voltage, Vo,

from a second terminal, with the third terminal connected to ground.

The series 78 regulators provide fixed positive regulated voltages from 5

to 24 volts. Similarly, the series 79 regulators provide fixed negative regulated

voltages from 5 to 24 volts.

xxi

Page 22: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-3

CHAPTER-3

MICROCONTROLLER

3.1 DESCRIPTION:

The generic 8051 architecture sports a Harvard architecture, which

contains two separate buses for both program and data. So, it has two distinctive

xxii

Page 23: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

memory spaces of 64K X 8 size for both program and data. It is based on an 8

bit central processing unit with an 8 bit Accumulator and another 8 bit B

register as main processing blocks. Other portions of the architecture include

few 8 bit and 16 bit registers and 8 bit memory locations.

Each 8031 device has some amount of data RAM built in the device for

internal processing. This area is used for stack operations and temporary storage

of data.

This base architecture is supported with on chip peripheral functions like

I/O ports, timers/counters, versatile serial communication port. So it is clear that

this 8031 architecture was designed to cater many real time embedded needs.

The following list gives the features of the 8051 architecture:

Optimized 8 bit CPU for control applications.

Extensive Boolean processing capabilities.

64K Program Memory address space.

64K Data Memory address space.

128 bytes of on chip Data Memory.

32 Bi-directional and individually addressable I/O lines.

Two 16 bit timer/counters.

Full Duplex UART, On-chip clock oscillator.

6-source / 5-vector interrupt structure with priority levels.

Now you may be wondering about the non mentioning of memory space

meant for the program storage, the most important part of any embedded

controller. Originally this 8031 architecture was introduced with on chip, ‘one

time programmable version of Program Memory of size 4K X 8. Intel delivered

all these microcontrollers (8051) with user’s program fused inside the device.

The memory portion was mapped at the lower end of the Program Memory

area. But, after getting devices, customers couldn’t change any thing in their

xxiii

Page 24: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

program code, which was already made available inside during device

fabrication.

So, very soon Intel introduced the 8031 devices (8751) with re-

programmable type of Program Memory using built-in EPROM of size 4K X 8.

Like a regular EPROM, this memory can be re-programmed many times. Later

on Intel started manufacturing these 8031 devices without any on chip Program

Memory.

The AT89S51 is a low-power, high-performance CMOS 8-bit

microcontroller with 4K bytes of In-System Programmable Flash memory. The

device is manufactured using Atmel’s high-density nonvolatile memory

technology and is compatible with the Indus-try-standard 80C51 instruction set

and pin out. The on-chip Flash allows the program memory to be reprogrammed

in-system or by a conventional nonvolatile memory pro-grammar. By

combining a versatile 8-bit CPU with In-System Programmable Flash on a

monolithic chip, the Atmel AT89S51 is a powerful microcontroller which

provides a highly-flexible and cost-effective solution to many embedded control

applications. The AT89S51 provides the following standard features: 4K bytes

of Flash, 128 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers,

two 16-bit timer/counters, a five-vector two-level interrupt architecture, a full

duplex serial port, on-chip oscillator, and clock circuitry.

In addition, the AT89S51 is designed with static logic for operation down to

zero frequency and supports two software selectable power saving modes. The

Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port,

and interrupt system to continue functioning. The Power-down mode saves the

RAM con-tents but freezes the oscillator, disabling all other chip functions until

the next external interrupt or hardware reset.

xxiv

Page 25: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

3.2 PIN DIAGRAM:

Fig.3.1-Pin Diagram Of 8051

3.2.1 8051 PIN FUNCTIONS:

3.2.1.1 I/O PORTS (P0, P1, P2, P3):

Of the 40 pins of the typical 8052, 32 of them are dedicated to I/O lines

that have a one-to-one relation with SFRs P0, P1, P2, and P3. The developer

may raise and lower these lines by writing 1s or 0s to the corresponding bits in

the SFRs. Likewise; the current state of these lines may be read by reading the

xxv

Page 26: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

corresponding bits of the SFRs. All of the ports have internal pull-up resistors

except for port 0.

3.2.1.2 PORT 0:

Port 0 is dual-function in that it in some designs port 0ís I/O lines are

available to the developer to access external devices while in other designs it is

used to access external memory. If the circuit requires external RAM or ROM,

the microcontroller will automatically use port 0 to clock in/out the 8-bit data

word as well as the low 8 bits of the address in response to a MOVX instruction

and port 0 I/O lines may be used for other functions as long as external RAM

isn’t being accessed at the same time. If the circuit requires external code

memory, the microcontroller will automatically use the port 0 I/O lines to

access each instruction that is to be executed. In this case, port 0 cannot be

utilized for other purposes since the state of the I/O lines are constantly being

modified to access external code memory.

Note that there are no pull-up resistors on port 0, so it may be necessary

to include your own pull-up resistors depending on the characteristics of the

parts you will be driving via port 0.here small decoupling capacitor is connected

in this port 0.

3.2.1.3 PORT 1:

Port 1 consists of 8 I/O lines that you may use exclusively to interface to

external parts. Unlike port 0, typical derivatives do not use port 1 for any

functions themselves. Port 1 is commonly used to interface to external hardware

such as LCDs, keypads, and other devices. With 8052 derivatives, two bits of

port 1 are optionally used as described for extended timer 2 functions. These

xxvi

Page 27: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

two lines are not assigned these special functions on 8051ís since 8051ís don’t

have a timer 2. Further, these lines can still be used for your own purposes if

you don’t need these features of timer 2.

P1.0 (T2): If T2CON.1 is set (C/T2), then timer 2 will be incremented

whenever there is a 1-0 transition on this line. With C/T2 set, P1.0 is the clock

source for timer 2. P1.1 (T2EX): If timer 2 is in auto-reload mode and

T2CON.3 (EXEN2) is set, a 1-0 transition on this line will cause timer 2 to be

reloaded with the auto-reload value. This will also cause the T2CON.6 (EXF2)

external flag to be set, which may cause an interrupt if so enabled.

3.2.1.4 PORT 2:

Like port 0, port 2 is dual-function. In some circuit designs it is available

for accessing devices while in others it is used to address external RAM or

external code memory. When the MOVX @DPTR instruction is used, port 2 is

used to output the high byte of the memory address that is to be accessed. In

these cases, port 2 may be used to access other devices as long as the devices

are not being accessed at the same time a MOVX instruction is using port 2 to

address external RAM. If the circuit requires external code memory, the

microcontroller will automatically use the port 2 I/O lines to access each

instruction that is to be executed.

In this case, port 2 cannot be utilized for other purposes since the state of

the I/O lines are constantly being modified to access external code memory.

3.2.1.5 PORT 3:

Port 3 consists entirely of dual-function I/O lines. While the developer

may access all these lines from their software by reading/writing to the P3 SFR,

each pin has a pre-defined function that the microcontroller handles

xxvii

Page 28: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

automatically when configured to do so and/or when necessary. P3.0 (RXD):

The UART/serial port uses P3.0 as the receive line. In circuit designs that will

be using the microcontroller’s internal serial port, this is the line into which

serial data will be clocked. Note that when interfacing an 8052 to an RS-232

port that you may not connect this line directly to the RS-232 pin; rather, you

must pass it through a part such as the MAX232 to obtain the correct voltage

levels. This pin is available for any use the developer may assign it if the circuit

has no need to receive data via the integrated serial port.

P3.1 (TXD): The UART/serial port uses P3.1 as the ‘transmit line.’ In

circuit designs that will be using the microcontroller’s internal serial port, this is

the line that the microcontroller will clock out all data which is written to the

SBUF SFR. Note that when interfacing an 8052 to an RS-232 port that you may

not connect this line directly to the RS-232 pin; rather, you must pass it through

a part such as the MAX232 to obtain the correct voltage levels. This pin is

available for any use the developer may assign it if the circuit has no need to

transmit data via the integrated serial port.

P3.2 (-INT0): When so configured, this line is used to trigger an ‘External

0 Interrupt.’ This may either be low-level triggered or may be triggered on a 1-0

transition. Please see the chapter on interrupts for details. This pin is available

for any use the developer may assign it if the circuit does not need to trigger an

external 0 interrupt.

P3.3 (-INT1): When so configured, this line is used to trigger an ‘External

1 Interrupt.’ This may either be low-level triggered or may be triggered on a 1-0

transition. Please see the chapter on interrupts for details. This pin is available

for any use the developer may assign it if the circuit does not need to trigger an

external 1 interrupt.

xxviii

Page 29: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

P3.4 (T0): When so configured, this line is used as the clock source for

timer 0. Timer 0 will be incremented either every instruction cycle that T0 is

high or every time there is a 1-0 transition on this line, depending on how the

timer is configured. Please see the chapter on timers for details. This pin is

available for any use the developer may assign it if the circuit does not to

control timer 0 externally.

P3.5 (T1): When so configured, this line is used as the clock source for

timer 1. Timer 1 will be incremented either every instruction cycle that T1 is

high or every time there is a 1-0 transition on this line, depending on how the

timer is configured. Please see the chapter on timers for details. This pin is

available for any use the developer may assign it if the circuit does not to

control timer 1 externally.

P3.6 (-WR): This is external memory write strobe line. This line will be

asserted low by the microcontroller whenever a MOVX instruction writes to

external RAM. This line should be connected to the RAM’s write (-W) line.

This pin is available for any use the developer may assign it if the circuit does

not write to external RAM using MOVX.

P3.7 (-RD): This is external memory write strobe line. This line will be

asserted low by the microcontroller whenever a MOVX instruction writes to

external RAM. This line should be connected to the RAM’s write (-W) line.

This pin is available for any use the developer may assign it if the circuit does

not read from external RAM using MOVX.

3.2.1.6 OSCILLATOR INPUTS (XTAL1, XTAL2):

The 8052 is typically driven by a crystal connected to pins 18 (XTAL2)

and 19 (XTAL1). Common crystal frequencies are 11.0592Mhz as well as

12Mhz, although many newer derivatives are capable of accepting frequencies

as high as 40Mhz.

xxix

Page 30: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

While a crystal is the normal clock source, this isn’t necessarily the case.

A TTL clock source may also be attached to XTAL1 and XTAL2 to provide the

microcontroller’s clock.

3.2.1.7 RESET LINE (RST):

Pin 9 is the master reset line for the microcontroller. When this pin is

brought high for two instruction cycles, the microcontroller is effectively reset.

SFRs, including the I/O ports, are restored to their default conditions and the

program counter will be reset to 0000h. Keep in mind that Internal RAM is not

affected by a reset. The microcontroller will begin executing code at 0000h

when pin 9 returns to a low state.

The reset line is often connected to a reset button/switch that the user may

press to reset the circuit. It is also common to connect the reset line to a

watchdog IC or a supervisor IC (such as MAX707).

3.2.1.8 ADDRESS LATCH ENABLE (ALE):

The ALE at pin 30 is an output-only pin that is controlled entirely by the

microcontroller and allows the microcontroller to multiplex the low-byte of a

memory address and the 8-bit data itself on port 0. This is because, while the

high-byte of the memory address is sent on port 2, port 0 is used both to send

the low byte of the memory address and the data itself. This is accomplished by

placing the low-byte of the address on port 0, exerting ALE high to latch the

low-byte of the address into a latch IC (such as the 74HC573), and then placing

the 8 data-bits on port 0. In this way the 8052 is able to output a 16-bit address

and an 8-bit data word with 16 I/O lines instead of 24.

xxx

Page 31: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

The ALE line is used in this fashion both for accessing external RAM

with MOVX @DPTR as well as for accessing instructions in external code

memory. When your program is executed from external code memory, ALE

will pulse at a rate of 1/6th that of the oscillator frequency. Thus if the oscillator

is operating at 11.0592 MHz, ALE will pulse at a rate of 1,843,200 times per

second. The only exception is when the MOVX instruction is executed one

ALE pulse is missed in lieu of a pulse on WR or RD.

3.2.1.9 PROGRAM STORE ENABLE (PSEN):

The Program Store Enable (PSEN) line at pin 29 is exerted low

automatically by the microcontroller whenever it accesses external code

memory. This line should be attached to the Output Enable (-OE) pin of the

EPROM that contains your code memory.

PSEN will not be exerted by the microcontroller and will remain in a high

state if your program is being executed from internal code memory.

3.2.1.10 EXTERNAL ACCESS (EA):

The External Access (EA) line at pin 31 is used to determine whether the

8052 will execute your program from external code memory or from internal

code memory.

If EA is tied high (connected to +5V) then the microcontroller will

execute the program it finds in internal/on-chip code memory. If EA is tied low

(to ground) then it will attempt to execute the program it finds in the attached

external code memory EPROM. Of course, your EPROM must be properly

xxxi

Page 32: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

connected for the microcontroller to be able to access your program in external

code memory.

3.2.1.11 MEMORY ORGANIZATION:

The 8051 architecture provides both on chip memory as well as off chip

memory expansion capabilities. It supports several distinctive ‘physical’ address

spaces, functionally separated at the hardware level by different addressing

mechanisms, read and write controls signals or both:

On chip Program Memory

On chip Data Memory

Off chip Program Memory

Off chip Data Memory

On chip Special Function Registers

The Program Memory area (EPROM incase of external memory or

Flash/EPROM incase of internal one) is extremely large and never lose

information when the power is removed. Program Memory is used for

information needed each time power is applied: Initialization values, Calibration

data, Keyboard lookup tables etc along with the program itself. The Program

Memory has a 16 bit address and any particular memory location is addressed

using the 16 bit Program Counter and instructions which generate a 16 bit

address.

On chip Data memory is smaller and therefore quicker than Program

Memory and it goes into a random state when power is removed. On chip RAM

is used for variables which are calculated when the program is executed.

xxxii

Page 33: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

In contrast to the Program Memory, on chip Data Memory accesses need

a single 8 bit value (may be a constant or another variable) to specify a unique

location. Since 8 bits are more than sufficient to address 128 RAM locations,

the on chip RAM address generating register is single byte wide.

Different addressing mechanisms are used to access these different

memory spaces and this greatly contributes to microcomputer’s operating

efficiency.

The 64K byte Program Memory space consists of an internal and an

external memory portion. If the EA pin is held high, the 8051 executes out of

internal Program Memory unless the address exceeds 0FFFH and locations

1000H through FFFFH are then fetched from external Program Memory. If the

EA pin is held low, the 8031 fetches all instructions from the external Program

Memory. In either case, the 16 bit Program Counter is the addressing

mechanism.

Figure.3.2 - Program Memory

The Data Memory address space consists of an internal and an external

memory space. External Data Memory is accessed when a MOVX instruction is

executed.

xxxiii

Page 34: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Apart from on chip Data Memory of size 128/256 bytes, total size of Data

Memory can be expanded up to 64K using external RAM devices.

Total internal Data Memory is divided into three blocks:

Lower 128 bytes.

Higher 128 bytes

Special Function Register space.

Higher 128 bytes are available only in 8032/8052 devices.

Fig.3.3. Main Memory

Even though the upper RAM area and SFR area share same address

locations, they are accessed through different addressing modes. Direct

addresses higher than 7FH access SFR memory space and indirect addressing

above 7FH access higher 128 bytes (in 8032/8052).

xxxiv

Page 35: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Fig.3.4. Internal Data Memory

The next figure indicates the layout of lower 128 bytes. The lowest 32

bytes (from address 00H to 1FH) are grouped into 4 banks of 8 registers.

Program instructions refer these registers as R0 through R7. Program Status

Word indicates which register bank is being used at any point of time.

The next 16 bytes above these register banks form a block of bit

addressable memory space. The instruction set of 8031 contains a wide range of

single bit processing instructions and these instructions can directly access the

128 bits of this area.

xxxv

Page 36: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

The SFR space includes port latches, timer and peripheral control

registers. All the members of 8031 family have same SFR at the same SFR

locations. There are some 16 unique locations which can be accessed as bytes

and as bits.

3.21.12 COMMON MEMORY SPACE:

The 8031’s Data Memory may not be used for program storage. So it

means you can’t execute instructions out of this Data Memory. But, there is a

way to have a single block of off chip memory acting as both Program and Data

Memory. By gating together both memory read controls (RD and PSEN) using

an AND gate, a common memory read control signal can be generated.

In this arrangement, both memory spaces are tied together and total

accessible memory is reduced from 128 Kbytes to 64 Kbytes.

The 8031 can read and write into this common memory block and it can

be used as Program and Data Memory.

You can use this arrangement during program development and

debugging phase. Without taking Microcontroller off the socket to program its

internal ROM (EPROM/Flash ROM), you can use this common memory for

frequent program storage and code modifications.

Basically, 8031’s assembly language instruction set consists of an

operation mnemonic and zero to three operands separated by commas. In two

byte instructions the destination is specified first, and then the source. Byte wide

mnemonics like ADD or MOV use the Accumulator as a source operand and

also to receive the result.

xxxvi

Page 37: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

3.3 BLOCK DIAGRAM:

Fig.3.5. Block Diagram of the 8051 Core

3.3.1 OSCILLATOR CHARACTERISTICS:

XTAL1 and XTAL2 are the input and output, respectively, of an

inverting amplifier which can be configured for use as an on chip oscillator, as

shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To

drive the device from an external clock source, XTAL2 should be left

unconnected while XTAL1 is driven as shown in Figure 2.

xxxvii

Page 38: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

There are no requirements on the duty cycle of the external clock signal,

since the input to the internal clocking circuitry is through a divide-by two flip-

flop, but minimum and maximum voltage high and low time specifications must

be observed.

3.3.2 8051 CLOCK:

8051 has an on-chip oscillator

It needs an external crystal

Crystal decides the operating frequency of the 8051

Fig.3.6 8051 CLOCK

3.3.3 IDLE MODE:

In idle mode, the CPU puts itself to sleep while all the on-chip peripherals

remain active. The mode is invoked by software. The content of the on-chip

RAM and all the special functions registers remain unchanged during this mode.

The idle mode can be terminated by any enabled interrupt or by a hardware

reset. It should be noted that when idle is terminated by a hardware reset, the

device normally resumes program execution, from where it left off, up to two

machine cycles before the internal reset algorithm takes control. On-chip

hardware inhibits access to internal RAM in this event, but access to the port

pins is not inhibited. To eliminate the possibility of an unexpected write to a

xxxviii

Page 39: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

port pin when Idle is terminated by reset, the instruction following the one that

invokes Idle should not be one that writes to a port pin or to external memory.

3.3.4 POWER DOWN MODE:

In the power down mode the oscillator is stopped, and the instruction that

invokes power down is the last instruction executed. The on-chip RAM and

Special Function Registers retain their values until the power down mode is

terminated. The only exit from power down is a hardware reset. Reset redefines

the SFRs but does not change the on-chip RAM. The reset should not be

activated before VCC is restored to its normal operating level and must be held

active long enough to allow the oscillator to restart and stabilize.

3.3.5 8051 RESET:

RESET is an active High input

When RESET is set to High, 8051 goes back to the power on state

Power-On Reset

Push PB and active High on RST

Release PB, Capacitor discharges and RST goes low

RST must stay high for a min of 2 machine cycles

Fig.3.7.8051 RESET

xxxix

Page 40: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

3.3.6 CENTRAL PROCESSING UNIT:

The CPU is the brain of the microcontrollers reading user’s programs and

executing the expected task as per instructions stored there in. Its primary

elements are an 8 bit Arithmetic Logic Unit (ALU), Accumulator (Acc), few

more 8 bit registers, B register, Stack Pointer (SP), Program Status Word (PSW)

and 16 bit registers, Program Counter (PC) and Data Pointer Register (DPTR).

3.3.7 THE ACCUMULATOR:

If worked with any other assembly language you will be familiar with the

concept of an accumulator register. The Accumulator, as its name suggests, is

used as a general register to accumulate the results of a large number of

instructions. It can hold an 8-bit (1-byte) value and is the most versatile register

the 8052 has due to the sheer number of instructions that make use of the

accumulator. More than half of the 8052ís 255 instructions manipulate or use

the Accumulator in some way.

For example, if you want to add the number 10 and 20, the resulting 30

will be stored in the Accumulator. Once you have a value in the Accumulator

you may continue processing the value or you may store it in another register or

in memory.

3.3.8 THE "R" REGISTERS:

The "R" registers are sets of eight registers that are named R0, R1,

through R7. These registers are used as auxiliary registers in many operations.

To continue with the above example, perhaps you are adding 10 and 20.

xl

Page 41: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

The original number 10 may be stored in the Accumulator whereas the

value 20 may be stored in, say, register R4. To process the addition you would

execute the command:

As mentioned earlier, there are four sets of ‘R’ registers, register bank 0,

1, 2, and 3. When the 8052 is first powered up, register bank 0 (addresses 00h

through 07h) is used by default.

In this case, for example, R4 is the same as Internal RAM address 04h.

However, your program may instruct the 8052 to use one of the alternate

register banks; i.e., register banks 1, 2, or 3. In this case, R4 will no longer be

the same as Internal RAM address 04h. For example, if your program instructs

the 8052 to use register bank 1, register R4 will now be synonymous with

Internal RAM address 0Ch. If you select register bank 2, R4 is synonymous

with 14h, and if you select register bank 3 it is synonymous with address 1Ch.

The concept of register banks adds a great level of flexibility to the 8052,

especially when dealing with interrupts (we'll talk about interrupts later).

However, always remember that the register banks really reside in the first 32

bytes of Internal RAM.

3.3.9 THE "B" REGISTER:

The "B" register is very similar to the Accumulator in the sense that it

may hold an 8-bit (1-byte) value. The "B" register is only used implicitly by two

8052 instructions: MUL AB and DIV AB. Thus, if you want to quickly and

easily multiply or divide A by another number, you may store the other number

in "B" and make use of these two instructions. Aside from the MUL and DIV an

instruction, the “B” register is often used as yet another temporary storage

register much like a ninth "R" register.

xli

Page 42: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

3.3.10 THE PROGRAM COUNTER (PC):

The Program Counter (PC) is a 2-byte address that tells the 8052 where

the next instruction to execute is found in memory. When the 8052 is initialized

PC always starts at 0000h and is incremented each time an instruction is

executed. It is important to note that PC isn’t always incremented by one. Since

some instructions are 2 or 3 bytes in length the PC will be incremented by 2 or 3

in these cases.

The Program Counter is special in that there is no way to directly modify

its value. That is to say, you can’t do something like PC=2430h. On the other

hand, if you execute LJMP 2430h you’ve effectively accomplished the same

thing.

It is also interesting to note that while you may change the value of PC

(by executing a jump instruction, etc.) there is no way to read the value of PC.

That is to say, there is no way to ask the 8052 "What address are you about to

execute?" As it turns out, this is not completely true: There is one trick that may

be used to determine the current value of PC.

3.3.11 THE DATA POINTER (DPTR):

The Data Pointer (DPTR) is the 8052ís only user-accessible 16-bit (2-

byte) register. The Accumulator, "R" registers, and "B" register are all 1-byte

values. The PC just described is a 16-bit value but isn’t directly user-accessible

as a working register. DPTR, as the name suggests, is used to point to data. It is

used by a number of commands that allow the 8052 to access external memory.

When the 8052 accesses external memory it accesses the memory at the address

indicated by DPTR.

xlii

Page 43: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

While DPTR is most often used to point to data in external memory or

code memory, many developers take advantage of the fact that it’s the only true

16-bit register available. It is often used to store 2-byte values that have nothing

to do with memory locations.

3.3.12 THE STACK POINTER (SP):

The Stack Pointer, like all registers except DPTR and PC, may hold an 8-

bit (1-byte) value. The Stack Pointer is used to indicate where the next value to

be removed from the stack should be taken from. When you push a value onto

the stack, the 8052 first increments the value of SP and then stores the value at

the resulting memory location. When you pop a value off the stack, the 8052

returns the value from the memory location indicated by SP, and then

decrements the value of SP.

This order of operation is important. When the 8052 is initialized SP will

be initialized to 07h. If you immediately push a value onto the stack, the value

will be stored in Internal RAM address 08h. This makes sense taking into

account what was mentioned two paragraphs above: First the 8051 will

increment the value of SP (from 07h to 08h) and then will store the pushed

value at that memory address (08h). SP is modified directly by the 8052 by six

instructions: PUSH, POP, ACALL, LCALL, RET, and RETI. It is also used

intrinsically whenever an interrupt is triggered (more on interrupts later. Don’t

worry about them for now!).

3.3.13 INPUT / OUTPUT PORTS:

The 8031’s I/O port structure is extremely versatile and flexible. The

device has 32 I/O pins configured as four eight bit parallel ports (P0, P1, P2 and

xliii

Page 44: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

P3). Each pin can be used as an input or as an output under the software control.

These I/O pins can be accessed directly by memory instructions during program

execution to get required flexibility.

These port lines can be operated in different modes and all the pins can be

made to do many different tasks apart from their regular I/O function

executions. Instructions, which access external memory, use port P0 as a

multiplexed address/data bus. At the beginning of an external memory cycle,

low order 8 bits of the address bus are output on P0. The same pins transfer data

byte at the later stage of the instruction execution.

Also, any instruction that accesses external Program Memory will output

the higher order byte on P2 during read cycle. Remaining ports, P1 and P3 are

available for standard I/O functions. But all the 8 lines of P3 support special

functions: Two external interrupt lines, two counter inputs, serial port’s two

data lines and two timing control strobe lines are designed to use P3 port lines.

When you don’t use these special functions, you can use corresponding port

lines as a standard I/O.

Even within a single port, I/O operations may be combined in many

ways. Different pins can be configured as input or outputs independent of each

other or the same pin can be used as an input or as output at different times. You

can comfortably combine I/O operations and special operations for Port 3 lines.

3.3.14 TIMERS / COUNTERS:

8031 has two 16 bit Timers/Counters capable of working in different

modes. Each consists of a ‘High’ byte and a ‘Low’ byte which can be accessed

under software. There is a mode control register and a control register to

configure these timers/counters in number of ways.

xliv

Page 45: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

These timers can be used to measure time intervals, determine pulse

widths or initiate events with one microsecond resolution up to a maximum of

65 millisecond (corresponding to 65, 536 counts). Use software to get longer

delays. Working as counter, they can accumulate occurrences of external events

(from DC to 500 KHz) with 16 bit precision.

Fig.3.8. Block Diagram of timers/counters

3.3.15 INTERRUPTS:

The 8031 has five interrupt sources: one from the serial port when a

transmission or reception operation is executed; two from the timers when

overflow occurs and two come from the two input pins INT0, INT1.

Each interrupt may be independently enabled or disabled to allow polling

on same sources and each may be classified as high or low priority.

A high priority source can override a low priority service routine. These

options are selected by interrupt enable and priority control registers, IE and IP.

xlv

Page 46: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

When an interrupt is activated, then the program flow completes the

execution of the current instruction and jumps to a particular program location

where it finds the interrupt service routine. After finishing the interrupt service

routine, the program flows return to back to the original place.

The Program Memory address, 0003H is allotted to the first interrupt and

next seven bytes can be used to do any task associated with that interrupt.

Interrupt Source Service routine starting address:

External 0 0003H

Timer/Counter 0 000BH

External 1 0013H

Timer/counter 1 001BH

Serial port 0023H

3.3.16 SERIAL PORT:

Each 8031 microcomputer contains a high speed full duplex (means you

can simultaneously use the same port for both transmitting and receiving

purposes) serial port which is software configurable in 4 basic modes: 8 bit

UART; 9 bit UART; Interprocessor Communications link or as shift register I/O

expander.

For the standard serial communication facility, 8031 can be programmed

for UART operations and can be connected with regular personal computers,

teletype writers, modem at data rates between 122 bauds and 31 kilo bauds.

xlvi

Page 47: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Getting this facility is made very simple using simple routines with

option to select even or odd parity. You can also establish a kind of

Interprocessor communication facility among many microcomputers in a

distributed environment with automatic recognition of address/data.

Apart from all above, you can also get super fast I/O lines using low cost

simple TTL or CMOS shift registers.

3.3.17APPLICATIONS:

Security applications

Image processing applications

Banking applications

xlvii

Page 48: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-4

xlviii

Page 49: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-4

SERIAL COMMUNICATION

4.1 INTRODUCTION:

Serial communication is basically the transmission or reception of data

one bit at a time. Today's computers generally address data in bytes or some

multiple thereof. A byte contains 8 bits. A bit is basically either a logical 1 or

zero. Every character on this page is actually expressed internally as one byte.

The serial port is used to convert each byte to a stream of ones and zeroes as

well as to convert a stream of ones and zeroes to bytes. The serial port contains

a electronic chip called a Universal Asynchronous Receiver/Transmitter

(UART) that actually does the conversion.

The serial port has many pins. We will discuss the transmit and receive

pin first. Electrically speaking, whenever the serial port sends a logical one (1) a

negative voltage is effected on the transmit pin. Whenever the serial port sends

a logical zero (0) a positive voltage is affected. When no data is being sent, the

serial port's transmit pin's voltage is negative (1) and is said to be in a MARK

state. Note that the serial port can also be forced to keep the transmit pin at a

positive voltage (0) and is said to be the SPACE or BREAK state. (The terms

MARK and SPACE are also used to simply denote a negative voltage (1) or a

positive voltage (0) at the transmit pin respectively).

When transmitting a byte, the UART (serial port) first sends a START

BIT which is a positive voltage (0), followed by the data (general 8 bits, but

could be 5, 6, 7, or 8 bits) followed by one or two STOP Bits which is a

negative(1) voltage. The sequence is repeated for each byte sent. Figure 1 shows

a diagram of what a byte transmission would look like.

xlix

Page 50: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

At this point you may want to know what the duration of a bit is. In other

words, how long does the signal stay in a particular state to define a bit. The

answer is simple. It is dependent on the baud rate. The baud rate is the number

of times the signal can switch states in one second. Therefore, if the line is

operating at 9600 baud, the line can switch states 9,600 times per second. This

means each bit has the duration of 1/9600 of a second or about 100µsec.

when transmitting a character there are other characteristics other than the

baud rate that must be known or that must be setup. These characteristics define

the entire interpretation of the data stream. The first characteristic is the length

of the byte that will be transmitted. This length in general can be anywhere from

5 to 8 bits.

The second characteristic is parity. The parity characteristic can be even,

odd, mark, space, or none. If even parity, then the last data bit transmitted will

be a logical 1 if the data transmitted had an even amount of 0 bits. If odd parity,

then the last data bit transmitted will be a logical 1 if the data transmitted had an

odd amount of 0 bits. If MARK parity, then the last transmitted data bit will

always be a logical 1. If SPACE parity, then the last transmitted data bit will

always be a logical 0. If no parity then there is no parity bit transmitted.

The third characteristic is the amount of stop bits. This value in general is

1 or 2. Assume we want to send the letter 'A' over the serial port. The binary

representation of the letter 'A' is 01000001. Remembering that bits are

transmitted from least significant bit (LSB) to most significant bit (MSB), the

bit stream transmitted would be as follows for the line characteristics 8 bits, no

parity, 1 stop bit and 9600 baud.

LSB (0 1 0 0 0 0 0 1 0 1) MSB

l

Page 51: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

The above represents (Start Bit) (Data Bits) (Stop Bit). To calculate the

actual byte transfer rate simply divide the baud rate by the number of bits that

must be transferred for each byte of data. In the case of the above example, each

character requires 10 bits to be transmitted for each character. As such, at 9600

baud, up to 960 bytes can be transferred in one second.

The above discussion was concerned with the "electrical/logical"

characteristics of the data stream. We will expand the discussion to line

protocol. Serial communication can be half duplex or full duplex. Full duplex

communication means that a device can receive and transmit data at the same

time. Half duplex means that the device cannot send and receive at the same

time. It can do them both, but not at the same time. Half duplex communication

is all but outdated except for a very small focused set of applications.

Half duplex serial communication needs at a minimum two wires, signal

ground and the data line. Full duplex serial communication needs at a minimum

three wires, signal ground, transmit data line, and receive data line. The RS232

specification governs the physical and electrical characteristics of serial

communications. This specification defines several additional signals that are

asserted (set to logical 1) for information and control beyond the data signal

These signals are the Carrier Detect Signal (CD), asserted by modems to

signal a successful connection to another modem, Ring Indicator (RI), asserted

by modems to signal the phone ringing, Data Set Ready (DSR), asserted by

modems to show their presence, Clear To Send (CTS), asserted by modems if

they can receive data, Data Terminal Ready (DTR), asserted by terminals to

show their presence, Request To Send (RTS), asserted by terminals if they can

receive data. The section RS232 Cabling describes these signals and how they

are connected.

li

Page 52: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

The above paragraph alluded to hardware flow control. Hardware flow

control is a method that two connected devices use to tell each other

electronically when to send or when not to send data. A modem in general drops

(logical 0) its CTS line when it can no longer receive characters. It re-asserts it

when it can receive again. A terminal does the same thing instead with the RTS

signal. Another method of hardware flow control in practice is to perform the

same procedure in the previous paragraph except that the DSR and DTR

signals.

Note that hardware flow control requires the use of additional wires. The

benefit to this however is crisp and reliable flow control. Another method of

flow control used is known as software flow control. This method requires a

simple 3 wire serial communication link, transmit data, receive data, and signal

ground. If using this method, when a device can no longer receive, it will

transmit a character that the two devices agreed on. This character is known as

the XOFF character. This character is generally a hexadecimal 13. When a

device can receive again it transmits an XON character that both devices agreed

to. This character is generally a hexadecimal 11.

4.2 NULL MODEM:

Serial communications with RS232. One of the oldest and most widely

spread communication methods in computer world. The way this type of

communication can be performed is pretty well defined in standards. I.e. with

one exception. The standards show the use of DTE/DCE communication, the

way a computer should communicate with a peripheral device like a modem.

For your information, DTE means Data Terminal Equipment (computers etc.)

where DCE is the abbreviation of Data Communication Equipment (modems).

lii

Page 53: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

One of the main uses of serial communication today where no modem is

involved—a serial null modem configuration with DTE/DTE communication—is

not so well defined, especially when it comes to flow control. The terminology

null modem for the situation where two computers communicate directly is so

often used nowadays, that most people don't realize anymore the origin of the

phrase and that a null modem connection is an exception, not the rule.

In history, practical solutions were developed to let two computers talk

with each other using a null modem serial communication line. In most

situations, the original modem signal lines are reused to perform some sort of

handshaking. Handshaking can increase the maximum allowed communication

speed because it gives the computers the ability to control the flow of

information. A high amount of incoming data is allowed if the computer is

capable to handle it, but not if it is busy performing other tasks. If no flow

control is implemented in the null modem connection, communication is only

possible at speeds at which it is sure the receiving side can handle the amount

information even under worst case conditions.

4.3 RS232:

When we look at the connector pin out of the RS232 port, we see two

pins which are certainly used for flow control. These two pins are RTS, request

to send and CTS, clear to send. With DTE/DCE communication (i.e. a computer

communicating with a modem device) RTS is an output on the DTE and input

on the DCE. CTS are the answering signal coming from the DCE.

Before sending a character, the DTE asks permission by setting its RTS

output. No information will be sent until the DCE grants permission by using

the CTS line.

If the DCE cannot handle new requests, the CTS signal will go low. A

simple but useful mechanism allowing flow control in one direction. The

liii

Page 54: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

assumption is that the DTE can always handle incoming information faster than

the DCE can send it. In the past, this was true. Modem speeds of 300 baud were

common and 1200 baud was seen as a high speed connection.

For further control of the information flow, both devices have the ability

to signal their status to the other side. For this purpose, the DTR data terminal

ready and DSR data set ready signals are present. The DTE uses the DTR signal

to signal that it is ready to accept information, whereas the DCE uses the DSR

signal for the same purpose. Using these signals involves not a small protocol of

requesting and answering as with the RTS/CTS handshaking. These signals are

in one direction only.

The last flow control signal present in DTE/DCE communication is the

CD carrier detect. It is not used directly for flow control, but mainly an

indication of the ability of the modem device to communicate with its counter

part. This signal indicates the existence of a communication link between two

modem devices.

4.4 NULL MODEM WITHOUT HANDSHAKING:

How to use the handshaking lines in a null modem configuration? The

simplest way is to don't use them at all. In that situation, only the data lines and

signal ground are cross connected in the null modem communication cable. All

other pins have no connection. An example of such a null modem cable without

handshaking can be seen in the figure below.

liv

Page 55: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Connector 1Connector

2Function

2 3 Rx TX

3 2 TX Rx

5 5 Signal ground

Fig.4.1. Simple null modem without handshaking

4.5 COMPATIBILITY ISSUES:

If you read about null modems, this three wire null modem cable is often

talked about. Yes, it is simple but can we use it in all circumstances? There is a

problem, if either of the two devices checks the DSR or CD inputs. These

signals normally define the ability of the other side to communicate. As they are

not connected, their signal level will never go high. This might cause a problem.

The same holds for the RTS/CTS handshaking sequence. If the software

on both sides is well structured, the RTS output is set high and then a waiting

cycle is started until a ready signal is received on the CTS line. This causes the

software to hang because no physical connection is present to either CTS line to

make this possible. The only type of communication which is allowed on such a

null modem line is data-only traffic on the cross connected Rx/TX lines.

lv

Page 56: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

This does however not mean that this null modem cable is useless.

Communication links like present in the Norton Commander program can use

this null modem cable. This null modem cable can also be used when

communicating with devices which do not have modem control signals like

electronic measuring equipment etc.

As you can imagine, with this simple null modem cable no hardware flow

control can be implemented. The only way to perform flow control is with

software flow control using the XOFF and XON characters.

lvi

Page 57: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-5

lvii

Page 58: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-5

SOFTWARE CODING

#include<REG420.h>

#include<stdio.h>

#include<string.h>

#include <stdlib.h>

Sbit DEV = P0^0;

Void SBUF1_puts(unsigned char *);

Void Gets (unsigned char *, unsigned char);

Unsigned char Get_USART_char_1 (void);

Unsigned char Get_USART_char_0 (void);

//***************VARIABLE DECLARATION**************//

Unsigned char temp=0, Count=0, Flag=0,Flag1=0,RecDat;

Unsigned char Str_Array [30],y[45];

Unsigned char *ptr;

//***************FUNCTION DECLARATION**************//

Void init_comms(void);

Void Delay_ms12M(unsigned int);

lviii

Page 59: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Void Transmit_0(unsigned char);

Void Transmit_1(unsigned char);

Void Send_SMS(void);

//code unsigned char *Send_msg = 0XAB; //Change the number here

//code unsigned char *Send_msg1 = 0XB1;

//****************MAIN FUNCTION********************//

Void main()

{

Delay_ms12M (100);

init_comms ();

P0 = 0x00;

DEV=1;

Transmit_1 ('L');

While (1){

While (Flag1==0); Send_SMS ();

}

}

lix

Page 60: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

//**************INTERRUPT FUNCTION*************//

Void Receive(void) interrupt 4

{

if (RI_0)

{

Temp = SBUF0;

//Receive the first character

if (temp == 'L')

{

ES0 = 0;

Gets(y,0);

While(!(strchr(y,'L'))) Gets(y,0);

ptr = strchr(y,'L')+ 2;

Flag = 1;

Flag1 = 1;

}

RI_0 = 0;

}

}

Void Serial_1() interrupt 7

lx

Page 61: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

{

if(RI_1)

{

RecDat = SBUF1;

if(RecDat == 'V')

{

Flag1=1;

}

else if(RecDat == 'S')

{

DEV=0;

}

RI_1 = 0;

}

}

void init_comms(void)

{

EA = 1;

ES0 = 0; ES1 = 1;

lxi

Page 62: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

PCON |= 0x80;

SCON0 = 0x50; //SERIAL CONN MODE 1 - SERIAL 0 (1 START, 8-

DATA, 1 STOP BIT)

SCON1 = 0x50; //SERIAL CONN MODE 1 - SERIAL 1 (START, 8-DATA,

1 STOP BIT)

TMOD |= 0x21; //TIMER 1 MODE 2, 8-BIT AUTO RELOAD MODE

TH1 = 0xFD; //11.0592 MHz at serial0(19200), serial1(9600) baud rate.

TCON = 0x50;

}

void Delay_ms12M(unsigned int del)

{

int j;

while(del>0)

{

del--;

for(j=0;j<110;j++);

}

}

lxii

Page 63: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Void SBUF1_puts(const unsigned char *string)

{

While(*string)

Transmit_1(*string++);

}

Void Gets(unsigned char *string, unsigned char n)

{

Unsigned char i=0,J=0;

Do

{

if(n==1)

*(string+i)= Get_USART_char_1();

else

*(string+i)= Get_USART_char_0();

J = *(string+i); //Transmit_0(J);

i++;

}while((J!='\n') && (J!='\r') && (J!=EOF));

i++;

*(string+i) = NULL;

}

Unsigned char Get_USART_char_1(void)

{

unsigned char c;

lxiii

Page 64: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

while(!RI_1);

c = SBUF1; RI_1 = 0;

return c;

}

unsigned char Get_USART_char_0(void)

{

unsigned char c;

while(!RI_0);

c = SBUF0; RI_0 = 0;

return c;

}

Void Transmit_1(unsigned char dat)

{

SBUF1 = dat;

while(TI_1==0);

TI_1 = 0;

Delay_ms12M(2);

}

void Send_SMS(void)

{

ES0 = 1;

while(Flag==0); Flag = 0;

Transmit_1(0XAB);

Transmit_1(0XB1);

lxiv

Page 65: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

SBUF1_puts(ptr);

}

lxv

Page 66: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-6

CHAPTER-6

SOFTWARE TOOLS

lxvi

Page 67: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

6.1 TYPES OF TOOLS:

KEIL C

Flash Magic

ORCAD

Capture

Layout

6.1.1 KEIL C:

Keil software is the leading vendor for 8/16-bit development tools

(ranked at first position in the 2004 embedded market study of the embedded

system and EE times magazine).

Keil software is represented world wide in more than 40 countries, since

the market introduction in 1988; the keil C51 compiler is the de facto industry

standard and supports more than 500 current 8051 device variants. Now, keil

software offers development tools for ARM.

Keil software makes C compilers, macro assemblers, real-time kernels,

debuggers, simulators, integrated environments, and evaluation boards for

8051, 251, ARM and XC16x/C16x/ST10 microcontroller families.

The Keil C51 C Compiler for the 8051 microcontroller is the most

popular 8051 C compiler in the world. It provides more features than any other

8051 C compiler available today.

The C51 Compiler allows you to write 8051 microcontroller applications

in C that, once compiled, have the efficiency and speed of assembly language.

lxvii

Page 68: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Language extensions in the C51 Compiler give you full access to all resources

of the 8051.

The C51 Compiler translates C source files into relocatable object

modules which contain full symbolic information for debugging with the

µVision Debugger or an in-circuit emulator. In addition to the object file, the

compiler generates a listing file which may optionally include symbol table and

cross reference

Nine basic data types, including 32-bit IEEE floating-point,

Flexible variable allocation with bit, data, bdata, idata, xdata, and pdata memory types,

Interrupt functions may be written in C, Full use of the 8051 register banks,

Complete symbol and type information for source-level debugging,

Use of AJMP and ACALL instructions,

Bit-addressable data objects, Built-in interface for the RTX51 real time kernels,

Support for the Philips 8xC750, 8xC751, and 8xC752 limited instruction sets,

Support for the Infineon 80C517 arithmetic unit.

6.1.2 FLASH MAGIC:

Flash magic can control the entry into ISP mode of some microcontroller

devices by using the COM port handshaking signals to control the device.

Typically the handshaking signals are used to control such pins as Reset, PSEN

and VCC. The exact pins used depend on the specific device.

lxviii

Page 69: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

When this feature is supported, Flash Magic will automatically place the

device into ISP mode at the beginning of an ISP operation. Flash Magic will

then automatically cause the device to execute code at the end of the ISP

operation.

6.1.3 ORCAD:

ORCAD really consists of tools. Capture is used for design entry in

schematic form. You will probably be already familiar with looking at circuits

in this form from working with other tools in your university courses. Layout is

a tool for designing the physical layout of components and circuits on a PCB.

During the design process, you will move back and forth between these two

tools. The design flow diagram is given below:

Fig.6.1. Design window of ORCAD

6.1.4 DESIGN FLOW OF ORCAD:

lxix

Page 70: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

lxx

Page 71: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-7

lxxi

Page 72: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-7

HARDWARE TOOLS:

WEB CAMERA

GPS MODULE

GSM MODEM

INTEGRATING UNIT

7.1 GPS MODULE:

The Global Positioning System (GPS) comprises three segments:

The space segment (all functional satellites)

The control segment (all ground stations involved in the monitoring of

the system master control station, Monitor stations, and ground control

stations)

The user segment (all civil and military GPS users).

GPS Was developed by the U.S. Department of Defense (DOD) and can

be used both by civilians and military Personnel. The civil signal SPS

(Standard Positioning Service) can be used freely by the general public,

whilst the Military signal PPS (Precise Positioning Service) can only is used

by authorized government agencies. The first Satellite was placed in orbit

on 22nd February 1978, and there are currently 28 operational satellites

orbiting the Earth at a height of 20,180 km on 6 different orbital planes.

Their orbits are inclined at 55° to the equator, ensuring that at least 4

satellites are in radio communication with any point on the planet.

lxxii

Page 73: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

During the development of the GPS system, particular emphasis was

placed on the following three aspects:

a) It had to provide users with the capability of determining position, speed

and time, whether in motion at rest.

b) It had to have a continuous, global, 3-dimensional positioning capability

with a high degree of accuracy, Irrespective of the weather.

c) It had to offer potential for civilian use

7.2 GPS SEGMENTS:

Fig.7.1. GPS segments

lxxiii

Page 74: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

7.3 SPACE SEGMENT:

7.3.1 SATELLITE MOVEMENT:

The space segment currently consists of 28_operational_ satellites

orbiting the Earth on 6 different Orbital planes (four to five satellites per

plane).They orbit at a height of 20,180 km above the Earth’s surface and Are

inclined at 55° to the equator. Any one satellite completes its orbit in around 12

hours. Due to the rotation Of the Earth, a satellite will be at its initial starting

position after approx. 24 hours (23_ hours_ 56_Minutes to be precise).

Fig.7.2 Position of the 28 GPS satellites at 12.00 hrs UTC

Satellite signals can be received anywhere within a satellite’s effective

range. Above shows the effective range (shaded area) of a satellite located

directly above the equator zero meridian intersection. The distribution of the 28

satellites at any given time is shown in below figure. It is due to this ingenious

pattern of distribution and to the great height at which they orbit that

communication with at least 4 satellites is ensured at all times anywhere in the

world.

lxxiv

Page 75: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

7.3.2 GPS SATELLITES:

7.3.2.1CONSTRUCTION OF SATELLITES:

All 28 satellites transmit time signals and data synchronized by on board

atomic Clocks at the same frequency (1575.42_ MHz). The minimum signal

strength received on Earth is approx. -158dBW to -160dBW. In accordance

with the specification, the maximum strength is approx.-153dBW.

Fig.7.3. GPS Satellite

7.3.2.2 GENERATING THE SATEELITE SIGNAL:

7.3.2.2.1 SIMPLIFIED BLOCK DIAGRAM:

On board the satellites are four highly accurate atomic clocks. The

following time pulses and frequencies required for day-to-day operation are

derived from the resonant frequency of one of our atomic clocks:

• The 50 Hz data pulse

• The C/A code pulse (Coarse/Acquisition code, PRN-Code, coarse reception

code at a frequency of 1023 MHz), which modulates the data using an

exclusive-or operation (this spreads the data over a 1MHz Bandwidth)

lxxv

Page 76: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

• The frequency of the civil L1 carrier(1575.42_MHz) The data modulated by

the C/A code modulates the L1 carrier in turn by using Bi-Phase-Shift-Keying

(BPSK). With every change in the modulated data there is a 180° change in the

L1 carrier phase.

Fig.7.4.Block Diagram of Satellite

7.4 CONTROL SEGMENTS:

The control segment (Operational Control System OCS) consists of a

Master Control Station located in the state of Colorado, five monitor stations

equipped with atomic clocks that are spread around the globe in the vicinity of

the equator and three grounds control stations that transmit information to the

satellites. The most important tasks of the control segment are:

• Observing the movement of the satellites and computing orbital data

(ephemeris)

• Monitoring the satellite clocks and predicting their behavior

• Synchronizing on board satellite time

lxxvi

Page 77: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

• Relaying the approximate orbital data of all satellites (almanac)

• Relaying further information, including satellite health, clock errors etc.

The control segment also oversees the artificial distortion of signals (SA,

Selective Availability), in order to degrade the system’s positional accuracy for

civil use. System accuracy had been intentionally degraded up until May 2000

for political and tactical reasons by the U.S. Department of Defense (DOD), the

satellite operators. It was shut down in May 2000, but it can be started up again,

if necessary, either on a global or regional basis. 7.5 USER SEGMENTS:

The signals transmitted by the satellites take approx. 67 milliseconds to

reach a receiver. As the signals travel at the speed of light, their transit time

depends on the distance between the satellites and the user. Four different

signals are generated in the receiver having the same structure as those received

from the 4 satellites. By synchronizing the signals generated in the receiver with

those from the satellites, the four satellite signal time shifts ∆t are measured as a

timing mark. The measured time shifts ∆t of all 4 satellite signals are used to

determine signal transit time.

7.6 GSM MODEM:

7.6.1 DEFINITION:

Global system for mobile communication (GSM) is a globally accepted

standard for digital cellular communication. GSM is the name of a

standardization group established in 1982 to create a common European mobile

telephone standard that would formulate specifications for a pan-European

mobile cellular radio system operating at 900 MHz.

lxxvii

Page 78: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

7.6.2 THE GSM NETWORK

GSM provides recommendations, not requirements. The GSM specifications

define the functions and interface requirements in detail but do not address the

hardware. The reason for this is to limit the designers as little as possible but

still to make it possible for the operators to buy equipment from different

suppliers. The GSM network is divided into three major systems: the switching

system (SS), the base station system (BSS), and the operation and support

system (OSS). The basic GSM network elements are shown in below figure

GSM Network Elements

7.6.3 GSM MODEM:

A GSM modem is a wireless modem that works with a GSM wireless

network. A wireless modem behaves like a dial-up modem. The main difference

between them is that a dial-up modem sends and receives data through a fixed

telephone line while a wireless modem sends and receives data through radio

waves.

A GSM modem can be an external device or a PC Card / PCMCIA Card.

Typically, an external GSM modem is connected to a computer through a serial

lxxviii

Page 79: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

cable or a USB cable. A GSM modem in the form of a PC Card / PCMCIA

Card is designed for use with a laptop computer. It should be inserted into one

of the PC Card / PCMCIA Card slots of a laptop computer. Like a GSM mobile

phone, a GSM modem requires a SIM card from a wireless carrier in order to

operate.

As mentioned in earlier sections of this SMS tutorial, computers use AT

commands to control modems. Both GSM modems and dial-up modems

support a common set of standard AT commands. You can use a GSM modem

just like a dial-up modem.

In addition to the standard AT commands, GSM modems support an

extended set of AT commands. These extended AT commands are defined in

the GSM standards. With the extended AT commands, you can do things like:

Reading, writing and deleting SMS messages.

Sending SMS messages.

Monitoring the signal strength.

Monitoring the charging status and charge level of the battery.

Reading, writing and searching phone book entries.

The number of SMS messages that can be processed by a GSM modem

per minute is very low -- only about six to ten SMS messages per minute.

7.6.4 GSM MODEM APPLICATIONS:

lxxix

Page 80: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

7.6.5 FACTS AND APPLICATIONS OF GSM/GPRS MODEM:

The GSM/GPRS Modem comes with a serial interface through which the

modem can be controlled using AT command interface. An antenna and a

power adapter are provided. The basic segregation of working of the modem is

as under

• Voice calls

• SMS

• GSM Data calls

• GPRS

Voice calls:

lxxx

Page 81: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

` Voice calls are not an application area to be targeted. In future if

interfaces like a microphone and speaker are provided for some applications

then this can be considered.

SMS:

SMS is an area where the modem can be used to provide features like:

• Pre-stored SMS transmission

• These SMS can be transmitted on certain trigger events in an

automation system

• SMS can also be used in areas where small text information has to be

sent. The transmitter can be an automation system or machines like vending

machines, collection machines or applications like positioning systems where

The navigator keeps on sending SMS at particular time intervals. SMS can be a

solution where GSM data call or GPRS services are not available

7.6.6 APPLICATIONS:

Access control devices:

Now access control devices can communicate with servers and security

staff through SMS messaging. Complete log of transaction is available at the

head-office Server instantly without any wiring involved and device can

instantly alert security personnel on their mobile phone in case of any problem.

RaviRaj Technologies is introducing this technology in all Fingerprint Access

control and time attendance products.

Transaction terminals:

lxxxi

Page 82: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

EDC machines, POS terminals can use SMS messaging to confirm

transactions from central servers. The main benefit is that central server can be

anywhere in the world. Today you need local servers in every city with multiple

telephone lines. You save huge infrastructure costs as well as per transaction

cost.

Supply Chain Management:

Today SCM require huge IT infrastructure with leased lines, networking

devices, data centre, workstations and still you have large downtimes and high

costs. You can do all this at a fraction of the cost with GSM M2M

technology. A central server in your head office with GSM capability is the

answer; you can receive instant transaction data from all your branch officers,

warehouses and business associates with nil downtime, Low cost

7.7 APPLICATIONS SUITABLE FOR GSM COMMUNICATION:

If your application needs one or more of the following features, GSM will

be more cost-effective then other communication systems.

Short Data Size:

You data size per transaction should be small like 1-3 lines. e.g. banking

transaction data, sales/purchase data, consignment tracking data, updates. These

small but important transaction data can be sent through SMS messaging which

cost even less then a local telephone call or sometimes free of cost worldwide.

Hence with negligible cost you are able to send critical information to your head

office located anywhere in the world from multiple points.

You can also transfer faxes, large data through GSM but this will be as or

more costly compared to landline networks.

lxxxii

Page 83: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Multiple remote data collection points:

If you have multiple data collections points situated all over your city,

state, country or worldwide you will benefit the most. The data can be sent from

multiple points like your branch offices, business associates, warehouses, and

agents with devices like GSM modems connected to PCs, GSM electronic

terminals and Mobile phones. Many a times some places like warehouses may

be situated at remote location may not have landline or internet but you will

have GSM network still available easily.

High uptime:

If your business require high uptime and availability GSM is best suitable

for you as GSM mobile networks have high uptime compared to landline,

internet and other communication mediums. Also in situations where you

expect that someone may sabotage your communication systems by cutting

wires or taping landlines, you can depend on GSM wireless communication.

Large transaction volumes:

GSM SMS messaging can handle large number of transaction in a very

short time. You can receive large number SMS messages on your server like e-

mails without internet connectivity. E-mails normally get delayed a lot but SMS

messages are almost instantaneous for instant transactions. Consider situation

like shop owners doing credit card transaction with GSM technology instead of

conventional landlines. time you find local transaction servers busy as these

servers use multiple telephone lines to take care of multiple transactions,

whereas one GSM connection is enough to handle hundreds of transaction.

Mobility, Quick installation:

lxxxiii

Page 84: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

GSM technology allows mobility, GSM terminals, modems can be just

picked and installed at other location unlike telephone lines. Also you can be

mobile with GSM terminals and can also communicate with server using your

mobile phone. You can just purchase the GSM hardware like modems,

terminals and mobile handsets, insert SIM cards, configure software and your

are ready for GSM communication.

lxxxiv

Page 85: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-8

CHAPTER-8

CONCLUSION

lxxxv

Page 86: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

From this we implement image-recognition techniques that can provide

the important functions required by advanced intelligent Car Security, to avoid

vehicle theft and protect the usage of unauthenticated users.

Secured and safety environment system for automobile users and also key

points for the investigators can easily find out the hijackers image. We can

predict the theft by using this system in our day to day life.

This project will help to reduce the complexity and improve security, also

much cheaper and ‘smarter’ than traditional ones.

lxxxvi

Page 87: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-9

CHAPTER-9

APPENDIX

COMPONENT LIST :

lxxxvii

Page 88: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

1) Micro controller(AT 89S51)

2) Interfacing IC (IC MAX232)

3) Transformer (230v/5v, 1A)

4) Toggle switch

5) RS232 Cable.

lxxxviii

Page 89: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

CHAPTER-10

CHAPTER-10

REFERENCES

BOOK REFERENCE :

Bio ID Face Database

lxxxix

Page 90: read.pudn.comread.pudn.com/downloads337/doc/1474954/MODEL REPORT... · Web viewread.pudn.com

Zhang Yu, “Research on High Level Model and Performance Estimation”

Southeast University PHD thesis, 2007.

Teresko, J., "Winning with wireless," Industry Week, 252(6), Available

ProQuest, 2003.

WEB REFERENCES:

www.atmel.com

www.dallas.com

www.gsmfavorites.com

www.gpsfavorities.com

www.holtek.com

www.microcontroller.com

xc