v2v Communication Using Edge Computing For Safe Commute
v2v Communication Using Edge Computing For Safe Commute
A PROJECT REPORT
Submitted By
DEEPAK R (620819106013)
DINESHKUMAR M (620819106022)
KIRUBASANKAR R (620819106038)
SILAMBARASU B (620819106084)
of
BACHELOR OF ENGINEERING
IN
i
ANNA UNIVERSITY : CHENNAI 600 025
BONAFIDE CERTIFICATE
Certified that this project report titled “V2V COMMUNICATION USING
EDGE COMPUTING FOR SAFE COMMUTE” is the bonafide work of
“DEEPAK R (620819106013), DINESHKUMAR M (620819106022),
KIRUBASANKAR R (6208191060538), SILAMBARASU B
(620819106084)” who carried out the project work under my supervision.
SIGNATURE SIGNATURE
Mr.R.PRABHU,M.E.,(Ph.D)., Mr.K.RAJA,.M.E.,
HEAD OF THE DEPARTMENT SUPERVISOR
ASSISTANT PROFESSOR
ii
ACKNOWLEDGEMENT
We would like to express our deep sense of heartiest thanks to our
beloved Chairman Dr. T. ARANGANNAL and Chairperson
Smt.P.MALALEENA Gnyanamani Educational Institutions, Namakkal, for
giving an opportunity to do and complete this project.
Ms.MADHUVANTHINIE ARANGANNAL, Vice Chairman, Gnyanamani
Educational Institutions, Namakkal, for her encouragement during our project.
We would like to express our sincere gratitude to our Chief
Administrative Officer Dr. P.PREMKUMAR Gnyanamani Educational
Institutions, Namakkal, for providing us with indefinable support.
We would like to express our deep sense of gratitude and profound thanks
to Dr. T. K.KANNAN, Principal, Gnanamani College of Technology,
Namakkal, for creating a beautiful atmosphere which inspired us to take over
this project.
We would like to express our deep sense of gratitude and profound thanks
to Academic Director Dr.B.SANJAY GANDHI Gnanamani College of
Technology, Namakkal, for creating a beautiful atmosphere which inspired us to
take over this project.
We express our sincere words of thanks to our parents, friends and all staff
members of Department Electronics and Communication Engineering,
Gnanamani College of Technology, for their blessing to complete the project
successfully.
iii
DECLARATION
We affirm that the project work titled “V2V COMMUNICATION USING
EDGE COMPUTING FOR SAFE COMMUTE” being submitted in partial
fulfillment for the award for B.E(ELECTRONIS AND COMMUNICATION
ENGINEERING) is the original work carried out by us. It has not formed the
part of any other project work submitted for award of any degree or diploma,
either in this or any other university.
DEEPAK R (620819106013)
DINESHKUMAR M (620819106022)
KIRUBASANKAR R (620819106038)
SILAMBARASU B (620819106084)
I certify that the declaration made above by the candidates are true
SIGNATURE
Mr.K.RAJA M.E.,
ASSISTANT PROFESSOR,
DEPARTMENT OF ECE
iv
INSTITUTE VISION AND MISSION STATEMENTS
VISION
Emerging gas a technical institution of high standard and excellence to provide
quality Engineers, Researches, Administrators and Entrepreneurs with ethical
and moral values to contribute the sustainable development of the society
MISSION
We facilities our students
MI1: To have in-depth domain knowledge with analytical and practical skills in
cutting edge Technologies by imparting quality technical education.
MISSION
MD2:Addressing the need of the people’s aspirations and to our local needs on
the emerging technology.
v
PROGRAM EDUCATIONAL OBJECTIVE (PEOs)
PEO 1
Be able to apply Mathematics, Science and Engineering fundamentals and
advanced concepts for their successful careers in industries, higher studies and
research.
PEO 2
Analyze, Design and execute interdisciplinary projects by addressing the
industrial and social needs.
PEO 3
Demonstrate and exhibit professional practice with ethical behavior and engage
in continuous learning career growth.
vi
Design solutions for complex engineering
problems and design system components or
PO3 Design /
processes that meet the specified needs with
development of
appropriate consideration for the public
solutions
health and safety, and the cultural, societal,
and environmental considerations.
vii
Function effectively as an individual, and as
a member or leader in diverse teams, and in
PO 9 Individual and
multidisciplinary settings.
teamwork
viii
ABSTRACT
safety. Here we proposed, each module are installed in the each vehicles to
sense the status of alcohol consumption of driver, status of vehicle speed, status
vehicle to other vehicles. RF range is about 300 meters. The status of the
vehicle can be communicated while the other vehicles are come inside the RF
ix
TABLE OF CONTENTS
ABSTRACT ix
LIST OF FIGURES xi
LIST OF TABLES xv
1 INTRODUCTION 1
2 LITERATURE REVIEW 2
3 EXISTING METHOD 5
4 PROPOSED METHOD 7
5 CONCLUSION 84
REFERENCES 85
x
LIST OF FIGURES
4.6 Battery 13
4.13 RF Receiver 20
4.15 Antenna 22
xi
4.16 Decoder Ht12d 23
4.24 Module 30
4.35 Dc Motor 38
xii
4.38 Pin Details L293d 41
4.45 Relay 48
xiii
4.58 Connection Diagram 72
4.60 LCD 73
xiv
List Of Tables
4 4.1 Specification 15
4.4 Specification 32
Radio 56
Responding Relay 69
4.9 Specifications 72
xv
CHAPTER 1
INTRODUCTION
1
CHAPTER 2
LITREATURE REVIEW
2
Robert H. Chen, and Jason L. Speyer, A Vehicle Health Monitoring System
Evaluated Experimentally on a Passenger Vehicle, IEEE
TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 14,
NO. 5, SEPTEMBER 2014
A vehicle health monitoring system based on analytical redundancy, is
developed for automated passenger vehicles. A residual generator and a residual
processor are designed together to detect and identify actuator and sensor faults
of the Buick LeSabre rapidly. The residual generator includes fault detection
filters and parity equations. It uses the control commands and sensor
measurements to generate the residuals, which have a unique static pattern in
response to each fault. Then, the residual processor interrogates the residuals by
matching them to one of several known patterns. It computes the probability of
each hypothesis conditioned on the history of residuals. The fault detection
latency is reduced by integrating the design of the residual generator and the
residual processor. The vehicle health monitoring system is evaluated in real-
time on a Buick LeSabre. The vehicle sensor and actuator faults are simulated
artificially by the computer or created manually by the driver. In one
experiment, a real intermittent sensor fault occurred and was immediately
detected and identified. The real-time evaluation demonstrates that the vehicle
health monitoring system can detect and identify actuator and sensor faults
under various disturbances and uncertainties with almost minimal detection
latency.
3
M.Jyothikiran, S.Raviteja, Final year students of K.L.University: Research
Scholars of K.L.University: D.S.Ramkiran, K .Phanisrinivas / International
Journal of Engineering Research and Applications (IJERA), VEHICLE
HEALTH MONITORING SYSTEM, ISSN: 2248-9622
www.ijera.comVol. 2, Issue 5, September- October 2015
This paper deals with developing an embedded system for detecting
the vehicle condition by monitoring the internal parameters that are used in
evaluating the vehicle‘s current health condition. Traveler information plays
a critical role in supporting safety, security, mobility, and in improving the
reliability of travel. This traveler information can be a continuous data on
performance of the vehicle and the status of its internal components. In this
project, an in-vehicle embedded system is being developed to generate a
vehicle health report (VHR) whenever needed by the user. It also acts as an
eco friendly vehicle by monitoring the emissions from the car which in
turn helps in regulating (by taking proper actions to reduce the emissions
as per the faults indicated in the VHR) the environmental pollution. It
predicts the future errors so that the driver can have an uninterrupted journey
and can avoid accidents. Thus, it alerts the driver about future errors and
assists him for a safe drive. The data required for generating the health report
consists of parameter values (outputs of in-built sensors) of different systems
inside the vehicle. This data can be obtained using the OBD-II protocol
which is followed by the vehicles manufactured after 1996. It uses
LabVIEW as platform that has automotive diagnostic command set tool
kit which helps in building up the software required to communicate with the
vehicle
4
CHAPTER 3
EXISTING METHOD
VEHICLE UNIT 1
LCD
POWER
SUPPLY GSM
MICRO
CONTROLLER
UBNORMAL
SENSOR PARKING
INDICATOR
DRIVER
ALCOHOL
SENSOR
VEHICLE
MOTOR
RF TX
5
VEHICLE UNIT 2
POWER
SUPPLY
RF RX
6
CHAPTER 4
PROPOSED METHOD
VECHILE UNIT 1
LCD
POWER
SUPPLY GSM
MICRO
CONTROLLER
UBNORMAL
SENSOR PARKING
INDICATOR
DRIVER
ALCOHOL
SENSOR
VEHICLE
MOTOR
RF TX
7
VECHILE UNIT 2
POWER
SUPPLY
MICRO VOICE
CONTROLLER SPEAKER
BOAR
D
RF RX
8
4.1 WORKING PRINCIPLE
9
Fig 4.3 CONSTRUCTION DIAGRAM
10
WORK FLOW CHART
UNIT 1
11
UNIT 2
12
4.2 COMPONENT USED
POWER SOURCE
BATTERY
An electric battery is a collection of one or more electrochemical cells in
which stored chemical energy is converted into electrical energy. The principles
of operation haven’t changed much since the time of Volta. Each cell consists
of two half cells connected in series through an electrolytic solution. One half
cell houses the Anode to which the positive ions migrate from
the Electrolyte and the other houses the Cathode to which the negative ones
drift. The two cells are may be connected via a semi permeable membranous
structure allowing ions to flow but not the mixing of electrolytes as in the case
of most primary cells or in the same solution as in secondary cells.
13
electron affinity will release electrons and these electrons come out into the
electrolyte solution and are added to the positive ions of the solution. In this
way, one of these metals or compounds gains electrons and another one loses
electrons. As a result, there will be a difference in electron concentration
between these two metals. This difference of electron concentration causes
an electrical potential difference to develop between the metals. This electrical
potential difference or emf can be utilized as a source of voltage in any
electronics or electrical circuit. This is a general and basic principle
of battery .
14
SPECIFICATIONS
FILTER
The output after being processed by full wave rectifier is not a pure DC.
The output is a pulsating DC. The output contains large fluctuations in voltages.
This is quite apparent from the block of full wave rectifier shown above. The
power supply that we intend to design must not have any variation in output
voltage. The voltage that we get from full wave rectifier fluctuates between 0 V
and Vpeak, and hence it contains AC components. These AC components needs
to be filtered out so as to obtain DC voltage. This is where filters come into
picture. Filters, as the name suggests, filters out any AC component present and
provides DC as the output. However, the output from the filter is still not a pure
DC but filters removes the AC component in the voltage to a considerable
extent. This increases the average DC value of the output voltage. Now a
question must arise as to how we can make a filter and which components are
15
required to make a filter. Although it not the goal of this section to study filters
in detail, it must suffice to know that filters used in power supplies can be made
simply by using capacitors. We leave the design of capacitive filter to some
other section. Typical input and output voltage of filters used in power supply is
shown below.
As shown in the figure above, the output voltage from the filter contains voltage
ripples. This output is not a pure DC, however considerable amount of AC
component is filtered out by the filter. The effectiveness of the filter to remove
the AC component is indicated by the ripple factor. Smaller the ripple factor,
better the filter.
16
IC VOLTAGE REGULATORS
Voltage regulators comprise a class of widely used ICs. Regulator IC
units contain the circuitry for reference source, comparator amplifier, control
device, and overload protection all in a single IC. Although the internal
construction of the IC is somewhat different from that described for discrete
voltage regulator circuits, the external operation is much the same. IC units
provide regulation of either a fixed positive voltage, a fixed negative voltage, or
an adjustably set voltage.
17
FEATURES OF VOLTAGE REGULATOR IC
• Output Current up to 1A
• Output Voltages of 5, 6, 8, 9, 10, 12, 15, 18, 24V
• Thermal Overload Protection
• Short Circuit Protection
• Output Transistor Safe Operating Area Protection
18
From the above equation we can understand that when Vno-load occurs
the load resistance is infinite, that is, the out terminals are open circuited. Vfull-
load occurs when the load resistance is of the minimum value where voltage
regulation is lost.
% Load Regulation = [(V no-load – V full-load)/V full-load] * 100
2.Minimum Load Resistance
The load resistance at which a power supply delivers its full-load rated
current at rated voltage is referred to as minimum load resistance.
Minimum Load Resistance = V full-load/I full-load
The value of I full-load, full load current should never increase than that
mentioned in the data sheet of the power supply.
3.Source/Line Regulation
In the block diagram, the input line voltage has a nominal value of 230
Volts but in practice, here are considerable variations in ac supply mains
voltage. Since this ac supply mains voltage is the input to the ordinary power
supply, the filtered output of the bridge rectifier is almost directly proportional
to the ac mains voltage. The source regulation is defined as the change in
regulated output voltage for a specified rage of lie voltage.
4.Output Impedance
A regulated power supply is a very stiff dc voltage source. This means
that the output resistance is very small. Even though the external load resistance
is varied, almost no change is seen in the load voltage. An ideal voltage source
has an output impedance of zero.
5.Ripple Rejection
Voltage regulators stabilize the output voltage against variations in
input voltage. Ripple is equivalent to a periodic variation in the input voltage.
Thus, a voltage regulator attenuates the ripple that comes in with the
unregulated input voltage. Since a voltage regulator uses negative feedback, the
distortion is reduced by the same factor as the gain.
19
RF RECEIVER
The receiver module has IC RX3400/RX3400 crystal oscillator, capacitor,
inductor and many components. The RX3400/RX3400-LF is low powers ASK
receiver IC which is fully compatible with the Mitel KESRX01 IC and is
suitable for use in a variety of low power radio applications including remote
keyless entry. The RX3400/RX3400-LF is based on a single-conversion, super-
heterodyne receiver architecture and incorporates an entire phase-locked loop
(PLL).
20
Vcc Operating 4.5 5 5.5 V
supply voltage
Itot Operating 3.5 4.5 Ma
Current
V Data Out I Data = +200 Ua( Vcc- - Vcc V
Data High ) 0.5
I Data = -10 Ua( Low - - 0.3 V
)
Electrical Characteristics
Characteristics SYM Min Type Max Unit
Operation Radio FC 300 – 434 MHz
Frequency
Sensitivity Pref -106 dBm
Channel Width +-500 KHz
Noise equivalent BW NEB 4 5 KHz
Baseboard data rate 3 Kb/s
21
Pin
Function Name
No
1 Ground (0V) Ground
2 Serial data output pin Data
3 Linear output pin; not connected NC
4 Supply voltage; 5V Vcc
5 Supply voltage; 5V Vcc
6 Ground (0V) Ground
7 Ground (0V) Ground
8 Antenna input pin ANT
22
Decoder HT12D
The 2^12 decoders are a series of CMOS LSIs for remote control system
applications. They are paired with Holtek’s 2^12 series of encoders (refer to the
encoder/decoder cross reference table). For proper operation, a pair of
encoder/decoder with the same number of addresses and data format should be
chosen. The decoders receive serial addresses and data from a programmed
2^12 series of encoders that are transmitted by a carrier using an RF or an IR
transmission medium. They compare the serial input data three times
continuously with their local addresses. If no error or unmatched codes are
found, the input data codes are decoded and then transferred to the output pins.
The VT pin also goes high to indicate a valid transmission. The 2^12 series of
decoders are capable of decoding information’s that consist of N bits of address
and 12-N bits of data. Of this series, the HT12D is arranged to provide 8
address bits and 4 data bits, and HT12F is used to decode 12 bits of address
information.
23
Features:-
Operating voltage: 2.4V~12V
Low power and high noise immunity CMOS technology
Low standby current
Capable of decoding 12 bits of information
Binary address setting
Received codes are checked 3 times
Address/Data number combination- HT12D: 8 address bits and 4
data bits
Built-in oscillator needs only 5% resistor
Valid transmission indicator
Easy interface with an RF or an infrared transmission medium
Minimal external components
Pair with Holtek’s 212 series of encoders
18-pin DIP, 20-pin SOP package
APPLICATION
Burglar alarm system
Smoke and fire alarm system
Garage door controllers
Car door controllers
Car alarm system
Security system
Cordless telephones
Other remote control systems
24
PIN DETAILS
25
D8 – D11 are the data output pins. Status of these pins can be VSS or VDD
depending upon the received serial data through pin DIN.
VT stand for Valid Transmission. This output pin will be HIGH when valid
data is available at D8 – D11 data output pins.
26
WORKING
HT12D decoder will be in standby mode initially ie, oscillator is disabled and a
HIGH on DIN pin activates the oscillator. Thus the oscillator will be active
when the decoder receives data transmitted by an encoder. The device starts
decoding the input address and data. The decoder matches the received address
three times continuously with the local address given to pin A0 – A7. If all
matches, data bits are decoded and output pins D8 – D11 are activated. This
valid data is indicated by making the pin VT (Valid Transmission) HIGH. This
will continue till the address code becomes incorrect or no signal is received.
27
DATA FLOW CHART
28
APPLICATION DIAGRAM
29
MODULE
30
causes the instantaneous frequency of a sine wave carrier to depart from the
center frequency by an amount proportional to the instantaneous value of the
modulating signal. Amplitude shift key (ASK) transmits data by varying the
amplitude of the transmitted signal. Frequency shift key (FSK) is a digital
modulation scheme using two or more output frequencies. Phase shift key
(PSK) is a digital modulation scheme in which the phase of the transmitted
signal is varied in accordance with the base band data signal.
Additional considerations when selecting RF transmitters include supply
voltage, supply current, RF connectors, special features, and packaging. Some
RF transmitters include visual or audible alarms or LED indicators that signal
operating modes such as power on or reception. Other devices attach to coaxial
cables or include a connector or port to which an antenna can be attached.
Typically, RF transmitters that are rated for outdoor use feature a heavy-duty
waterproof design. Devices with internal calibration and a frequency range
switch are also available.
RF transmitters are used in a variety of applications and industries. Often,
devices that are used with integrated circuits (ICs) incorporate surface mount
technology (SMT), through hole technology (THT), and flat pack. In the
telecommunications industry, RF transmitters are designed to fit in a metal rack
that can be installed in a cabinet. RF transmitters are also used in radios and in
electronic article surveillance systems (EAS) found in retail stores. Inventory
management systems use RF transmitters as an alternative to barcodes.
31
SPECIFICATIONS
Symbol Parameter Conditions Min Type Max Unit
Vcc Operating 2.0 - 12 V
supply voltage
Icc Peak - - 1.64 mA
Current(2V)
Icc Peak - - 19.4 mA
Current(12V)
Vin Input High IData=100Ua Vcc- - Vcc V
Voltage (High) 0.5
Vii Input Low IData=0Ua - - 0.3 V
Voltage (Low)
Fo Absolute 433.72 433.92 434.12 MHz
Frequency
417.8 418 418.2 MHz
△FO Relative To +/-150 +/-200 KHz
433.92MHz
32
PIN DETAILS
Pin
Function Name
No
1 Ground (0V) Ground
2 Serial data Data
input pin
3 Supply Vcc
voltage; 5V
4 Antenna ANT
output pin
HT12E ENCODER
33
using the paired HT12E encoder and HT12D decoder we can easily transmit
and receive 12 bits of parallel data serially. HT12E simply converts 12 bit
parallel data in to serial output which can be transmitted through a RF
transmitter. These 12 bit parallel data is divided in to 8 address bits and 4 data
bits. By using these address pins we can provide 8 bit security code for data
transmission and multiple receivers may be addressed using the same
transmitter.
Features
Operating voltage
2.4V~12V for the HT12E
Low power and high noise immunity CMOS technology
Low standby current: 0 (typ.) at VDD=5V
HT12A with a 38kHz carrier for infrared transmission medium
Minimum transmission word
Four words for the HT12E
Built-in oscillator needs only 5% resistor
Data code has positive polarity
Minimal external components
HT12A/E: 18-pin DIP/20-pin SOP package
APPLICATIONS
Burglar alarm system
Smoke and fire alarm system
Garage door controllers
Car door controllers
Car alarm system
Security system
Cordless telephones
Other remote control systems
34
INTERNAL BLOCK DIAGRAM
35
Fig 4.30 OSC1 AND OSC2
TE is used for enabling the transmission and is an active low input.
A0 – A7 are the input address pins. By using these pins we can provide a
security code for the data. These pins can be connected to VSS or left open.
D8 – D11 are the input data pins. These pins can be connected to VSS or may
left open for sending LOW and HIGH respectively.
DOUT – It is the serial data output of the encoder and can be connected to a
RF transmitter.
WORKING
The HT12E 212 series encoder starts a 4 word transmission cycle upon receiving
transmission enable signal on TE input. This output cycle will repeat as long as
the transmission is enabled. When the transmission enable (TE) signal switches
to HIGH, the encoder output completes the current cycle and stops as shown
below. The encoder will be in the Standby mode when the transmission is
disabled.
36
DATA FLOW DIAGRAM
37
CIRCUIT DIAGRAM
38
WORKING PRINCIPLE
39
SPECIFICATIONS
Voltage : 12 VDC
Current : 0.1A
RPM : 10- 50 rpm
Temperature : up to 40 0 C
Weight: 130.00g
Length: 80mm
Torque: 1.5 kg.cm
Shaft Diameter: 6mm
MOTOR DRIVER
The L293 and L293D are quadruple high-current half-H drivers. The
L293 is designed to provide bidirectional drive currents of up to 1 A at voltages
from 4.5 V to 36 V. The L293D is designed to provide bidirectional drive
currents of up to 600-mA at voltages from 4.5 V to 36 V. Both devices are
designed to drive inductive loads such as relays, solenoids, dc and bipolar
stepping motors, as well as other high-current/high-voltage loads in positive-
supply applications. All inputs are TTL compatible. Each output is a complete
totem-pole drive circuit, with a Darlington transistor sink and a pseudo-
Darlington source. Drivers are enabled in pairs, with drivers 1 and 2 enabled by
1,2EN and drivers 3 and 4 enabled by 3,4EN. When an enable input is high, the
associated drivers are enabled, and their outputs are active and in phase with
their inputs. When the enable input is low, those drivers are disabled, and their
outputs are off and in the high-impedance state. With the proper data inputs,
each pair of drivers forms a full-H (or bridge) reversible drive suitable for
solenoid or motor applications.
40
On the L293, external high-speed output clamp diodes should be used for
inductive transient suppression. A VCC1 terminal, separate from VCC2, is
provided for the logic inputs to minimize device power dissipation. The
L293and L293D are characterized for operation from 0°C to 70°C.
PIN DETAIL
41
LOGICAL DIAGRAM
42
TABLE 4.6 OPERATION OF TWO MOTORS
The motor operations of two motors can be controlled by input logic at pins 2 &
7 and 10 & 15. Input logic 00 or 11 will stop the corresponding motor. Logic 01
and 10 will rotate it in clockwise and anticlockwise directions, respectively.
Enable pins 1 and 9 (corresponding to the two motors) must be high for motors
to start operating. When an enable input is high, the associated driver gets
enabled. As a result, the outputs become active and work in phase with their
inputs. Similarly, when the enable input is low, that driver is disabled, and their
outputs are off and in the high-impedance state.
CONNECTION DIAGRAM
43
L293D MOTOR DRIVER BOARD
L293D SPECIFICATIONS
External Power 9V to 24V DC
Dimensional Size : 44mm x 37mm x 14mm (l x b x h)
Temperature Range : 0°C to +70 °C
PIC16F887A MICROCONTROLLER
PIC16F877 belongs to a class of 8-bit microcontrollers of RISC architecture.
It has 8kb flash memory for storing a written program. Since memory made in
FLASH technology can be programmed and cleared more than once, it makes
this microcontroller suitable for device development. IT has data memory that
needs to be saved when there is no supply. It is usually used for storing
important data that must not be lost if power supply suddenly stops. For
instance, one such data is an assigned temperature in temperature regulators. If
during a loss of power supply this data was lost, we would have to make the
adjustment once again upon return of supply.
44
RISC architecture
o Only 35 instructions to learn
o All single-cycle instructions except branches
46
PIN Diagram:-
BLOCK DIAGRAM
47
RELAY
Relays are simple switches which are operated both electrically and
mechanically. Relays consist of a n electromagnet and also a set of contacts.
The switching mechanism is carried out with the help of the electromagnet.
There are also other operating principles for its working. But they differ
according to their applications. Most of the devices have the application of
relays.
48
There are only four main parts in a relay. They are
Electromagnet
Movable Armature
Switch point contacts
Spring
49
to their type they are called by the names break before make and make
before breakcontacts.
RELAY TYPES:
Single Pole Single Throw (SPST) – This type of relay has a total of four
terminals. Out of these two terminals can be connected or disconnected.
The other two terminals are needed for the coil.
Single Pole Double Throw (SPDT) – This type of a relay has a total of
five terminals. Out f these two are the coil terminals. A common terminal
is also included which connects to either of two others.
Double Pole Single Throw (DPST) – This relay has a total of six
terminals. These terminals are further divided into two pairs. Thus they
can act as two SPST’s which are actuated by a single coil. Out of the six
terminals two of them are coil terminals.
Double Pole Double Throw (DPDT) – This is the biggest of all. It has
mainly eight relay terminals. Out of these two rows are designed to be
change over terminals. They are designed to act as two SPDT relays
which are actuated by a single coil.
50
Fig 4.49 RELAY TYPE
51
CONDITION II: RELAY IN OFF STATE.
Coil is de-energized.
Contact in NC position then load is de activated.
52
RELAY BOARD
RELAY APPLICATIONS
Relays are used to realize logic functions. They play a very
important role in providing safety critical logic.
Relays are used to provide time delay functions. They are used to
time the delay open and delay close of contacts.
Relays are used to control high voltage circuits with the help of low
voltage signals. Similarly they are used to control high current
circuits with the help of low current signals.
53
They are also used as protective relays. By this function all the
faults during transmission and reception can be detected and
isolated.
GSM
o GSM (Global System for Mobile) / GPRS (General Packet Radio
Service) TTL –Modem is SIM900 Quad-band GSM / GPRS
device, works on frequencies 850 MHZ, 900 MHZ, 1800MHZ and
1900 MHZ. It is very compact in size and easy to use as plug in
GSM Modem.
The Modem is designed with 3V3 and 5V DC TTL interfacing
circuitry, which allows User to directly interface with 5V
Microcontrollers (PIC, AVR, Arduino, 8051, etc.) as well as
3V3Microcontrollers (ARM, ARM Cortex XX, etc.). The baud rate can
be configurable from 9600-115200 bps through AT (Attention)
commands. This GSM/GPRS TTL Modem has internal TCP/IP stack to
enable User to connect with internet through GPRS feature. It is
suitable for SMS as well as DATA transfer application in mobile phone
to mobile phone interface.
The modem can be interfaced with a Microcontroller using USART
(Universal Synchronous Asynchronous Receiver and Transmitter)
feature (serial communication).
The equipment was limited to operate only within the boundaries of each
country.
Spectrum efficiency
International roaming
55
each component of the system, and to provide guidance on the design of the
system. These specifications will then standardize the system in order to
guarantee the proper inter-working between the different elements of the
GSM system. In 1990, the phase I of the GSM specifications was published
but the commercial use of GSM did not start until mid-1991. The most
important events in the development of the GSM system are presented in the
table 1.
Year Events
CEPT establishes a GSM group in order to develop the standards for
1982
a pan-European cellular mobile system
TDMA is chosen as access method (in fact, it will be used with
1987 FDMA) Initial Memorandum of Understanding (MoU) signed by
telecommunication operators (representing 12 countries)
1989 The responsibility of the GSM specifications is passed to the ETSI
1990 Appearance of the phase 1 of the GSM specifications
1991 Commercial launch of the GSM service
Enlargement of the countries that signed the GSM- MoU> Coverage
1992
of larger cities/airports
1993 Coverage of main roads GSM services start outside Europe
1995 Phase 2 of the GSM specifications Coverage of rural areas
From the evolution of GSM, it is clear that GSM is not anymore only a
European standard. GSM networks are operational or planned in over 80
countries around the world. The rapid and increasing acceptance of the GSM
system is illustrated with the following figures:
56
1.3 million GSM subscribers worldwide in the beginning of 1994.
Over 5 million GSM subscribers worldwide in the beginning of 1995.
Over 10 million GSM subscribers only in Europe by December 1995.
Since the appearance of GSM, other digital mobile systems have been
developed. The table 2 charts the different mobile cellular systems developed
since the commercial launch of cellular systems.
EVOLUTION OF GSM
GSM is a global system for mobile communication GSM is
an international digital cellular telecommunication. The GSM standard was
released by ETSI (European Standard Telecommunication Institute) back in
1989. The first commercial services were launched in 1991 and after its early
introduction in Europe; the standard went global in 1992. Since then, GSM has
become the most widely adopted and fastest-growing digital cellular standard,
and it is positioned to become the world’s dominant cellular standard.
Today’s second-generation GSM networks deliver high quality and secure
mobile voice and data services (such as SMS/ Text Messaging) with full
roaming capabilities across the world. GSM platform is a hugely successful
technology and as unprecedented story of global achievement. In less than ten
years since the first GSM network was commercially launched, it become, the
world’s leading and fastest growing mobile standard, spanning over 173
countries. Today, GSM technology is in use by more than one in ten of the
world’s population and growth continues to sour with the number of subscriber
worldwide expected to surpass one billion by through end of 2003.
Today’s GSM platform is living, growing and evolving and already offers an
expanded and feature-rich ‘family’ of voice and enabling services.
The Global System for Mobile Communication (GSM) network is a cellular
telecommunication network with a versatile architecture complying with the
ETSI GSM 900/GSM 1800 standard. Siemen’s implementation is the digital
57
cellular mobile communication system D900/1800/1900 that uses the very latest
technology to meet every requirement of the standard.
The following GSM generation passed in 3decades:
1G Analog Communication
2G Digital Communications
2.5G GPRS
2.75G EDGE
3G Enhanced feature of Video call
4G High-speed Wireless Broadband
GSM NETWORK
A GSM network is composed of several functional entities, whose functions and
interfaces are specified. The GSM network can be divided into three broad
parts.
The Mobile Station is carried by the subscriber. The Base Station Subsystem
controls the radio link with the Mobile Station. The Network Subsystem, the
main part of which is the Mobile services Switching Center (MSC), performs
the switching of calls between the mobile users, and between mobile and fixed
network users. The MSC also handles the mobility management operations.
Not shown is the Operations and Maintenance Center, which oversees the
proper operation and setup of the network. The Mobile Station and the Base
Station Subsystem communicate across the Um interface, also known as the air
interface or radio link. The Base Station Subsystem communicates with the
Mobile services Switching Center across the A interface.
58
Fig 4.54 GSM NETWORK
MOBILE STATION:
Mobile Equipment (ME) such as hand portable and vehicle mounted unit.
Subscriber Identity Module (SIM), which contains the entire customer related
information (identification, secret key for authentication, etc.). The SIM is a
small smart card, which contains both programming and information. The A3
and A8 algorithms are implemented in the Subscriber Identity Module (SIM).
Subscriber information, such as the IMSI (International Mobile Subscriber
Identity), is stored in the Subscriber Identity Module (SIM). The Subscriber
Identity Module (SIM) can be used to store user-defined information such as
phonebook entries. One of the advantages of the GSM architecture is that the
SIM may be moved from one Mobile Station to another. This makes upgrades
very simple for the GSM telephone user. The use of SIM card is mandatory in
the GSM world, whereas the SIM (RUIM) is not very popular in the CDMA
world.
Base Station Subsystem (BSS):
All radio-related functions are performed in the BSS, which consists of
base Station controllers (BSCs) and the base transceiver stations (BTSs).
59
Base Transceiver Station (BTS):
The Base Transceiver Station (BTS) contains the equipment for
transmitting and receiving of radio signals (transceivers), antennas, and
equipment for encrypting and decrypting communications with the Base Station
Controller (BSC).A group of BTSs are controlled by a BSC. Typically a BTS
for anything other than a pico cell will have several transceivers (TRXs), which
allow it to serve several different frequencies and different sectors of the cell (in
the case of sectorised base stations). A BTS is controlled by a parent BSC via
the Base Station Control Function (BCF). The BCF is implemented as a discrete
unit or even incorporated in a TRX in compact base stations. The BCF provides
an Operations and Maintenance (O&M) connection to the Network
Management System (NMS), and manages operational states of each TRX, as
well as software handling and alarm collection.
Base Station Controller(BSC):
The BSC controls multiple BTSs and manages radio channel setup, and
handovers. The BSC is the connection between the Mobile Station and Mobile
Switching Center. The Base Station Controller (BSC) provides, classicaly, the
intelligence behind the BTSs. Typically a BSC has 10s or even 100s of BTSs
under its control. The BSC handles allocation of radio channels, receives
measurements from the mobile phones, controls handovers from BTS to BTS. A
key function of the BSC is to act as a concentrator where many different low
capacity connections to BTSs become reduced to a smaller number of
connections towards the Mobile Switching Center (MSC) (with a high level of
utilisation). Overall, this means that networks are often structured to have many
BSCs distributed into regions near their BTSs which are then connected to large
centralised MSC sites.
The BSC is undoubtedly the most robust element in the BSS as it is not
only a BTS controller but, for some vendors, a full switching center, as well as
an SS7 node with connections to the MSC and SGSN. It also provides all the
60
required data to the Operation Support Subsystem (OSS) as well as to the
performance measuring centers. A BSC is often based on a distributed
computing architecture, with redundancy applied to critical functional units to
ensure availability in the event of fault conditions. Redundancy often extends
beyond the BSC equipment itself and is commonly used in the power supplies
and in the transmission equipment providing the A-ter interface to PCU. The
databases for all the sites, including information such as carrier frequencies,
frequency hopping lists, power reduction levels, receiving levels for cell border
calculation, are stored in the BSC.
Network Switching Subsystem (NSS):
Network Switching Subsystem is the component of a GSM system that
carries out switching functions and manages the communications between
mobile phones and the Public Switched Telephone Network. It is owned and
deployed by mobile phone operators and allows mobile phones to communicate
with each other and telephones in the wider telecommunications network. The
architecture closely resembles a telephone exchange, but there are additional
functions which are needed because the phones are not fixed in one location.
There is also an overlay architecture on the GSM core network to provide
packet-switched data services and is known as the GPRS core network. This
allows mobile phones to have access to services such as WAP, MMS, and
Internet access. All mobile phones manufactured today have both circuit and
packet based services, so most operators have a GPRS network in addition to
the standard GSM core network.
Mobile Switching Centre (MSC):
The Mobile Switching Centre or MSC is a sophisticated telephone
exchange, which provides circuit-switched calling, mobility management, and
GSM services to the mobile phones roaming within the area that it serves. This
means voice, data and fax services, as well as SMS and call divert. In the GSM
mobile phone system, in contrast with earlier analogue services, fax and data
61
information is sent directly digitally encoded to the MSC. Only at the MSC is
this re-coded into an "analogue" signal. There are various different names for
MSCs in different context, which reflects their complex role in the network, all
of these terms though could refer to the same MSC, but doing different things at
different times.
A Gateway MSC is the MSC that determines which visited MSC the
subscriber who is being called is currently located. It also interfaces with the
Public Switched Telephone Network. All mobile to mobile calls and PSTN to
mobile calls are routed through a GMSC. The term is only valid in the context
of one call since any MSC may provide both the gateway function and the
Visited MSC function, however, some manufacturers design dedicated high
capacity MSCs which do not have any BSCs connected to them. These MSCs
will then be the Gateway MSC for many of the calls they handle. The Visited
MSC is the MSC where a customer is currently located. The VLR associated
with this MSC will have the subscriber's data in it. The Anchor MSC is the
MSC from which a handover has been initiated. The Target MSC is the MSC
toward which a Handover should take place. An MSC Server is a part of the
redesigned MSC concept starting from 3GPP Release 5.
FREQUENCY BAND USAGE:
Since radio spectrum is a limited resource shared by all users, a method
must be devised to divide up the bandwidth among as many users as possible.
The method chosen by GSM is a combination of Time- and Frequency-Division
Multiple Access (TDMA/FDMA). The FDMA part involves the division by
frequency of the (maximum) 25 MHz bandwidth into 124 carrier frequencies
spaced 200 kHz apart. One or more carrier frequencies are assigned to each base
station. Each of these carrier frequencies is then divided in time, using a TDMA
scheme. The fundamental unit of time in this TDMA scheme is called a burst
period and it lasts 15/26 ms (or approx. 0.577 ms). Eight burst periods are
grouped into a TDMA frame (120/26 ms, or approx. 4.615 ms), which forms the
62
basic unit for the definition of logical channels. One physical channel is one
burst period per TDMA frame. Channels are defined by the number and
position of their corresponding burst periods. All these definitions are cyclic,
and the entire pattern repeats approximately every 3 hours. Channels can be
divided into dedicated channels, which are allocated to a mobile station, and
common channels, which are used by mobile stations in idle mode. A traffic
channel (TCH)is used to carry speech and data traffic. Traffic channels are
defined using a 26-frame multiframe, or group of 26 TDMA frames. The length
of a 26-frame multiframe is 120 ms, which is how the length of a burst period is
defined (120 ms divided by 26 frames divided by 8 burst periods per frame).
Out of the 26 frames, 24 are used for traffic, 1 is used for the Slow Associated
Control Channel (SACCH) and 1 is currently unused. TCHs for the uplink and
downlink are separated in time by 3 burst periods, so that the mobile station
does not have to transmit and receive simultaneously, thus simplifying the
electronics. In addition to these full-rate TCHs, there are also half-rate TCHs
defined, although they are not yet implemented. Half-rate TCHs will effectively
double the capacity of a system once half-rate speech coders are specified (i.e.,
speech coding at around 7 kbps, instead of 13 kbps). Eighth-rate TCHs are also
specified, and are used for signalling. In the recommendations, they are called
Stand-alone Dedicated Control Channels (SDCCH).
63
Organization of bursts, TDMA frames, and multiframes for speech and
data GSM is a digital system, so speech which is inherently analog, has to be
digitized. The method employed by ISDN, and by current telephone systems for
multiplexing voice lines over high speed trunks and optical fiber lines, is Pulse
Coded Modulation (PCM). The output stream from PCM is 64 kbps, too high a
rate to be feasible over a radio link. The 64 kbps signal, although simple to
implement, contains much redundancy. The GSM group studied several speech
coding algorithms on the basis of subjective speech quality and complexity
(which is related to cost, processing delay, and power consumption once
implemented) before arriving at the choice of a Regular Pulse Excited – Linear
Predictive Coder (RPE--LPC) with a Long Term Predictor loop. Basically,
information from previous samples, which does not change very quickly, is
used to predict the current sample. The coefficients of the linear combination of
the previous samples, plus an encoded form of the residual, the difference
between the predicted and actual sample, represent the signal. Speech is divided
into 20 millisecond samples, each of which is encoded as 260 bits, giving a total
bit rate of 13 kbps. This is the so-called Full-Rate speech coding. Recently, an
Enhanced Full-Rate (EFR) speech-coding algorithm has been implemented by
some North American GSM1900 operators. This is said to provide improved
speech quality using the existing 13 kbps bit rate.
WORKING
The GSM module is connected with the controller. As the controller is
keep on monitoring the doors and locker key, when the door get opened, the
microcontroller sends the command “AT” to initiate the module. Now the
module sends an sms as “Theft Occurred” to the already fed mobile number.
Thus the information is passed from the module to the Authorized person.
Whenever it receives the correct password from the mobile, it will inform the
microcontroller to open the door.
64
SMS IN GSM
SMS stands for Short Message Service. It is a technology that enables the
sending and receiving of message between mobile phones. SMS first appeared
in Europe in 1992. It was included in the GSM (Global System for Mobile
Communication) standards right at the beginning. Later it was ported to wireless
technologies like CDMA and TDMA. The GSM and SMS standards were
originally developed by ETSI. ETSI is the abbreviation for European
Telecommunication Standard Institute.
Now the 3GPP (Third Generation Partnership Project) is responsible for the
development and maintenance of the GSM and SMS standards.
One SMS message can contain at most 140 bytes (1120 bits) of data, so one
SMS message can contain up to:
• 160 characters if 7-bit character encoding is used. (7-bit character
encoding is suitable for encoding Latin characters like English alphabets.)
• 70 characters if 16-bit Unicode UCS2 character encoding is used. (SMS
text messages containing non-Latin characters like Chinese character should use
16-bit character encoding.)
Once the message is sent the message is received by SMSC, which must then
get it to the appropriate mobile device. To do this the SMSC sends a SMS
request to Home Location Register (HLR) to find the roaming customer. Once
HLR receives the request, it responds to the SMSC with the subscriber’s status:
Inactive or active
Where subscriber is roaming.
65
COMMANDS USED IN GSM MODEM
In order to send a SMS, the modem has to be put in SMS text mode first using
the following command:
AT+CMGF=1 <ENTER>
If the modem responds with error, either the modem does not support SMS text
mode, or the SIM card is not ready. In this case please check that the SIM card
is inserted and the pin code is entered.
Reading a message
To list a single message, you have to use the read command. You must use the
list command first, so you know the indexes of the messages in the storage. For
instance, to read the message on memory location '2' use:
AT+CMGR=2 <ENTER>
The modem will list the single message:
+CMGR: "REC READ","+31625012254",,"07/07/05,09:56:03+08"
Test message 2
OK
66
Some advanced GSM modems like Waveform and Multitask, support the SMS
text mode. This mode allows you to send SMS messages using AT commands,
without the need to encode the binary PDU field of the SMS first. This is done
by the GSM modem
To check if your modem supports this text mode, you can try the following
command:
You can now type the message text and send the message using the <CTRL>-
<Z> key combination:
Hello World ! <CTRL-Z>
After some seconds the modem will respond with the message ID of the
message, indicating that the message was sent correctly:
+CMGS: 62
67
SMS responding Relay or light power ON / OFF commands list.
68
DDMMYYHHMMSS# UPDATED TO RTC
*xxxxxxRONOFddmmyyhh TIME DEPENDENT ------
ddmmyyhh# RELAY ON/OFF
*xxxxxxPHON9791260935# OWNER NUMBER OWNER NUBER
CHANGING CHANGED
COMMAND
69
Fig 4.56 SIMCOM SIM900A GSM MODULE
SIMCom SIM900A GSM Module:
This is actual SIM900 GSM module which is manufactured by SIMCom.
Designed for global market, SIM900 is a quad-band GSM/GPRS engine that
works on frequencies GSM 850MHz, EGSM 900MHz, DCS 1800MHz and
PCS 1900MHz.SIM900 features GPRS multislot class 10/ class 8 (optional) and
supports the GPRS coding schemes CS-1, CS-2, CS-3 and CS-4. With a tiny
configuration of 24mm x 24mm x 3mm, SIM900 can meet almost all the space.
ALHOCOL SENSOR
70
once. Some detectors may be utilized as individual units to monitor small
workspace areas, or units can be combined or linked together to create a
protection system.
WORKING PRINCIPLE
A reliable method of measurement for gas quantity is found in a gas sensor
based on taguchi principle .this gas sensor is essentially heated element inside a
porous semi conductive tube. The tube has a large surface and is able to freely
absorb gas modules on the semiconductor surface. Electron transfer occurs
between the gas molecules and the already absorbed oxygen molecules. This
causes a relatively large increase in conductivity for a small change in gas
concentration. This change occurs quite quickly.
71
CONNECTION DIAGRAM
The command register stores the command instructions given to the LCD. A
command is an instruction given to LCD to do a predefined task like
73
Initializing it
Clearing its screen,
Setting the cursor position,
Controlling display & etc.
The data register stores the data to be displayed on the LCD. The data is the
ASCII value of the character to be displayed on the LCD. Click to learn more
about internal structure of a LCD.
LCD COMMANDS
74
LCD PIN CONFIGURATION
75
LCD CONFIGURATION FLOW CHART
BACKLIGHT(SIDE):LED(WHITE)
MPLAB IDE
MPLAB IDE is a software program that runs on a PC to develop
76
applications for Microchip Microcontrollers. It is called an Integrated
Development Environment, or IDE, because it provides a single integrated
“environment” to develop code for embedded microcontrollers.
An embedded system is typically a design making use of the power of a
small microcontroller. These microcontrollers combine a microprocessor unit
(like the CPU in a desktop PC) with some additional circuits called
“peripherals”, plus some additional circuits on the same chip to make a small
control module requiring few other external devices. This single device can
then be embedded into other electronic and mechanical devices for low-cost
digital control.
The main difference between an embedded controller and a PC is that the
embedded controller is dedicated to one specific task or set of tasks. A PC is
designed to run many different types of programs and to connect to many
different external devices. An embedded controller has a single program and, as
a result, can be made cheaply to include just enough computing power and
hardware to perform that dedicated task. A PC has a relatively expensive
generalized central processing unit (CPU) at its heart with many other external
devices (memory, disk drives, video controllers, network interface circuits,
etc.). An embedded system has a low-cost microcontroller unit (MCU) for its
intelligence, with many peripheral circuits on the same chip, and with relatively
few external devices. Often, an embedded system is an invisible part, or sub-
module of another product, such as a cordless drill, refrigerator or garage door
opener. The controller in these products does a tiny portion of the function of
the whole device. The controller adds low-cost intelligence to some of the
critical sub-systems in these devices.
An example of an embedded system is a smoke detector. Its function is to
evaluate signals from a sensor and sound an alarm if the signals indicate the
presence of smoke. A small program in the smoke detector either runs in an
infinite loop, sampling the signal from the smoke sensor, or lies dormant in a
77
low-power “sleep” mode, being awakened by a signal from the sensor. The
program then sounds the alarm. The program would possibly have a few other
functions, such as a user test function, and a low battery alert. While a PC with
a sensor and audio output could be programmed to do the same function, it
would not be a cost-effective solution (nor would it run on a nine-volt battery,
unattended for years!) Embedded designs use inexpensive microcontrollers to
put intelligence into the everyday things in our environment, such as smoke
detectors, cameras, cell phones, appliances, automobiles, smart cards and
security systems.
The process for writing an application is often described as a
development cycle - as it is rare that all the steps from design to
implementation can be done flawlessly the first time. More often code is
written, tested and then modified in order to produce an application that
performs correctly. The Integrated Development Environment allows the
embedded systems design engineer to progress through this cycle without the
distraction of switching among an array of tools. By using MPLAB IDE, all the
functions are integrated, allowing the engineer to concentrate on completing the
application without the interruption of separate tools and different modes of
operation.
78
graphical user interface – usually automatically. For instance, once code is
written, it can be converted to executable instructions and downloaded into a
microcontroller to see how it works. In this process multiple tools are needed:
an editor to write the code, a project manager to organize files and settings, a
compiler or assembler to convert the source code to machine code and some
sort of hardware or software that either connects to a target microcontroller or
simulates the operation of a microcontroller.
79
4.3 CIRCUIT DIAGRAM
80
4.4 CIRCUIT CONNECTION TABLE
RX RC7
IP3 RC2
IP4 RC3
E RB2
D4 RB3
D5 RB4
D6 RB5
D7 RB6
81
RF FSK360, FOR TRANSMIT
TRANS/RECEIVER HT12D, AND RECEIVE
9 HT12E A RF SIGNAL 5V DIGITAL IP1 RC0
BOARD
IP2 RC1
IP3 RC2
IP4 RC3
DELET RD2
ADDR RD3
82
4.5 ADVANTAGES AND APPLICATION
ADVANTAGES
Accidents are reduced
Safety precaution is high
Low cost
High reliable
User friendly
APPLICATION
All type of four wheelers
Safety systems
83
CHAPTER 5
CONCLUSION
84
REFERENCES
and algorithms ,”IEEE Trans. Autom. Contr., vol. AC-32, no. 7, pp.593–
603.
846.
85
7. Yao, Y.; Chen, X.; Rao, L.; Liu, X.;2009, Zhou, X. “Lora: Loss
Communication Performance”.
86