Project Eye...
Project Eye...
Project Eye...
ABSTRACT
Now a days, every system is automated in order to face new challenges in the present
day situation. Automated systems have less manual operations, so that the flexibility,
reliabilities are high and accurate. Hence every field prefers automated control systems.
Especially in the field of electronics automated systems are doing better performance
increasingly.
This system can be mounted at any place/room that needs to be monitored. For example
the house owner can mount this electronic eye or PIR sensor at one of the corners of the room
so that it can cover monitoring the entire room area. Whenever a human being enters inside the
room, this system senses the Passive Infrared rays emitted from the human body. The system
also monitors the LPG gas leakages using gas detection sensor, fire using temperature sensor,
in any Industry or Home and if it exceeds the threshold level, it alerts. This sensors output is
given to the Microcontroller for further processing. Microcontroller takes necessary action like
sending SMS based alarm messages for twice and automatically dials to the pre-programmed
phone numbers. The Microcontroller is programmed using Embedded C language. This system
works well both at day and night (dark light) timing. The phone numbers to which this system
should dial-up can be pre-programmed. By this way we can take the prevention steps before
occurrence of the major fire accidents and we can avoid the human losses and financial losses.
The application program for the microcontroller will be written in embedded ‘C’ and will be
stored in the flash memory of the microcontroller.
ii
1.INTRODUCTION
2.BLOCK DIAGRAM
LCD DISPLAY
POWER SUPPLY (16*2 LINES)
GAS SENSOR
LEDS
MAX 232: The microcontroller can communicate with the serial devices using its single Serial
Port. The logic levels at which this serial port operates is TTL logics. But some of the serial
devices operate at RS 232 Logic levels. For example PC and GSM etc. So in order to
communicate the Microcontroller with either GSM modem or PC, a mismatch between the
2
Logic levels occurs. In order to avoid this mismatch, in other words to match the Logic levels,
a Serial driver is used. And MAX 232 is a Serial Line Driver used to establish communication
between microcontroller and PC (or GSM)
LCD Display: This section is basically meant to show up the status of the project. This project
makes use of Liquid Crystal Display to display / prompt for necessary information. Fire
sensor: Smoke sensor is used to detect any leakage of smoke and any hazardous gases such
that an alarm can be initiated to avoid any damages in the industries. These sensors are also
used in many applications like corporate and in any office work areas these are linked to fire
alarms
GSM modem Section: This section consists of a GSM modem. The modem will communicate
with microcontroller using serial communication. The modem is interfaced to microcontroller
using MAX 232, a serial driver. The Global System for Mobile Communications is a TDMA
based digital wireless network technology that is used for communication between the cellular
devices. GSM phones make use of a SIM card to identify the user's account.
PIR sensor: A Passive Infra Red sensor (PIR sensor) is an electronic device that measures
infrared (IR) light radiating from objects in its field of view. PIR sensors are often used in the
construction of PIR-based motion detectors (see below). Apparent motion is detected when an
infrared source with one temperature, such as a human, passes in front of an infrared source
with another temperature, such as a wall.
3.HARDWARE COMPONENTS
3.1.Microcontroller (LPC 2148)
ARM stands for Advanced RISC Machines. It is a 32 bit processor core, used for high
end application. It is widely used in Advanced Robotic Applications.
Key features:
• 16-bit/32-bit ARM7TDMI-S microcontroller in a tiny LQFP64 package.
• 8 kB to 40 kB of on-chip static RAM and 32 kB to 512 kB of on-chip flash memory.
• 128-bit wide interface/accelerator enables high-speed 60 MHz operation.
• In-System Programming/In-Application Programming (ISP/IAP) via on-chip boot
loader software. Single flash sector or full chip erase in 400 ms and programming of
256 bytes in 1 ms.
3
• Embedded ICE RT and Embedded Trace interfaces offer real-time debugging with the
on-chip Real Monitor software and high-speed tracing of instruction execution.
• USB 2.0 Full-speed compliant device controller with 2 kB of endpoint RAM.
• In addition, the LPC2146/48 provides 8 kB of on-chip RAM accessible to USB by
DMA.
• One or two (LPC2141/42 vs. LPC2144/46/48) 10-bit ADCs provide a total of 6/14
analog inputs, with conversion times as low as 2.44 μs per channel.
• Single 10-bit DAC provides variable analog output (LPC2142/44/46/48 only).
• Two 32-bit timers/external event counters (with four capture and four compare channels
each), PWM unit (six outputs) and watchdog.
• Low power Real-Time Clock (RTC) with independent power and 32 kHz clock input.
• Multiple serial interfaces including two UARTs (16C550), two Fast I2C-bus (400
kbit/s),
• SPI and SSP with buffering and variable data length capabilities.
• Vectored Interrupt Controller (VIC) with configurable priorities and vector addresses.
• Up to 45 of 5 V tolerant fast general purpose I/O pins in a tiny LQFP64 package.
• Up to 21 external interrupt pins available.
• 60 MHz maximum CPU clock available from programmable on-chip PLL with settling
time of 100 μs.
• On-chip integrated oscillator operates with an external crystal from 1 MHz to 25 MHz.
• Power saving modes include Idle and Power-down.
4
Fig 2.Micro-Controller LPC2148 Pin Diagram
5
Block diagram:
6
- Barrel Shifter is basically a combinational logic circuit, which can shift data to left
or right by arbitrary number of position in same cycle.
• Increment or Decrement logic can update register content for sequential access.
Pipeline:
• In ARM 7, a 3 stage pipeline is used. A 3 stage pipeline is the simplest form of pipeline
that does not suffer from the problems such as read before write.
• In a pipeline, when one instruction is executed, second instruction is decoded and third
instruction will be fetched.
• This is executed in a single cycle.
Register Bank:
• ARM 7 uses load and store Architecture.
• Data has to be moved from memory location to a central set of registers.
• Data processing is done and is stored back into memory.
• Register bank contains, general purpose registers to hold either data or address.
• It is a bank of 16 user registers R0-R15 and 2 status registers.
• Each of these registers is 32 bit wide.
7
N - Negative Result from ALU
Z - Zero result from ALU
C - ALU operation carried out
V - ALU operation overflowed
T- Bit
If
T=0, Processor in ARM Mode.
T=1, Processor in THUMB Mode
8
Measures the passage of time to maintain a calendar and clock.
Ultra Low Power design to support battery powered systems
Provides Seconds, Minutes, Hours, Day of Month, Month, Year, Day of Week, and Day of Year
Dedicated 32 kHz oscillator or programmable pre-scaler from VPB clock.
Dedicated power supply pin can be connected to a battery or to the main 3.3 V Description:
On, and optionally when it is off. It uses little power in Power-down mode. On the
LPC2141/2/4/6/8, the RTC can be clocked by a separate 32.768 KHz oscillator, or by a
programmable prescale divider based on the VPB clock. Also, the RTC is powered by it’s,
which can be connected to a battery or to the same 3.3 V supply used by the rest of the device.
Block Diagram:
3.4.Power Supply
The power supply is designed to convert high voltage AC mains electricity to a suitable
low voltage supply for electronic circuits and other devices. A power supply can by broken
down into a series of blocks, each of which performs a particular function. A D.C. power supply
which maintains the output voltage constant irrespective of a.c mains fluctuations or load
9
variations is known as “Regulated D.C Power Supply” For example a 5V regulated power
supply system as shown below:
3.5.Transformer
A transformer is an electrical device which is used to convert electrical power from one
electrical circuit to another without change in frequency.
Transformers convert AC electricity from one voltage to another with little loss of
power. Transformers work only with AC and this is one of the reasons why mains electricity is
AC. Step-up transformers increase in output voltage, step-down transformers decrease in
output voltage. Most power supplies use a step-down transformer to reduce the dangerously
high mains voltage to a safer low voltage. The input coil is called the primary and the output
coil is called the secondary. There is no electrical connection between the two coils; instead
they are linked by an alternating magnetic field created in the soft-iron core of the transformer.
The two lines in the middle of the circuit symbol represent the core.
Transformers waste very little power so the power out is (almost) equal to the power in. Note
that as voltage is stepped down current is stepped up. The ratio of the number of turns on each
coil, called the turn’s ratio, determines the ratio of the voltages. A step-down transformer has
a large number of turns on its primary (input) coil which is connected to the high voltage mains
supply, and a small number of turns on its secondary (output) coil to give a low output voltage.
10
Fig 6 : An Electrical Transformer
3.6.Rectifier
A circuit, which is used to convert a.c to dc, is known as RECTIFIER. The process of
conversion a.c to d.c is called “rectification” Types of Rectifiers:
• Half wave Rectifier
• Full wave rectifier
1. Center tap full wave rectifier.
2. Bridge type full bridge rectifier.
Full-wave Rectifier:
From the above comparisons we came to know that full wave bridge rectifier as more
advantages than the other two rectifiers. So, in our project we are using full wave bridge
rectifier circuit.
Bridge Rectifier:
A bridge rectifier makes use of four diodes in a bridge arrangement to achieve fullwave
rectification. This is a widely used configuration, both with individual diodes wired as shown
and with single component bridges where the diode bridge is wired internally.
A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig(7)
to achieve full-wave rectification. This is a widely used configuration, both with individual
diodes wired as shown and with single component bridges where the diode bridge is wired
internally.
11
Fig 7.Bridge Rectifier
Operation:
During positive half cycle of secondary, the diodes D2 and D3 are in forward biased
while D1 and D4 are in reverse biased as shown in the fig(7.1). The current flow direction is
shown in the fig (b) with dotted arrows.
During negative half cycle of secondary voltage, the diodes D1 and D4 are in forward
biased while D2 and D3 are in reverse biased as shown in the fig(7.2). The current flow
direction is shown in the fig (c) with dotted arrows.
12
Filter:
A Filter is a device, which removes the a.c component of rectifier output but allows the
d.c component to reach the load.
Capacitor Filter:
We have seen that the ripple content in the rectified output of half wave rectifier is 121%
or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples
is not acceptable for most of the applications. Ripples can be removed by one of the following
methods of filtering:
(a) A capacitor, in parallel to the load, provides an easier by –pass for the ripples voltage though
it due to low impedance. At ripple frequency and leave the d.c.to appears the load. (b) An
inductor, in series with the load, prevents the passage of the ripple current (due to high
impedance at ripple frequency) while allowing the d.c (due to low resistance to d.c)
(c) various combinations of capacitor and inductor, such as L-section filter section filter,
multiple section filter etc. which make use of both the properties mentioned in (a) and (b)
above. Two cases of capacitor filter, one applied on half wave rectifier and another with full
wave rectifier.
Filtering is performed by a large value electrolytic capacitor connected across the DC
supply to act as a reservoir, supplying current to the output when the varying DC voltage from
the rectifier is falling. The capacitor charges quickly near the peak of the varying DC, and thenS
discharges as it supplies current to the output. Filtering significantly increases the average DC
voltage to almost the peak value (1.4 × RMS value).
To calculate the value of capacitor(C),
C = ¼*√3*f*r*Rl
Where, f = supply frequency,
r = ripple factor,
Rl = load resistance
Note: In our circuit we are using 1000microfarads.
3.7.Regulator
Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output
voltages. The maximum current they can pass also rates them. Negative voltage regulators are
available, mainly for use in dual supplies. Most regulators include some automatic protection
13
from excessive current ('overload protection') and overheating ('thermal protection'). Many of
the fixed voltage regulator ICs have 3 leads and look like power transistors, such as the 7805
+5V 1A regulator shown on the right. The LM7805 is simple to use. You simply connect the
positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the
Input pin, connect the negative lead to the Common pin and then when you turn on the power,
you get a 5 volt supply from the output pin.
78XX:
The Bay Linear LM78XX is integrated linear positive regulator with three terminals.
The LM78XX offer several fixed output voltages making them useful in wide range of
applications. When used as a zener diode/resistor combination replacement, the LM78XX
usually results in an effective output impedance improvement of two orders of magnitude,
lower quiescent current. The LM78XX is available in the TO-252, TO-220 & TO263packages.
Features:
• Output Current of 1.5A
• Output Voltage Tolerance of 5%
• Internal thermal overload protection
• Internal Short-Circuit Limited
• No External Component
• Output Voltage 5.0V, 6V, 8V, 9V, 10V, 12V, 15V, 18V, 24V
• Offer in plastic TO-252, TO-220 & TO-263
• Direct Replacement for LM78XX
14
3.8.Liquid Crystal Display(LCD)
Liquid crystal displays (LCDs) have materials, which combine the properties of both
liquids and crystals. Rather than having a melting point, they have a temperature range within
which the molecules are almost as mobile as they would be in a liquid, but are grouped together
in an ordered form similar to a crystal.
An LCD consists of two glass panels, with the liquid crystal material sand witched in between
them. The inner surface of the glass plates are coated with transparent electrodes which define
the character, symbols or patterns to be displayed polymeric layers are present in between the
electrodes and the liquid crystal, which makes the liquid crystal molecules to maintain a defined
orientation angle.
One each polarisers are pasted outside the two glass panels. These polarisers would rotate the
light rays passing through them to a definite angle, in a particular direction. When the LCD is
in the off state, light rays are rotated by the two polarisers and the liquid crystal, such that the
light rays come out of the LCD without any orientation, and hence the LCD appears transparent.
When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be
aligned in a specific direction. The light rays passing through the LCD would be rotated by the
polarisers, which would result in activating/ highlighting the desired characters.
The LCD’s are lightweight with only a few millimeters thickness. Since the LCD’s consume
less power, they are compatible with low power electronic circuits, and can be powered for
long durations.
The LCD’s don’t generate light and so light is needed to read the display. By using
backlighting, reading is possible in the dark. The LCD’s have long life and a wide operating
temperature range.
The LCDs used exclusively in watches, calculators and measuring instruments are the simple
seven-segment displays, having a limited amount of numeric data. The recent advances in
technology have resulted in better legibility, more information displaying capability and a
wider temperature range. These have resulted in the LCDs being extensively used in
telecommunications and entertainment electronics. The LCDs have even started replacing the
cathode ray tubes (CRTs) used for the display of text and graphics, and also in small TV
applications.
15
3.8.1.LCD Operation
In recent years the LCD is finding widespread use replacing LEDs(seven-segment LEDs or
other multi-segment LEDs).This is due to the following reasons:
1. The declining prices of LCDs.
2. The ability to display numbers, characters and graphics. This is in contract
to LEDs, which are limited to numbers and a few characters.
3. Incorporation of a refreshing controller into the LCD, there by
relieving the CPU of the task of refreshing the LCD. In the contrast, the
LED must be refreshed by the CPU to keep displaying the data.
4. Ease of programming for characters and graphics.
3.8.2.Uses
The LCDs used exclusively in watches, calculators and measuring instruments are the
simple seven-segment displays, having a limited amount of numeric data. The recent advances
in technology have resulted in better legibility, more information displaying capability and a
wider temperature range. These have resulted in the LCDs being extensively used in
telecommunications and entertainment electronics. The LCDs have even started replacing the
cathode ray tubes (CRTs) used for the display of text and graphics, and also in small TV
applications.
3.8.3.LCD Interfacing
Sending commands and data to LCDs with a time delay:
16
Fig 9: Interfacing of LCD to a micro controller
3.9.1.Ionization Detectors
Ionization detectors have an ionization chamber and a source of ionizing radiation. The
source of ionizing radiation is a minute quantity of americium-241 (perhaps 1/5000th of a
gram), which is a source of alpha particles (helium nuclei). The ionization chamber consists of
two plates separated by about a centimeter. The battery applies a voltage to the plates, charging
one plate positive and the other plate negative. Alpha particles constantly released by the
americium knock electrons off of the atoms in the air, ionizing the oxygen and nitrogen atoms
17
in the chamber. The positively-charged oxygen and nitrogen atoms are attracted to the negative
plate and the electrons are attracted to the positive plate, generating a small, continuous electric
current. When smoke enters the ionization chamber, the smoke particles attach to the ions and
neutralize them, so they do not reach the plate. The drop in current between the plates triggers
the alarm.
3.9.2.Photoelectric Detectors
In one type of photoelectric device, smoke can block a light beam. In this case, the
reduction in light reaching a photocell sets off the alarm. In the most common type of
photoelectric unit, however, light is scattered by smoke particles onto a photocell, initiating an
alarm. In this type of detector there is a T-shaped chamber with a light-emitting diode (LED)
that shoots a beam of light across the horizontal bar of the T. A photocell, positioned at the
bottom of the vertical base of the T, generates a current when it is exposed to light. Under
smoke-free conditions, the light beam crosses the top of the T in an uninterrupted straight line,
not striking the photocell positioned at a right angle below the beam. When smoke is present,
the light is scattered by smoke particles, and some of the light is directed down the vertical part
of the T to strike the photocell. When sufficient light hits the cell, the current triggers the alarm.
Both ionization and photoelectric detectors are effective smoke sensors. Both types of
smoke detectors must pass the same test to be certified as UL smoke detectors. Ionization
detectors respond more quickly to flaming fires with smaller fire particles; photoelectric
detectors respond more quickly to smoldering fires. In either type of detector, steam or high
humidity can lead to condensation on the circuit board and sensor, causing the alarm to sound.
Ionization detectors are less expensive than photoelectric detectors, but some users purposely
disable them because they are more likely to sound an alarm from normal cooking due to their
sensitivity to minute smoke particles. However, ionization detectors have a degree of built-in
security not inherent to photoelectric detectors. When the battery starts to fail in an ionization
detector, the ion current falls and the alarm sounds, warning that it is time to change the battery
before the detector becomes ineffective. Back-up batteries may be used for photoelectric
detectors.
Sensitive material of MQ-3 gas sensor is SnO2, which with lower conductivity in clean
air. When the target alcohol gas exist, The sensor’s conductivity is more higher along with the
gas concentration rising. MQ-3 gas sensor has high sensitivity to Alcohol, and has good
18
resistance to disturb of gasoline, smoke and vapor. The sensor could be used to detect alcohol
with different concentration; it is with low cost and suitable for different application.
Good sensitivity to alcohol gas
Long life and low cost
Simple drive circuit
3.9.3.Basic test loop
Structure and configuration of MQ-3 gas sensor is shown as Fig. 11, sensor composed
by micro AL2O3 ceramic tube, Tin Dioxide (SnO2) sensitive layer, measuring electrode and
heater are fixed into a crust made by plastic and stainless steel net. The heater provides
necessary work conditions for work of sensitive components. The enveloped MQ-4 has 6 pin,
4 of them are used to fetch signals, and other 2 are used for providing heating current.
19
3.10.PIR sensor
A Passive InfraRed sensor (PIR sensor) is an electronic device that measures infrared
(IR) light radiating from objects in its field of view. PIR sensors are often used in the
construction of PIR-based motion detectors (see below). Apparent motion is detected when an
infrared source with one temperature, such as a human, passes in front of an infrared source
with another temperature, such as a wall.
All objects emit what is known as black body radiation. It is usually infrared radiation
that is invisible to the human eye but can be detected by electronic devices designed for such a
purpose. The term passive in this instance means that the PIR device does not emit an infrared
beam but merely passively accepts incoming infrared radiation. “Infra” meaning below our
ability to detect it visually, and “Red” because this color represents the lowest energy level that
our eyes can sense before it becomes invisible. Thus, infrared means below the energy level of
the color red, and applies to many sources of invisible energy.
In a PIR-based motion detector (usually called a PID, for Passive Infrared Detector),
the PIR sensor is typically mounted on a printed circuit board containing the necessary
electronics required to interpret the signals from the pyroelectric sensor chip. The complete
assembly is contained within a housing mounted in a location where the sensor can view the
area to be monitored. Infrared energy is able to reach the pyroelectric sensor through the
window because the plastic used is transparent to infrared radiation (but only translucent to
visible light). This plastic sheet also prevents the intrusion of dust and/or insects from obscuring
the sensor's field of view, and in the case of insects, from generating false alarms. A few
mechanisms have been used to focus the distant infrared energy onto the sensor surface. The
window may have multiple Fresnel lenses molded into it.
A person entering a monitored area is detected when the infrared energy emitted from
the intruder's body is focused by a Fresnel lens or a mirror segment and overlaps a section on
the chip that had previously been looking at some much cooler part of the protected area. That
portion of the chip is now much warmer than when the intruder wasn't there. As the intruder
moves, so does the hot spot on the surface of the chip. This moving hot spot causes the
electronics connected to the chip to de-energize the relay, operating its contacts, thereby
activating the detection input on the alarm control panel. Conversely, if an intruder were to try
to defeat a PID, perhaps by holding some sort of thermal shield between himself and the PID,
20
a corresponding 'cold' spot moving across the face of the chip will also cause the relay to de-
energize — unless the thermal shield has the same temperature as the objects behind it.
Manufacturers recommend careful placement of their products to prevent false
(nonintruder caused) alarms. They suggest mounting the PIDs in such a way that the PID cannot
'see' out of a window. Although the wavelength of infrared radiation to which the chips are
sensitive does not penetrate glass very well, a strong infrared source such as from a vehicle
headlight or sunlight reflecting from a vehicle window can overload the chip with enough
infrared energy to fool the electronics and cause a false alarm. A person moving on the other
side of the glass however would not be 'seen' by the PID.
They also recommended that the PID not be placed in such a position that an HVAC
vent would blow hot or cold air onto the surface of the plastic which covers the housing's
window. Although air has very low emissivity (emits very small amounts of infrared energy),
the air blowing on the plastic window cover could change the plastic's temperature enough to,
once again, fool the electronics. PIDs come in many configurations for a wide variety of
applications. The most common, used in home security systems, have numerous Fresnel lenses
or mirror segments and an effective range of about thirty feet. Some larger PIDs are made with
single segment mirrors and can sense changes in infrared energy over one hundred feet away
from the PID. There are also PIDs designed with reversible orientation mirrors which allow
either broad coverage (110° wide) or very narrow 'curtain' coverage.
PIDs can have more than one internal sensing element so that, with the appropriate
electronics and Fresnel lens, it can detect direction. Left to right, right to left, up or down and
provide an appropriate output signal.
21
Fig 12: PIR sensor
22
6. No effect of mechanical vibrations
7. Extremely long life
Typical LED uses a forward voltage of about 2V and current of 5 to 10mA.
GaAs LED produces infra-red light while red, green and orange lights are produced by
gallium arsenide phosphide (GaAs) and gallium phosphide(Gap) .
3.11.1.Function
LEDs must be connected the correct way round, the diagram may be labelled a or + for anode
and k or - for cathode (yes, it really is k, not c, for cathode!). The cathode is the short lead and there
may be a slight flat on the body of round LEDs. If you can see inside the LED the cathode is the larger
electrode (but this is not an official identification method).
LEDs can be damaged by heat when soldering, but the risk is small unless
you are very slow.
3.11.3.Testing an LED
3.11.4.Colors of LED’s
LEDs are available in red, orange, amber, yellow, green, blue and white. Blue and white LEDs
are much more expensive than the other colours.
23
The colour of an LED is determined
by the semiconductor material, not by the
colouring of the 'package' (the plastic body).
LEDs of all colours are available in
uncoloured packages which may be diffused
(milky) or clear (often described as 'water
clear'). The coloured packages are also available as diffused (the standard(type)or transparent.
4.GSM TECHNOLOGY
Global System for Mobile Communication (GSM) is a set of ETSI standards specifying
the infrastructure for a digital cellular service. The standard is used in approx. 85 countries in
the world including such locations as Europe, Japan and Australia.
When a mobile subscriber roams into a new location area (new VLR), the VLR
automatically determines that it must update the HLR with the new location information, which
it does using an SS7 Location Update Request Message. The Location Update Message is
routed to the HLR through the SS7 network, based on the global title translation of the IMSI
that is stored within the SCCP Called Party Address portion of the message. The HLR responds
with a message that informs the VLR whether the subscriber should be provided service in the
new location.
When a user dials a GSM mobile subscriber's MSISDN, the PSTN routes the call to the
Home MSC based on the dialed telephone number. The MSC must then query the HLR based
on the MSISDN, to attain routing information required to route the call to the subscribers'
current location. The MSC stores global title translation tables that are used to determine the
HLR associated with the MSISDN. When only one HLR exists, the translation tables are trivial.
When more than one HLR is used however, the translations become extremely challenging;
with one translation record per subscriber (see the example below). Having determined the
24
appropriate HLR address, the MSC sends a Routing Information Request to it. When the HLR
receives the Routing Information Request, it maps the MSISDN to the IMSI, and ascertains the
subscribers' profile including the current VLR at which the subscriber is registered. The HLR
then queries the VLR for a Mobile Station Roaming Number (MSRN). The MSRN is
essentially an ISDN telephone number at which the mobile subscriber can currently be reached.
The MSRN is a temporary number that is valid only for the duration of a single call. The HLR
generates a response message, which includes the MSRN, and sends it back across the SS7
network to the MSC. Finally, the MSC attempts to complete the call using the MSRN provided
25
which allows operators using the 800 MHz band to have access to GSM technology too.
GSM security issues such as theft of service, privacy, and legal interception continue to raise
significant interest in the GSM community. The purpose of this portal is to raise awareness of
these issues with GSM security.
The mobile communications has become one of the driving forces of the digital
revolution. Everyday, millions of people are making phone calls by pressing a few buttons.
Little is known about how one person's voice reaches the other person's phone that is thousands
of miles away. Even less is known about the security measures and protection behind the
system. The complexity of the cell phone is increasing as people begin sending text messages
and digital pictures to their friends and family. The cell phone is slowly turning into a handheld
computer. All the features and advancements in cell phone technology require a backbone to
support it. The system has to provide security and the capability for growth to accommodate
future enhancements. General System for Mobile Communications, GSM, is one of the many
solutions out there. GSM has been dubbed the "Wireless Revolution" and it doesn't take much
to realize why GSM provides a secure and confidential method of communication.
Digital containers offer an alternative way of securely delivering content to consumers.
They can offer many advantages, particularly for content delivery over mobile phone networks:
Scalability
Micro transactions/Micro payments compatibility
Content channel neutrality (heterogeneous networks, unicast /multicast/broadcast etc)
Possibility of DRM
Consumer anonymity Etc.
4.2.GSM MODEM
This is a GSM/GPRS-compatible Quad-band cell phone, which works on a frequency
of 850/900/1800/1900MHz and which can be used not only to access the Internet, but also for
oral communication (provided that it is connected to a microphone and a small loud speaker)
and for SMSs. Externally, it looks like a big package (0.94 inches x 0.94 inches x 0.12 inches)
with L-shaped contacts on four sides so that they can be soldered both on the side and at the
bottom. Internally, the module is managed by an AMR926EJ-S processor, which controls
phone communication, data communication (through an integrated TCP/IP stack), and (through
an UART and a TTL serial interface) the communication with the circuit interfaced with the
cell phone itself. The processor is also in charge of a SIM card (3 or 1,8 V) which needs to be
attached to the outer wall of the module.
26
Fig 14.GSM Modem
4.2.1. Features
-Provides the industry standard serial RS232 interface for easy connection to
computers and other devices
-Provides serial TTL interface for easy and direct interface to Microcontrollers
-Optionally available USB interface for easy interface to laptops, computers, etc
-Onboard MIC and Speaker circuits and 3.5mm audio connectors for direct connection
to mics and speaker
-All pins of the SIM900 module can be tapped into for expansion using onboard
expansion holes. GPIO pins, Serial communication pins, 2 PWM pins, I2C pins and
ADC pins are broken out to standard 0.1” spaced holes for easy expansion
-Power, Status and Network LEDs for easy debugging
-Can be used for GSM based Voice communications, Data/Fax, SMS,GPRS and
TCP/IP stack
-Comes with an onboard wire antenna for better reception. Board provides an option
for adding an external antenna through an SMA connector
-The SIM900 allows an adjustable serial baudrate from 1200 to 115200 bps (autobaud
by default)
-Modem a low power consumption of 0.25 A during normal operations and around 1 A
during transmission
-Select the serial port to which the modem is connected under the “Connect Using“
option(usually COM1)
-Select Baudrate of 9600 and Flow control as none. The board works on a serial
communication that can work within a wide range of speeds from 1200 bps to 1152000
bps,
-You will have to send character ‘A’ (uppercase A) initially before you send any other
command to the modem
-Enter “AT” in the Hyperterminal, the board will echo “OK” if everything is properly
setup
-The onboard Net LED(yellow) is used to display the network status
-LED Off – SIM900 not running
-64ms On 0.8 Sec Off - SIM900 unable to find network
-64ms On 3 Sec Off - SIM900 found network
28
-64ms On/ 300ms Off GPRS communication
You will have to use standard AT commands to interface with the modem. Here are
some of the common GSM operations that can be achieved using the board . a) To Dial a
Number
- To dial a number you will have to send the command -> ATD NUM; where NUM is the
number you want to dial.
For instance to dial 9008620582, send the command ATD 9008620852;
- To disconnect the number use the command – ATH
- To redial a number use the command – ATDL
b) To Send a SMS
- To send SMS send the command -> AT+CMGF=1
Modem will then send the text -> OK
Then send -> AT+CMGS="NUM"
where NUM is the number you want to send the SMS to. Modem
will then send the text - TYPE THE MESSAGE>
Enter the message and then press ctrl+z to send SMS
The Power Key (labeled PWR KEY on the modem) can be used to power on and off
the module just by a holding it down for a second. Putting the module in power down mode
will drastically reduce the modems power consumption. Pressing the Power Key when the
29
module is off, will power on the module and vice-versa. Please refer the SIM900 datasheet
for more information.
When the modem is powered on the module will be in power off mode by default.
You will have to press and hold the PWR Key for a second to put it in power on mode to start
using the modem to make calls, send messages, etc.
If you want to put the module in power on mode automatically everytime the modem is
powered on, you will have to put the jumper named Power Key Disable next to the PWR
Key.
- The GSM Modem consumes a lot of current during transmission, make sure your power
supply can handle large currents without giving substantial voltage drops at the output
- If the GSM Modem is unable to connect to the network, try coming to a place with clear
surroundings for best reception
- The SIM Card holder used on the Modem is quite delicate and can easily break upon
rough use. Use it with care and caution.
30
FIG 15: SIM 900 PIN DESCRIPTION
5.SOFTWARE DESCRIPTION
Softwares used is:
*KEIL µVision using Embedded C programming
*Express PCB for lay out design
*Express SCH for schematic design
5.1Express PCB
Express PCB is a Circuit Design Software and PCB manufacturing service. One can
learn almost everything you need to know about Express PCB from the help topics included
with the programs given.
Details:
Express PCB, Version 5.6.0
31
5.2.Express SCH
The Express SCH schematic design program is very easy to use. This software enables
the user to draw the Schematics with drag and drop options.
A Quick Start Guide is provided by which the user can learn how to use it.
Details:
Express SCH, Version 5.6.0
5.3.EMBEDDED C
The programming Language used here in this project is an Embedded C Language.
This Embedded C Language is different from the generic C language in few things like a)
Data types
b) Access over the architecture addresses.
The Embedded C Programming Language forms the user friendly language with access
over Port addresses, SFR Register addresses etc.
Embedded C Data types:
Data Types Size in Bits Data Range/Usage
Signed char:
o Used to represent the – or + values.
o As a result, we have only 7 bits for the magnitude of the signed number, giving us
values from -128 to +127.
32
file, specifying another list of controls, run either the Library Manager or Linker (again
specifying a list of controls) and finally running the Object-HEX Converter to convert the
Linker output file to an Intel Hex File. Once that has been completed the Hex File can be
downloaded to the target hardware and debugged. Alternatively KEIL can be used to create
source files; automatically compile, link and covert using options set with an easy to use user
interface and finally simulate or perform debugging on the hardware with access to C
variables and memory. Unless you have to use the tolls on the command line, the choice is
clear. KEIL Greatly simplifies the process of creating and testing an embedded application.
Projects:
The user of KEIL centers on “projects”. A project is a list of all the source files required to
build a single application, all the tool options which specify exactly how to build the
application, and – if required – how the application should be simulated. A project contains
enough information to take a set of source files and generate exactly the binary code required
for the application. Because of the high degree of flexibility required from the tools, there are
many options that can be set to configure the tools to operate in a specific manner. It would be
tedious to have to set these options up every time the application is being built; therefore they
are stored in a project file. Loading the project file into KEIL informs KEIL which source files
are required, where they are, and how to configure the tools in the correct way. KEIL can then
execute each tool with the correct options. It is also possible to create new projects in KEIL.
Source files are added to the project and the tool options are set as required. The project can
then be saved to preserve the settings. The project is reloaded and the simulator or debugger
started, all the desired windows are opened. KEIL project files have the extension.
5.4.2.Simulator/Debugger
The simulator/ debugger in KEIL can perform a very detailed simulation of a micro controller
along with external signals. It is possible to view the precise execution time of a single assembly
instruction, or a single line of C code, all the way up to the entire application, simply by entering
the crystal frequency. A window can be opened for each peripheral on the device, showing the
state of the peripheral. This enables quick trouble shooting of misconfigured peripherals.
Breakpoints may be set on either assembly instructions or lines of C code, and execution may
be stepped through one instruction or C line at a time. The contents of all the memory areas
may be viewed along with ability to find specific variables. In addition the registers may be
viewed allowing a detailed view of what the microcontroller is doing at any point in time.
33
5.5.ARM SOFTWARE
About Keil ARM:
5. Save the Project by typing suitable project name with no extension in u r own folder
sited in either C:\ or D:\
13. Now double click on the Target1, you would get another option “Source group 1”
as shown in next page.
14. Click on the file option from menu bar and select “new”
15. The next screen will be as shown in next page, and just maximize it by double
clicking on its blue boarder.
17. For a program written in Assembly, then save it with extension “. asm” and for
“C” based program save it with extension “ .C”
18. Now right click on Source group 1 and click on “Add files to Group Source”
19. Now you will get another window, on which by default “C” files will appear
20. .Now select as per your file extension given while saving the file
34
21. Click only one time on option “ADD”
22. Now Press function key F7 to compile. Any error will appear if so happen.
23. .If the file contains no error, then press Control+F5 simultaneously.
26. Now Click on the Peripherals from menu bar, and check your required port
27. Drag the port a side and click in the program file
28. Now keep Pressing function key “F11” slowly and observe.
5.6.Flash magic Flash Magic is a PC tool for programming flash based microcontrollers
from NXP using a serial or Ethernet protocol while in the target hardware. The figures below
show how the baud rate is selected for the microcontroller, how are the registers erased before
the device is programmed.
If dumping process of the hex file is completed, then the controller will work as per our
requirement
36
-can detect fire and harmful gas leakages
Disadvantages:
-Failure of micro-controller affects the whole functioning
-Unreliability
7. APPLICATIONS
1. Home Security as it is used as an automatic guest indicator.
2. It can also be used in banks as a burglar alarm.
3. It is also used in detecting fire and harmful gas leakages.
4. It is used in defense applications.
8. CONCLUSION
The project “ELECTRONIC EYE DIAL UP” has been successfully designed and tested.
Integrating features of all the hardware components used have developed it. Presence of every
module has been reasoned out and placed carefully thus contributing to the best working of the
unit. Secondly, using highly advanced IC’s and with the help of growing technology the project
has been successfully implemented.
37
9.REFERENCES
Books
[1]. ARM7TDMI datasheet ARM
[2]. LPC2119/2129/2194/2292/2294 User Manual Philips
[3]. ARM System on chip architecture Steve Furber
[4]. Architecture Reference Manual David Seal
[5]. ARM System developers guide Andrew N. Sloss,
Domonic Symes,
[6]. Chris Wright
[7]. Micro C/OS-II Jean J. Labrosse
GCC The complete reference Arthur Griffith
Websites
[1]. http://www.arm.com
[2]. http://www.philips.com
[3]. http://www.lpc2000.com
[4]. http://www.semiconductors.philips.com/
[5]. http://ieeexplore.ieee.org
[6]. http://ww.hitex.co.uk
[7]. http://www.keil.co.uk
[8]. http://www.ucos-ii.com
[9]. http://www.ristancase.com
[10]. http://gcc.gnu.org/onlinedocs/gcc/Evaluation Boards And Modules
[11]. http://www.knox.com
38