Upload
Upload
INTRODUCTION
These days car theft cases are higher than ever, give your car an excellent protection with the only reliable anti-theft device. Automobile security system ensures the best guarantee to protect your car from different kinds of theft cases. It is a car security device that offers excellent protection to your car. A car with automobile security system helps the user to lock and unlock doors at the press of a button. The most important features kept in mind while designing our project are Motion sensors that produce alarm when an invader approaches your car Remote Outputs allows user to add features like remote starters or window controls Effective glass break sensor Easy installation Simple in handling Negligible maintenance
1.1.1 Features
Easy to use for day to day operation. Stand alone device no computer or any other hardware required. Needs to be programmed only once. Easy to program.
1.1.2 Benefits
No need to assign a person No manual intervention Saves man power and money
Toy car
In our project 2 module are there one on automobile and other on garage. RF transmitter attached to microcontroller AT89S52 at garage. A RF receiver attached to microcontroller AT89S52 at vehicle. HT 12D and HT 12E are interfacing devices.
2.3 DIPTRACE
DipTrace is EDA software for creating schematic diagrams and printed circuit boards. The first version of DipTrace was released in August, 2004. The latest version as of September 2011 is DipTrace version 2.2. Interface has been translated to many languages and new language can be added by user. Starting from February 2011 DipTrace is used as project publishing standard by Parallax.
DipTrace Screenshot [show] Original author(s) Novarm Ltd. Stable release 2.2.0.3 / October 17, 2011 Written in Object Pascal (Delphi) Operating system Windows, Mac OS X,Linux/Wine Type Electronic design automation License Proprietary Website http://www.diptrace.com/
Modules Schematic Design Editor PCB Layout Editor Component Editor Pattern Editor Shape-Based Auto router 3D PCB Preview
Sr. no. 1. 2.
Quantity
3. 4.
1 1 1 1
5. 6. 7. 8. 9.
Electrolytic capacitor (10 microfarad) Electrolytic capacitor (33 picofarad) DPDT switch HT 12D and HT 12E IC Rf transmitter and receiver
3 2 1 1 each 1
Eight Interrupt Sources Full Duplex UART Serial Channel Low-power Idle and Power-down Modes Interrupt Recovery from Power-down Mode Watchdog Timer Dual Data Pointer Power-off Flag
3.2.2 Description
The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K Bytes of in-system programmable Flash memory. The device is manufactured using Atmels high-density nonvolatile memory technology and is compatible with the industry- standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and costeffective solution to many embedded control applications. The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector twolevel interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. The AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset.
Port 0: Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 can also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode, P0 has internal Pull-ups. Port 0 also receives the code bytes during Flash programming and outputs the code bytes during program verification. External pull ups are required during program verification.
Port 1: Port 1 is an 8-bit bidirectional I/O port with internal pull ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the internal pull ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull ups. In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as shown in the following table. Port 1 also receives the low-order address bytes during Flash programming and verification.
Alternate Functions T2 (external count input to Timer/Counter 2), clock-out T2EX (Timer/Counter 2 capture/reload trigger & direction control) MOSI (used for In-System Programming) MISO (used for In-System Programming) SCK (used for In-System Programming) Table 3.2 Functions of Port1
Port 2: Port 2 is an 8-bit bidirectional I/O port with internal pull ups. The Port 2 output buffers can ink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the internal pull ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @ DPTR). In this application, Port 2 uses strong internal pull-ups when emitting 1s. During accesses to external data memory that uses 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. Port 2 also receives the high-order address bits and some control signals during Flash programming and verification.
Port 3: Port 3 is an 8-bit bidirectional I/O port with internal pull ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the internal pull ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull ups. Port 3 also serves the functions of various special features of the AT89S52, as shown in the following table. Port 3 also receives some control signals for Flash programming and verification.
Alternate Functions RXD (serial input port) TXD (serial output port) INT0 (external interrupt 0) INT1 (external interrupt 1) T0 (timer 0 external input)
T1 (timer 1 external input) WR (external data memory write strobe) SCK (used for In-System Programming) Table 3.3 Functions of Port 3
RST: Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. This pin drives High for 96 oscillator periods after the Watchdog times out. The DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In the default state of bit DISRTO, the RESET HIGH out feature is enabled.
ALE/PROG: Address Latch Enable (ALE) is an output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming. In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator frequency and may be used for external timing or clocking purposes. If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction.
AT89S52: Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.
PSEN: Program Store Enable (PSEN) is the read strobe to external program memory. When the AT89S52 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.
EA/VPP: External Access Enable (EA) must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH.
If lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming. XTAL1: Input to the inverting oscillator amplifier and input to the internal clock operating circuit. XTAL2: Output from the inverting oscillator amplifier. Special Function Registers: A map of the on-chip memory area called the Special Function Register (SFR) space. Read accesses to these addresses will in general return random data, and write accesses will have an indeterminate effect. User software should not write 1s to these unlisted locations, since they may be used in future products to invoke new features. In that case, the reset or inactive values of the new bits will always be 0. Timer 2 Registers: Control and status bits are contained in registers T2CON (shown in Table 2) and T2MOD for Timer 2. The register pair (RCAP2H, RCAP2L) are the Capture/Reload registers for Timer 2 in 16-bit capture mode or 16-bit auto-reload mode. Interrupt Registers: The individual interrupt enable bits are in the IE register. Two priorities can be set for each of the six interrupt sources in the IP register. Symbol Function: TF2 Timer 2 overflow flag set by a Timer 2 overflow and must be cleared by software. TF2 will not be set when either RCLK = 1 or TCLK = 1. EXF2 Timer 2 external flag set when either a capture or reload is caused by a negative transition on T2EX and EXEN2 = 1. When Timer 2 interrupt is enabled, EXF2 = 1 will cause the CPU to vector to the Timer 2 interrupt routine. EXF2 must be cleared by software. EXF2 does not cause an interrupt in up/down counter mode (DCEN = 1). RCLK Receive clock enable. When set, causes the serial port to use Timer 2 overflow pulses for its receive clock in serial port Modes 1 and 3. RCLK = 0 causes Timer 1 overflow to be used for the receive clock. TCLK Transmit clock enable. When set, causes the serial port to use Timer 2 overflow pulses for its transmit clock in serial port Modes 1 and 3. TCLK = 0 causes Timer 1 overflows to be used for the transmit clock.
EXEN2 Timer 2 external enable. When set, allows a capture or reload to occur as a result of a negative transition on T2EX if Timer 2 is not being used to clock the serial port. EXEN2 = 0 causes Timer 2 to ignore events at T2EX. TR2 Start/Stop control for Timer 2. TR2 = 1 starts the timer. C/T2 Timer or counter select for Timer 2. C/T2 = 0 for timer function. C/T2 = 1 for external event counter (falling edge triggered). CP/RL2 Capture/Reload select. CP/RL2 = 1 causes captures to occur on negative transitions at T2EX if EXEN2 = 1. CP/RL2 = 0 causes automatic reloads to occur when Timer 2 overflows or negative transitions occur at T2EX when EXEN2 = 1. When either RCLK or TCLK = 1, this bit is ignored and the timer is forced to auto-reload on Timer 2 overflow. Dual Data Pointer Registers: To facilitate accessing both internal and external data memory, two banks of 16-bit Data Pointer Registers are provided: DP0 at SFR address locations 82H-83H and DP1 at 84H-85H. Bit DPS = 0 in SFR AUXR1 selects DP0 and DPS = 1 selects DP1. The user should always initialize the DPS bit to the appropriate value before accessing the respective Data Pointer Register. Power Off Flag: The Power Off Flag (POF) is located at bit 4 (PCON.4) in the PCON SFR. POF is set to 1 during power up. It can be set and rest under software control and is not affected by reset. Memory Organization: MCS-51 devices have a separate address space for Program and Data Memory. Up to 64K bytes each of external program and Data Memory can be addressed. Program Memory: If the EA pin is connected to GND, all program fetches are directed to external memory. On the AT89S52, if EA is connected to VCC, program fetches to addresses 0000H through 1FFFH are directed to internal memory and fetches to addresses 2000H through FFFFH are to external memory. Data Memory: The AT89S52 implements 256 bytes of on-chip RAM. The upper 128 bytes occupy a parallel address space to the Special Function Registers. This means that the upper 128 bytes have the same addresses as the SFR space but are physically
separate from SFR space. When an instruction accesses an internal location above address 7FH, the address mode used in the instruction specifies whether the CPU accesses the upper 128 bytes of RAM or the SFR space. Instructions which use direct addressing access of the SFR space. For example, the following direct addressing instruction accesses the SFR at location 0A0H (which is P2). MOV 0A0H, #data Instructions that use indirect addressing access the upper 128 bytes of RAM. For example, the following indirect addressing instruction, where R0 contains 0A0H, accesses the data byte at address 0A0H, rather than P2 (whose address is 0A0H). MOV @R0, #data Note that stack operations are examples of indirect addressing, so the upper 128 bytes of data RAM are available as stack space. Baud Rate Generator: Timer 2 is selected as the baud rate generator by setting TCLK and/or RCLK in T2CON. The baud rates for transmit and receive can be different if Timer 2 is used for the receiver or transmitter and Timer 1 is used for the other function. Setting RCLK and/or TCLK puts Timer 2 into its baud rate generator mode. The baud rate generator mode is similar to the auto-reload mode, in that a rollover in TH2 causes the Timer 2 registers to be reloaded with the 16-bit value in registers RCAP2H and RCAP2L, which are preset by software. The baud rates in Modes 1 and 3 are determined by Timer 2s overflow rate according to the following equation. The Timer can be configured for either timer or counter operation. In most applications, it is configured for timer operation (CP/T2 = 0). The timer operation is different for Timer 2 when it is used as a baud rate generator. Normally, as a timer, it increments every machine cycle (at 1/12 the oscillator frequency). As a baud rate generator, however, it increments every state time (at 1/2 the oscillator frequency). Where (RCAP2H, RCAP2L) is the content of RCAP2H and RCAP2L taken as a 16-bit unsigned integer. Timer 2 as a baud rate generator is shown in Figure 8. This figure is valid only if RCLK or TCLK = 1 in T2CON. Note that a rollover in TH2 does not set TF2 and will not
generate an interrupt. Note too, that if EXEN2 is set, a 1-to-0 transition in T2EX will set EXF2 but will not cause a reload from (RCAP2H, RCAP2L) to (TH2, TL2). Thus, when Timer 2 is in use as a baud rate generator, T2EX can be used as an extra external interrupt. When Timer 2 is running (TR2 = 1) as a timer in the baud rate generator mode, TH2 or TL2 should not be read from or written to. Under these conditions, the Timer is incremented every state time, and the results of a read or write may not be accurate. The RCAP2 registers may be read but should not be written to, because a write might overlap a reload and cause write and/or reload errors. The timer should be turned off (clear TR2) before accessing the Timer 2 or RCAP2 registers. Timer 0 and 1: Timer 0 and Timer 1 in the AT89S52 operate the same way as Timer 0 and Timer 1 in the AT89C51 and AT89C52. Timer 2: It is a 16-bit Timer/Counter that can operate as either a timer or an event counter. The type of operation is selected by bit C/T2 in the SFR T2CON. Timer 2 has three operating modes: capture, auto-reload (up or down counting), and baud rate generator. The modes are selected by bits in T2CON. Timer 2 consists of two 8-bit registers, TH2 and TL2. In the Timer function, the TL2 register is incremented every machine cycle. Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the oscillator frequency. Timer 2 Operating Modes RCLK +TCLK 0 0 1 X CP/RL2 0 1 X X TR2 1 1 1 0 MODE 16-bit Auto-reload 16-bit Capture Baud Rate Generator (OFF)
3.3 RESISTORS
The electrical resistance of an object is a measure of its opposition to the passage of a steady electric current. An object of uniform cross section will have a resistance proportional to its length and inversely proportional to its cross-sectional area, and proportional to the resistivity of the material.
Figure 3.3: Resistors The resistance of a resistive object determines the amount of current through the object for a given potential difference across the object, in accordance with Ohm's law: I =V/R R is the resistance of the object, measured in ohms, equivalent to Js/C2. V is the potential difference across the object, measured in volts I is the current through the object, measured in amperes For a wide variety of materials and conditions, the electrical resistance does not depend on the amount of current through or the amount of voltage across the object, meaning that the resistance R is constant for the given temperature and material. Therefore, the resistance of an object can be defined as the ratio of voltage to current. In the case of nonlinear objects (not purely resistive, or not obeying Ohm's law), this ratio can change as current or voltage changes; the ratio taken at any particular point, the inverse slope of a chord to an IV curve, is sometimes referred to as a "chordal resistance" or "static resistance".
Figure 3.4: Crystal Oscillator A quartz crystal can be modeled as an electrical network with a low impedance (series) and a high impedance (parallel) resonance point spaced closely together.
3.5 CAPACITOR
A capacitor or condenser is a passive electronic component consisting of a pair of conductors separated by a dielectric (insulator). When a potential difference (voltage) exists across the conductors, an electric field is present in the dielectric. This field stores energy and produces a mechanical force between the conductors. The effect is greatest when there is a narrow
separation between large areas of conductor; hence capacitor conductors are often called plates.
Fig3.5Capacitors
3.6 LED
Light emitting diodes (LEDs) are semiconductor light sources. The light emitted from LEDs varies from visible to infrared and ultraviolet regions. They operate on low voltage and power.
depending on the position of the switch. An example of which is a mini-toggle switch or a switch using a push or pull control.
3.7.1 Features
DPDT switches commonly use polarity reversal. That is why some variations of the DPDT switch, such as the cross-over switches, are internally wired for that purpose. The cross-over switches have only four terminals or connections, as opposed to six that you see on DPDT. There are two connections used for the outputs and the other two for the inputs. The switch then selects either normal or reversed polarity when connected to any DC source such as the battery. A DPDT Relay has a single coil with two arms that move simultaneously. Inside of the DPDT relay, there are two separate SPDT (Single Pole Double Throw) switch mechanisms. These are being used for signal switching applications more often than not, but can also be found in high power switching applications.
3.7.2Function
A DPDT can be used on any application that requires a NO (Normally Open) and NC (Normally Closed) wiring system, an example of which is Railroad Modelling or Model Railroading, a hobby that makes use of small scaled trains and railways, even small scale cars and bridges. The NC allows for the system to be onat all times while NO allows for another piece to be turned onor activated through the relay.
DPDT can be used in such cases for block control due to the ease and flexibility of wiring, as well as, coil voltage and coil amperage capabilities. In block controls, it is important to be able to take the higher power due to multiple turn ons and turn offs on the system. Block control allows the relay coil to be triggered remotely, while another relay is controlling another block. It is important to assess the priority needs when employing the block control, which accessory or application would need to be prioritized that would be turned on while the other one is turned off to make way for it.
3.7.3Type
There are different types of DPDT . There is a wide selection of DPDT Relay boards that can be used for different applications. There are DPDT Relay boards used for low power signal switching, there are also DPDT Relay boards used for high voltage switching used in high current applications. There are ranges of channels to choose from, from a two-channel DPDT Relay Controller to a 32-channel DPDT Relay Controller. One may choose whichever fits the configuration that is needed. Other options would be either Ethernet DPDT Relay, USB DPDT Relay and BlueTooth DPDT Relay.
3.7.4Identification
Dual 1-Amp DPDT Small Signal Relay Controller Board- 2-Channel 1-Amp RS232 DPDT Relay, is used with low current, low signal switching applications. Examples of applications aretelecommunications, networking, video and line-level audio. This relay is soldered to the controller to connect the relays to the board, which is a cheaper and space saving alternative to terminal blocks. Dual 3-Amp DPDT Signal Relay Controller Board- 2-Channel 3-Amp RS232 DPDT Relay. This is similar in application to the Dual 1-Amp DPDT except that it uses higher amperage. Quad 1-Amp DPDT Small Signal Relay Controller Board- has 4-Channel 1-Amp RS232 DPDT Relay. Similar in application to that of the first two, except it has four channels. This controller board or relay is also available in 3-Amp and 5-Amp. Also available in eight channels with 1Amp, 3-Amp and 5-Amp.
Other types using higher channels and amperages, such as 8-channels, 16-channels, 24-channels and 32-channels with 3-Amp and 5-Amp are available in the market.
3.7.5 Significance
There are different types of DPDT switches that can be used for different configurations. They are significant in ensuring that the applications they are applied to perform the type of switching that they are intended to perform. From computing and networking, to video and audio level switching, as well as, hobbies such as Model Railroading.
The HT 12D ICs are series of CMOS LSIs for remote control system applications. This ICs are paired with each other. For proper operation a pair of encoder/decoder with the same number of address and data format should be selected. The Decoder receive the serial address and data from its corresponding decoder, transmitted by a carrier using an RF transmission medium and gives output to the output pins after processing the data.
3.8.1Features
Encoder 18 PIN DIP Operating Voltage 2.4V ~ 12V Low Power and High Noice Immunity CMOS Technology
Low Standby Current and Minimum Transmission Word Built-in Oscillator needs only 5% Resistor Easy Interface with and RF or an Infrared transmission medium Minimal External Components
Decoder 18 PIN DIP, Operating Voltage 2.4V ~ 12.0V Low Power and High Noice Immunity, CMOS Technology Low Stand by Current, Trinary address setting Capable of Decoding 12 bits of Information 8 ~ 12 Address Pins and ~ 4 Data Pins Received Data are checked 2 times, Built in Oscillator needs only 5% resistor VT goes high during a valid transmission Easy Interface with an RF of IR transmission medium Minimal External Components
3.8.2Applications
Burglar Alarm, Smoke Alarm, Fire Alarm, Car Alarm, Security System Garage Door and Car Door Controllers Cordless telephone Other Remote Control System
3.8.3 Compatibility
Compatible with RF Modules 433 MHz.
Transmission through RF is better than IR (infrared) because of many reasons. Firstly, signals through RF can travel through larger distances making it suitable for long range applications. Also, while IR mostly operates in line-of-sight mode, RF signals can travel even when there is an obstruction between transmitter receiver. Next, RF transmission is more strong and reliable than IR transmission. RF communication uses a specific frequency unlike IR signals which are affected by other IR emitting sources. This RF module comprises of an RF Transmitter and an RF Receiver. The transmitter/receiver (Tx/Rx) pair operates at a frequency of 434 MHz. An RF transmitter receives serial data and transmits it wirelessly through RF through its antenna connected at pin4. The transmission occurs at the rate of 1Kbps - 10Kbps.The transmitted data is received by an RF receiver operating at the same frequency as that of the transmitter. The RF module is often used alongwith a pair of encoder/decoder. The encoder is used for encoding parallel data for transmission feed while reception is decoded by a decoder. -
Pin Diagram:-
3.9.1 Pin Description:RF Transmitter Pin No 1. 2. 3. 4. Function Name Ground (0V) Ground Serial data input pin Data Supply voltage; 5V Vcc Antenna output pin ANT
RF Receiver Pin No 1 2 3 4 5 6 7 8 Function Name Ground (0V) Ground Serial data output pin Data Linear output pin; not connected NC Supply voltage; 5V Vcc Supply voltage; 5V Vcc Ground (0V) Ground Ground (0V) Ground Antenna input pin ANT
Pin Diagram:
Pin Description: Pin No 1 2 3 Function Input voltage (5V-18V) Ground (0V) Regulated output; 5V (4.8V-5.2V) Name Input Ground Output
Table3.5Pin description
ELECTRICAL SPECIFICATIONS: Min. Sound Pressure Level at 5VDC/10cm.......85dB(A) Rated Voltage..5VDC Operating Voltage...4~6.5VDC Max. Consumption .30mA/5VDC
Resonant Frequency .. .2300 300Hz Max. Response Time .... 50ms Operating Temperature -40~+85C Storage Temperature.-40~+85C Weight.. 2g
Its a onetime cost product. The end user has to invest once in the system and later on he can avail the facilities for quite a long period of time.
Cost of our project is approx Rs.4500. Components are easily available in the market.
4.2 Advantages:
Automobile Security systems come in wide range of varieties with different specifications. You can easily find one for your car that provides the best features. The installation of locking system imparts a safe and luxurious touch to your car. Also, when you unlock the driver's door, the other doors will also unlock. This security device is simple and easy-to-use and also offers complete safety.
Automobile Security system has its own advantages in this risky world that keeps your car safe from those who are waiting for an opportunity to drive away your car. Some benefits of installing central locking system in your vehicle are : Guaranty against theft by hot-wiring Remote produces alarm if the user cannot find his car Also helps recover stolen vehicles In case if the door is left ajar, CLS alerts with a different alarm Reliable and Safe Powerful and Remote lock/unlock
4.3 APPLICATIONS
Employed to any automobile. Ensures full proof security. Furthermore connections can be done to get track on cell phone.
Can be employed to ATMS , or any other important object. 4.4 FUTURE SCOPE
Can be implemented with GPS : GPS is the most modern means of mapping and surveying and is immensely used in navigation, marine geodesy, disaster management, remote sensing, arial photography, geodesy, GIS and military operations. GPS is used in the field to update the topographic maps. Security system for restricted areas: Driving away of the vehicles from the restricted areas can be prevented through this project which also very important for the security purpose
Chapter 5 Conclusion
These days car theft cases are higher than ever, give your car an excellent protection with the only reliable anti-theft device. Automobile security system ensures the best guarantee to protect your car from different kinds of theft cases. It is a car security device that offers excellent protection to your car. A car with automobile security system helps the user to lock and unlock doors at the press of a button.