[go: up one dir, main page]

0% found this document useful (0 votes)
27 views101 pages

v2v Communication Using Edge Computing For Safe Commute

Uploaded by

ANAND
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views101 pages

v2v Communication Using Edge Computing For Safe Commute

Uploaded by

ANAND
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 101

V2V COMMUNICATION

USING EDGE COMPUTING


FOR SAFE COMMUTE

A PROJECT REPORT

Submitted By

DEEPAK R (620819106013)

DINESHKUMAR M (620819106022)

KIRUBASANKAR R (620819106038)

SILAMBARASU B (620819106084)

in partial fulfillment for the award of the degree

of

BACHELOR OF ENGINEERING

IN

ELECTRONICS AND COMMUNICATION ENGINEERING

GNANAMANI COLLEGE OF TECHNOLOGY

PACHAL, NAMAKKAL -637018

ANNA UNIVERSITY : CHENNAI 600025


MAY 2023

i
ANNA UNIVERSITY : CHENNAI 600 025

BONAFIDE CERTIFICATE
Certified that this project report titled “V2V COMMUNICATION USING
EDGE COMPUTING FOR SAFE COMMUTE” is the bonafide work of
“DEEPAK R (620819106013), DINESHKUMAR M (620819106022),
KIRUBASANKAR R (6208191060538), SILAMBARASU B
(620819106084)” who carried out the project work under my supervision.

SIGNATURE SIGNATURE

Mr.R.PRABHU,M.E.,(Ph.D)., Mr.K.RAJA,.M.E.,
HEAD OF THE DEPARTMENT SUPERVISOR

ASSISTANT PROFESSOR

Electronics and Communication Electronics and Communication


Engineering, Engineering

Gnanamani college of Technology, Gnanamani college of Technology,

Pachal, Namakkal Pachal, Namakkal.

Submitted for the Anna University project viva-voce examination held


on_______

INTERNAL EXAMINER EXTERNAL EXAMINER

ii
ACKNOWLEDGEMENT
We would like to express our deep sense of heartiest thanks to our
beloved Chairman Dr. T. ARANGANNAL and Chairperson
Smt.P.MALALEENA Gnyanamani Educational Institutions, Namakkal, for
giving an opportunity to do and complete this project.
Ms.MADHUVANTHINIE ARANGANNAL, Vice Chairman, Gnyanamani
Educational Institutions, Namakkal, for her encouragement during our project.
We would like to express our sincere gratitude to our Chief
Administrative Officer Dr. P.PREMKUMAR Gnyanamani Educational
Institutions, Namakkal, for providing us with indefinable support.
We would like to express our deep sense of gratitude and profound thanks
to Dr. T. K.KANNAN, Principal, Gnanamani College of Technology,
Namakkal, for creating a beautiful atmosphere which inspired us to take over
this project.
We would like to express our deep sense of gratitude and profound thanks
to Academic Director Dr.B.SANJAY GANDHI Gnanamani College of
Technology, Namakkal, for creating a beautiful atmosphere which inspired us to
take over this project.

We take this opportunities to convey our heartiest thanks to


Mr.R.PRABHU, Head, Department of Electronics and Communication
Engineering, pillar of support for the successful completion of the project.

We are extremely grateful to our Project Coordinator, Dr.K.ANAND,


AP/ECE Electronics and Communication Engineering department, forgiving
this opportunity with full encouragement to complete this project.

We are thankful to our Project Guide Mr. K RAJA AP/ECE


Electronics and Communication Engineering department, for providing good
suggestions and help me to make this project success.

We express our sincere words of thanks to our parents, friends and all staff
members of Department Electronics and Communication Engineering,
Gnanamani College of Technology, for their blessing to complete the project
successfully.

iii
DECLARATION
We affirm that the project work titled “V2V COMMUNICATION USING
EDGE COMPUTING FOR SAFE COMMUTE” being submitted in partial
fulfillment for the award for B.E(ELECTRONIS AND COMMUNICATION
ENGINEERING) is the original work carried out by us. It has not formed the
part of any other project work submitted for award of any degree or diploma,
either in this or any other university.

DEEPAK R (620819106013)

DINESHKUMAR M (620819106022)

KIRUBASANKAR R (620819106038)

SILAMBARASU B (620819106084)

I certify that the declaration made above by the candidates are true

SIGNATURE

Mr.K.RAJA M.E.,

ASSISTANT PROFESSOR,

DEPARTMENT OF ECE

iv
INSTITUTE VISION AND MISSION STATEMENTS
VISION
Emerging gas a technical institution of high standard and excellence to provide
quality Engineers, Researches, Administrators and Entrepreneurs with ethical
and moral values to contribute the sustainable development of the society

MISSION
We facilities our students

MI1: To have in-depth domain knowledge with analytical and practical skills in
cutting edge Technologies by imparting quality technical education.

MI2: To be industry ready and multi-skilled personalities to transfer technology


to industries and rural areas by creating interests among students in Research
and Development and Entrepreneurship.

DEPARTMENT VISION AND MISSION STATEMENTS


VISION
To produce globally competent, innovative, ethical, socially responsible and
academically excellent graduates in Electronics and Communication
Engineering

MISSION

MD1:Imparting high quality education with value added programs through


state-of-art facilities to prepare technically strong engineers with social
awareness.

MD2:Addressing the need of the people’s aspirations and to our local needs on
the emerging technology.

MD3:Promoting excellence towards productive careers in industry, research


and Enterpreneurship.

v
PROGRAM EDUCATIONAL OBJECTIVE (PEOs)

Graduates of Electronics and Communication Engineering will

PEO 1
Be able to apply Mathematics, Science and Engineering fundamentals and
advanced concepts for their successful careers in industries, higher studies and
research.

PEO 2
Analyze, Design and execute interdisciplinary projects by addressing the
industrial and social needs.

PEO 3
Demonstrate and exhibit professional practice with ethical behavior and engage
in continuous learning career growth.

Program Outcomes (POs) for B.E-Electronics and Communication


Engineering

Apply the Knowledge of mathematics,


science, engineering fundamentals and an
PO1 Engineering
engineering specialization to the solution of
knowledge
complex engineering problems.

Identify, formulate, review research literature,


and analyze complex engineering problems
PO2 Problem analysis reaching substantiated conclusions using first
principles of mathematics, natural sciences,
and engineering sciences.

vi
Design solutions for complex engineering
problems and design system components or
PO3 Design /
processes that meet the specified needs with
development of
appropriate consideration for the public
solutions
health and safety, and the cultural, societal,
and environmental considerations.

Conduct Use research-based knowledge and research


investigations of methods including design of experiments,
PO 4
complex problems analysis and interpretation of data, and
synthesis of the information to provide valid
conclusions

Create select, and apply appropriate


techniques resources, and modern
PO 5 Modern tool usage
engineering and IT tools including to
complex engineering activities with an
understanding of the limitations.

Apply reasoning informed by the contextual


knowledge to assess societal. health, safety,
PO 6 The engineer and
legal and cultural issues and the consequent
society responsibilities relevant to the professional
engineering practice.

Understand the impact of the professional


engineering solutions in societal and
Environment and
environmental contexts, and demonstrate the
PO 7 sustainability knowledge of, and need for sustainable
development.

Apply ethical principles and commit to


professional ethics and responsibilities and
PO 8 Ethics
norms of the engineering practice.

vii
Function effectively as an individual, and as
a member or leader in diverse teams, and in
PO 9 Individual and
multidisciplinary settings.
teamwork

Communicate effectively on complex


engineering activities with the engineering
community and with society at large, such as,
PO 10 Communication being able to comprehend and write effective
reports and design documentation, make
effective presentations, and give and receive
clear instructions.

Demonstrate knowledge and understanding


of the engineering and management
principles and apply these to one's own work,
PO 11 Management and as a member and leader in a team, to manage
projects and in Multi disciplinary
finance environments.

Recognize the need for, and have the


preparation and ability to engage in
PO 12 Life-long learning independent and life-long learning in the
broadest context of technological change.

List of Program Specific Outcomes (PSOs):


PSO 1: Possess knowledge and skills to work on analog and digital systems,
Adhoc and sensor networks, embedded and communication systems.

PSO 2: Adapt to emerging technologies with required skills and to offer


solutions to the novel problems and succeed in their career.

viii
ABSTRACT

In our project, we proposed the V2V technique in the field of accident

safety. Here we proposed, each module are installed in the each vehicles to

sense the status of alcohol consumption of driver, status of vehicle speed, status

of drowsiness of the driver, status of vehicle brake by means of corresponding

sensor and microcontroller. RF transceiver is used for V2V wireless sensor

network communication. V2V is used for communicating the status of the

vehicle to other vehicles. RF range is about 300 meters. The status of the

vehicle can be communicated while the other vehicles are come inside the RF

range. One vehicle vehicle’s status is indicated by voice to other vehicles if

abnormal status is occurred.

ix
TABLE OF CONTENTS

CHAPTER NO TITLE PAGE NO

ABSTRACT ix

LIST OF FIGURES xi

LIST OF TABLES xv

1 INTRODUCTION 1

2 LITERATURE REVIEW 2

3 EXISTING METHOD 5

4 PROPOSED METHOD 7

4.1 Work Principle 9

4.2 Component Used 13

4.3 Circuit Diagram 80

4.4 Circuit Connection Table 81

4.5 Advantages And Application 83

5 CONCLUSION 84

REFERENCES 85

x
LIST OF FIGURES

CHAPTER NO FIGURES PAGE NO

3 3.1 Vehicle Unit 1 5


3.2 Vehicle Unit 2 6

4 4.1 Vehicle Unit 1 7


4.2 Vehicle Unit 2 8
4.3 Construction Diagram 10

4.4 Unit 1 Work Flow Chart 11

4.5 Unit 2 Work Flow Chart 12

4.6 Battery 13

4.7 Working Principle 14

4.8 Filter Block Diagram 16

4.9 Filter Circuit Diagram 16

4.10 Voltage Regulator IC 17

4.11 Connection Diagram Of


Voltage Regulator IC 17

4.12 Power Supply Module 18

4.13 RF Receiver 20

4.14 Pin Description 21

4.15 Antenna 22

xi
4.16 Decoder Ht12d 23

4.17 Pin Details 25

4.18 Osc1 And Osc2 25

4.19 Internal Block Diagram 26

4.20 Timing Diagram 27

4.21 Data Flow Chart 28

4.22 Application Diagram 29

4.23 Circuit Diagram 29

4.24 Module 30

4.25 Transmitter Module 31

4.26 Pin Details 33

4.27 Ht12e Encoder 33

4.28 Internal Block Diagram 35

4.29 Pin Details 35

4.30 Osc1 And Osc2 36

4.31 Timing Diagram For Ht12e 36

4.32 Data Flow Diagram 37

4.33 Application Diagram 37

4.34 Circuit Diagram 38

4.35 Dc Motor 38

4.36 Fleming’s Left Hand Rule 39

4.37 Motor Driver 41

xii
4.38 Pin Details L293d 41

4.39 Logic Diagram 42

4.40 Motor Operations 42

4.41 Connection Diagram 43

4.42 L293d Motor Driver Board 44

4.43 Pic16f877/874 Pin Diagram 47

4.44 Block Diagram 47

4.45 Relay 48

4.46 Normal Open Contact (No) 49

4.47 Normal Closed Contact (Nc) 49

4.48 Change-Over (Co)/

Double Throw (Dt) Contact 50

4.49 Relay Type 51

4,50 Relay In On State 51

4.51 Relay In Off State 52

4.52 Relay Connection Circuit 52

4.53 Relay Board 53

4.54 GSM Network 59

4.55 Stand-Alone Dedicated


Control Channel 63

4.56 SIMCOM Sim900a GSM Module 70

4.57 Alcohol Sensor 71

xiii
4.58 Connection Diagram 72

4.59 Gas Sensor Module 72

4.60 LCD 73

4.61 LCD Connection Diagram 75

4.62 LCD Configuration Flow Chart 76

4.63 Design Cycle 78

4.64 MPLAB IDE 79

4.65 MPLAB IDE Window 79

4.66 Circuit Diagram 80

xiv
List Of Tables

Chapter No Tables Page No

4 4.1 Specification 15

4.2 Electrical Characteristics 21

4.3 Pin Descryption 22

4.4 Specification 32

4.5 Pin Details 33

4.6 Operation Of Two Motors 43

4.7 History Of Cellular Mobile

Radio 56

4.8 Command List Of Sms

Responding Relay 69

4.9 Specifications 72

4.10 Lcd Commands 74

4.11 Lcd Pin Configuration 75

4.12 Circuit Connection Table 82

xv
CHAPTER 1
INTRODUCTION

V2V communication, also known as vehicle-to-vehicle communication, enables


vehicles to exchange information with each other using wireless technology.
One of the commonly used systems for V2V communication is the RF (Radio
Frequency) system. RF-based V2V communication allows vehicles to share
critical data, such as speed, Drivers status information, to improve road safety
and enable advanced driving features. Considering these factors, we propose a
system design to cater all the situations. Our proposed framework converts the
conventional vehicles into connected vehicles as long as they are present in the
premises. Our device monitors the speed of the vehicle and alerts the vehicle
driver and the security station if the speed limit is violated. We use 433Mhz
radio transceivers to exchange the information wirelessly and develop a
connected vehicles environment. The device is mounted on the vehicle as it
enters and is removed as the vehicle exits the premises. The vehicles dedicated
for the in premise transportation are always equipped with the device. For the on
premise vehicles, the device is also interfaced with the vehicle power train
controller.

1
CHAPTER 2
LITREATURE REVIEW

Orkun Karabasoglu ,SYSU-CMU Joint Institute of Engineering,


Guangzhou, China.Turning Conventional Vehicles in Secured Areas into
Connected Vehicles for Safety Applications,978-1-4,IEEE
Remote and mobile vehicular monitoring has become a very important
need since over speeding vehicles or reckless driving can be a threat to life and
property. In this work, we propose a framework to convert the conventional
vehicles into connected vehicles in secured areas such as educational
institutions, residential societies, hospitals and etc. where the entry and exit
points are secured by gates. We designed a GPS based wireless hardware
system to monitor the speed and location of a moving vehicle. As the
conventional vehicle enters through the gate, the security guard gives this
device to the driver and removes it when the vehicle exits. Once activated inside
the region, the system monitors the speed of the vehicle and communicates any
rule violations to the security station in the premises and also to the driver. If the
speed of the vehicle increases beyond the threshold limit, the vehicle driver is
alerted and a warning message is communicated to the system. A record of the
driving patterns is separately maintained at the receiver unit so that the
penalizing action can be taken against the defaulters. The effectiveness of the
proposed system is validated with the results of a field trial with different
drivers, with and without our hardware prototype installed in the vehicle for a
period of two days on a pre-defined route. The average number of over speeds
from day 1 to day 2 was reduced by. Our system is promising to increase safety
in secured residential areas.

2
Robert H. Chen, and Jason L. Speyer, A Vehicle Health Monitoring System
Evaluated Experimentally on a Passenger Vehicle, IEEE
TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 14,
NO. 5, SEPTEMBER 2014
A vehicle health monitoring system based on analytical redundancy, is
developed for automated passenger vehicles. A residual generator and a residual
processor are designed together to detect and identify actuator and sensor faults
of the Buick LeSabre rapidly. The residual generator includes fault detection
filters and parity equations. It uses the control commands and sensor
measurements to generate the residuals, which have a unique static pattern in
response to each fault. Then, the residual processor interrogates the residuals by
matching them to one of several known patterns. It computes the probability of
each hypothesis conditioned on the history of residuals. The fault detection
latency is reduced by integrating the design of the residual generator and the
residual processor. The vehicle health monitoring system is evaluated in real-
time on a Buick LeSabre. The vehicle sensor and actuator faults are simulated
artificially by the computer or created manually by the driver. In one
experiment, a real intermittent sensor fault occurred and was immediately
detected and identified. The real-time evaluation demonstrates that the vehicle
health monitoring system can detect and identify actuator and sensor faults
under various disturbances and uncertainties with almost minimal detection
latency.

3
M.Jyothikiran, S.Raviteja, Final year students of K.L.University: Research
Scholars of K.L.University: D.S.Ramkiran, K .Phanisrinivas / International
Journal of Engineering Research and Applications (IJERA), VEHICLE
HEALTH MONITORING SYSTEM, ISSN: 2248-9622
www.ijera.comVol. 2, Issue 5, September- October 2015
This paper deals with developing an embedded system for detecting
the vehicle condition by monitoring the internal parameters that are used in
evaluating the vehicle‘s current health condition. Traveler information plays
a critical role in supporting safety, security, mobility, and in improving the
reliability of travel. This traveler information can be a continuous data on
performance of the vehicle and the status of its internal components. In this
project, an in-vehicle embedded system is being developed to generate a
vehicle health report (VHR) whenever needed by the user. It also acts as an
eco friendly vehicle by monitoring the emissions from the car which in
turn helps in regulating (by taking proper actions to reduce the emissions
as per the faults indicated in the VHR) the environmental pollution. It
predicts the future errors so that the driver can have an uninterrupted journey
and can avoid accidents. Thus, it alerts the driver about future errors and
assists him for a safe drive. The data required for generating the health report
consists of parameter values (outputs of in-built sensors) of different systems
inside the vehicle. This data can be obtained using the OBD-II protocol
which is followed by the vehicles manufactured after 1996. It uses
LabVIEW as platform that has automotive diagnostic command set tool
kit which helps in building up the software required to communicate with the
vehicle

4
CHAPTER 3

EXISTING METHOD

 Vehicle status cannot be sensed


 Vehicle status cannot be shared with other vehicles

VEHICLE UNIT 1

LCD

POWER
SUPPLY GSM

MICRO
CONTROLLER
UBNORMAL
SENSOR PARKING
INDICATOR

DRIVER
ALCOHOL
SENSOR

VEHICLE
MOTOR
RF TX

Fig 3.1 VEHICLE UNIT 1

5
VEHICLE UNIT 2

POWER
SUPPLY

MICRO VOICE SPEAKER


CONTROLLER
BOAR
D

RF RX

Fig 3.2 VEHICLE UNIT 2

6
CHAPTER 4
PROPOSED METHOD

VECHILE UNIT 1

LCD

POWER
SUPPLY GSM

MICRO
CONTROLLER
UBNORMAL
SENSOR PARKING
INDICATOR

DRIVER
ALCOHOL
SENSOR

VEHICLE
MOTOR
RF TX

Fig 4.1 VEHICLE UNIT 1

7
VECHILE UNIT 2

POWER
SUPPLY

MICRO VOICE
CONTROLLER SPEAKER
BOAR
D

RF RX

Fig 4.2 VEHICLE UNIT 2

8
4.1 WORKING PRINCIPLE

This paper deals with developing an embedded system for


detecting the vehicle condition by monitoring the internal parameters that are
used in evaluating the vehicle‘s current health condition. Traveler
information plays a critical role in supporting safety, security, mobility,
and in improving the reliability of travel.

This traveler information can be a continuous data on performance


of the vehicle and the status of its internal components. In this project, an
in-vehicle embedded system is being developed to generate a vehicle
health report (VHR) whenever needed by the user.

In this project, we proposed the V2V technique in the field of accident


safety. Here we proposed, each module are installed in the each vehicles to
sense the status of alcohol consumption of driver, status of vehicle speed,
status of drowsiness of the driver, status of vehicle brake by means of
corresponding sensor and microcontroller. RF transceiver is used for V2V
wireless sensor network communication.

V2V is used for communicating the status of the vehicle to other


vehicles. RF range is about 300 meters. The status of the vehicle can be
communicated while the other vehicles are come inside the RF range. One
vehicle’s status is indicated by voice to other vehicles if abnormal status is
occurred. And also vehicle data status can be updated on GSM system. In
case of any abnormal status will occurred the parking indicator will activated
and park to the side of the road automatically for safety.

9
Fig 4.3 CONSTRUCTION DIAGRAM

10
WORK FLOW CHART

UNIT 1

Fig 4.4 UNIT 1 WORK FLOW CHART

11
UNIT 2

Fig 4.5 UNIT 2 WORK FLOW CHART

12
4.2 COMPONENT USED
POWER SOURCE
BATTERY
An electric battery is a collection of one or more electrochemical cells in
which stored chemical energy is converted into electrical energy. The principles
of operation haven’t changed much since the time of Volta. Each cell consists
of two half cells connected in series through an electrolytic solution. One half
cell houses the Anode to which the positive ions migrate from
the Electrolyte and the other houses the Cathode to which the negative ones
drift. The two cells are may be connected via a semi permeable membranous
structure allowing ions to flow but not the mixing of electrolytes as in the case
of most primary cells or in the same solution as in secondary cells.

Fig 4.6 BATTERY


WORKING PRINCIPLE
The energy released during accepting an electron by a neutral atom is
known as electron affinity. As the atomic structure for different materials are
different, the electron affinity of different materials will differ. If two different
kinds of metals or metallic compounds are immersed in the same electrolyte
solution, one of them will gain electrons and the other will release electrons.
Which metal (or metallic compound) will gain electrons and which will lose
them depends upon the electron affinities of these metals or metallic
compounds. The metal with low electron affinity will gain electrons from the
negative ions of the electrolyte solution. On the other hand, the metal with high

13
electron affinity will release electrons and these electrons come out into the
electrolyte solution and are added to the positive ions of the solution. In this
way, one of these metals or compounds gains electrons and another one loses
electrons. As a result, there will be a difference in electron concentration
between these two metals. This difference of electron concentration causes
an electrical potential difference to develop between the metals. This electrical
potential difference or emf can be utilized as a source of voltage in any
electronics or electrical circuit. This is a general and basic principle
of battery .

Fig 4.7 WORKING PRINCIPLE

14
SPECIFICATIONS

NOMINAL VOLTAGE 12V


INTERNAL IMPEDANCE 0.25 Ω
CHARGING CUT OFF VOLTAGE 13.3 V
DISCHARGING CUT OFF 10.5
VOLTAGE
OPERATING TEMPERATURE charging 0oC ~ 45oC
discharging -0oC ~ 55oC
Chemistry Lead Acid
Capacity 7Ah
Rating whr 84
Length 5.95 inches
Width 2.56 inches
Height 3.7 inches
Weight 1 Kg

TABLE 4.1 SPECIFICATIONS

FILTER
The output after being processed by full wave rectifier is not a pure DC.
The output is a pulsating DC. The output contains large fluctuations in voltages.
This is quite apparent from the block of full wave rectifier shown above. The
power supply that we intend to design must not have any variation in output
voltage. The voltage that we get from full wave rectifier fluctuates between 0 V
and Vpeak, and hence it contains AC components. These AC components needs
to be filtered out so as to obtain DC voltage. This is where filters come into
picture. Filters, as the name suggests, filters out any AC component present and
provides DC as the output. However, the output from the filter is still not a pure
DC but filters removes the AC component in the voltage to a considerable
extent. This increases the average DC value of the output voltage. Now a
question must arise as to how we can make a filter and which components are

15
required to make a filter. Although it not the goal of this section to study filters
in detail, it must suffice to know that filters used in power supplies can be made
simply by using capacitors. We leave the design of capacitive filter to some
other section. Typical input and output voltage of filters used in power supply is
shown below.

Fig 4.8 FILTER BLOCK DIAGRAM

Fig 4.9 FILTER CIRCUIT DIAGRAM

As shown in the figure above, the output voltage from the filter contains voltage
ripples. This output is not a pure DC, however considerable amount of AC
component is filtered out by the filter. The effectiveness of the filter to remove
the AC component is indicated by the ripple factor. Smaller the ripple factor,
better the filter.

16
IC VOLTAGE REGULATORS
Voltage regulators comprise a class of widely used ICs. Regulator IC
units contain the circuitry for reference source, comparator amplifier, control
device, and overload protection all in a single IC. Although the internal
construction of the IC is somewhat different from that described for discrete
voltage regulator circuits, the external operation is much the same. IC units
provide regulation of either a fixed positive voltage, a fixed negative voltage, or
an adjustably set voltage.

Fig 4.10 VOLTAGE REGULATORS IC

CONNECTION DIAGRAM OF VOLTAGE REGULATOR IC

Fig 4.11 CONNECTION DIAGRAM OF VOLTAGE REGULATOR IC

17
FEATURES OF VOLTAGE REGULATOR IC
• Output Current up to 1A
• Output Voltages of 5, 6, 8, 9, 10, 12, 15, 18, 24V
• Thermal Overload Protection
• Short Circuit Protection
• Output Transistor Safe Operating Area Protection

POWER SUPPLY MODULE

Fig 4.12 POWER SUPPLY MODULE

POWER SUPPLY CHARACTERISTICS


There are various factors that determine the quality of the power supply
like the load voltage, load current, voltage regulation, source regulation, output
impedance, ripple rejection, and so on. Some of the characteristics are briefly
explained below:
1.Load Regulation
The load regulation or load effect is the change in regulated output
voltage when the load current changes from minimum to maximum value.
Load regulation = V no-load – V full-load
V no-load – Load Voltage at no load
V full-load – Load voltage at full load .

18
From the above equation we can understand that when Vno-load occurs
the load resistance is infinite, that is, the out terminals are open circuited. Vfull-
load occurs when the load resistance is of the minimum value where voltage
regulation is lost.
% Load Regulation = [(V no-load – V full-load)/V full-load] * 100
2.Minimum Load Resistance
The load resistance at which a power supply delivers its full-load rated
current at rated voltage is referred to as minimum load resistance.
Minimum Load Resistance = V full-load/I full-load
The value of I full-load, full load current should never increase than that
mentioned in the data sheet of the power supply.
3.Source/Line Regulation
In the block diagram, the input line voltage has a nominal value of 230
Volts but in practice, here are considerable variations in ac supply mains
voltage. Since this ac supply mains voltage is the input to the ordinary power
supply, the filtered output of the bridge rectifier is almost directly proportional
to the ac mains voltage. The source regulation is defined as the change in
regulated output voltage for a specified rage of lie voltage.
4.Output Impedance
A regulated power supply is a very stiff dc voltage source. This means
that the output resistance is very small. Even though the external load resistance
is varied, almost no change is seen in the load voltage. An ideal voltage source
has an output impedance of zero.
5.Ripple Rejection
Voltage regulators stabilize the output voltage against variations in
input voltage. Ripple is equivalent to a periodic variation in the input voltage.
Thus, a voltage regulator attenuates the ripple that comes in with the
unregulated input voltage. Since a voltage regulator uses negative feedback, the
distortion is reduced by the same factor as the gain.

19
RF RECEIVER
The receiver module has IC RX3400/RX3400 crystal oscillator, capacitor,
inductor and many components. The RX3400/RX3400-LF is low powers ASK
receiver IC which is fully compatible with the Mitel KESRX01 IC and is
suitable for use in a variety of low power radio applications including remote
keyless entry. The RX3400/RX3400-LF is based on a single-conversion, super-
heterodyne receiver architecture and incorporates an entire phase-locked loop
(PLL).

Fig 4.13 RF RECEIVER


Features
 Frequency Range: 433.92MHz
 Modulate Mode: ASK
 Circuit Shape: LC
 Date Rate:-4800bps
 Selectivity:-106dBm
 Channel Spacing: ±500KHz
 Supply Voltage: 5V
 High Sensitivity Passive Design.

20
Vcc Operating 4.5 5 5.5 V
supply voltage
Itot Operating 3.5 4.5 Ma
Current
V Data Out I Data = +200 Ua( Vcc- - Vcc V
Data High ) 0.5
I Data = -10 Ua( Low - - 0.3 V
)
Electrical Characteristics
Characteristics SYM Min Type Max Unit
Operation Radio FC 300 – 434 MHz
Frequency
Sensitivity Pref -106 dBm
Channel Width +-500 KHz
Noise equivalent BW NEB 4 5 KHz
Baseboard data rate 3 Kb/s

TABLE 4.2 ELECTRICAL CHARACTERISTICS


PIN DESCRIPTION

Fig 4.14 PIN DESCRIPTION

21
Pin
Function Name
No
1 Ground (0V) Ground
2 Serial data output pin Data
3 Linear output pin; not connected NC
4 Supply voltage; 5V Vcc
5 Supply voltage; 5V Vcc
6 Ground (0V) Ground
7 Ground (0V) Ground
8 Antenna input pin ANT

TABLE 4.3 PIN DESCRIPTION


Antenna
The antenna is also used at the receiver unit to collect the data which is
send by the transmitting antenna. The antenna receives the desired signal and
sends the data to the decoder circuit. For example, AMR devices for water
meters must be able to communicate in the RF unfriendly environment of the
iron water pit. Typically, this is accomplished by placing an antenna on top of
the water pit lid, with the connection to the meter going through a hole in the
lid. This allows a large antenna area, but the antenna often
protrudesdangerously high above the lid, and requires a field-installed
connection between the antenna and the water meter.

Fig 4.15 ANTENNA

22
Decoder HT12D
The 2^12 decoders are a series of CMOS LSIs for remote control system
applications. They are paired with Holtek’s 2^12 series of encoders (refer to the
encoder/decoder cross reference table). For proper operation, a pair of
encoder/decoder with the same number of addresses and data format should be
chosen. The decoders receive serial addresses and data from a programmed
2^12 series of encoders that are transmitted by a carrier using an RF or an IR
transmission medium. They compare the serial input data three times
continuously with their local addresses. If no error or unmatched codes are
found, the input data codes are decoded and then transferred to the output pins.
The VT pin also goes high to indicate a valid transmission. The 2^12 series of
decoders are capable of decoding information’s that consist of N bits of address
and 12-N bits of data. Of this series, the HT12D is arranged to provide 8
address bits and 4 data bits, and HT12F is used to decode 12 bits of address
information.

Fig 4.16 DECODER HT12D

23
Features:-
 Operating voltage: 2.4V~12V
 Low power and high noise immunity CMOS technology
 Low standby current
 Capable of decoding 12 bits of information
 Binary address setting
 Received codes are checked 3 times
 Address/Data number combination- HT12D: 8 address bits and 4
data bits
 Built-in oscillator needs only 5% resistor
 Valid transmission indicator
 Easy interface with an RF or an infrared transmission medium
 Minimal external components
 Pair with Holtek’s 212 series of encoders
 18-pin DIP, 20-pin SOP package

APPLICATION
 Burglar alarm system
 Smoke and fire alarm system
 Garage door controllers
 Car door controllers
 Car alarm system
 Security system
 Cordless telephones
 Other remote control systems

24
PIN DETAILS

Fig 4.17 PIN DETAILS


 VDD and VSS are used to provide power to the IC, Positive and Negative
of the power supply respectively. As I said earlier its operating voltage can
be in the range 2.4V to 12V
 OSC1 and OSC2 are used to connect external resistor for internal oscillator
of HT12D. OSC1 is the oscillator input pin and OSC2 is the oscillator
output pin as shown in the figure below.
 A0 – A7 are the address input pins. Status of these pins should match with
status of address pin in HT12E (used in transmitter) to receive the data.
These pins can be connected to VSS or left open.
 DIN is the serial data input pin and can be connected to a RF receiver
output.

Fig 4.18 OSC1 AND OSC2

25
 D8 – D11 are the data output pins. Status of these pins can be VSS or VDD
depending upon the received serial data through pin DIN.
 VT stand for Valid Transmission. This output pin will be HIGH when valid
data is available at D8 – D11 data output pins.

INTERNAL BLOCK DIAGRAM

Fig 4.19 INTERNAL BLOCK DIAGRAM

26
WORKING

Fig 4.20 TIMING DIAGRAM

HT12D decoder will be in standby mode initially ie, oscillator is disabled and a
HIGH on DIN pin activates the oscillator. Thus the oscillator will be active
when the decoder receives data transmitted by an encoder. The device starts
decoding the input address and data. The decoder matches the received address
three times continuously with the local address given to pin A0 – A7. If all
matches, data bits are decoded and output pins D8 – D11 are activated. This
valid data is indicated by making the pin VT (Valid Transmission) HIGH. This
will continue till the address code becomes incorrect or no signal is received.

27
DATA FLOW CHART

Fig 4.21 DATA FLOW CHART

28
APPLICATION DIAGRAM

Fig 4.22 APPLICATION DIAGRAM


CIRCUIT DIAGRAM

Fig 4.23 CIRCUIT DIAGRAM

29
MODULE

Fig 4.24 MODULE


TRANSMITTER MODULE
RF transmitters are electronic devices that create continuously varying
electric current, encode sine waves, and broadcast radio waves. RF transmitters
use oscillators to create sine waves, the simplest and smoothest form of
continuously varying waves, which contain information such as audio and
video. Modulators encode these sign wives and antennas broadcast them as
radio signals. There are several ways to encode or modulate this information,
including amplitude modulation (AM) and frequency modulation (FM). Radio
techniques limit localized interference and noise. With direct sequence spread
spectrum, signals are spread over a large band by multiplexing the signal with a
code or signature that modulates each bit. With frequency hopping spread
spectrum, signals move through a narrow set of channels in a sequential,
cyclical, and predetermined pattern.
Selecting RF transmitters requires an understanding of modulation
methods such as AM and FM. On-off key (OOK), the simplest form of
modulation, consists of turning the signal on or off. Amplitude modulation
(AM) causes the base band signal to vary the amplitude or height of the carrier
wave to create the desired information content. Frequency modulation (FM)

30
causes the instantaneous frequency of a sine wave carrier to depart from the
center frequency by an amount proportional to the instantaneous value of the
modulating signal. Amplitude shift key (ASK) transmits data by varying the
amplitude of the transmitted signal. Frequency shift key (FSK) is a digital
modulation scheme using two or more output frequencies. Phase shift key
(PSK) is a digital modulation scheme in which the phase of the transmitted
signal is varied in accordance with the base band data signal.
Additional considerations when selecting RF transmitters include supply
voltage, supply current, RF connectors, special features, and packaging. Some
RF transmitters include visual or audible alarms or LED indicators that signal
operating modes such as power on or reception. Other devices attach to coaxial
cables or include a connector or port to which an antenna can be attached.
Typically, RF transmitters that are rated for outdoor use feature a heavy-duty
waterproof design. Devices with internal calibration and a frequency range
switch are also available.
RF transmitters are used in a variety of applications and industries. Often,
devices that are used with integrated circuits (ICs) incorporate surface mount
technology (SMT), through hole technology (THT), and flat pack. In the
telecommunications industry, RF transmitters are designed to fit in a metal rack
that can be installed in a cabinet. RF transmitters are also used in radios and in
electronic article surveillance systems (EAS) found in retail stores. Inventory
management systems use RF transmitters as an alternative to barcodes.

Fig 4.25 TRASNMITTER MODULE

31
SPECIFICATIONS
Symbol Parameter Conditions Min Type Max Unit
Vcc Operating 2.0 - 12 V
supply voltage
Icc Peak - - 1.64 mA
Current(2V)
Icc Peak - - 19.4 mA
Current(12V)
Vin Input High IData=100Ua Vcc- - Vcc V
Voltage (High) 0.5
Vii Input Low IData=0Ua - - 0.3 V
Voltage (Low)
Fo Absolute 433.72 433.92 434.12 MHz
Frequency
417.8 418 418.2 MHz
△FO Relative To +/-150 +/-200 KHz
433.92MHz

Po RF Out Power VCC 9V-12V - 16 - dBm


Into 50Ω
VCC 5V-6V 14
Modulation External 512 4.8K 200K bps
Bandwidth Encoding
Tr Modulation - - 100 uS
Rise Time
Tf Modulation Fall - - 100 uS
Time

TABLE 4.4 SPECIFICATION

32
PIN DETAILS

Fig 4.26 PIN DETAILS

Pin
Function Name
No
1 Ground (0V) Ground
2 Serial data Data
input pin
3 Supply Vcc
voltage; 5V
4 Antenna ANT
output pin

TABLE 4.5 PIN DETAILS

HT12E ENCODER

Fig 4.27 HT12E ENCODER

HT12E is a 212 series encoder IC (Integrated Circuit) for remote control


applications. It is commonly used for radio frequency (RF) applications. By

33
using the paired HT12E encoder and HT12D decoder we can easily transmit
and receive 12 bits of parallel data serially. HT12E simply converts 12 bit
parallel data in to serial output which can be transmitted through a RF
transmitter. These 12 bit parallel data is divided in to 8 address bits and 4 data
bits. By using these address pins we can provide 8 bit security code for data
transmission and multiple receivers may be addressed using the same
transmitter.
Features
 Operating voltage
 2.4V~12V for the HT12E
 Low power and high noise immunity CMOS technology
 Low standby current: 0 (typ.) at VDD=5V
 HT12A with a 38kHz carrier for infrared transmission medium
 Minimum transmission word
 Four words for the HT12E
 Built-in oscillator needs only 5% resistor
 Data code has positive polarity
 Minimal external components
 HT12A/E: 18-pin DIP/20-pin SOP package
APPLICATIONS
 Burglar alarm system
 Smoke and fire alarm system
 Garage door controllers
 Car door controllers
 Car alarm system
 Security system
 Cordless telephones
 Other remote control systems

34
INTERNAL BLOCK DIAGRAM

Fig 4.28 INTERNAL BLOCK DIAGRAM


PIN DETAILS

Fig 4.29 PIN DETAILS


VDD and VSS are power supply pins which are used to connect positive and
negative of the power supply respectively.
OSC1 and OSC2 are used to connect external resistance for the internal
oscillator. OSC1 is the oscillator input pin and OSC2 is the oscillator output pin.

35
Fig 4.30 OSC1 AND OSC2
TE is used for enabling the transmission and is an active low input.
A0 – A7 are the input address pins. By using these pins we can provide a
security code for the data. These pins can be connected to VSS or left open.
D8 – D11 are the input data pins. These pins can be connected to VSS or may
left open for sending LOW and HIGH respectively.
DOUT – It is the serial data output of the encoder and can be connected to a
RF transmitter.
WORKING

The HT12E 212 series encoder starts a 4 word transmission cycle upon receiving
transmission enable signal on TE input. This output cycle will repeat as long as
the transmission is enabled. When the transmission enable (TE) signal switches
to HIGH, the encoder output completes the current cycle and stops as shown
below. The encoder will be in the Standby mode when the transmission is
disabled.

Fig 4.31 TIMING DIAGRAM FOR HT12E

36
DATA FLOW DIAGRAM

Fig 4.32 DATA FLOW DIAGRAM


APPLICATION DIAGRAM

Fig 4.33 APPLICATION DIAGRAM

37
CIRCUIT DIAGRAM

Fig 4.34 CIRCUIT DIAGRAM


DC MOTOR
Electrical motors are everywhere around us. Almost all the electro-
mechanical movements we see around us are caused either by an A.C. or a DC
motor. Here we will be exploring this kind of motors. This is a device that
converts DC electrical energy to a mechanical energy.

Fig 4.35 DC MOTOR

38
WORKING PRINCIPLE

This DC or direct electric current motor works on the principal, when


a electric current carrying conductor is placed in a magnetic field, it experiences
a torque and has a tendency to move. This is known as motoring action. If the
direction of electric current in the wire is reversed, the direction of rotation also
reverses. When magnetic field and electric field interact they produce a
mechanical force, and based on that the working principle of dc
motor established.

Fig 4.36 FLEMING’S LEFT HAND RULE

The direction of rotation of a this motor is given by Fleming’s left hand


rule, which states that if the index finger, middle finger and thumb of your left
hand are extended mutually perpendicular to each other and if the index finger
represents the direction of magnetic field, middle finger indicates the direction
of electric current, then the thumb represents the direction in which force is
experienced by the shaft of the dc motor.

39
SPECIFICATIONS

 Voltage : 12 VDC
 Current : 0.1A
 RPM : 10- 50 rpm
 Temperature : up to 40 0 C
 Weight: 130.00g
 Length: 80mm
 Torque: 1.5 kg.cm
 Shaft Diameter: 6mm

MOTOR DRIVER
The L293 and L293D are quadruple high-current half-H drivers. The
L293 is designed to provide bidirectional drive currents of up to 1 A at voltages
from 4.5 V to 36 V. The L293D is designed to provide bidirectional drive
currents of up to 600-mA at voltages from 4.5 V to 36 V. Both devices are
designed to drive inductive loads such as relays, solenoids, dc and bipolar
stepping motors, as well as other high-current/high-voltage loads in positive-
supply applications. All inputs are TTL compatible. Each output is a complete
totem-pole drive circuit, with a Darlington transistor sink and a pseudo-
Darlington source. Drivers are enabled in pairs, with drivers 1 and 2 enabled by
1,2EN and drivers 3 and 4 enabled by 3,4EN. When an enable input is high, the
associated drivers are enabled, and their outputs are active and in phase with
their inputs. When the enable input is low, those drivers are disabled, and their
outputs are off and in the high-impedance state. With the proper data inputs,
each pair of drivers forms a full-H (or bridge) reversible drive suitable for
solenoid or motor applications.

40
On the L293, external high-speed output clamp diodes should be used for
inductive transient suppression. A VCC1 terminal, separate from VCC2, is
provided for the logic inputs to minimize device power dissipation. The
L293and L293D are characterized for operation from 0°C to 70°C.

Fig 4.37 MOTOR DRIVER

PIN DETAIL

Fig 4.38 PIN DETAILS L293D

41
LOGICAL DIAGRAM

Fig 4.39 LOGICAL DIAGRAM


WORKING

Fig 4.40 MOTOR OPERATION

42
TABLE 4.6 OPERATION OF TWO MOTORS
The motor operations of two motors can be controlled by input logic at pins 2 &
7 and 10 & 15. Input logic 00 or 11 will stop the corresponding motor. Logic 01
and 10 will rotate it in clockwise and anticlockwise directions, respectively.

Enable pins 1 and 9 (corresponding to the two motors) must be high for motors
to start operating. When an enable input is high, the associated driver gets
enabled. As a result, the outputs become active and work in phase with their
inputs. Similarly, when the enable input is low, that driver is disabled, and their
outputs are off and in the high-impedance state.

CONNECTION DIAGRAM

Fig 4.41 CONNECTION DIAGRAM

43
L293D MOTOR DRIVER BOARD

Fig 4.42 L293D MOTOR DRIVER BOARD

L293D SPECIFICATIONS
 External Power 9V to 24V DC
 Dimensional Size : 44mm x 37mm x 14mm (l x b x h)
 Temperature Range : 0°C to +70 °C

PIC16F887A MICROCONTROLLER
PIC16F877 belongs to a class of 8-bit microcontrollers of RISC architecture.
It has 8kb flash memory for storing a written program. Since memory made in
FLASH technology can be programmed and cleared more than once, it makes
this microcontroller suitable for device development. IT has data memory that
needs to be saved when there is no supply. It is usually used for storing
important data that must not be lost if power supply suddenly stops. For
instance, one such data is an assigned temperature in temperature regulators. If
during a loss of power supply this data was lost, we would have to make the
adjustment once again upon return of supply.

44
 RISC architecture
o Only 35 instructions to learn
o All single-cycle instructions except branches

 Operating frequency 0-20 MHz


 Precision internal oscillator
o Factory calibrated
o Software selectable frequency range of 8MHz to 31KHz
 Power supply voltage 2.0-5.5V
o Consumption: 220uA (2.0V, 4MHz), 11uA (2.0 V, 32 KHz) 50nA
(stand-by mode)
 Power-Saving Sleep Mode
 Brown-out Reset (BOR) with software control option
 35 input/output pins
o High current source/sink for direct LED drive
o software and individually programmable pull-up resistor
o Interrupt-on-Change pin
 8K ROM memory in FLASH technology
o Chip can be reprogrammed up to 100.000 times
 In-Circuit Serial Programming Option
o Chip can be programmed even embedded in the target device

 Data can be written more than 1.000.000 times


 368 bytes RAM memory
 A/D converter:
o 14-channels
o 10-bit resolution
 3 independent timers/counters
 Watch-dog timer
 Analogue comparator module with
45
o Two analogue comparators
o Fixed voltage reference (0.6V)
o Programmable on-chip voltage reference
 PWM output steering control
 Eight level deep hardware stack
 Power-on Reset (POR)
 Power-up Timer (PWRT) and
 Oscillator Start-up Timer (OST)
 Programmable code protection
 Watchdog Timer (WDT) with its own on-chip RC oscillator for
reliable operation
 Direct, indirect and relative addressing modes
 Interrupt capability (up to 14 sources)
 Enhanced USART module
o Supports RS-485, RS-232 and LIN2.0
o Auto-Baud Detect
 Master Synchronous Serial Port (MSSP)
o supports SPI and I2C mode

46
PIN Diagram:-

Fig 4.43 PIC16F877/874 PIN DIAGRAM

BLOCK DIAGRAM

Fig 4.44 BLOCK DIAGRAM

47
RELAY
Relays are simple switches which are operated both electrically and
mechanically. Relays consist of a n electromagnet and also a set of contacts.
The switching mechanism is carried out with the help of the electromagnet.
There are also other operating principles for its working. But they differ
according to their applications. Most of the devices have the application of
relays.

Fig 4.45 RELAY


main operation of a relay comes in places where only a low-power signal
can be used to control a circuit. It is also used in places where only one signal
can be used to control a lot of circuits. The application of relays started during
the invention of telephones. They played an important role in switching calls in
telephone exchanges. They were also used in long distance telegraphy. They
were used to switch the signal coming from one source to another destination.
After the invention of computers they were also used to perform Boolean and
other logical operations. The high end applications of relays require high power
to be driven by electric motors and so on.

48
There are only four main parts in a relay. They are
 Electromagnet
 Movable Armature
 Switch point contacts
 Spring

RELAY CONTACT CONDITIONS:


 Normally Open Contact (NO) – NO contact is also called a make
contact. It closes the circuit when the relay is activated. It disconnects the
circuit when the relay is inactive.

Fig 4.46 A NORMAL OPEN CONTACT(NO)


 Normally Closed Contact (NC) – NC contact is also known as break
contact. This is opposite to the NO contact. When the relay is activated,
the circuit disconnects. When the relay is deactivated, the circuit
connects.

Fig 4.47 A NORMAL CLOSED CONTACT(NC)


 Change-over (CO) / Double-throw (DT) Contacts – This type of
contacts are used to control two types of circuits. They are used to control
a NO contact and also a NC contact with a common terminal. According

49
to their type they are called by the names break before make and make
before breakcontacts.

Fig 4.48 CHANGE-OVER (CO) / DOUBLE-THROW (DT) CONTACT

RELAY TYPES:
 Single Pole Single Throw (SPST) – This type of relay has a total of four
terminals. Out of these two terminals can be connected or disconnected.
The other two terminals are needed for the coil.

 Single Pole Double Throw (SPDT) – This type of a relay has a total of
five terminals. Out f these two are the coil terminals. A common terminal
is also included which connects to either of two others.

 Double Pole Single Throw (DPST) – This relay has a total of six
terminals. These terminals are further divided into two pairs. Thus they
can act as two SPST’s which are actuated by a single coil. Out of the six
terminals two of them are coil terminals.
 Double Pole Double Throw (DPDT) – This is the biggest of all. It has
mainly eight relay terminals. Out of these two rows are designed to be
change over terminals. They are designed to act as two SPDT relays
which are actuated by a single coil.

50
Fig 4.49 RELAY TYPE

RELAY WORKING PRINCIPLE:


CONDITION I: RELAY IN ON STATE.
 Coil is energized.
 Contact becomes NO to NC position then load is activated.

Fig 4.50 RELAY IN ON STATE

51
CONDITION II: RELAY IN OFF STATE.
 Coil is de-energized.
 Contact in NC position then load is de activated.

Fig 4.51 RELAY IN OFF STATE

RELAY CONNECTION CIRCUIT

Fig 4.52 RELAY CONNECTION CIRCUIT

52
RELAY BOARD

Fig 4.53 RELAY BOARD


RELAY SPECIFICATIONS

 Nominal Voltage (VDC): 12V


 Coil Resistance (Ω) (± 10%): 400Ω
 Power Consumption (W): 0.36 W
 Nominal Current (mA) (± 10%): 30 mA
 Pull in Voltage (VDC): 75% Max.
 Drop Out Voltage (VDC): 10% Min.
 Max. Allowable Voltage (VDC): 130%

RELAY APPLICATIONS
 Relays are used to realize logic functions. They play a very
important role in providing safety critical logic.
 Relays are used to provide time delay functions. They are used to
time the delay open and delay close of contacts.
 Relays are used to control high voltage circuits with the help of low
voltage signals. Similarly they are used to control high current
circuits with the help of low current signals.

53
 They are also used as protective relays. By this function all the
faults during transmission and reception can be detected and
isolated.

 GSM
o GSM (Global System for Mobile) / GPRS (General Packet Radio
Service) TTL –Modem is SIM900 Quad-band GSM / GPRS
device, works on frequencies 850 MHZ, 900 MHZ, 1800MHZ and
1900 MHZ. It is very compact in size and easy to use as plug in
GSM Modem.
 The Modem is designed with 3V3 and 5V DC TTL interfacing
circuitry, which allows User to directly interface with 5V
Microcontrollers (PIC, AVR, Arduino, 8051, etc.) as well as
3V3Microcontrollers (ARM, ARM Cortex XX, etc.). The baud rate can
be configurable from 9600-115200 bps through AT (Attention)
commands. This GSM/GPRS TTL Modem has internal TCP/IP stack to
enable User to connect with internet through GPRS feature. It is
suitable for SMS as well as DATA transfer application in mobile phone
to mobile phone interface.
 The modem can be interfaced with a Microcontroller using USART
(Universal Synchronous Asynchronous Receiver and Transmitter)
feature (serial communication).

 HISTORY OF CELLULAR MOBILE RADIO


 The idea of cell-based mobile radio systems appeared at Bell
Laboratories (in USA) in the early 1970s. However, mobile cellular
systems were not introduced for commercial use until the 1980s.
During the early 1980s, analog cellular telephone systems experienced
a very rapid growth in Europe, particularly in Scandinavia and the
54
United Kingdom. Today cellular systems still represent one of the
fastest growing telecommunications systems. But in the beginnings of
cellular systems, each country developed its own system, which was an
undesirable situation for the following reasons:

 The equipment was limited to operate only within the boundaries of each
country.

 The market for each mobile equipment was limited.

 In order to overcome these problems, the Conference of European Posts


and Telecommunications (CEPT) formed, in 1982, the Group Special
Mobile (GSM) in order to develop a pan-European mobile cellular radio
system (the GSM acronym became later the acronym for Global System
for Mobile communications). The standardized system had to meet
certain criteria:

 Spectrum efficiency

 International roaming

 Low mobile and base stations costs

 Good subjective voice quality

 Compatibility with other systems such as ISDN (Integrated Services


Digital Network)

 Ability to support new services

 Unlike the existing cellular systems, which were developed using an


analog technology, the GSM system was developed using a digital
technology.
 In 1989 the responsibility for the GSM specifications passed from the CEPT
to the European Telecommunications Standards Institute (ETSI). The aim of
the GSM specifications is to describe the functionality and the interface for

55
each component of the system, and to provide guidance on the design of the
system. These specifications will then standardize the system in order to
guarantee the proper inter-working between the different elements of the
GSM system. In 1990, the phase I of the GSM specifications was published
but the commercial use of GSM did not start until mid-1991. The most
important events in the development of the GSM system are presented in the
table 1.

Year Events
CEPT establishes a GSM group in order to develop the standards for
1982
a pan-European cellular mobile system
TDMA is chosen as access method (in fact, it will be used with
1987 FDMA) Initial Memorandum of Understanding (MoU) signed by
telecommunication operators (representing 12 countries)
1989 The responsibility of the GSM specifications is passed to the ETSI
1990 Appearance of the phase 1 of the GSM specifications
1991 Commercial launch of the GSM service
Enlargement of the countries that signed the GSM- MoU> Coverage
1992
of larger cities/airports
1993 Coverage of main roads GSM services start outside Europe
1995 Phase 2 of the GSM specifications Coverage of rural areas

TABLE 4.7 HISTORY OF CELLULAR MOBILE RADIO

From the evolution of GSM, it is clear that GSM is not anymore only a
European standard. GSM networks are operational or planned in over 80
countries around the world. The rapid and increasing acceptance of the GSM
system is illustrated with the following figures:

56
 1.3 million GSM subscribers worldwide in the beginning of 1994.
 Over 5 million GSM subscribers worldwide in the beginning of 1995.
 Over 10 million GSM subscribers only in Europe by December 1995.

Since the appearance of GSM, other digital mobile systems have been
developed. The table 2 charts the different mobile cellular systems developed
since the commercial launch of cellular systems.

EVOLUTION OF GSM
GSM is a global system for mobile communication GSM is
an international digital cellular telecommunication. The GSM standard was
released by ETSI (European Standard Telecommunication Institute) back in
1989. The first commercial services were launched in 1991 and after its early
introduction in Europe; the standard went global in 1992. Since then, GSM has
become the most widely adopted and fastest-growing digital cellular standard,
and it is positioned to become the world’s dominant cellular standard.
Today’s second-generation GSM networks deliver high quality and secure
mobile voice and data services (such as SMS/ Text Messaging) with full
roaming capabilities across the world. GSM platform is a hugely successful
technology and as unprecedented story of global achievement. In less than ten
years since the first GSM network was commercially launched, it become, the
world’s leading and fastest growing mobile standard, spanning over 173
countries. Today, GSM technology is in use by more than one in ten of the
world’s population and growth continues to sour with the number of subscriber
worldwide expected to surpass one billion by through end of 2003.
Today’s GSM platform is living, growing and evolving and already offers an
expanded and feature-rich ‘family’ of voice and enabling services.
The Global System for Mobile Communication (GSM) network is a cellular
telecommunication network with a versatile architecture complying with the
ETSI GSM 900/GSM 1800 standard. Siemen’s implementation is the digital

57
cellular mobile communication system D900/1800/1900 that uses the very latest
technology to meet every requirement of the standard.
The following GSM generation passed in 3decades:
1G Analog Communication
2G Digital Communications
2.5G GPRS
2.75G EDGE
3G Enhanced feature of Video call
4G High-speed Wireless Broadband

GSM NETWORK
A GSM network is composed of several functional entities, whose functions and
interfaces are specified. The GSM network can be divided into three broad
parts.
The Mobile Station is carried by the subscriber. The Base Station Subsystem
controls the radio link with the Mobile Station. The Network Subsystem, the
main part of which is the Mobile services Switching Center (MSC), performs
the switching of calls between the mobile users, and between mobile and fixed
network users. The MSC also handles the mobility management operations.
Not shown is the Operations and Maintenance Center, which oversees the
proper operation and setup of the network. The Mobile Station and the Base
Station Subsystem communicate across the Um interface, also known as the air
interface or radio link. The Base Station Subsystem communicates with the
Mobile services Switching Center across the A interface.

58
Fig 4.54 GSM NETWORK
MOBILE STATION:
Mobile Equipment (ME) such as hand portable and vehicle mounted unit.
Subscriber Identity Module (SIM), which contains the entire customer related
information (identification, secret key for authentication, etc.). The SIM is a
small smart card, which contains both programming and information. The A3
and A8 algorithms are implemented in the Subscriber Identity Module (SIM).
Subscriber information, such as the IMSI (International Mobile Subscriber
Identity), is stored in the Subscriber Identity Module (SIM). The Subscriber
Identity Module (SIM) can be used to store user-defined information such as
phonebook entries. One of the advantages of the GSM architecture is that the
SIM may be moved from one Mobile Station to another. This makes upgrades
very simple for the GSM telephone user. The use of SIM card is mandatory in
the GSM world, whereas the SIM (RUIM) is not very popular in the CDMA
world.
Base Station Subsystem (BSS):
All radio-related functions are performed in the BSS, which consists of
base Station controllers (BSCs) and the base transceiver stations (BTSs).

59
Base Transceiver Station (BTS):
The Base Transceiver Station (BTS) contains the equipment for
transmitting and receiving of radio signals (transceivers), antennas, and
equipment for encrypting and decrypting communications with the Base Station
Controller (BSC).A group of BTSs are controlled by a BSC. Typically a BTS
for anything other than a pico cell will have several transceivers (TRXs), which
allow it to serve several different frequencies and different sectors of the cell (in
the case of sectorised base stations). A BTS is controlled by a parent BSC via
the Base Station Control Function (BCF). The BCF is implemented as a discrete
unit or even incorporated in a TRX in compact base stations. The BCF provides
an Operations and Maintenance (O&M) connection to the Network
Management System (NMS), and manages operational states of each TRX, as
well as software handling and alarm collection.
Base Station Controller(BSC):
The BSC controls multiple BTSs and manages radio channel setup, and
handovers. The BSC is the connection between the Mobile Station and Mobile
Switching Center. The Base Station Controller (BSC) provides, classicaly, the
intelligence behind the BTSs. Typically a BSC has 10s or even 100s of BTSs
under its control. The BSC handles allocation of radio channels, receives
measurements from the mobile phones, controls handovers from BTS to BTS. A
key function of the BSC is to act as a concentrator where many different low
capacity connections to BTSs become reduced to a smaller number of
connections towards the Mobile Switching Center (MSC) (with a high level of
utilisation). Overall, this means that networks are often structured to have many
BSCs distributed into regions near their BTSs which are then connected to large
centralised MSC sites.
The BSC is undoubtedly the most robust element in the BSS as it is not
only a BTS controller but, for some vendors, a full switching center, as well as
an SS7 node with connections to the MSC and SGSN. It also provides all the

60
required data to the Operation Support Subsystem (OSS) as well as to the
performance measuring centers. A BSC is often based on a distributed
computing architecture, with redundancy applied to critical functional units to
ensure availability in the event of fault conditions. Redundancy often extends
beyond the BSC equipment itself and is commonly used in the power supplies
and in the transmission equipment providing the A-ter interface to PCU. The
databases for all the sites, including information such as carrier frequencies,
frequency hopping lists, power reduction levels, receiving levels for cell border
calculation, are stored in the BSC.
Network Switching Subsystem (NSS):
Network Switching Subsystem is the component of a GSM system that
carries out switching functions and manages the communications between
mobile phones and the Public Switched Telephone Network. It is owned and
deployed by mobile phone operators and allows mobile phones to communicate
with each other and telephones in the wider telecommunications network. The
architecture closely resembles a telephone exchange, but there are additional
functions which are needed because the phones are not fixed in one location.
There is also an overlay architecture on the GSM core network to provide
packet-switched data services and is known as the GPRS core network. This
allows mobile phones to have access to services such as WAP, MMS, and
Internet access. All mobile phones manufactured today have both circuit and
packet based services, so most operators have a GPRS network in addition to
the standard GSM core network.
Mobile Switching Centre (MSC):
The Mobile Switching Centre or MSC is a sophisticated telephone
exchange, which provides circuit-switched calling, mobility management, and
GSM services to the mobile phones roaming within the area that it serves. This
means voice, data and fax services, as well as SMS and call divert. In the GSM
mobile phone system, in contrast with earlier analogue services, fax and data

61
information is sent directly digitally encoded to the MSC. Only at the MSC is
this re-coded into an "analogue" signal. There are various different names for
MSCs in different context, which reflects their complex role in the network, all
of these terms though could refer to the same MSC, but doing different things at
different times.
A Gateway MSC is the MSC that determines which visited MSC the
subscriber who is being called is currently located. It also interfaces with the
Public Switched Telephone Network. All mobile to mobile calls and PSTN to
mobile calls are routed through a GMSC. The term is only valid in the context
of one call since any MSC may provide both the gateway function and the
Visited MSC function, however, some manufacturers design dedicated high
capacity MSCs which do not have any BSCs connected to them. These MSCs
will then be the Gateway MSC for many of the calls they handle. The Visited
MSC is the MSC where a customer is currently located. The VLR associated
with this MSC will have the subscriber's data in it. The Anchor MSC is the
MSC from which a handover has been initiated. The Target MSC is the MSC
toward which a Handover should take place. An MSC Server is a part of the
redesigned MSC concept starting from 3GPP Release 5.
FREQUENCY BAND USAGE:
Since radio spectrum is a limited resource shared by all users, a method
must be devised to divide up the bandwidth among as many users as possible.
The method chosen by GSM is a combination of Time- and Frequency-Division
Multiple Access (TDMA/FDMA). The FDMA part involves the division by
frequency of the (maximum) 25 MHz bandwidth into 124 carrier frequencies
spaced 200 kHz apart. One or more carrier frequencies are assigned to each base
station. Each of these carrier frequencies is then divided in time, using a TDMA
scheme. The fundamental unit of time in this TDMA scheme is called a burst
period and it lasts 15/26 ms (or approx. 0.577 ms). Eight burst periods are
grouped into a TDMA frame (120/26 ms, or approx. 4.615 ms), which forms the

62
basic unit for the definition of logical channels. One physical channel is one
burst period per TDMA frame. Channels are defined by the number and
position of their corresponding burst periods. All these definitions are cyclic,
and the entire pattern repeats approximately every 3 hours. Channels can be
divided into dedicated channels, which are allocated to a mobile station, and
common channels, which are used by mobile stations in idle mode. A traffic
channel (TCH)is used to carry speech and data traffic. Traffic channels are
defined using a 26-frame multiframe, or group of 26 TDMA frames. The length
of a 26-frame multiframe is 120 ms, which is how the length of a burst period is
defined (120 ms divided by 26 frames divided by 8 burst periods per frame).
Out of the 26 frames, 24 are used for traffic, 1 is used for the Slow Associated
Control Channel (SACCH) and 1 is currently unused. TCHs for the uplink and
downlink are separated in time by 3 burst periods, so that the mobile station
does not have to transmit and receive simultaneously, thus simplifying the
electronics. In addition to these full-rate TCHs, there are also half-rate TCHs
defined, although they are not yet implemented. Half-rate TCHs will effectively
double the capacity of a system once half-rate speech coders are specified (i.e.,
speech coding at around 7 kbps, instead of 13 kbps). Eighth-rate TCHs are also
specified, and are used for signalling. In the recommendations, they are called
Stand-alone Dedicated Control Channels (SDCCH).

Fig 4.55 STAND-ALONE DEDICATED CONTROL CHANNELS

63
Organization of bursts, TDMA frames, and multiframes for speech and
data GSM is a digital system, so speech which is inherently analog, has to be
digitized. The method employed by ISDN, and by current telephone systems for
multiplexing voice lines over high speed trunks and optical fiber lines, is Pulse
Coded Modulation (PCM). The output stream from PCM is 64 kbps, too high a
rate to be feasible over a radio link. The 64 kbps signal, although simple to
implement, contains much redundancy. The GSM group studied several speech
coding algorithms on the basis of subjective speech quality and complexity
(which is related to cost, processing delay, and power consumption once
implemented) before arriving at the choice of a Regular Pulse Excited – Linear
Predictive Coder (RPE--LPC) with a Long Term Predictor loop. Basically,
information from previous samples, which does not change very quickly, is
used to predict the current sample. The coefficients of the linear combination of
the previous samples, plus an encoded form of the residual, the difference
between the predicted and actual sample, represent the signal. Speech is divided
into 20 millisecond samples, each of which is encoded as 260 bits, giving a total
bit rate of 13 kbps. This is the so-called Full-Rate speech coding. Recently, an
Enhanced Full-Rate (EFR) speech-coding algorithm has been implemented by
some North American GSM1900 operators. This is said to provide improved
speech quality using the existing 13 kbps bit rate.
WORKING
The GSM module is connected with the controller. As the controller is
keep on monitoring the doors and locker key, when the door get opened, the
microcontroller sends the command “AT” to initiate the module. Now the
module sends an sms as “Theft Occurred” to the already fed mobile number.
Thus the information is passed from the module to the Authorized person.
Whenever it receives the correct password from the mobile, it will inform the
microcontroller to open the door.

64
SMS IN GSM
SMS stands for Short Message Service. It is a technology that enables the
sending and receiving of message between mobile phones. SMS first appeared
in Europe in 1992. It was included in the GSM (Global System for Mobile
Communication) standards right at the beginning. Later it was ported to wireless
technologies like CDMA and TDMA. The GSM and SMS standards were
originally developed by ETSI. ETSI is the abbreviation for European
Telecommunication Standard Institute.
Now the 3GPP (Third Generation Partnership Project) is responsible for the
development and maintenance of the GSM and SMS standards.
One SMS message can contain at most 140 bytes (1120 bits) of data, so one
SMS message can contain up to:
• 160 characters if 7-bit character encoding is used. (7-bit character
encoding is suitable for encoding Latin characters like English alphabets.)
• 70 characters if 16-bit Unicode UCS2 character encoding is used. (SMS
text messages containing non-Latin characters like Chinese character should use
16-bit character encoding.)
Once the message is sent the message is received by SMSC, which must then
get it to the appropriate mobile device. To do this the SMSC sends a SMS
request to Home Location Register (HLR) to find the roaming customer. Once
HLR receives the request, it responds to the SMSC with the subscriber’s status:
 Inactive or active
 Where subscriber is roaming.

SMS provides a mechanism for transmitting short message to and from


wireless devices. The service makes use of an SMSC, which acts as a store and
forward system for short messages. One major advantage of SMS is that it is
supported by 100% GSM mobile phones. Almost all subscription plans
provided by wireless carriers include inexpensive SMS messaging service.

65
COMMANDS USED IN GSM MODEM

Receiving SMS messages using AT commands

AT+CMGF=1 <ENTER> If the modem responds with "OK" this mode is


supported. Please note that using this mode it is only possible to send simple
text messages. It is not possible to send multipart, Unicode, data and other types
of messages.

Setting up the modem:

In order to send a SMS, the modem has to be put in SMS text mode first using
the following command:

AT+CMGF=1 <ENTER>

If the modem responds with error, either the modem does not support SMS text
mode, or the SIM card is not ready. In this case please check that the SIM card
is inserted and the pin code is entered.

Reading a message

To list a single message, you have to use the read command. You must use the
list command first, so you know the indexes of the messages in the storage. For
instance, to read the message on memory location '2' use:

AT+CMGR=2 <ENTER>
The modem will list the single message:
+CMGR: "REC READ","+31625012254",,"07/07/05,09:56:03+08"
Test message 2
OK

Send SMS using AT commands

66
Some advanced GSM modems like Waveform and Multitask, support the SMS
text mode. This mode allows you to send SMS messages using AT commands,
without the need to encode the binary PDU field of the SMS first. This is done
by the GSM modem

To check if your modem supports this text mode, you can try the following
command:

AT+CMGF=1 <ENTER> If the modem responds with "OK" this mode is


supported. Please note that using this mode it is only possible to send simple
text messages. It is not possible to send multipart, Unicode, data and other types
of messages.

Sending the message:

AT+CMGS="+31638740161" <ENTER> Replace the above phone number


with your own cell phone number. The modem will respond with: >

You can now type the message text and send the message using the <CTRL>-
<Z> key combination:
Hello World ! <CTRL-Z>

After some seconds the modem will respond with the message ID of the
message, indicating that the message was sent correctly:

+CMGS: 62

67
SMS responding Relay or light power ON / OFF commands list.

SMS SENDING COMMAND CURRENT


COMMANDS RESPONDING STATUS SMS
ON / OFF IN SEND TO THE
HARDWARE OWNER
NUMBER
*xxxxxS1ON# AC POWERED ON AC OFF
*xxxxxS2ON# LIGHT POWERED LIGHT OFF
ON
*xxxxxS3ON# FAN POWERED ON FAN OFF
*xxxxxS4ON# MOTOR POWERED MOTOR OFF
ON
*xxxxxS1OF# AC POWERED OFF AC OFF
*xxxxxS2OF# LIGHT POWERED LIGHT OFF
OFF
*xxxxxS3OF# FAN POWERED OFF FAN OFF
*xxxxxS4OF# MOTOR POWERED MOTOR OFF
OFF
*xxxxxPASSxxxxxx# PASSWORD PASSWORD
CHANGING CHANGED
FORMAT OLD TO
NEW
*xxxxxSTAT# ALL APPLICATIONS AC ON | IN LIGHT
STATUS ARE SEND OFF | MOTOR ON
TO THE OWNER | FAN ON | OUT
NUMBER LIGHT OFF
*xxxxxxTIME TIME AND DATE ------

68
DDMMYYHHMMSS# UPDATED TO RTC
*xxxxxxRONOFddmmyyhh TIME DEPENDENT ------
ddmmyyhh# RELAY ON/OFF
*xxxxxxPHON9791260935# OWNER NUMBER OWNER NUBER
CHANGING CHANGED
COMMAND

TABLE 4.8 COMMAND LIST OF SMS RESPONDING RELAY


FEATURES:
o Quad Band GSM/GPRS : 850 / 900 / 1800 / 1900 MHz
o Built in RS232 to TTL or vice versa Logic Converter
(MAX232) Configurable Baud Rate
o SMA (Sub Miniature version A) connector with GSM L
Type Antenna
o Built in SIM (Subscriber Identity Module) Card holder
o Built in Network Status LED
o Inbuilt Powerful TCP / IP (Transfer Control Protocol /
Internet Protocol) stack for Internet data transfer through
GPRS (General Packet Radio Service)
o Audio Interface Connectors (Audio in and Audio out)
o Most Status and Controlling pins are available
o Normal Operation Temperature : -20 °C to +55 °C
o Input Voltage : 5V to 12V DC

69
Fig 4.56 SIMCOM SIM900A GSM MODULE
SIMCom SIM900A GSM Module:
This is actual SIM900 GSM module which is manufactured by SIMCom.
Designed for global market, SIM900 is a quad-band GSM/GPRS engine that
works on frequencies GSM 850MHz, EGSM 900MHz, DCS 1800MHz and
PCS 1900MHz.SIM900 features GPRS multislot class 10/ class 8 (optional) and
supports the GPRS coding schemes CS-1, CS-2, CS-3 and CS-4. With a tiny
configuration of 24mm x 24mm x 3mm, SIM900 can meet almost all the space.

ALHOCOL SENSOR

Alcohol measure and indicate the concentration of certain gases in an air


via different technologies. Typically employed to prevent toxic exposure and
fire, gas detectors are often battery operated devices used for safety purposes.
They are manufactured as portable or stationary (fixed) units and work by
signifying high levels of gases through a series of audible or visible indicators,
such as alarms, lights or a combination of signals. While many of the older,
standard gas detector units were originally fabricated to detect one gas, modern
multifunctional or multi-gas devices are capable of detecting several gases at

70
once. Some detectors may be utilized as individual units to monitor small
workspace areas, or units can be combined or linked together to create a
protection system.

As detectors measure a specified gas concentration, the sensor response serves


as the reference point or scale. When the sensors response surpasses a certain
pre-set level, an alarm will activate to warn the user. There are various types of
detectors available and the majority serves the same function: to monitor and
warn of a dangerous gas level. However, when considering what type of
detector to install, it is helpful to consider the different sensor technologies.

Fig 4.57 ALCOHOL SENSOR

WORKING PRINCIPLE
A reliable method of measurement for gas quantity is found in a gas sensor
based on taguchi principle .this gas sensor is essentially heated element inside a
porous semi conductive tube. The tube has a large surface and is able to freely
absorb gas modules on the semiconductor surface. Electron transfer occurs
between the gas molecules and the already absorbed oxygen molecules. This
causes a relatively large increase in conductivity for a small change in gas
concentration. This change occurs quite quickly.

71
CONNECTION DIAGRAM

Fig 4.58 CONNECTION DIAGRAM


GAS SENSOR MODULE

Fig 4.59 GAS SENSOR MODULE


SPECIFICATIONS

TABLE 4.9 SPECIFICATIONS


72
LCD
LCD (Liquid Crystal Display) screen is an electronic display module and
find a wide range of applications. A 16x2 LCD display is very basic module and
is very commonly used in various devices and circuits. These modules are
preferred over seven segments and other multi segment LEDs. The reasons
being:

 LCDs are economical


 Easily programmable
 Have no limitation of displaying special characters.

Fig 4.60 LCD


A 16x2 LCD means it can display 16 characters per line and there are 2 such
lines. In this LCD each character is displayed in 5x7 pixel matrix. This LCD has
two registers, namely, Command and Data.

The command register stores the command instructions given to the LCD. A
command is an instruction given to LCD to do a predefined task like

73
 Initializing it
 Clearing its screen,
 Setting the cursor position,
 Controlling display & etc.

The data register stores the data to be displayed on the LCD. The data is the
ASCII value of the character to be displayed on the LCD. Click to learn more
about internal structure of a LCD.

LCD COMMANDS

TABLE 4.10 LCD COMMANDS

74
LCD PIN CONFIGURATION

TABLE 4.11 LCD PIN CONFIGURATION


LCD CONNECTION DIAGRAM

Fig 4.61 LCD CONNECTION DIAGRAM

75
LCD CONFIGURATION FLOW CHART

Fig 4.62 LCD CONFIGURATION FLOW CHART


16X2 LCD DISPLAY SPECIFICATIONS:
 Display Mode: STN, BLUB
 Display Formate: 16 Character x 2 Line
 Viewing Direction: 6 O’Clock
 Input Data: 4-Bits or 8-Bits interface available
 Display Font : 5 x 8 Dots
 Power Supply : Single Power Supply (5V±10%)
 Driving Scheme : 1/16Duty,1/5Bias

 BACKLIGHT(SIDE):LED(WHITE)

MPLAB IDE
MPLAB IDE is a software program that runs on a PC to develop

76
applications for Microchip Microcontrollers. It is called an Integrated
Development Environment, or IDE, because it provides a single integrated
“environment” to develop code for embedded microcontrollers.
An embedded system is typically a design making use of the power of a
small microcontroller. These microcontrollers combine a microprocessor unit
(like the CPU in a desktop PC) with some additional circuits called
“peripherals”, plus some additional circuits on the same chip to make a small
control module requiring few other external devices. This single device can
then be embedded into other electronic and mechanical devices for low-cost
digital control.
The main difference between an embedded controller and a PC is that the
embedded controller is dedicated to one specific task or set of tasks. A PC is
designed to run many different types of programs and to connect to many
different external devices. An embedded controller has a single program and, as
a result, can be made cheaply to include just enough computing power and
hardware to perform that dedicated task. A PC has a relatively expensive
generalized central processing unit (CPU) at its heart with many other external
devices (memory, disk drives, video controllers, network interface circuits,
etc.). An embedded system has a low-cost microcontroller unit (MCU) for its
intelligence, with many peripheral circuits on the same chip, and with relatively
few external devices. Often, an embedded system is an invisible part, or sub-
module of another product, such as a cordless drill, refrigerator or garage door
opener. The controller in these products does a tiny portion of the function of
the whole device. The controller adds low-cost intelligence to some of the
critical sub-systems in these devices.
An example of an embedded system is a smoke detector. Its function is to
evaluate signals from a sensor and sound an alarm if the signals indicate the
presence of smoke. A small program in the smoke detector either runs in an
infinite loop, sampling the signal from the smoke sensor, or lies dormant in a

77
low-power “sleep” mode, being awakened by a signal from the sensor. The
program then sounds the alarm. The program would possibly have a few other
functions, such as a user test function, and a low battery alert. While a PC with
a sensor and audio output could be programmed to do the same function, it
would not be a cost-effective solution (nor would it run on a nine-volt battery,
unattended for years!) Embedded designs use inexpensive microcontrollers to
put intelligence into the everyday things in our environment, such as smoke
detectors, cameras, cell phones, appliances, automobiles, smart cards and
security systems.
The process for writing an application is often described as a
development cycle - as it is rare that all the steps from design to
implementation can be done flawlessly the first time. More often code is
written, tested and then modified in order to produce an application that
performs correctly. The Integrated Development Environment allows the
embedded systems design engineer to progress through this cycle without the
distraction of switching among an array of tools. By using MPLAB IDE, all the
functions are integrated, allowing the engineer to concentrate on completing the
application without the interruption of separate tools and different modes of
operation.

Fig 4.63 The Design Cycle


The IDE is a “wrapper” that coordinates all the tools from a single

78
graphical user interface – usually automatically. For instance, once code is
written, it can be converted to executable instructions and downloaded into a
microcontroller to see how it works. In this process multiple tools are needed:
an editor to write the code, a project manager to organize files and settings, a
compiler or assembler to convert the source code to machine code and some
sort of hardware or software that either connects to a target microcontroller or
simulates the operation of a microcontroller.

Fig 4.64 MPLAB IDE


It Converts Source Code into Machine Instructions
The MPLAB IDE desktop is a resizable window that operates independent of
the rest of the menu items. The desktop consists of a menu bar, tool bars, a
status bar and any open windows and/or dialogs.

Fig 4.65 MPLAB IDE WINDOW

79
4.3 CIRCUIT DIAGRAM

Fig 5.1 CIRCUIT DIAGRAM

80
4.4 CIRCUIT CONNECTION TABLE

S.NO COMPONENTS MODEL USE OUTPT SIGNAL CONNECTING


VOLTAG TYPE PIN
E

1 POWER SUPPLY RECTIFICATI TO SUPPLY 5V REGULATED ALL POSSITIVE


ON THE SOURCE AND NEGATIVE
PIN FOR SOURCE

2 MICRO PIC 16F877A CONTROLLING 5V DIGITAL ALL INPUT AND


ALL OUTPUT DEVICES
CONTROLLER COMPONENS

3 ALCOHOL MQ6 DETECTING 5V DIGITAL RD0


SENSOR GAS

4 BUZZER GOLI ALERTING A 5V DIGITAL RD3


SYSTEM

5 RELAY DC5V CONTROLLING 5V DIGITAL RD4


A LOADS

6 GSM SIM800C SENDING SMS 5V DIGITAL TX RC6

RX RC7

7 MOTOR DRIVER L293D MOTOR 5V DIGITAL IP1 RC0


CONTROLNG
IP2 RC1

IP3 RC2

IP4 RC3

8 LCD 16X2 DISPLAY THE 5V DIGITAL RS RB0


CHARACTER
RW RB1

E RB2

D4 RB3

D5 RB4

D6 RB5

D7 RB6

81
RF FSK360, FOR TRANSMIT
TRANS/RECEIVER HT12D, AND RECEIVE
9 HT12E A RF SIGNAL 5V DIGITAL IP1 RC0
BOARD

IP2 RC1

IP3 RC2

IP4 RC3

10 VOICE BOARD WTC104 RECORD AND 5V DIGITAL PLAY RD0


PLAY BACK A
VOICE RECORD RD1

DELET RD2

ADDR RD3

11 MOTOR GEAR TYPE FOR 12V REGULATED CONNECTING TO


MECHANICAL THE MOTOR
ROTATION DRIVER
PURPOSE

TABLE 4.12 CIRCUIT CONNECTION TABLE

82
4.5 ADVANTAGES AND APPLICATION

ADVANTAGES
 Accidents are reduced
 Safety precaution is high
 Low cost
 High reliable
 User friendly

APPLICATION
 All type of four wheelers
 Safety systems

83
CHAPTER 5
CONCLUSION

In our project we proposed a framework to connect the conventional vehicles


with each other and a receiving unit to monitor the speed of the vehicle in a
particular region. We designed a GPS based vehicle speed monitoring and data
collection system. This system was designed to cater to the real time safety
application to avoid the accidents in public places like residential societies,
educational institutions and etc. due to over speeding vehicles. The hardware
prototype was tested on a vehicle to study the driver behavior and a field study
was done to evaluate the requirement and effectiveness of the proposed
system for the real life implementation. With the help of the field trial results,
it was found that the average effectiveness of the system is 63%. It was
observed that with continuous monitoring of the driver with our system, the
driver behavior can be changed and the number of over speed scan be reduced.
The proposed framework has a great potential in the development of the
structure of vehicular ad hoc networks. With more real time and smart
applications, the system can also be an add on for the autonomous vehicles and
the smart city concepts

84
REFERENCES

1. A.Papathanassiou ;A.khoryaev. 2017 ,“Cellular v2x as essential enabler of


superior global connected transportaion service”.

2. H. L. Jones,2018, “Failure detection in linear systems,”Ph.D. dissertation,

Aeronautics and Astronautics Dept., Mass. Inst. Technol., Cambridge.

3. J. E. White and J. L. Speyer,2015, “Detection filter design: Spectral theory

and algorithms ,”IEEE Trans. Autom. Contr., vol. AC-32, no. 7, pp.593–

603.

4. M.-A. Massoumnia,2014, “A geometric approach to the synthesis of failure

detection filters,”IEEE Trans. Autom. Contr., vol. AC-31, no. 9, pp.839–

846.

5. R. Rajamani, A. S. Howell, C. Chen, J. K. Hedrick, and M.

Tomizuka,2010, “A complete fault diagnostic system for automated

vehicles operating in a platoon ,”IEEE Trans. Contr. Syst. Technol., vol. 9,

no. 4, pp. 553–564.

6. R. V. Beard,2011 “Failure accomodation in linear systems through self-

reorganization,”Ph.D. dissertation, Aeronautics and Astronautics

Dept.,Mass. Inst. Technol., Cambridge.

85
7. Yao, Y.; Chen, X.; Rao, L.; Liu, X.;2009, Zhou, X. “Lora: Loss

differentiation rate adaptation scheme for vehicle-to-vehicle

safety communications”. IEEE Trans. Veh. Technol.

8. Y.Wei, J.Chen and S.Hwang,2012, “Adjacent Vehicle Number-Triggered

Adaptive Transmission for V2V Communications”.

9. ZhigangXu,1 XiaochiLi,1 XiangmoZhao,1 MichaelH.Zhang,2

andZhongrenWang3.2004, ”DSRC versus 4G-LTE for Connected

Vehicle Applications: A Study on Field Experiments of Vehicular

Communication Performance”.

86

You might also like