GSM BASED VEHICLE THEFT CONTROL SYSTEM
1. INTRODUCTION
1.1 EMBEDDED SYSTEM:
An embedded system is a special-purpose system in which the computer is
completely encapsulated by or dedicated to the device or system it controls. Unlike a general-
purpose computer, such as a personal computer, an embedded system performs one or a few
predefined tasks, usually with very specific requirements. Since the system is dedicated to
specific tasks, design engineers can optimize it, reducing the size and cost of the product.
Embedded systems are often mass-produced, benefiting from economies of scale.
Personal digital assistants (PDAs) or handheld computers are generally considered
embedded devices because of the nature of their hardware design, even though they are more
expandable in software terms. This line of definition continues to blur as devices expand.
With the introduction of the OQO Model 2 with the Windows XP operating system and ports
such as a USB port
both features usually Belong to "general purpose computers", — the line of nomenclature
blurs even more.
Physically, embedded systems ranges from portable devices such as digital
watches and MP3 players, to large stationary installations like traffic lights, factory
controllers, or the systems controlling nuclear power plants.
In terms of complexity embedded systems can range from very simple with a
single microcontroller chip, to very complex with multiple units, peripherals and networks
mounted inside a large chassis or enclosure.
1
GSM BASED VEHICLE THEFT CONTROL SYSTEM
1.2 HISTORY:
In the 1960s, computers possessed an ability to acquire, analyze, process data, and
make decisions at very high speeds. However there were some disadvantages with the
computer controls. They were: high cost, program complexity, and hesitancy of personnel to
learn. However the new concept of electronic devices was evolved. They were called
programmable controllers which later became a part of embedded systems. This concept
developed from a mix of computer technology, solid state devices, and traditional electro
mechanical sequences. The first mass-produced embedded system was the Autonetics D-17
guidance computer for the Minuteman missile released in 1961. It was built from discrete
transistor logic and had a hard disk for main memory.
REQUIREMENTS OF TYPICAL EMBEDDED SYSTEMS: -
EX: CHEMICAL PLANT: Consider a chemical plant. No. of temperatures have to be
measured &based on values certain operations are performed, such as opening a value.
INPUT: - From sensors which measure temperatures.
OUTPUT: signal that controls a value.
Ex: MOBILE PHONES: The processor of a mobile phone needs to carry out a great deal of
communications protocol processing to make "TELEPHONECAL”.
Fig 1.1 Typical embedded sysytem organisation
2
GSM BASED VEHICLE THEFT CONTROL SYSTEM
1.3 CHARACTERISTICS:
Embedded systems often use a (relatively) slow processor and small memory size with an
intentionally simplified architecture to minimize costs.
Programs on embedded systems must often run with limited resources
Embedded system designers use compilers to develop an embedded system.
They often have no operating system or a speciali8zed embedded operating system
(often a real-time operating system ).
Programs on an embedded system often must run with resources: often there is no disk
drive, operating system, keyboard or screen. may replace rotating media, and a small
keypad and screen may be used instead of a PC's keyboard and screen.
Embedding a computer is to interact with the environment, often by monitoring and
controlling external machinery. In order to do this, analog inputs and outputs must be
transformed to and from digital signal levels.
1.4 APPLICATIONS OF EMBEDDED SYSTEMS:
Some widely used applications of embedded systems are listed below:
Automatic teller machines
Cellular telephones.
Computer network.
Disc drives.
Thermo stats.
Sprinklers.
Security monitoring systems.
Hand held calculations.
House-hold appliances.
Inertial guided systems.
Flight control hardware / software.
Medical equipment.
1.5 GSM
3
GSM BASED VEHICLE THEFT CONTROL SYSTEM
The Global System for Mobile Communications (GSM) is the most popular standard
for mobile phones in the world. GSM phones are used by over a billion people across more than
200 countries. The ubiquity of the GSM standard makes international roaming very common
between mobile phone operators, which enable phone users to access their services in many
other parts of the world as well as their own country. GSM differs significantly from its
predecessors in that both signaling and speech channels are digital, which means that it is seen as
a second generation (2G) mobile phone system. This fact has also meant that data
communication was built into the system from very early on. GSM is an open standard, which is
currently developed by the 3GPP.From the point of view of the consumer, the key advantage of
GSM systems has been higher digital voice quality and low cost alternatives to making calls such
as text messaging. The advantage for network operators has been 8 the ability to deploy
equipment from different vendors because the open standard allows easy inter-operability. Also,
the standards have allowed network operators to offer roaming services, which mean the
subscribers, can use their phone all over the world. GSM retained backward-compatibility with
the original GSM phones as the GSM standard continued to develop, for example packet data
capabilities were added in the Release '97 version of the standard, by means of GPRS. Higher
speed data transmission has also been introduced with EDGE in the Release '99 version of the
standard.
2. BLOCK DIAGRAM AND SCHEMATIC DIAGRAM4
GSM BASED VEHICLE THEFT CONTROL SYSTEM
2.1 BLOCK-DIAGRAM
FIG 2.1 Block diagram of vehicle theft control system
2.2 BLOCK DIAGRAM EXPLANATION:
The project “GSM BASED VEHICLE THEFT CONTROL SYSTEM” deals with
the design & development of a theft control system for automobiles which is being used to
prevent / control the theft of a vehicle. The developed system makes use of an embedded system
based on GSM technology. An interfacing mobile is also connected to the microcontroller, which
is in turn, connected to the engine.
Once, the vehicle is being stolen, the information is being used by the vehicle owner
for further processing. The information is passed onto the central processing insurance system,
where by sitting at a remote place, a particular number is dialed by them to the interfacing
mobile that is with the hardware kit which is installed in the vehicle. By reading the signals
received by the mobile, one can control the ignition of the engine; say to lock it or to stop the
engine immediately. Again it will come to the normal condition only after entering a secured
password. The owner of the vehicle & the centre processing system will know this secured
password. We can modify this concept such that the vehicle owner also can lock the vehicle from
his mobile phone.
5
GSM MODEM
KEYPAD
MICRO
CONTROLLER
LCD
LED
MEMS ADC
GSM BASED VEHICLE THEFT CONTROL SYSTEM
The main concept in this design is introducing the mobile communications into the
embedded system. With the help of SIM tracking knows the location of vehicle and informs to
the local police or stops it from further movement.
6
GSM BASED VEHICLE THEFT CONTROL SYSTEM
2.3 SCHEMATIC DIAGRAM:
Fig 2.2 schematic diagram
7
GSM BASED VEHICLE THEFT CONTROL SYSTEM
2.4 SCHEMATIC DESCRIPTION:
The operation of this circuit mainly depends on the MEM sensor. The actual position
of the MEM sensor should be 90 degrees with respect to ground. If there is any change in the
actual position of the MEM a control signal will be given to the ADC. The ADC will convert
the analog signal to the digital signal and it will send the digital signal to the micro controller.
Micro controller will send a signal to the GSM module. As GSM receives a signal
from micro controller it informs the owner as “vehicle theft detected” through an SMS.
When the owner receives the above message he will send a message to the GSM module to
lock the engine. As the GSM receives a secret code from the owner it sends a signal to the
micro controller and the micro controller will lock the engine. As this is a protocol we have
shown the locking of the engine by glowing led.
After locking the engine, the owner can able to find the location of the Automobile
by using the signals generated by GSM. After reaching the position where vehicle was
locked, the owner enters an secret code to unlock the engine. In this way we can protect the
vehicles. And we can also use this as a accident sensor.
8
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3. HARDWARE COMPONENTS
3.1 MICRO CONTROLLER (AT89S52)
3.1.1 INTRODUCTION:
A Micro controller consists of a powerful CPU tightly coupled with memory, various
I/O interfaces such as serial port, parallel port timer or counter, interrupt controller, data
acquisition interfaces-Analog to Digital converter, Digital to Analog converter, integrated on to a
single silicon chip.
If a system is developed with a microprocessor, the designer has to go for external
memory such as RAM, ROM, EPROM and peripherals. But controller is provided all these
facilities on a single chip. Development of a Micro controller reduces PCB size and cost of
design.
One of the major differences between a Microprocessor and a Micro controller is that
a controller often deals with bits not bytes as in the real world application.
Intel has introduced a family of Micro controllers called the MCS-51.
Fig 3.1.1 Micro controller
9
GSM BASED VEHICLE THEFT CONTROL SYSTEM
NECESSITY OF MICROCONTROLLERS:
Microprocessors brought the concept of programmable devices and made many
applications of intelligent equipment. Most applications, which do not need large amount of data
and program memory, tended to be:
Costly:
The microprocessor system had to satisfy the data and program requirements so,
sufficient RAM and ROM are used to satisfy most applications .The peripheral control
equipment also had to be satisfied. Therefore, almost all-peripheral chips were used in the
design. Because of these additional peripherals cost will be comparatively high.
An example:
8085 chip needs An Address latch for separating address from multiplex address and data.32-
KB RAM and 32-KB ROM to be able to satisfy most applications. As also Timer / Counter,
Parallel programmable port, Serial port, Interrupt controller are needed for its efficient
applications.
In comparison a typical Micro controller 8052 chip has all that the 8052 board has
except a reduced memory as follows. 4K bytes of ROM as compared to 32-KB, 128 Bytes of
RAM as compared to 32-KB.
Bulky:
On comparing a board full of chips (Microprocessors) with one chip with all
components in it (Micro controller)
Debugging:
Lots of Microprocessor circuitry and program to debug. In Micro controller there is
no Microprocessor circuitry to debug. Slower Development time: As we have observed
Microprocessors need a lot of debugging at board level and at program level, whereas, Micro
controller do not have the excessive circuitry and the built-in peripheral chips are easier to
program for operation.
10
GSM BASED VEHICLE THEFT CONTROL SYSTEM
So peripheral devices like Timer/Counter, Parallel programmable port, Serial
Communication Port, Interrupt controller and so on, which were most often used were integrated
with the Microprocessor to present the Micro controller .RAM and ROM also were integrated in
the same chip. The ROM size was anything from 256 bytes to 32Kb or more. RAM was
optimized to minimum of 64 bytes to 256 bytes or more.
Typical Micro controllers have all the following features:
8/16/32 CPU
Instruction set rich in I/O & bit operations.
One or more I/O ports.
One or more timer/counters.
One or more interrupt inputs and an interrupt controller
One or more serial communication ports.
Analog to Digital /Digital to Analog converter
One or more PWM output
Network controlled interface
Why AT 89C52? :
The system requirements and control specifications clearly rule out the use of 16, 32
or 64 bit micro controllers or microprocessors. Systems using these may be earlier to implement
due to large number of internal features. They are also faster and more reliable but, the above
application is satisfactorily served by 8-bit micro controller. Using an inexpensive 8-bit Micro
controller will doom the 32-bit product failure in any competitive market place.
Coming to the question of why to use AT89C52 of all the 8-bit Micro controller
available in the market the main answer would be because it has 8 Kb on chip flash memory
which is just sufficient for our application. The on-chip Flash ROM allows the program memory
11
GSM BASED VEHICLE THEFT CONTROL SYSTEM
to be reprogrammed in system or by conventional non-volatile memory Programmer. Moreover
ATMEL is the leader in
Flash technology in today’s market place and hence using AT 89C52 is the optimal
solution.
8052 micro controller architecture:
The 8052 architecture consists of these specific features:
Compatible with MCS®-51 Products
8K Bytes of In-System Programmable (ISP) Flash
4.0V to 5.5V Operating Range
Fully Static Operation: 0 Hz to 33 MHz
Three-level Program Memory Lock
256 x 8-bit Internal RAM
32 Programmable I/O Lines
Three 16-bit Timer/Counters
Eight Interrupt Sources
Full Duplex UART Serial Channel
Low-power Idle and Power-down Modes
Interrupt Recovery from Power-down Mode
Watchdog Timer
Dual Data Pointer
Power-off Flag
Fast Programming Time
12
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Flexible ISP Programming (Byte and Page Mode)
3.1.2 PIN DIAGRAM:
Fig -3.1.2 Pin out diagram of 89C52 ic
13
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3.1.3 FUNCTIONAL BLOCK DIAGRAM OF MICROCONTROLLER
Fig 3.1.3 Functional block diagram of micro controller
14
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3.1.4 Internal Block diagram:
Fig 3.
Fig 3.1.4 AT89C52 internal block diagram
The 8052 oscillator and clock:
The heart of the 8052 circuitry that generates the clock pulses by which all the
internal all internal operations are synchronized. Pins XTAL1 And XTAL2 is provided for
connecting a resonant network to form an oscillator. Typically a quartz crystal and capacitors are
employed. The crystal frequency is the basic internal clock frequency of the micro controller.
15
GSM BASED VEHICLE THEFT CONTROL SYSTEM
The manufacturers make 8052 designs that run at specific minimum and maximum frequencies
typically 1 to 16 MHz.
Types of memory:
The 8052 have three general types of memory. They are on-chip memory, external
Code memory and external Ram. On-Chip memory refers to physically existing memory on the
micro controller itself. External code memory is the code memory that resides off chip. This is
often in the form of an external EPROM. External RAM is the Ram that resides off chip. This
often is in the form of standard static RAM or flash RAM.
a) Code memory
Code memory is the memory that holds the actual 8052 programs that is to be run.
This memory is limited to 64K. Code memory may be found on-chip or off-chip. It is
possible to have 4K of code memory on-chip and 60K off chip memory simultaneously. If
only off-chip memory is available then there can be 64K of off chip ROM. This is controlled
by pin provided as Ea
b) Internal memory
The 8052 have a bank of 256 bytes of internal RAM. The internal RAM is found on-
chip. So it is the fastest Ram available. And also it is most flexible in terms of reading and
writing. Internal Ram is volatile, so when 8052 is reset, this memory is cleared. 256 bytes of
internal memory are subdivided. The first 32 bytes are divided into 4 register banks. Each
bank contains 8 registers. Internal RAM also contains 128 bits, which are addressed from 20h
to 2Fh. These bits are bit addressed i.e. each individual bit of a byte can be addressed by the
user. They are numbered 00h to 7Fh. The user may make use of these variables with
commands such as SETB and CLR.
16
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Special Function registered memory:
Special function registers are the areas of memory that control specific functionality
of the 8052 micro controller.
a) Accumulator (0E0h)
As its name suggests, it is used to accumulate the results of large no of instructions. It
can hold 8 bit values
b) B register (0F0h)
The B register is very similar to accumulator. It may hold 8-bit value. The b register
is only used by MUL AB and DIV AB instructions. In MUL AB the higher byte of the product
gets stored in B register. In div AB the quotient gets stored in B with the remainder in A.
c) Stack pointer (81h)
The stack pointer holds 8-bit value. This is used to indicate where the next value to be
removed from the stack should be taken from. When a value is to be pushed onto the stack, the
8052 first store the value of SP and then store the value at the resulting memory location. When a
value is to be popped from the stack, the 8052 returns the value from the memory location
indicated by SP and then decrements the value of SP.
d) Data pointer
The SFRs DPL and DPH work together work together to represent a 16-bit value
called the data pointer. The data pointer is used in operations regarding external RAM and some
instructions code memory. It is a 16-bit SFR and also an addressable SFR.
e) Program counter
The program counter is a 16 bit register, which contains the 2 byte address, which
tells the 8052 where the next instruction to execute to be found in memory. When the 8052 is
initialized PC starts at 0000h. And is incremented each time an instruction is executes. It is not
addressable SFR.
17
GSM BASED VEHICLE THEFT CONTROL SYSTEM
f) PCON (power control, 87h)
The power control SFR is used to control the 8052’s power control modes. Certain
operation modes of the 8052 allow the 8052 to go into a type of “sleep mode” which consumes
much less power.
g) TCON (timer control, 88h)
The timer control SFR is used to configure and modify the way in which the 8052’s
two timers operate. This SFR controls whether each of the two timers is running or stopped and
contains a flag to indicate that each timer has overflowed. Additionally, some non-timer related
bits are located in TCON SFR. These bits are used to configure the way in which the external
interrupt flags are activated, which are set when an external interrupt occurs.
h) TMOD (Timer Mode, 89h)
The timer mode SFR is used to configure the mode of operation of each of the two
timers. Using this SFR your program may configure each timer to be a 16-bit timer, or 13 bit
timer, 8-bit auto reload timer, or two separate timers. Additionally you may configure the timers
to only count when an external pin is activated or to count “events ” that are indicated on an
external pin.
18
GSM BASED VEHICLE THEFT CONTROL SYSTEM
i) TO (Timer 0 low/high, address 8A/8C h)
These two SFRs taken together represent timer 0. Their exact behavior depends on
how the timer is configured in the TMOD SFR; however, these timers always count up. What is
configurable is how and when they increment in value.
j) T1 (Timer 1 Low/High, address 8B/ 8D h)
These two SFRs, taken together, represent timer 1. Their exact behavior depends on
how the timer is configured in the TMOD SFR; however, these timers always count up.
k)Timer 2:
Timer 2 is a 16-bit Timer/Counter that can operate as either a timer or an event
counter. The type of operation is selected by bit C/T2 in the SFR T2CON (shown in Table 2).
Timer 2 has three operating modes: capture, auto-reload (up or down counting), and baud
rate generator. The modes are selected by bits in T2CON, as shown in Table 3. Timer 2
consists of two 8-bit registers, TH2 and TL2. In the Timer function, the TL2 register is
incremented every machine cycle. Since a machine cycle consists of 12 oscillator periods, the
count rate is 1/12 of the oscillator frequency.
Table 3. Timer 2 Operating Modes
19
GSM BASED VEHICLE THEFT CONTROL SYSTEM
In the Counter function, the register is incremented in response to a 1-to-0 transition
at its corresponding external input pin, T2. In this function, the external input is sampled
during S5P2 of every machine cycle. When the samples show a high in one cycle and a low
in the next cycle, the count is incremented. The new count value appears in the register
during S3P1 of the cycle following the one in which the transition was detected. Since two
machine cycles (24 oscillator periods) are required to recognize a 1-to-0 transition, the
maximum count rate is 1/24 of the oscillator frequency. To ensure that a given level is
sampled at least once before it changes, the level should be held for at least one full machine
cycle.
l) P0 (Port 0, address 90h, bit addressable)
This is port 0 latch. Each bit of this SFR corresponds to one of the pins on a micro
controller. Any data to be outputted to port 0 is first written on P0 register. For e.g., bit 0 of port
0 is pin P0.0, bit 7 is pin p0.7. Writing a value of 1 to a bit of this SFR will send a high level on
the corresponding I/O pin whereas a value of 0 will bring it to low level.
m) P1 (port 1, address 90h, bit addressable)
This is port latch1. Each bit of this SFR corresponds to one of the pins on a micro
controller. Any data to be outputted to port 0 is first written on P0 register. For e.g., bit 0 of port
0 is pin P1.0, bit 7 is pin P1.7. Writing a value of 1 to a bit of this SFR will send a high level on
the corresponding I/O pin whereas a value of 0 will bring it to low level
n) P2 (port 2, address 0A0h, bit addressable)
This is a port latch2. Each bit of this SFR corresponds to one of the pins on a micro
controller. Any data to be outputted to port 0 is first written on P0 register. For e.g., bit 0 of port
0 is pin P2.0, bit 7 is pin P2.7. Writing a value of 1 to a bit of this SFR will send a high level on
the corresponding I/O pin whereas a value of 0 will bring it to low level.
o) P3(port 3,address B0h, bit addressable)
This is a port latch3. Each bit of this SFR corresponds to one of the pins on a micro
controller. Any data to be outputted to port 0 is first written on P0 register. For e.g., bit 0 of port
20
GSM BASED VEHICLE THEFT CONTROL SYSTEM
0 is pin P3.0, bit 7 is pin P3.7. Writing a value of 1 to a bit of this SFR will send a high level on
the corresponding I/O pin whereas a value of 0 will bring it to low level
p) IE (interrupt enable, 0A8h):
The Interrupt Enable SFR is used to enable and disable specific interrupts. The low
7 bits of the SFR are used to enable/disable the specific interrupts, where the MSB bit is used to
enable or disable all the interrupts. Thus, if the high bit of IE is 0 all interrupts are disabled
regardless of whether an individual interrupt is enabled by setting a lower bit.
q) IP (Interrupt Priority, 0B8h)
The interrupt priority SFR is used to specify the relative priority of each interrupt. On
8052, an interrupt maybe either low or high priority. An interrupt may interrupt interrupts. For
e.g., if we configure all interrupts as low priority other than serial interrupt. The serial interrupt
always interrupts the system, even if another interrupt is currently executing. However, if a serial
interrupt is executing no other interrupt will be able to interrupt the serial interrupt routine since
the serial interrupt routine has the highest priority.
r) PSW (Program Status Word, 0D0h)
The program Status Word is used to store a number of important bits that are set and
cleared by 8052 instructions. The PSW SFR contains the carry flag, the auxiliary carry flag, the
parity flag and the overflow flag. Additionally, it also contains the register bank select flags,
which are used to select, which of the “R” register banks currently in use.
s) SBUF (Serial Buffer, 99h)
21
GSM BASED VEHICLE THEFT CONTROL SYSTEM
SBUF is used to hold data in serial communication. It is physically two registers.
One is writing only and is used to hold data to be transmitted out of 8052 via TXD. The other is
read only and holds received data from external sources via RXD. Both mutually exclusive
registers use address 99h.
I/O ports:
One major feature of a microcontroller is the versatility built into the input/output
(I/O) circuits that connect the 8052 to the outside world. The main constraint that limits
numerous functions is the number of pins available in the 8052 circuit. The DIP had 40 pins and
the success of the design depends on the flexibility incorporated into use of these pins. For this
reason, 24 of the pins may each used for one of the two entirely different functions which
depend, first, on what is physically connected to it and, then, on what software programs are used
to “program” the pins.
Port 0
Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can sink
eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high-impedance
inputs. Port 0 can also be configured to be the multiplexed low-order address/data bus during
accesses to external program and data memory. In this mode, P0 has internal pull-ups. Port 0 also
receives the code bytes during Flash programming and outputs the code bytes during program
verification. External pull-ups are required during program verification.
Port 1
Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers
can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the
inter-nal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being
pulled low will source current (IIL) because of the internal pull-ups. In addition, P1.0 and P1.1
can be configured to be the timer/counter 2 external count input (P1.0/T2) and the timer/counter
2 trigger input (P1.1/T2EX), respectively, as shown in the follow-ing table. Port 1 also receives
the low-order address bytes during Flash programming and verification.
Port 2
22
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output buffers
can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the
inter-nal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being
pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order
address byte during fetches from external program memory and dur-ing accesses to external data
memory that use 16-bit addresses (MOVX @ DPTR). In this application, Port 2 uses strong
internal pull-ups when emitting 1s. During accesses to external data memory that use 8-bit
addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. Port 2
also receives the high-order address bits and some control signals during Flash program-ming
and verification.
Port 3
Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers
can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the
inter-nal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being
pulled low will source current (IIL) because of the pull-ups. Port 3 receives some control signals
for Flash programming and verification. Port 3 also serves the functions of various special
features of the
AT89S52, as shown in the fol-lowing table
23
GSM BASED VEHICLE THEFT CONTROL SYSTEM
RST
Reset input. A high on this pin for two machine cycles while the oscillator is running
resets the device. This pin drives high for 98 oscillator periods after the Watchdog times out. The
DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In the default state
of bit DISRTO, the RESET HIGH out feature is enabled.
ALE/PROG
Address Latch Enable (ALE) is an output pulse for latching the low byte of the address
during accesses to external memory. This pin is also the program pulse input (PROG) during
Flash programming. In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator
frequency and may be used for external timing or clocking purposes. Note, however, that one
ALE pulse is skipped dur-ing each access to external data memory. If desired, ALE operation can
be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a
MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable
bit has no effect if the microcontroller is in external execution mode.
INTERRUPTS:
24
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Interrupts are hardware signals that are used to determine conditions that exist in external
and internal circuits. Any interrupt can cause the 8052 to perform a hardware call to an interrupt
–handling subroutine that is located at a predetermined absolute address in the program memory.
Five interrupts are provided in the 8052. Three of these are generated automatically
by the internal operations: Timer flag 0, Timer Flag 1, and the serial port interrupt (RI or TI)
Two interrupts are triggered by external signals provided by the circuitry that is connected to the
pins INTO 0 and INTO1. The interrupts maybe enable or disabled, given priority or otherwise
controlled by altering the bits in the Interrupt Enabled (IE) register, Interrupt Priority (IP)
register, and the Timer Control (TCON) register. . These interrupts are mask able i.e. they can be
disabled. Reset is a non maskable interrupt which has the highest priority. It is generated when a
high is applied to the reset pin. Upon reset, the registers are loaded with the default values.
Each interrupt source causes the program to do store the address in PC onto the stack and
causes a hardware call to one of the dedicated addresses in the program memory. The appropriate
memory locations for each for each interrupt are as follows:
In interrupt A Address
Rr RESET 00 00
IE E0 (External interrupt 0) 00 03
T F0 (Timer 0 interrupt) 00 0B
I E1 (External interrupt 1) 00 13
T F1 (Timer 1 interrupt) 00 1B
S SERIAL 00 23
The AT89C52 is a low-power, high-performance CMOS 8-bit microcomputer with
4K bytes of Flash programmable and erasable read only memory (PEROM). The device is
manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with
the industry-standard MCS-51 instruction set and pin out. The on-chip Flash allows the program
memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer.
By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C51 is a
25
GSM BASED VEHICLE THEFT CONTROL SYSTEM
powerful microcomputer, which provides a highly flexible and cost-effective solution to many
embedded control applications.
Hardware details:
The on chip oscillator of 89C52 can be used to generate system clock. Depending
upon version of the device, crystals from 3.5 to 12 MHz may be used for this purpose. The
system clock is internally divided by 6 and the resultant time period becomes one processor
cycle. The instructions take mostly one or two processor cycles to execute, and very occasionally
three processor cycles. The ALE (address latch enable) pulse rate is 16th of the system clock,
except during access of internal program memory, and thus can be used for timing purposes.
AT89C52 Serial port pins
PIN ALTERNATE USE SFR
P3.O RXD Seria data input SBUF
P3.I TXD Serial data output SBUF
P3.2 INTO External interrupt 0 TCON-1
P3.3 INT1 External interrupt 1 TCON- 2
P3.4 TO External timer 0 input TMOD
P3.5 T1 External timer 1 input TMOD
P3.6 WR External memory write pulse ---------
P3.7 RD External memory read pulse ----
Table – AT89C52 serial port pins
The two internal timers are wired to the system clock and prescaling factor is decided
by the software, apart from the count stored in the two bytes of the timer control registers. One
of the counters, as mentioned earlier, is used for generation of baud rate clock for the UART. It
would be of interest to know that the 8052 have a third timer, which is usually used for
generation of baud rate. The reset input is normally low and taking it high resets the micro controller,
26
GSM BASED VEHICLE THEFT CONTROL SYSTEM
In the present hardware, a separate CMOS circuit has been used for generation of reset signal so
that it could be used to drive external devices as well.
Writing the software:
The 89C52 has been specifically developed for control applications. As mentioned
earlier, out of the 128 bytes of internal RAM, 16 bytes have been organized in such a way that all
the 128 bits associated.
With this group may be accessed bit wise to facilitate their use for bit set/reset/test
applications. These are therefore extremely useful for programs involving individual logical
operations. One can easily give example of lift for one such application where each one of the
floors, door condition, etc may be depicted by a single hit. The 89C52 has instructions for bit
manipulation and testing. Apart from these, it has 8-bit multiply and divide instructions, which
may be used with advantage. The 89C52 has short branch instructions for 'within page' and
conditional jumps, short jumps and calls within 2k memory space which are very convenient,
and as such the controller seems to favor programs which are less than 2k byte long. Some
versions of 8751 EPROM devices have a security bit which can be programmed to lock the
device and then the contents of internal program EPROM cannot be read. The device has to be
erased in full for further alteration, and thus it can only be reused but not copied. EEPROM and
FLASH memory versions of the device are also available now.
Memory unit:
Memory is part of the micro controller whose function is to store data. The easiest
way to explain it is to describe it as one big closet with lots of drawers. If we suppose that we
marked the drawers in such a way that they cannot be confused, any of their contents will then be
easily accessible. It is enough to know the designation of the drawer and so its contents will be
known to us for sure.
Memory components are exactly like that. For a certain input we get the contents of a
certain addressed memory location and that’s all. Two new concepts are brought to us:
addressing and memory location. Memory consists of all memory locations, and addressing is
nothing but selecting one of them. This means that we need to select the desired memory
27
GSM BASED VEHICLE THEFT CONTROL SYSTEM
location on one hand, and on the other hand we need to wait for the contents of that location.
Besides reading from a memory location, memory must also provide for writing onto it. This is
done by supplying an additional line, called control line. We will designate this line as R/W
(read/write). Control line is used in the following way: if r/w=1, reading is done, and if opposite
is true then writing is done on the memory location. Memory is the first element, and we need a
few operation of our micro controller.
Central Processing Unit:
Let add 3 more memory locations to a specific block that will have a built in
capability to multiply, divide, subtract, and move its contents from one memory location onto
another. The part we just added in is called “central processing unit” (CPU). Its memory
locations are called registers.
Registers are therefore memory locations whose role is to help with performing
various mathematical operations or any other operations with data wherever data can be found.
Look at the current situation. We have two independent entities (memory and CPU), which are
interconnected, and thus any exchange of data is hindered, as well as its functionality. If, for
example, we wish to add the contents of two memory locations and return the result again back
to memory, we would need a connection between memory and CPU. Simply stated, we must
have some “way” through data goes from one block to another.
Bus:
That “way” is called “bus”. Physically, it represents a group of 8, 16, or more wires.
There are two types of buses: address and data bus. The first one consists of as many lines as the
amount of memory we wish to address, and the other one is as wide as data, in our case 8 bits or
the connection line. First one serves to transmit address from CPU memory, and the second to
connect all blocks inside the micro controller.
Input-output unit:
Those locations we’ve just added are called “ports”. There are several types of ports:
input, output or bi-directional ports. When working with ports, first of all it is necessary to
choose which port we need to work with, and then to send data to, or take it from the port.
28
GSM BASED VEHICLE THEFT CONTROL SYSTEM
When working with it the port acts like a memory location. Something is simply being
written into or read from it, and it could be noticed on the pins of the micro-controller.
3.2 555 TIMER IC
The 555 Timer IC is an integrated circuit (chip) implementing a variety of timer and
multi vibrator applications. The IC was designed by Hans R. Camenzind in 1970 and brought to
market in 1971 by Signetics (later acquired by Philips). The original name was the SE555 (metal
can)/NE555 (plastic DIP) and the part was described as "The IC Time Machine". It has been
claimed that the 555 gets its name from the three 5 kΩ resistors used in typical early
implementations, but Hans Camenzind has stated that the number was arbitrary. The part is still
in wide use, thanks to its ease of use, low price and good stability. As of 2003, it is estimated that
1 billion units are manufactured every year.
Depending on the manufacturer, the standard 555 package includes over 20
transistors, 2 diodes and 15 resistors on a silicon chip installed in an 8-pin mini dual-in-line
package (DIP-8). Variants available include the 556 (a 14-pin DIP combining two 555s on one
chip), and the 558 (a 16-pin DIP combining four slightly modified 555s with DIS & THR
connected internally, and TR falling edge sensitive instead of level sensitive).
Ultra-low power versions of the 555 are also available, such as the 7555 and TLC555. The 7555
requires slightly different wiring using fewer external components and less power.
29
GSM BASED VEHICLE THEFT CONTROL SYSTEM
The 555 has three operating modes:
Monostable mode:
In this mode, the 555 functions as a "one-shot". Applications include timers, missing
pulse detection, bounce free switches, touch switches, frequency divider, capacitance
measurement, pulse-width modulation (PWM) etc
A stable - free running mode:
The 555 can operate as an oscillator. Uses include LED and lamp flashers, pulse
generation, logic clocks, tone generation, security alarms, pulse position modulation, etc.
Bi stable mode or Schmitt trigger:
The 555 can operate as a flip-flop, if the DIS pin is not connected and no capacitor
is used. Uses include bounce free latched switches, etc. The 555 Timer IC is available as an
8-pin metal can, an 8-pin mini DIP (dual-in-package) or a 14-pin DIP.
This IC consists of 23 transistors, 2 diodes and 16 resistors. The explanation of
terminals coming out of the 555 timer IC is as follows. The pin number used in the
following discussion refers to the 8-pin DIP and 8-pin metal can packages.
3.2.1 555 timer ic pin diagram
30
GSM BASED VEHICLE THEFT CONTROL SYSTEM
555 timer IC 8 pin configuration
Pin 1: Grounded Terminal. All the voltages are measured with respect to this terminal.
Pin 2: Trigger Terminal. This pin is an inverting input to a comparator that is responsible for
transition of flip-flop from set to reset. The output of the timer depends on the amplitude of the
external trigger pulse applied to this pin.
Pin 3: Output Terminal. Output of the timer is available at this pin. There are two ways in
which a load can be connected to the output terminal either between pin 3 and ground pin (pin 1)
or between pin 3 and supply pin (pin 8). The load connected between pin 3 and ground supply
pin is called the normally on load and that connected between pin 3 and ground pin is called the
normally off load.
Pin 4: Reset Terminal. To disable or reset the timer a negative pulse is applied to this pin
due to which it is referred to as reset terminal. When this pin is not to be used for reset purpose,
it should be connected to + VCC to avoid any possibility of false triggering.
Pin 5: Control Voltage Terminal. The function of this terminal is to control the threshold
and trigger levels. Thus either the external voltage or a pot connected to this pin determines the
pulse width of the output waveform. The external voltage applied to this pin can also be used to
modulate the output waveform. When this pin is not used, it should be connected to ground
through a 0.01 micro Farad to avoid any noise problem.
Pin 6: Threshold Terminal. This is the non-inverting input terminal of comparator 1, which
compares the voltage applied to the terminal with a reference voltage of 2/3 VCC. The amplitude
of voltage applied to this terminal is responsible for the set state of flip-flop.
Pin 7: Discharge Terminal. This pin is connected internally to the collector of transistor and
mostly a capacitor is connected between this terminal and ground. It is called discharge terminal
because when transistor saturates, capacitor discharges through the transistor. When the
transistor is cut-off, the capacitor charges at a rate determined by the external resistor and
capacitor.
Pin 8: Supply Terminal. A supply voltage of + 5 V to + 18 V is applied to this terminal with
respect to ground (pin 1).
31
GSM BASED VEHICLE THEFT CONTROL SYSTEM
The 555 timer IC is an amazingly simple yet versatile device. It has been around now
for many years and has been reworked into a number of different technologies. The two primary
versions today are the original bipolar design and the more recent CMOS equivalent. These
differences primarily affect the amount of power they require and their maximum frequency of
operation; they are pin-compatible and functionally interchangeable.
This page contains only a description of the 555 timer IC itself. Functional circuits
and a few of the very wide range of its possible applications will be covered in additional pages
in this category.
The operation of the 555 timer revolves around the three resistors that form a voltage
divider across the power supply, and the two comparators connected to this voltage divider. The
IC is quiescent so long as the trigger input (pin 2) remains at +VCC and the threshold input (pin 6)
is at ground. Assume the reset input (pin 4) is also at +VCC and therefore inactive, and that the
control voltage input (pin 5) is unconnected. Under these conditions, the output (pin 3) is at
ground and the discharge transistor (pin 7) is turned on, thus grounding whatever is connected to
this pin.
The three resistors in the voltage divider all have the same value (5K in the bipolar
version of this IC), so the comparator reference voltages are 1/3 and 2/3 of the supply voltage,
whatever that may be. The control voltage input at pin 5 can directly affect this relationship,
although most of the time this pin is unused.
The internal flip-flop changes state when the trigger input at pin 2 is pulled down
below +VCC/3. When this occurs, the output (pin 3) changes state to +VCC and the discharge
transistor (pin 7) is turned off. The trigger input can now return to +VCC; it will not affect the
state of the IC.
However, if the threshold input (pin 6) is now raised above (2/3)+VCC, the output will
return to ground and the discharge transistor will be turned on again. When the threshold input
returns to ground, the IC will remain in this state, which was the original state when we started
this analysis.
32
GSM BASED VEHICLE THEFT CONTROL SYSTEM
The easiest way to allow the threshold voltage (pin 6) to gradually rise to (2/3)+VCC is
to connect it to a capacitor being allowed to charge through a resistor. In this way we can adjust
the R and C values for almost any time interval we might want.
The 555 can operate in either monostable or astable mode, depending on the
connections to and the arrangement of the external components. Thus, it can either produce a
single pulse when triggered, or it can produce a continuous pulse train as long as it remains
powered.
In monostable mode, the timing interval, t, is set by a single resistor and capacitor, as
shown to the right. Both the threshold input and the discharge transistor (pins 6 & 7) are
connected directly to the capacitor, while the trigger input is held at +VCC through a resistor. In
the absence of any input, the output at pin 3 remains low and the discharge transistor prevents
capacitor C from charging.
When an input pulse arrives, it is capacitively coupled to pin 2, the trigger input. The
pulse can be either polarity; its falling edge will trigger the 555. At this point, the output rises to
+VCC and the discharge transistor turns off. Capacitor C charges through R towards +VCC. During
this interval, additional pulses received at pin 2 will have no effect on circuit operation.
The standard equation for a charging capacitor applies here: e = E(1 - (-t/RC)). Here,
"e" is the capacitor voltage at some instant in time, "E" is the supply voltage, VCC, and " " is the
33
GSM BASED VEHICLE THEFT CONTROL SYSTEM
base for natural logarithms, approximately 2.718. The value "t" denotes the time that has passed,
in seconds, since the capacitor started charging.
We already know that the capacitor will charge until its voltage reaches (2/3)+VCC,
whatever that voltage may be. This doesn't give us absolute values for "e" or "E," but it does give
us the ratio e/E = 2/3. We can use this to compute the time, t, required to charge capacitor C to
the voltage that will activate the threshhold comparator:
2/3 = 1 - (-t/RC)
-1/3 = - (-t/RC)
1/3 = (-t/RC)
ln(1/3) = -t/RC
-1.0986123 = -t/RC
t = 1.0986123RC
t = 1.1RC
The value of 1.1RC isn't exactly precise, of course, but the round off error amounts to
about 0.126%, which is much closer than component tolerances in practical circuits, and is very
easy to use. The values of R and C must be given in Ohms and Farads, respectively, and the time
will be in seconds. You can scale the values as needed and appropriate for your application,
provided you keep proper track of your powers of 10. For example, if you specify R in megohms
and C in microfarads, t will still be in seconds. But if you specify R in kilo ohms and C in
microfarads, t will be in milliseconds. It's not difficult to keep track of this, but you must be sure
to do it accurately in order to correctly calculate the component values you need for any given
time interval. The timing interval is completed when the capacitor voltage reaches the (2/3)+VCC
upper threshold as monitored at pin 6. When this threshold voltage is reached, the output at pin 3
goes low again, the discharge transistor (pin 7) is turned on, and the capacitor rapidly discharges
back to ground once more. The circuit is now ready to be triggered once again.
34
GSM BASED VEHICLE THEFT CONTROL SYSTEM
If we rearrange the circuit slightly so that both the trigger and threshold inputs are
controlled by the capacitor voltage, we can cause the 555 to trigger itself repeatedly. In this case,
we need two resistors in the capacitor charging path so that one of them can also be in the
capacitor discharge path. This gives us the circuit shown to the left.
In this mode, the initial pulse when power is first applied is a bit longer than the
others, having a duration of 1.1(Ra + Rb)C. However, from then on, the capacitor alternately
charges and discharges between the two comparator threshold voltages. When charging, C starts
at (1/3)Vcc and charges towards VCC. However, it is interrupted exactly halfway there, at
(2/3)VCC.Therefore, the charging time, t1, is ln(1/2)(Ra + Rb)C = 0.693(Ra + Rb)C.
When the capacitor voltage reaches (2/3)VCC, the discharge transistor is enabled (pin
7), and this point in the circuit becomes grounded. Capacitor C now discharges through Rb
alone. Starting at (2/3)VCC, it discharges towards ground, but again is interrupted halfway there,
at (1/3)VCC. The discharge time, t2, then, is -ln(1/2)(Rb)C = 0.693(Rb)C.The total period of the
pulse train is t1 + t2, or 0.693(Ra + 2Rb)C. The output frequency of this circuit is the inverse of
the period, or 1.44/(Ra + 2Rb)C.
Note that the duty cycle of the 555 timer circuit in astable mode cannot reach 50%. On time must
always be longer than off time, because Ra must have a resistance value greater than zero to
prevent the discharge transistor from directly shorting VCC to ground. Such an action would
immediately destroy the 555 IC.
35
GSM BASED VEHICLE THEFT CONTROL SYSTEM
One interesting and very useful feature of the 555 timer in either mode is that the
timing interval for either charge or discharge is independent of the supply voltage, VCC. This is
because the same VCC is used both as the charging voltage and as the basis of the reference
voltages for the two comparators inside the 555. Thus, the timing equations above depend only
on the values for R and C in either operating mode.
In addition, since all three of the internal resistors used to make up the reference
voltage divider are manufactured next to each other on the same chip at the same time, they are
as nearly identical as can be. Therefore, changes in temperature will also have very little effect
on the timing intervals, provided the external components are temperature stable. A typical
commercial 555 timer will show a drift of 50 parts per million per Centigrade degree of
temperature change (50 ppm/°C) and 0.01%/Volt change in VCC. This is negligible in most
practical applications
3.3 ADC 0808
The ADC0808/ADC0809 data acquisition component is a monolithic CMOS device
with an 8-bit analog-to-digital converter, 8-channel multiplexer and microprocessor compatible
control logic. The 8-bit A/D converter uses successive approximation as the conversion
technique. The converter features a high impedance chopper stabilized comparator, a 256R
voltage divider with analog switch tree and a successive approximation register. The 8-channel
multiplexer can directly access any of 8-single-ended analog signals. The device eliminates the
need for external zero and full-scale adjustments. Easy interfacing to microprocessors is
provided by the latched and decoded multiplexer address inputs and latched TTL TRI-STATE
outputs.
The design of the ADC0808, ADC0809 has been optimized by incorporating the most
desirable aspects of several A/D conversion techniques. The ADC0808, ADC0809 offers high
speed, high accuracy, minimal temperature dependence, excellent long-term accuracy and
repeatability, and consumes minimal power. These features make this device ideally suited to
applications from process and machine control to consumer and automotive applications. For 16
channels multiplexer with common output (sample/hold port) see ADC0816 data sheet.
36
GSM BASED VEHICLE THEFT CONTROL SYSTEM
FEATURES:
Easy interface to all microprocessors
Operates ratio metrically or with 5 VDC or analog span adjusted voltage reference
No zero or full-scale adjust required
8-channel multiplexer with address logic
0V to VCC input range
Outputs meet TTL voltage level specifications
ADC0808 equivalent to MM74C949
KEY SPECIFICATIONS:
Resolution 8 Bits
Total Unadjusted Error ±½ LSB and ±1 LSB
Single Supply 5 VDC
Low Power 15 mW
Conversion Time 100 μs
37
GSM BASED VEHICLE THEFT CONTROL SYSTEM
BLOCK DIAGRAM:
3.3 .1 Block diagram of ADC 0808
PIN DIAGRAM OF ADC 0808
3.3.2 Pin diagram of ADC 0808
38
GSM BASED VEHICLE THEFT CONTROL SYSTEM
FUNCTIONAL DESCRIPTION:
MULTIPLEXER:
The device contains an 8-channel single-ended analog signal multiplexer. A particular
input channel is selected by using the address decoder. Table 1 shows the input states for the
address lines to select any channel. The address is latched into the decoder on the low-to-high
transition of the address latch enable signal.
CONVERTER CHARACTERISTICS:
The Converter:
The heart of this single chip data acquisition system is its 8- bit analog-to-digital
converter. The converter is designed to give fast, accurate, and repeatable conversions over a
wide range of temperatures. The converter is partitioned into 3 major sections: the 256R ladder
network, the successive approximation register, and the comparator. The converter's digital
outputs are positive true. The 256R ladder network approach shown in f igure 4.2 was chosen
over the conventional R/2R ladder because of its inherent mono tonicity, which guarantees no
missing digital codes. Mono tonicity is particularly important in closed loop feedback control
systems. A non-monotonic relationship can cause oscillations that will be catastrophic for the
system. Additionally, the 256R network does not cause load variations on the reference voltage.
3.3.3 Ladder network
39
GSM BASED VEHICLE THEFT CONTROL SYSTEM
The bottom resistor and the top resistor of the ladder network in figure4.3 are not the
same value as the remainder of the network. The difference in these resistors causes the output
characteristic to be symmetrical with the zero and full-scale points of the transfer curve. The first
output transition occurs when the analog signal has reached +½ LSB and succeeding output
transitions occur every 1 LSB later up to full-scale. The successive approximation register (SAR)
performs 8 iterations to approximate the input voltage. For any SAR type converter, n-iterations
are required for an n-bit converter.
The most important section of the A/D converter is the comparator. It is this section
which is responsible for the ultimate accuracy of the entire converter. It is also the comparator
drift which has the greatest influence on the repeatability of the device. A chopper-stabilized
comparator provides the most effective method of satisfying all the converter requirements. The
chopper-stabilized comparator converts the DC input signal into an AC signal. This signal is then
fed through a high gain AC amplifier and has the DC level restored. This technique limits the
drift component of the amplifier since the drift is a DC component which is not passed by the AC
amplifier. This makes the entire A/D converter extremely insensitive to temperature, long term
drift and input offset errors.
3.4 RS 232:
In telecommunications, RS-232 (Recommended Standard 232) is a standard for serial
binary data signals connecting between a DTE (Data terminal equipment) and a DCE (Data
Circuit-terminating Equipment). It is commonly used in computer serial ports.
Scope of the standard:
The Electronic Industries Alliance (EIA) standard RS-232-C as of 1969 defines:
Electrical signal characteristics such as voltage levels, signaling rate, timing and slew-
rate of signals, voltage withstand level short-circuit behavior, and maximum load
capacitance.
Interface mechanic characteristics, pluggable connectors and pin identification.
Functions of each circuit in the interface connector.
40
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Standard subsets of interface circuits for selected telecom applications.
The standard does not define such elements as
Character encoding (for example, ASCII, Baudot or EBCDIC)
The framing of characters in the data stream (bits per character, start/stop bits, parity)
Protocols for error detection or algorithms for data compression
Bit rates for transmission, although the standard says it is intended for bit rates lower than
20,000 bits per second. Many modern devices support speeds of 115,200 bps and above
Power supply to external devices.
Details of character format and transmission bit rate are controlled by the serial port
hardware, often a single integrated circuit called a UART that converts data from parallel
to serial form. A typical serial port includes specialized driver and receiver integrated
circuits to convert between internal logic levels and RS-232 compatible signal levels.
History:
The original DTEs were electromechanical teletypewriters and the original DCEs
were (usually) modems. When electronic terminals (smart and dumb) began to be used, they
were often designed to be interchangeable with teletypes, and so supported RS-232. The C
revision of the standard was issued in 1969 in part to accommodate the electrical characteristics
of these devices.
Since application to devices such as computers, printers, test instruments, and so on
were not considered by the standard, designers implementing an RS-232 compatible interface on
their equipment often interpreted the requirements idiosyncratically. Common problems were
non-standard pin assignment of circuits on connectors, and incorrect or missing control signals.
The lack of adherence to the standards produced a thriving industry of breakout boxes, patch
boxes, test equipment, books, and other aids for the connection of disparate equipment. A
common deviation from the standard was to drive the signals at a reduced voltage: the standard
requires the transmitter to use +12V and -12V, but requires the receiver to distinguish voltages as
low as +3V and -3V. Some manufacturers therefore built transmitters that supplied +5V and -5V
and labeled them as "RS-232 compatible."
41
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Later personal computers (and other devices) started to make use of the standard so
that they could connect to existing equipment. For many years, an RS-232-compatible port was a
standard feature for serial communications, such as modem connections, on many computers. It
remained in widespread use into the late 1990s. While it has largely been supplanted by other
interface standards in computer products, it is still used to connect older designs of peripherals,
industrial equipment (such as based on PLCs), and console ports, and special purpose equipment
such as a cash drawer for a cash register.
The standard has been renamed several times during its history as the sponsoring
organization changed its name, and has been variously known as EIA RS 232, EIA 232, and
most recently as TIA 232. The standard continues to be revised and updated by the EIA and
since 1988 the Telecommunications Industry Association (TIA). Revision C was issued in a
document dated August 1969. Revision D was issued in 1986. The current revision i TIA-232-F
Interface between Data Terminal Equipment and Data Circuit-Terminating Equipment
Employing Serial Binary Data Interchange, sissued in 1997. Changes since Revision C have
been in timing and details intended to improve harmonization with the CCITT standard V.24, but
equipment built to the current standard will interoperate with older versions.
Limitations of the standard:
Because the application of RS-232 has extended far beyond the original purpose of
interconnecting a terminal with a modem, successor standards have been developed to address
the limitations. Issues with the RS-232 standard include:
The large voltage swings and requirement for positive and negative supplies increases power
consumption of the interface and complicates power supply design. The voltage swing
requirement also limits the upper speed of a compatible interface.
Single-ended signaling referred to a common signal ground limits the noise immunity and
transmission distance.
Multi-drop (meaning a connection between more than two devices) operation of an RS-232
compatible interface is not defined; while multi-drop "work-arounds" have been devised, they
have limitations in speed and compatibility.
42
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Asymmetrical definitions of the two ends of the link make the assignment of the role of a
newly developed device problematic; the designer must decide on either a DTE-like or DCE-like
interface and which connector pin assignments to use.
The handshaking and control lines of the interface are intended for the setup and takedown of
a dial-up communication circuit; in particular, the use of handshake lines for flow control is not
reliably implemented in many devices.
No method for sending power to a device, while a small amount of current can be extracted
from the DTR and RTS lines this can only be used for low power devices such as mice.
While the standard recommends a 25-way connector and its pinout, the connector is large by
current standards.
Role in modern personal computers:
Today, RS-232 is gradually being superseded in personal computers by USB for local
communications. Compared with RS-232, USB is faster, has lower voltage levels, and has
connectors that are simpler to connect and use. Both standards have software support in popular
operating systems. USB is designed to make it easy for device drivers to communicate with
hardware. However, there is no direct analog to the terminal programs used to let users
communicate directly with serial ports. USB is more complex than the RS 232 standard because
it includes a protocol for transferring data to devices. This requires more software to support the
protocol used. RS 232 only standardizes the voltage of signals and the functions of the physical
interface pins. Serial ports of personal computers are also often used to directly control various
hardware devices, such as relays or lamps, since the control lines of the interface could be easily
manipulated by software. This isn't feasible with USB which requires some form of receiver to
decode the serial data.
As an alternative, USB docking ports are available which can provide connectors for a keyboard,
mouse, one or more serial ports, and one or more parallel ports. Corresponding device drivers are
required for each USB-connected device to allow programs to access these USB-connected
devices as if they were the original directly-connected peripherals. Devices that convert USB to
RS 232 may not work with all software on all personal computers.
43
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Standard details:
In RS-232, data is sent as a time-series of bits. Both synchronous and asynchronous
transmissions are supported by the standard. In addition to the data circuits, the standard defines
a number of control circuits used to manage the connection between the DTE and DCE. Each
data or control circuit only operates in one direction that is, signaling from a DTE to the attached
DCE or the reverse. Since transmit data and receive data are separate circuits, the interface can
operate in a full duplex manner, supporting concurrent data flow in both directions. The standard
does not define character framing within the data stream, or character encoding.
Voltage levels:
The RS-232 standard defines the voltage levels that correspond to logical one and
logical zero levels. Valid signals are plus or minus 3 to 15 volts. The range near zero volts is not
a valid RS-232 level; logic one is defined as a negative voltage, the signal condition is called
marking, and has the functional significance of OFF. Logic zero is positive; the signal condition
is spacing, and has the function ON. The standard specifies a maximum open-circuit voltage of
25 volts; signal levels of ±5 V,±10 V,±12 V, and ±15 V are all commonly seen depending on the
power supplies available within a device. RS-232 drivers and receivers must be able to withstand
indefinite short circuit to ground or to any voltage level up to +/-25 volts. The slew rate, or how
fast the signal changes between levels, is also controlled.
Because the voltage levels are higher than logic levels typically used by integrated
circuits, special intervening driver circuits are required to translate logic levels. These also
protect the device's internal circuitry from short circuits or transients that may appear on the RS-
232 interface, and provide sufficient current to comply with the slew rate requirements for data
transmission.
Because both ends of the RS-232 circuit depend on the ground pin being zero volts,
problems will occur when connecting machinery and computers where the voltage between the
ground pin on one end and the ground pin on the other is not zero. This may also cause a
hazardous ground loop.
44
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Connectors:
RS-232 devices may be classified as Data Terminal Equipment (DTE) or Data
Communications Equipment (DCE); this defines at each device which wires will be sending and
receiving each signal. The standard recommended but did not make mandatory the D-
subminiature 25 pin connector. In general, terminals have male connectors with DTE pin
functions, and modems have female connectors with DCE pin functions. Other devices may have
any combination of connector gender and pin definitions.
Presence of a 25 pin D-sub connector does not necessarily indicate an RS-232C
compliant interface. For example, on the original IBM PC, a male D-sub was an RS-232C DTE
port (with a non-standard current loop interface on reserved pins), but the female D-sub
connector was used for a parallel Centronics printer port. Some personal computers put non-
standard voltages or signals on their serial ports.
The standard specifies 20 different signal connections. Since most devices use only a
few signals, smaller connectors can be used. For example, the 9 pin DE-9 connector was used by
most IBM-compatible PCs since the IBM PC AT, and has been standardized as TIA-574. More
recently, modular connectors have been used. Most common are 8 pin RJ-45 connectors.
Standard EIA/TIA 561 specifies a pin assignment, but the "Yost Serial Device Wiring Standard"
invented by Dave Yost is common on UNIX computers and newer devices from Cisco Systems.
Many devices don't use either of these standards. 10 pin RJ-50 connectors can be found on some
devices as well. Digital Equipment Corporation defined their own DECconnect connection
system which was based on the Modified Modular Jack connector. This is a 6 pin modular jack
where the key is offset from the center position. As with the Yost standard, DECconnect uses a
symmetrical pin layout which enables the direct connection between two DTEs. Another
common connector is the DH10 header connector common on motherboards and add-in cards
which are usually converted via a cable to the more standard 9 pin DE-9 connector (and
frequently mounted on a free slot plate or other part of the housing).
Conventions:
For functional communication through a serial port interface, conventions of bit rate,
character framing, communications protocol, character encoding, data compression, and error
detection, not defined in RS 232, must be agreed to by both sending and receiving equipment.
45
GSM BASED VEHICLE THEFT CONTROL SYSTEM
For example, consider the serial ports of the original IBM PC. This implementation has an
integrated circuit UART, often 16550 UART, using asynchronous start-stop character formatting
with 7 or 8 data bits per frame, usually ASCII character coding, and data rates programmable
between 75 bits per second and 115,000 bits per second. Data rates above 20,000 bits per second
are out of the scope of the standard, although higher data rates are sometimes used by
commercially manufactured equipment. In the particular case of the IBM PC, baud rates were
programmable with arbitrary values, so that a PC could be connected to, for example, MIDI
music controllers (31,250 bits per second) or other devices not using the rates typically used with
modems. Since most devices do not have automatic baud rate detection, users must manually set
the baud rate (and all other parameters) at both ends of the RS-232 connection.
3-wire and 5-wire RS-232
A minimal “3-wire” RS-232 connection consisting only of transmits data, receives
data and ground, and is commonly used when the full facilities of RS-232 are not required. When
only flow control is required, the RTS and CTS lines are added in a 5-wire version.
3.5 MAX 232
A standard serial interface for PC, RS232C, requires negative logic, i.e., logic 1 is -
3V to -12V and logic 0 is +3V to +12V. To convert TTL logic, say, TxD and RxD pins of the
microcontroller thus need a converter chip. A MAX232 chip has long been using in many
microcontrollers boards. It is a dual RS232 receiver / transmitter that meets all RS232
specifications while using only +5V power supply. It has two onboard charge pump voltage
converters which generate +10V to -10V power supplies from a single 5V supply. It has four
level translators, two of which are RS232 transmitters that convert TTL/CMOS input levels into
+9V RS232 outputs. The other two level translators are RS232 receivers that convert RS232
input to 5V. Typical MAX232 circuit is shown below.
46
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Fig 3.5.1 Pin diagram of max232
A standard serial interfacing for PC, RS232C, requires negative logic, i.e., logic '1' is
-3V to -12V and logic '0' is +3V to +12V. To convert TTL logic, say, TxD and RxD pins of the
uC chips thus need a converter chip. A MAX232 chip has long been using in many uC boards. It
provides 2-channel RS232C port and requires external 10uF capacitors. Carefully check the
polarity of capacitor when soldering the board. A DS275 however, no need external capacitor
and smaller. Either circuit can be used without any problems.
47
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3.5.2 circuit connection of max 232
3.6 LIQUID CRYSTAL DISPLAY
3.6.1 INTRODUCTION:
In recent years the LCD is finding widespread use replacing LED s (seven-segment
LED or other multi segment LED s).
This is due to the following reasons:
1. The declining prices of LCD s.
2. The ability to display numbers, characters and graphics. This is in
contract to LED s, which are limited to numbers and a few characters.
3. Incorporation of a refreshing controller into the LCD, there by relieving the CPU of
the task of refreshing the LCD. In the contrast, the LED must be refreshed by the
CPU to keep displaying the data.
4. Ease of programming for characters and graphics.
48
GSM BASED VEHICLE THEFT CONTROL SYSTEM
USES:
The LCD s used exclusively in watches, calculators and measuring instruments is the
simple seven-segment displays, having a limited amount of numeric data. The recent advances in
technology have resulted in better legibility, more information displaying capability and a wider
temperature range. These have resulted in the LCD s being extensively used in
telecommunications and entertainment electronics. The LCD s has even started replacing the
cathode ray tubes (CRTs) used for the display of text and graphics, and also in small TV
applications.
49
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3.6.2 LCD PIN DIAGRAM:
3.6.1 LCD pin diagram
LCD PIN DESCRIPTION :
The LCD discussed in this section has 14 pins. The function of each pin is given in table.
Pin symbol I/O Description
1 Vss -- Ground
2 Vcc -- +5V power supply
3 VEE -- Power supply to
control contrast
4 RS 1 RS=0 to select cmd
register
Rs=1 to select data
register
5 R/W I R/W=0 for write
50
GSM BASED VEHICLE THEFT CONTROL SYSTEM
R/W=1 for read
6 E I/O Enable
7 DB0 I/O The 8-bit data bus
8 DB1 I/O The 8-bit data bus
9 DB2 I/O The 8-bit data bus
10 DB3 I/O The 8-bit data bus
11 DB4 I/O The 8-bit data bus
12 DB5 I/O The 8-bit data bus
13 DB6 I/O The 8-bit data bus
14 DB7 I/O The 8-bit data bus
TABLE 2: LCD COMMAND CODES
Code(HEX) COMMAND TO LCD INSTRUCTION REGISTER
1 Clear display screen
2 Return home
4 Decrement cursor
6 Increment cursor
5 Shift display right
7 Shift display left
8 Display off, cursor off
A Display off, cursor on
51
GSM BASED VEHICLE THEFT CONTROL SYSTEM
C Display on, cursor off
E Display on, cursor on
F Display on, cursor blinking
10 Shift cursor position to left
14 Shift cursor position to right
18 Shift the entire display to the left
1C Shift the entire display to the right
80 Force cursor to beginning of 1st line
C0 Force cursor to beginning of 2nd line
38 2 lines and 5x7 matrix
Power supply:
The power supply should be of +5V, with maximum allowable transients of 10mv. To
achieve a better / suitable contrast for the display, the voltage (VL) at pin 3 should be adjusted
properly.
A module should not be inserted or removed from a live circuit. The ground terminal
of the power supply must be isolated properly so that no voltage is induced in it. The module
should be isolated from the other circuits, so that stray voltages are not induced, which could
cause a flickering display.
Hardware:
Develop a uniquely decoded ‘E’ strobe pulse, active high, to accompany each module
transaction. Address or control lines can be assigned to drive the RS and R/W inputs.
52
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Utilize the Host’s extended timing mode, if available, when transacting with the
module. Use instructions, which prolong the Read and Write or other appropriate data strobes, so
as to realize the interface timing requirements.
If a parallel port is used to drive the RS, R/W and ‘E’ control lines, setting the ‘E’ bit
simultaneously with RS and R/W would violate the module’s set up time. A separate instruction
should be used to achieve proper interfacing timing requirements.
Mounting:
Cover the display surface with a transparent protective plate, to protect the polarizer.
Don’t touch the display surface with bare hands or any hard materials. This will stain the display
area and degrade the insulation between terminals. Do not use organic solvents to clean the
display panel as these may adversely affect tape or with absorbent cotton and petroleum benzene.
The processing or even a slight deformation of the claws of the metal frame will have effect on
the connection of the output signal and cause an abnormal display. Do not damage or modify the
pattern wiring, or drill attachment holes in the PCB. When assembling the module into another
equipment, the space between the module and the fitting plate should have enough height, to
avoid causing stress to the module surface. Make sure that there is enough space behind the
module, to dissipate the heat generated by the ICs while functioning for longer durations. When
an electrically powered screwdriver is used to install the module, ground it properly.
While cleaning by a vacuum cleaner, do not bring the sucking mouth near the
module. Static electricity of the electrically powered driver or the vacuum cleaner may destroy
the module.
Environmental precautions:
Operate the LCD module under the relative condition of 40C and 50% relative
humidity. Lower temperature can cause retardation of the blinking speed of the display, while
higher temperature makes the overall display discolor.
53
GSM BASED VEHICLE THEFT CONTROL SYSTEM
When the temperature gets to be within the normal limits, the display will be normal.
Polarization degradation, bubble generation or polarizer peel-off may occur with high
temperature and humidity.
Contact with water or oil over a long period of time may cause deformation or color
fading of the display. Condensation on the terminals can cause electro-chemical reaction
disrupting the terminal circuit.
3.6.3 TROUBLE SHOOTING
Introduction:
When the power supply is given to the module, with the pin 3 (VL) connected to
ground, all the pixels of a character gets activated in the following manner:
All the characters of a single line display, as in CDM 16108.
The first eight characters of a single line display, operated in the two-line display
mode, as in CDM 16116.
The first line of characters of a two-line display as in CDM 16216 and 40216. The
first and third line of characters of a four-line display operated in the two-line display mode, as in
CDM 20416.
If the above mentioned does not occur, the module should be initialized by software.
Make sure that the control signals ‘E’ , R/W and RS are according to the interface
timing requirements.
Improper character display:
When the characters to be displayed are missing between, the data read/write is too
fast. A slower interfacing frequency would rectify the problem.
When uncertainty is there in the start of the first characters other than the specified
ones are rewritten, check the initialization and the software routine.
54
GSM BASED VEHICLE THEFT CONTROL SYSTEM
In a multi-line display, if the displays of characters in the subsequent lines does’nt
take place properly, check the DD RAM addresses set for the corresponding display lines.
When it is unable to display data, even though it is present in the DD RAM, either the
display on/off flag is in the off state or the display shift function is not set properly. When the
display shift is done simultaneous with the data write operation, the data may not be visible on
the display.
If a character not found in the font table is displayed, or a character is missing, the
CG ROM is faulty and the controllers IC have to be changed
If particular pixels of the characters are missing, or not getting activated properly,
there could be an assembling problem in the module.
In case any other problems are encountered you could send the module to our factory
for testing and evaluation.
CRYSTALONICS DISPLAY
Introduction:
Crystalonics dot –matrix (alphanumeric) liquid crystal displays are available in TN,
STN types, with or without backlight. The use of C-MOS LCD controller and driver ICs result in
low power consumption. These modules can be interfaced with a 4-bit or 8-bit micro
processor /Micro controller.
The built-in controller IC has the following features:
Correspond to high speed MPU interface (2MHz)
80 x 8 bit display RAM (80 Characters max)
9,920 bit character generator ROM for a total of 240 character fonts. 208
character fonts (5 x 8 dots) 32 character fonts (5 x 10 dots)
64 x 8 bit character generator RAM 8 character generator RAM 8 character fonts
(5 x 8 dots) 4 characters fonts (5 x 10 dots)
Programmable duty cycles
1/8 – for one line of 5 x 8 dots with cursor
55
GSM BASED VEHICLE THEFT CONTROL SYSTEM
1/11 – for one line of 5 x 10 dots with cursor
1/16 – for one line of 5 x 8 dots with cursor
Wide range of instruction functions display clear, cursor home, display on/off,
cursor on/off, display character blink, cursor shift, display shift.
Automatic reset circuit, that initializes the controller / driver ICs after power on.
Functional description of the controller IC register:
The controller IC has two 8 bit registers, an instruction register (IR) and a data
register (DR). The IR stores the instruction codes and address information for display data RAM
(DD RAM) and character generator RAM (CG RAM). The IR can be written, but not read by the
MPU.
The DR temporally stores data to be written to /read from the DD RAM or CG RAM.
The data written to DR by the MPU is automatically written to the DD RAM or CG RAM as an
internal operation.
When an address code is written to IR, the data is automatically transferred from the
DD RAM or CG RAM to the DR. data transfer between the MPU is then completed when the
MPU reads the DR. likewise, for the next MPU read of the DR, data in DD RAM or CG RAM at
the address is sent to the DR automatically. Similarly, for the MPU write of the DR, the next DD
RAM or CG RAM address is selected for the write operation.
Busy flag:
When the busy flag is1, the controller is in the internal operation mode, and the next
instruction will not be accepted.
When RS = 0 and R/W = 1, the busy flag is output to DB7.
The next instruction must be written after ensuring that the busy flag is 0.
Address counter:
56
GSM BASED VEHICLE THEFT CONTROL SYSTEM
The address counter allocates the address for the DD RAM and CG RAM read/write
operation when the instruction code for DD RAM address or CG RAM address setting, is input
to IR, the address code is transferred from IR to the address counter. After writing/reading the
display data to/from the DD RAM or CG RAM, the address counter increments/decrements by
one the address, as an internal operation. The data of the address counter is output to DB0 to
DB6 while R/W = 1 and RS = 0.
Display data RAM(DD RAM):
The characters to be displayed are written into the display data RAM (DD RAM), in
the form of 8 bit character codes present in the character font table. The extended capacity of the
DD RAM is 80 x 8 bits i.e. 80 characters.
Character generator ROM (CG ROM):
The character generator ROM generates 5 x 8 dot 5 x 10 dot character patterns from 8
bit character codes. It generates 208, 5 x 8 dot character patterns and 32, 5 x 10 dot character
patterns.
Interfacing the microprocessor/controller:
The module, interfaced to the system, can be treated as RAM input/output, expanded
or parallel I/O.
Since there is no conventional chip select signal, developing a strobe signal for the
enable signal (E) and applying appropriate signals to the register select (RS) and read/write
(R/W) signals are important.
The module is selected by gating a decoded module – address with the host –
processor’s read/write strobe. The resultant signal, applied to the LCDs enable (E) input, clocks
in the data.
The ‘E’ signal must be a positive going digital strobe, which is active while data and
control information are stable and true. The falling edge of the enable signal enables the data /
57
GSM BASED VEHICLE THEFT CONTROL SYSTEM
instruction register of the controller. All module timings are referenced to specific edges of the
‘E’ signal. The ‘E’ signal is applied only when a specific module transaction is desired.
The read and write strobes of the host, which provides the ‘E’ signals, should not be
linked to the module’s R/W line. An address bit which sets up earlier in the host’s machine cycle
can be used as R/W.
When the host processor is so fast that the strobes are too narrow to serve as the ‘E’ pulse
Prolong these pulses by using the hosts ‘Ready’ input
Prolong the host by adding wait states
Decrease the Hosts Crystal frequency.
Inspite of doing the above mentioned, if the problem continues, latch both the data and
control information and then activate the ‘E’ signal. When the controller is performing an
internal operation he busy flag (BF) will set and will not accept any instruction. The user should
check the busy flag or should provide a delay of approximately 2ms after each instruction.
The module presents no difficulties while interfacing slower MPUs.The liquid crystal display
module can be interfaced, either to 4-bit or 8-bit MPUs.For 4-bit data interface, the bus lines
DB4 to DB7 are used for data transfer, while DB0 to DB3 lines are disabled. The data transfer is
complete when the 4-bit data has been transferred twice.
The busy flag must be checked after the 4-bit data has been transferred twice. Two more 4-bit
operations then transfer the busy flag and address counter data.
For 8-bit data interface, all eight-bus lines (DB0 to DB7) are used.
58
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3.6.4 LCD INTERFACING
SENDING COMMANDS AND DATA TO LCD’S WITH A TIME DELAY:
Fig 3.6.2 LCD interfacing
To send any command from table 2 to the LCD, make pin RS=0. For data, make
RS=1.Then place a high to low pulse on the E pin to enable the internal latch of the LCD.
59
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3.7 LIGHT EMITTING DIODE
3.7.1 Introduction:
The term LED stands for Light Emitting Diode. Modern electronics relies heavily
upon LED light bulbs. For instance, LED’s transmit information from remote controls, are used
in traffic lights, digital LED clocks, flashlights, and to form images on jumbo television screens.
These low-power, smaller-sized light emitting diode (LED) devices are based on the
company's existing standard and high brightness silicon carbide (sic) product technology. These
new devices consume 50% the power and represent cost savings over the current standard and
high brightness blue and green LED’s.
These devices are available in production quantities and are currently shipping into
high volume consumer applications. Target applications for these new devices include cellular
phones, high-resolution video boards and segmented LED displays.
Physical function:
A LED is a special type of semiconductor diode. Like a normal diode, it consists of a
chip of semi conducting material impregnated, or doped, with impurities to create a structure
called a p-n junction. As in other diodes, current flows easily from the p-side or anode to the n-
side, or cathode, but not in the reverse direction. Charge-carriers - electrons and holes flow into
the junction from electrodes with different voltages. When an electron meets a hole, it falls into a
lower energy level, and releases energy in the form of a photon as it does so.
The wavelength of the light emitted, and therefore its color, depends on the band gap
energy of the materials forming the p-n junction. In silicon or germanium diodes, the electrons
and holes recombine by a non - radiative transition which produces no optical emission, because
these are indirect band gap materials. The materials used for an LED have a direct band gap with
energies corresponding to near-infrared, visible or near-ultraviolet light.
LED development began with infrared and red devices made with gallium arsenide.
Advances in materials science have made possible the production of devices with ever-shorter
wavelengths, producing light in a variety of colors.
60
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3.7.2 Advantages and Disadvantages of LED’s:
Advantages:
LED’s are capable of emitting light of an intended color without the use of color filters
that traditional lighting methods require.
The shape of the LED package allows light to be focused. Incandescent and fluorescent
sources often require an external reflector to collect light and direct it in a useable
manner.
LED’s are insensitive to vibration and shocks, unlike incandescent and discharge sources.
LED’s are built inside solid cases that protect them, making them hard to break and
extremely durable.
LED’s have an extremely long life span: typically ten years, twice as long as the best
fluorescent bulbs and twenty times longer than the best incandescent bulbs.
Further LED’s fail by dimming over time, rather than the abrupt burnout of incandescent
bulbs.
LED’s give off less heat than incandescent light bulbs with similar light output.
LED’s light up very quickly. An illumination LED will achieve full brightness in
approximately 0.01 seconds, 10 times faster than an incandescent light bulb (0.1 second),
and many times faster than a compact fluorescent lamp, which starts to come on after 0.5
seconds or 1 second, but does not achieve full brightness for 30 seconds or more. A
typical red indicator LED will achieve full brightness in microseconds, or possibly less if
it's used for communication devices.
Disadvantages:
LED’s are currently more expensive than more conventional lighting technologies.
The additional expense partially stems from the relatively low lumen output
(requiring more light sources) and drive circuitry/power supplies needed. A good
measure to compare lighting technologies is lumen/dollar.
LED performance largely depends on the ambient temperature of the operating
environment. "Driving" an LED 'hard' in high ambient temperatures may result in
overheating of the LED package, eventually to device failure. Adequate heat sinking
61
GSM BASED VEHICLE THEFT CONTROL SYSTEM
is required to maintain long life. This is especially important when considering
automotive/military applications where the device must operate over a large range of
temperatures, with government-regulated output.
3.7.3 LED applications:
.LED’s are used as informative indicators in various types of embedded systems:
Status indicators, e.g. on/off lights on professional instruments and consumers
audio/video equipment.
In toys, especially as light up "eyes" of robot toys.
Seven segment displays, in calculators and measurement instruments, although now
mostly replaced by liquid crystal displays.
Thin, lightweight message displays, e.g. in public information signs (at airports and
railway stations and as destination displays for trains, buses, trams and ferries).
Red or yellow LED’s are used in indicator and [alpha] numeric displays in environments
where night vision must be retained: aircraft cockpits, submarine and ship bridges,
astronomy observatories, and in the field, e.g. night time animal watching and military
field use.
LED’s may also be used to transmit digital information:
Remote controls for TVs, VCRs, etc, using Infrared LED’s.
In fiber optic communications.
In dot matrix arrangements for displaying messages.
LED’s find further application in safety devices, where high brightness and reliability are
critical:
In traffic signals, LED clusters are replacing colored incandescent bulbs.
In level crossing lights, red LED’s have been used to replace incandescent bulbs.
In car brake and indicator lights, where the quick-on characteristic of LED’s enhances
safety.
In bicycle lighting; also for pedestrians to be seen by car traffic.
Signaling and emergency beacons or strobes.
62
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Navigation lights on boats, which are red, green, and white and shine in specific
directions. Boats use direct current batteries to power their lights, so not only does that
match the requirements of LED’s, but the efficiency of colored LED’s is a big advantage.
LED’s are also used for illumination:
In photographic darkrooms, red or yellow LED’s are also used for providing lighting,
which does not lead to unwanted exposure of the film.
In flashlights (US) / torches (UK), and backlights for LCD screens.
As a replacement for incandescent and fluorescent bulbs in home and office lighting, an
application known as Solid State Lighting (SSL).
In projectors. LED projectors are smaller, lighter, and produce much less heat than
incandescent technology.
3.8REGULATED POWER SUPPLY
3.8.1 DESCRIPTION:
A variable regulated power supply, also called a variable bench power supply, is one
where you can continuously adjust the output voltage to your requirements. Varying the output
of the power supply is the recommended way to test a project after having double checked parts
placement against circuit drawings and the parts placement guide. This type of regulation is ideal
for having a simple variable bench power supply. Actually this is quite important because one of
the first projects a hobbyist should undertake is the construction of a variable regulated power
supply. While a dedicated supply is quite handy e.g. 5V or 12V, it's much handier to have a
variable supply on hand, especially for testing. Most digital logic circuits and processors need a 5
volt power supply. To use these parts we need to build a regulated 5 volt source. Usually you
start with an unregulated power supply ranging from 9 volts to 24 volts DC (A 12 volt power
supply is included with the Beginner Kit and the Microcontroller Beginner Kit.). To make a 5
volt power supply, we use a LM7805 voltage regulator IC .
63
GSM BASED VEHICLE THEFT CONTROL SYSTEM
FIG 3.8.1 over view of regulator
The LM7805 is simple to use. You simply connect the positive lead of your unregulated DC
power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the
Common pin and then when you turn on the power, you get a 5 volt supply from the Output pin.
78XX:
The Bay Linear LM78XX is integrated linear positive regulator with three terminals.
The LM78XX offer several fixed output voltages making them useful in wide range of
applications. When used as a zener diode/resistor combination replacement, the LM78XX
usually results in an effective output impedance improvement of two orders of magnitude, lower
quiescent current. The LM78XX is available in the TO-252, TO-220 & TO-263packages,
64
GSM BASED VEHICLE THEFT CONTROL SYSTEM
BLOCK DIAGRAM:
FIG 3.8.2 block diagram of power supply unit
CIRCUIT FEATURES
Brief description of operation: Gives out well regulated +5V output, output current capability of
100 mA Circuit protection: Built-in overheating protection shuts down output when regulator IC
gets too hot
Circuit complexity: Very simple and easy to build
Circuit performance: Very stable +5V output voltage, reliable operation
Availability of components: Easy to get, uses only very common basic components
Applications: Part of electronics devices, small laboratory power supply
Power supply voltage: Unregulated DC 8-18V power supply
Power supply current: Needed output current + 5 mA
Component costs: Few dollars for the electronics components + the input transformer
cost
Design testing: Based on datasheet example circuit,I have used this circuit
successfully as part of many electronics projects
65
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3.8.2 BASIC POWER SUPPLY CIRCUIT
Fig 3.8.3 cicuit diagram of a basic power supply unit
BASIC POWER SUPPLY CIRCUIT
Above is the circuit of a basic unregulated dc power supply. A bridge rectifier D1 to D4
rectifies the ac from the transformer secondary, which may also be a block rectifier such as WO4
or even four individual diodes such as 1N4004 types. (See later re rectifier ratings).
The principal advantage of a bridge rectifier is you do not need a centre tap on the
secondary of the transformer. A further but significant advantage is that the ripple frequency at
the output is twice the line frequency (i.e. 50 Hz or 60 Hz) and makes filtering somewhat easier.
As a design example consider we wanted a small unregulated bench supply for our projects. Here
we will go for a voltage of about 12 - 13V at a maximum output current (IL) of 500ma (0.5A).
Maximum ripple will be 2.5% and load regulation is 5%.
Now the RMS secondary voltage (primary is whatever is consistent with your area)
for our power transformer T1 must be our desired output Vo PLUS the voltage drops across D2
and D4 ( 2 * 0.7V) divided by 1.414. This means that Vsec = [13V + 1.4V] / 1.414 which equals
about 10.2V. Depending on the VA rating of your transformer, the secondary voltage will vary
considerably in accordance with the applied load. The secondary voltage on a transformer
advertised as say 20VA will be much greater if the secondary is only lightly loaded.
66
GSM BASED VEHICLE THEFT CONTROL SYSTEM
If we accept the 2.5% ripple as adequate for our purposes then at 13V this becomes
13 * 0.025 = 0.325 Vrms. The peak to peak value is 2.828 times this value. Vrip = 0.325V X
2.828 = 0.92 V and this value is required to calculate the value of C1. Also required for this
calculation is the time interval for charging pulses. If you are on a 60Hz system it it 1/ (2 * 60 ) =
0.008333 which is 8.33 milliseconds. For a 50Hz system it is 0.01 sec or 10 milliseconds.
Remember the tolerance of the type of capacitor used here is very loose. The
important thing to be aware of is the voltage rating should be at least 13V X 1.414 or 18.33. Here
you would use at least the standard 25V or higher (absolutely not 16V).With our rectifier diodes
or bridge they should have a PIV rating of 2.828 times the Vsec or at least 29V. Don't search for
this rating because it doesn't exist. Use the next highest standard or even higher. The current
rating should be at least twice the load current maximum i.e. 2 X 0.5A or 1A. A good type to use
would be 1N4004, 1N4006 or 1N4008 types.
3.8.3 BRIDGE RECTIFIER :
A bridge rectifier makes use of four diodes in a bridge arrangement to achieve full-
wave rectification. This is a widely used configuration, both with individual diodes wired as
shown and with single component bridges where the diode bridge is wired internally. A bridge
rectifier makes use of four diodes in a bridge arrangement as shown in fig(a) to achieve full-
wave rectification. This is a widely used configuration, both with individual diodes wired as
shown and with single component bridges where the diode bridge is wired internally.
Fig 3.8.4 Bridge Rectifier
67
GSM BASED VEHICLE THEFT CONTROL SYSTEM
OPERATION:
During positive half cycle of secondary, the diodes D2 and D3 are in forward biased
while D1 and D4 are in reverse biased as shown in the fig(b). The current flow direction is
shown in the fig (b) with dotted arrows.
Fig(B)
During negative half cycle of secondary voltage, the diodes D1 and D4 are in forward
biased while D2 and D3 are in reverse biased as shown in the fig(c). The current flow
direction is shown in the fig (c) with dotted arrows.
Fig(C)
CONSTRUCTION
The whole project MUST be enclosed in a suitable box. The main switch (preferably
double pole) must be rated at 240V or 120V at the current rating. All exposed parts within the
box MUST be fully insulated, preferably with heat shrink tubing.
68
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3.9 KEY PAD
3.9.1Fig Keypad
Th The 12-Button telephone-like matrix keypad offers:
Rugged gray plastic with white key.
3 x 4 Matrix Type
8-position solder pad
Contact rating: 24VDC @ 20mA
Contact resistance: 200 Ohms max.
Size: 77 x 56 x 15mm height
DEDETAILS: This keypad provides a visually appealing way to get numeric data to your
concontrol system. The board is a series of pushbutton switches that provide structured input
for memeasuring user input. Output pins are 1-7, where pin 1 corresponds to the pin closest to
the * key key.
69
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Table keypad output pins
K KeypadOOutput Pins
1 2-3
2 1-2
3 2-5
4 3-7
5 1-7
6 5-7
7 3-6
8 1-6
9 5-6
0 1-4
# 4-5
* 3-4
Wire Keypad Interface:
This describes a possible technique for interfacing a AT89S52 to a standard 3x4
matrix keypad of the type commonly found in telephones. Interfacing these normally requires the
70
GSM BASED VEHICLE THEFT CONTROL SYSTEM
use of 7 I/O lines. To implement this technique, some extra hardware is required over the
standard solution which needs no other hardware. Six diodes are needed; these may be general
purpose silicon signal diodes the schematic is shown below:
3.9.1 KEYBOARD SECTION
A 16 key matrix keyboard as shown below is used in this system.
MM74C922 connects the rows to drivers (constant supply) and scans the columns on
depression of any key to sense which key was depressed. It then encodes the key and sends the
code to 8052. In this project we have used membrane key switch keyboard. This keyboard has a
number of membrane switches present below the keys and there are no springs. On pressing a
key an electric circuit is closed by two metallic contacts. On releasing the key, this circuit is
broken. Due to the less moving parts this is a silent keyboard.
Types of Keyboard:
1. Membrane keyboard
Membrane keyboards are by far the most commonly used with computers. They are
designed so that all the keycaps are positioned above rubber domes, which in turn are above a 3-
71
D
R
I
V
S E N S O R S
GSM BASED VEHICLE THEFT CONTROL SYSTEM
layer plastic membrane that spreads over the entire keyboard. When the user presses the keycap
the full key travel distance, a contact point at the top of the rubber dome pushes the top layer
through a hole in the middle layer to contact the bottom layer, creating a short circuit which
generates the keystroke that is then sent to the computer. The middle layer of the membrane
keeps the top and bottom layers from contacting each other except when a switch is depressed
completely. Differences in the shape and thickness of the rubber domes determine the travel,
resistance, and tactile feedback of the switch; however the keystrokes are only generated when
the key is fully depressed. The travel distance is usually 'full-travel' i.e. 3.5 - 4.0 mm, and the
elasticity of the rubber dome membrane returns the key to its default 'up' position.
Membrane keyboards are typically inexpensive and can range from firm to soft feel
depending on the design of the rubber dome, however most have a 'softer' feel due to the
'sponginess' of the dome. They are the least durable of keyboards, with ratings typically in the
0.5 to 5 million keystroke range. Over time some keys become inelastic and other overly elastic,
creating a variance in how much force is required to type throughout the keyboard. This can be
caused by various factors, including buildup of debris, rubber fatigue, manufacturing
imperfections and even ultraviolet radiation.
Another special case of rubber dome switch is conductive rubber. While this
mechanical portion of the switch can be identical to a membrane keyboard (either simple rubber
dome or scissors switch), the electrical portion only uses a single layer. The "pill" portion of the
rubber dome is a specially-doped rubber which conducts electricity, so that when the switch
bottoms out, the pill directly shorts out two different circuits to cause a switch action.
2. Mechanical keyboard
Mechanical key switches are more intricate and of higher quality than membrane
keyboards. Each key has its own independent key switch mechanism that will register when a
key is pressed. For example on the mechanical key switch at right the keycap rests on top of the
blue plunger mechanism which depresses into the unit. In most cases the key is actuated (that is
the keystroke is generated and sent to the computer) halfway through the key travel distance.
Finally, keys snap back to ready position quicker, allowing for faster typing speeds.
All these features means there is both audible (clicks) and tactile (feel) feedback when we have
successfully actuated a keystroke
72
GSM BASED VEHICLE THEFT CONTROL SYSTEM
4. GSM MODEM AND AT-COMMANDS
4.1 GSM Fundamentals:
The Global System for Mobile Communications (GSM) is the most popular standard
for mobile phones in the world. GSM phones are used by over a billion people across more than
200 countries. The ubiquity of the GSM standard makes international roaming very common
between mobile phone operators, which enable phone users to access their services in many
other parts of the world as well as their own country. GSM differs significantly from its
predecessors in that both signaling and speech channels are digital, which means that it is seen as
a second generation (2G) mobile phone system. This fact has also meant that data
communication was built into the system from very early on. GSM is an open standard, which is
currently developed by the 3GPP.From the point of view of the consumer, the key advantage of
GSM systems has been higher digital voice quality and low cost alternatives to making calls such
as text messaging. The advantage for network operators has been 8 the ability to deploy
equipment from different vendors because the open standard allows easy inter-operability. Also,
the standards have allowed network operators to offer roaming services, which mean the
subscribers, can use their phone all over the world. GSM retained backward-compatibility with
the original GSM phones as the GSM standard continued to develop, for example packet data
capabilities were added in the Release '97 version of the standard, by means of GPRS. Higher
speed data transmission has also been introduced with EDGE in the Release '99 version of the
standard.
4.2 GSM SERVICES & GSM SECURITY:
From the beginning, the planners of GSM wanted ISDN compatibility in terms of the
services offered and the control signaling used. However, radio transmission limitations, in terms
of bandwidth and cost, do not allow the standard ISDN B-channel bit rate of 64 kbps to be
73
GSM BASED VEHICLE THEFT CONTROL SYSTEM
practically achieved. Using the ITU-T definitions, telecommunication services can be divided
into bearer services, teleservices, and supplementary services. The most basic teleservice
supported by GSM is telephony. As with all other communications, speech is digitally encoded
and transmitted through the GSM network as a digital stream. There is also an emergency
service, where the nearest emergency-service provider is notified by dialing three digits (similar
to 911).
A variety of data services is offered. GSM users can send and receive data, at rates up
to 9600 bps, to users on POTS (Plain Old Telephone Service), ISDN, Packet Switched Public
Data Networks, and Circuit Switched Public Data Networks using a variety of access methods
and protocols, such as X.25 or X.32. Since GSM is a digital network, a modem is not required
between the user and GSM network, although an audio modem is required inside the GSM
network to interwork with POTS. Other data services include Group 3 facsimile, as described in
ITU-T recommendation T.30, which is supported by use of an appropriate fax adaptor.
A unique feature of GSM, not found in older analog systems, is the Short Message
Service (SMS). SMS is a bi-directional service for short alphanumeric (upto160 bytes)
Messages. Messages are transported in a store-and-forward fashion. For point-to-point SMS, a
message can be sent to another subscriber to the service, and an of receipt acknowledgement is
provided to the sender. SMS can also be used in a cell-broadcast mode, for sending messages
such as traffic updates or news updates. Messages can also be stored in the SIM card for later
retrieval. Supplementary services are provided on top of tele services or bearer services. In the
current (Phase I) specifications, they include several forms of call forward (such as call
forwarding when the mobile subscriber is unreachable by the network), and call barring of
outgoing or incoming calls, for example when roaming in another country. Many additional
supplementary services will be provided in the specifications, such as caller identification, call
waiting, multi-party conversations.
GSM SECURITY:
GSM was designed with a moderate level of security. The system was designed to
authenticate the subscriber using shared-secret cryptography. Communications between the
subscriber and the base station can be encrypted. The development of UMTS introduces an
74
GSM BASED VEHICLE THEFT CONTROL SYSTEM
optional USIM, that uses a longer authentication key to give greater security, as well as mutually
authenticating the network and the user - whereas GSM only authenticated the user to the
network (and not vice versa). The security model therefore offers confidentiality and
authentication, but limited authorization capabilities, and no non-repudiation. GSM uses several
cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring
over the- air voice privacy. A5/1 was developed first and is a stronger algorithm used within
Europe and the United States; A5/2 is weaker and used in countries that may not be able to
support the infrastructure necessary for A5/1.
A large security advantage of GSM is that the Ki, the crypto variable stored on the
SIM card that is the key to any GSM ciphering algorithm, is never sent over the air interface.
Serious weaknesses have been found in both algorithms, and it is possible to break A5/2 in real-
time in a cipher text-only attack.
4.3 GSM INTERFACING
Interfacing with PC:
Fig 4.3.1 GSM interfacing with pc
75
GSM BASED VEHICLE THEFT CONTROL SYSTEM
The GSM modem consists of a SIMCOM300 GSM module which is
interfaced with the MAX232 level converter with DB9 connector. The modem and the
PC can be connected using DB9 data cable via serial port of the PC. The modem can be
tested by connecting with PC and sending AT commands and notifying how it responds
to AT-Commands. With the modem, open a terminal application. Communication
settings should be found in the modem datasheet. In our application we required the
settings of 9600 Baud-rate, 8 Data-bits, None-Parity, 1 Stop-bit and Hardware Flow
control as shown in below figure. Now the connected system should enable sending AT-
Commands from the terminal window. Test with “AT” to verify this.
4.4 ADVANTAGES & USES OF GSM:
1. Roaming with GSM phones is a major advantage over the competing technology as roaming
across CDMA networks.
2. Another major reason for the growth in GSM usage, particularly between 1998 to 2002, was
the availability of prepaid calling from mobile phone operators. This allows people who are
either unable or unwilling to enter into a contract with an operator to have mobile phones.
Prepaid also enabled the rapid expansion of GSM in many developing countries where large
sections of the population do not have access to banks or bank accounts and countries where
there are no effective credit rating agencies. (In the USA, starting a non-prepaid contract with a
cellular phone operator is almost always subject to credit verification through personal
information provided by credit rating agencies).
3. The architecture of GSM allows for rapid flow of information by voice or data messaging
(SMS). Users now have access to more information, whether personal, technical, economic or
political, more quickly than was possible before the global presence of GSM. Even remote
communities are able to integrate into networks (sometimes global) thereby making information,
knowledge and culture accessible, in theory, to anyone.
76
GSM BASED VEHICLE THEFT CONTROL SYSTEM
4. One of the most appealing aspects of wireless communications is its mobility. Much of the
success of GSM is due to its mobility management, offering users the freedom and convenience
to conduct business from almost anywhere at any time.
5. GSM has been the catalyst in the tremendous shift in traffic volume from fixed networks to
mobile networks. This has resulted in the emergence of a mobile paradigm, whereby the mobile
phone has become the first choice of personal phone.
6. Higher digital voice quality.
7. Low cost alternatives to making calls such a text messaging.
USES OF GSM:
Uses encryption to make phone calls more secure
Data networking
Group III facsimile services
Short Message Service (SMS) for text messages and paging
Call forwarding
Caller ID U
Call waiting.
Multi-party conferencing
After a few turbulent years for the industry, we highlight some of the key factors we view as
critical for the continued success of GSM. These include:
Enabling convergence with other wireless technologies
Developing Mobile Centric Applications
Evolving the mobile business model
Mobile terminal enhancements and variety
77
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Fostering industry partnerships and co-operations
Interoperability and Inter-generational roaming between various platforms.
4.5 GSM AT- COMMANDS
When a modem is connected to any device (computer, fax, etc.,) we need AT
commands to direct the modem for its operations. Basically we send commands directly to the
modem after activating Terminal mode . This mode is also called as local mode or direct mode.
Apart from the basic AT commands, to send the SMS message, it is required to have some
special AT commands. The basic regularly used AT commands along with the SMS AT
commands are discussed below.
THE AT COMMAND FORMAT
Instructions sent to the modem are referred as AT commands because they are always
preceded by a prefix AT that are used to get the attention of the modem
<AT> <COMMAND>{Argument}{=n}<enter>
AT - attention code
Command - a command consists of one letter
Argument - Optional information that further defines the command
=n - used when setting a register
you may string commands together in one command line as long as the total length of
command does not exceed 63 bytes . The attention code, AT, is only required at the beginning
of the command line. A/, +++ are the only two commands which are not preceded by AT.
78
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Using AT Commands
When issued to the fax modem, AT commands direct the fax modem to dial, answer, hang up,
and to perform many other communication tasks. Some of the most commonly used commands
are:
AT (Attention). This is the command line prefix. (All the commands listed , except A/ and +++,
must be preceded by the command AT). A Answer an incoming call D Dial the following phone
number E Turn echo OFF H Hang up O Return to on-line state Z Reset the modem to the values
stored in the N.V. Ram +++ Return to the Command State A/ Repeat last command (Do not
precede this command with AT or follow it with <Enter>)
Request revision identification +CGMR
Description :
This command is used to get the revised software version.
Preferred Message Storage +CPMS
Description:
79
GSM BASED VEHICLE THEFT CONTROL SYSTEM
This command allows the message storage area to be selected (for reading, writing, etc).
Syntax:
Defined values :
<mem1>: Memory used to list, read and delete messages. It can be:
- “SM” : SMS message storage in SIM (default)
- “BM” : CBM message storage (in volatile memory).
- “SR” : Status Report message storage (in SIM if the EF-SMR file exists, otherwise in the
ME
80
GSM BASED VEHICLE THEFT CONTROL SYSTEM
non volatile memory)
Note : “SR” ME non volatile memory is cleared when another SIM card is inserted. It is kept,
even after a reset, while the same SIM card is used.
<mem2> : Memory used to write and send messages
- “SM” : SMS message storage in SIM (default).
If the command is correct, the following message indication is sent:
+CPMS: <used1>,<total1>,<used2>,<total2>
When <mem1> is selected, all following +CMGL, +CMGR and +CMGD
commands are related to the type of SMS stored in this memory.
Preferred Message Format +CMGF
Description :
The message formats supported are text mode and PDU mode.
In PDU mode, a complete SMS Message including all header information is given as a binary
string (in hexadecimal format). Therefore, only the following set of characters is allowed:
{‘0’,’1’,’2’,’3’,’4’,’5’,’6’,’7’,’8’,’9’, ‘A’, ‘B’,’C’,’D’,’E’,’F’}. Each pair or characters is
converted to a byte (e.g.: ‘41’ is converted to the ASCII character ‘A’, whose ASCII code is
0x41 or 65).
In Text mode, all commands and responses are in ASCII characters. The format selected is
stored in EEPROM by the +CSAS command.
Syntax :
81
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Example, sending an SMS Message in PDU mode
Defined values :
The <pdu> message is composed of the SC address (« 00 means no SC address given, use
default SC address read with +CSCA command) and the TPDU message.
In this example, the length of octets of the TPDU buffer is 14, coded as GSM 03.40
In this case the TPDU is : 0x01 0x03 0x06 0x91 0x21 0x43 0x65 0x00 0x00
0x04 0xC9 0xE9 0x34 0x0B, which means regarding GSM 03.40 :
<fo> 0x01 (SMS-SUBMIT, no validity period)
<mr> (TP TP-MR) 0x03 (Message Reference)
<da> (TP TP-DA) 0x06 0x91 0x21 0x43 0x65 (destination address +123456)
<pid> (TP TP-PID) 0x00 (Protocol Identifier)
<dcs> (TP TP-DCS) 0x00 (Data Coding Scheme : 7 bits alphabet)
<length> (TP TP-UDL) 0x04 (User Data Length, 4 characters of text)
TP-UD 0xC9 0xE9 0x34 0x0B (User Data : ISSY)
82
GSM BASED VEHICLE THEFT CONTROL SYSTEM
TPDU in hexadecimal format must be converted into two ASCII characters, e.g. octet with
hexadecimal value 0x2A is
presented to the ME as two characters ‘2’ (ASCII 50) and ‘A’ (ASCII 65).
Read message +CMGR
Description :
This command allows the application to read stored messages. The messages are read from the
memory selected by +CPMS command.
Syntax :
Command syntax : AT+CMGR=<index>
Response syntax for text mode:
+CMGR :<stat>,<oa>,[<alpha>,] <scts> [,<tooa>,<fo>,
<pid>,<dcs>,<sca>,<tosca>,<length>] <CR><LF> <data> (for SMS MS MS-DELIVER only)
+CMGR : <stat>,<da>,[<alpha>,] [,<toda>,<fo>,<pid>,<dcs>, [<vp>], <sca>,
<tosca>,<length>]<CR><LF> <data> (for SMS-SUBMIT only)
+CMGR : <stat>,<fo>,<mr>,[<ra>],[<tora>],<scts>,<dt>,<st> (for SMS SMS- STATUS-
REPORT only)
Response syntax for PDU mode :
+CMGR: <stat>, [<alpha>] ,<length> <CR><LF> <pdu>
A message read with status “REC UNREAD” will be updated in memory with the status “REC
READ”.Note : the <stat> parameter for SMS Status Reports is always “READ”.
Example :
83
GSM BASED VEHICLE THEFT CONTROL SYSTEM
New message indication +CNMI
Description :
This command selects the procedure for message reception from the network.
Syntax :
84
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Defined values :
<mode> : controls the processing of unsolicited result codes
Only <mode>=2 is supported.
Any other value for <mode> (0,1 or 3) is accepted (return code will be OK), but the processing
of unsolicited result codes will be the same as with<mode>=2.
<mode>
0: Buffer unsolicited result codes in the TA. If TA result code buffer is full, indications can be
buffered in some other place or the oldest indications may be discarded and replaced
with the new received indications
1: Discard indication and reject new received message unsolicited result codes when TA-TE
link is reserved. Otherwise forward them directly to the TE
2: Buffer unsolicited result codes in the TA when TA-TE link is reserved and flush them to
the TE after reservation. Otherwise forward them directly to the TE
3: Forward unsolicited result codes directly to the TE. TA-TE link specific inband used to
embed result codes and data when TA is in on-line data mode
<mt> : sets the result code indication routing for SMS-DELIVERs. Default is 0.
<mt>
0: No SMS-DELIVER indications are routed.
1: SMS-DELIVERs are routed using unsolicited code : +CMTI: “SM”,<index>
2: SMS-DELIVERs (except class 2 messages) are routed using unsolicited code : +CMT :
[<alpha>,] <length> <CR> <LF> <pdu> (PDU mode) or +CMT : <oa>,[<alpha>,] <scts>
85
GSM BASED VEHICLE THEFT CONTROL SYSTEM
[,<tooa>, <fo>, <pid>, <dcs>, <sca>, <tosca>, <length>] <CR><LF><data> (text mode)
3: Class 3 SMS-DELIVERS are routed directly using code in <mt>=2 ;
Message of other classes result in indication <mt>=1
<bm>: set the rules for storing received CBMs (Cell Broadcast Message) types depend on its
coding scheme, the setting of Select CBM Types (+CSCB command) and <bm>. Default
is 0.
<bm>
0: No CBM indications are routed to the TE. The CBMs are stored.
1: The CBM is stored and an indication of the memory location is routed to the customer
application using unsolicited result code: +CBMI: “BM”, <index>
2: New CBMs are routed directly to the TE using unsolicited result code.
+CBM: <length><CR><LF><pdu> (PDU mode) or
+CBM: <sn>,<mid>,<dcs>,<page>,<pages>(Text mode) <CR><LF> <data>
3: Class 3 CBMs : as <bm>=2. Other classes CBMs : as <bm>=1.
<ds> for SMS-STATUS-REPORTs. Default is 0.
<ds>
0: No SMS-STATUS-REPORTs are routed.
1: SMS-STATUS-REPORTs are routed using unsolicited code : +CDS : <length> <CR>
<LF> <pdu> (PDU mode) or +CDS : <fo>,<mr>, [<ra>], [<tora>], <scts>,<dt>,<st> (Text
mode)
2: SMS-STATUS-REPORTs are stored and routed using the unsolicited result code :
86
GSM BASED VEHICLE THEFT CONTROL SYSTEM
+CDSI: “SR”,<index>
<bfr> Default is 0.
<bfr>
0: TA buffer of unsolicited result codes defined within this command is flushed to the TE
when <mode> 1…3 is entered (OK response shall be given before flushing the codes)
1: TA buffer of unsolicited result codes defined within this command is cleared when
<mode> 1…3 is entered.
4.6 Fabrication Process:
PCB FABRICATION
The fabrication of a PCB includes four steps.
Preparing the PCB pattern.
Transferring the pattern onto the PCB.
Developing the PCB.
Finishing (i.e.) drilling, cutting, smoothing, turning etc.
Pattern designing is the primary step in fabricating a PCB. In this step, all
interconnection between the components in the given circuit are converted into PCB tracks.
Several factors such as positioning the diameter of holes, the area that each component would
occupy, the type of end terminal should be considered.
Transferring the PCB Pattern
The copper side of the PCB should be thoroughly cleaned with the help of
alcoholic spirit or petrol. It must be completely free from dust and other contaminants. The
mirror image of the pattern must be carbon copied and to the laminate the complete pattern may
now be made each resistant with the help of paint and thin brush.
Developing
87
GSM BASED VEHICLE THEFT CONTROL SYSTEM
In this developing all excessive copper is removed from the board and only the
printed pattern is left behind. About 100ml of tap water should be heated to 75 ° C and 30.5
grams of FeCl3 added to it, the mixture should be thoroughly stirred and a few drops of HCl may
be added to speed up the process. The board with its copper side facing upward should be placed
in a flat bottomed plastic tray and the aqueous solution of FeCl2 poured in the etching process
would take 40 to 60 min to complete. After etching the board it should be washed under running
water and then held against light .the printed pattern should be cleanly visible. The paint should
be removed with the help of thinner.
Finishing Touches: After the etching is completed, hole of suitable diameter should be drilled,
then the PCB may be tin plated using an ordinary 35 Watts soldering rod along with the solder
core, the copper side may be given a coat of varnish to prevent oxidation.
Drilling: Drills for PCB use usually come with either a set of collects of various sizes or a 3-Jaw
chuck. For accuracy however 3-jaw chunks aren’t brilliant and small drill below 1 mm from
grooves in the jaws preventing good grips.
Soldering: Begin the construction by soldering the resistors followed by the capacitors and the
LEDs diodes and IC sockets. Don’t try soldering an IC directly unless you trust your skill in
soldering. All components should be soldered as shown in the figure. Now connect the switch
and then solder/screw if on the PCB using multiple washers or spaces. Soldering it directly will
only reduce its height above other components and hamper in its easy fixation in the cabinet.
Now connect the battery lead.
Assembling: The circuit can be enclosed in any kind of cabinet. Before fitting the PCB suitable
holes must be drilled in the cabinet for the switch, LED and buzzer. Note that a rotary switch can
be used instead of a slide type. Switch on the circuit to be desired range. It will automatically
start its timing cycles. To be sure that it is working properly watch the LED flash. The
components are selected to trigger the alarm a few minutes before the set limit.
The fabrication of one demonstration unit is carried out in the following sequence:
1.Finalizing the total circuit diagram, listing out the components and their sources of procurement.
2. Procuring the components, testing the components and screening the components.
88
GSM BASED VEHICLE THEFT CONTROL SYSTEM
3. Making layout, preparing the inter connection diagram as per the circuit diagram, preparing the
drilling details, cutting the laminate to the required size.
4. Drilling the holes on the board as per the component layout, painting the tracks on the board as per
inter connection diagram.
5. Etching the board to remove the un-wanted copper other than track portion. Then cleaning the board
with water, and solder coating the copper tracks to protect the tracks from rusting or oxidation due to
moisture.
6. Assembling the components as per the component layout and circuit diagram and soldering
components.
7. Integrating the total unit inter wiring the unit and final testing the unit.
8. Keeping the unit ready for demonstration.
PCB FABRICATION DETAILS:
The Basic raw material in the manufacture of PCB is copper cladded laminate. The laminate
consists of two or more layers insulating reinforced materials bonded together under heat and pressure
by thermo setting resins used are phenolic or epoxy. The reinforced materials used are electrical grade
paper or woven glass cloth. The laminates are manufactured by impregnating thin sheets of reinforced
materials (woven glass cloth or electrical grade paper) with the required resin (Phenolic or epoxy). The
laminates are divided into various grades by National Electrical Manufacturers association (NEMA).
The nominal overall thickness of laminate normally used in PCB industry is 1.6mm with copper
cladding on one or two sides. The copper foil thickness is 35 Microns (0.035mm) OR 70 Microns
(0.070 mm).
The next stage in PCB fabrication is artwork preparation. The artwork (Mater drawing) is
essentially a manufacturing tool used in the fabrication of PCB’s. It defines the pattern to be generated
on the board. Since the artwork is the first of many process steps in the Fabrication of PCBs. It must be
very accurately drawn. The accuracy of the finished board depends on the accuracy of artwork.
Normally, in industrial applications the artwork is drawn on an enlarged scale and photographically
reduced to required size. It is not only easy to draw the enlarged dimensions but also the errors in the
artwork correspondingly get reduced during photo reduction. For ordinary application of simple single
sided boards artwork is made on ivory art paper using drafting aids. After taping on a art paper and
89
GSM BASED VEHICLE THEFT CONTROL SYSTEM
phototraphy (Making the –ve) the image of the photo given is transformed on silk screen for screen
printing. After drying the paint, the etching process is carried out. This is done after drilling of the
holes on the laminate as per the components layout. The etching is the process of chemically removing
un-wanted copper from the board.
The next stage after PCB fabrication is solder masking the board to prevent the tracks from
corrosion and rust formation. Then the components will be assembled on the board as per the component
layout.
The next stage after assembling is the soldering the components. The soldering may be
defined as process where in joining between metal parts is produced by heating to suitable temperatures
using non-ferrous filler metals has melting temperatures below the melting temperatures of the metals to
be joined. This non-ferrous intermediate metal is called solder. The solders are the alloys of lead and
tin.
5 . MEMS (MICRO ELECTRO MECHANICAL SYSTEMS)
The MEMS (Micro Electro Mechanical System) which consists of a 3-axis
accelerometer which gives output based on three axis movement. This setup is fixed on the
road vehicles and during normal movement (X-axis), the accelerometer output is nearly
constant. When any accident occurs the MEMS sensor gives unbalanced or high axis output
value (depends on vehicle position), and then the microcontroller reads the value and expects
for the normal movement output value again on same axis (X-axis). If the output is not
returning back to normal value within the specific time then the microcontroller commands
the GSM modem and send a SMS about the accident to any predefined numbers such as
ambulance or police or any other numbers to intimate the accident.
Micro-Electro-Mechanical Systems (MEMS) is the integration of mechanical
elements, sensors, actuators, and electronics on a common silicon substrate through micro
fabrication technology. While the electronics are fabricated using integrated circuit (IC)
process sequences (e.g., CMOS, Bipolar, or BICMOS processes).
MEMS promises to revolutionize nearly every product category by bringing together
silicon-based microelectronics with micromachining technology, making possible the
realization of complete systems-on-a-chip. MEMS is an enabling technology allowing the
90
GSM BASED VEHICLE THEFT CONTROL SYSTEM
development of smart products, augmenting the computational ability of microelectronics
with the perception and control capabilities of micro sensors and micro actuators and
expanding the space of possible designs and applications.
Microelectronic integrated circuits can be thought of as the "brains" of a system and
MEMS augments this decision-making capability with "eyes" and "arms", to allow micro
systems to sense and control the environment. Sensors gather information from the
environment through measuring mechanical, thermal, biological, chemical, optical, and
magnetic phenomena. The electronics then process the information derived from the
sensors and through some decision making capability direct the actuators to respond by
moving, positioning, regulating, pumping, and filtering, thereby controlling the environment
for some desired outcome or purpose. Because MEMS devices are manufactured using batch
fabrication techniques similar to those used for integrated circuits, unprecedented levels of
functionality, reliability, and sophistication can be placed on a small silicon chip at a
relatively low cost.
Accelerometers
MEMS accelerometers are quickly replacing conventional accelerometers for crash
air-bag deployment systems in automobiles. The conventional approach uses several bulky
accelerometers made of discrete components mounted in the front of the car with separate
electronics near the air-bag; this approach costs over $50 per automobile. MEMS and
Nanotechnology has made it possible to integrate the accelerometer and electronics onto a
single silicon chip at a cost between $5 to $10. These MEMS accelerometers are much
smaller, more functional, lighter, more reliable, and are produced for a fraction of the cost of
the conventional macro scale accelerometer elements.
Current Challenges
MEMS are currently used in low- or medium-volume applications.
Limited Options
Most companies who wish to explore the potential of MEMS and Nanotechnology
have very limited options for prototyping or manufacturing devices, and have no capability
or expertise in micro fabrication technology. Few companies will build their own fabrication
91
GSM BASED VEHICLE THEFT CONTROL SYSTEM
facilities because of the high cost. A mechanism giving smaller organizations responsive and
affordable access to MEMS and Nano fabrication is essential.
Packaging
The packaging of MEMS devices and systems needs to improve considerably from its
current primitive state. MEMS packaging is more challenging than IC packaging due to the
diversity of MEMS devices and the requirement that many of these devices be in contact
with their environment. Currently almost all MEMS and must develop a new and specialized
package for each new device. Most companies find that packaging is the single most
expensive and time consuming task in their overall product development program. As for the
components themselves, numerical modeling and simulation tools for MEMS packaging are
virtually non-existent. Approaches which allow designers to select from a catalog of existing
standardized packages for a new MEMS device without compromising performance would
be beneficial.
6. SOFTWARE
ABOUT SOFTWARE
Software’s used are:
*Keil software for c programming
*Express PCB for lay out design
*Express SCH for schematic design
What's New in µVision3?
µVision3 adds many new features to the Editor like Text Templates, Quick Function Navigation,
and Syntax Coloring with brace high lighting Configuration Wizard for dialog based startup and
debugger setup. µVision3 is fully compatible to µVision2 and can be used in parallel with
µVision2.
What is µVision3?
µVision3 is an IDE (Integrated Development Environment) that helps you write, compile, and
debug embedded programs. It encapsulates the following components:
92
GSM BASED VEHICLE THEFT CONTROL SYSTEM
A project manager.
A make facility.
Tool configuration.
Editor.
A powerful debugger.
To help you get started, several example programs (located in the \C51\Examples, \C251\
Examples, \C166\Examples, and \ARM\...\Examples) are provided.
HELLO is a simple program that prints the string "Hello World" using the Serial Interface.
MEASURE is a data acquisition system for analog and digital systems.
TRAFFIC is a traffic light controller with the RTX Tiny operating system.
SIEVE is the SIEVE Benchmark.
DHRY is the Dhrystone Benchmark.
WHETS is the Single-Precision Whetstone Benchmark.
Additional example programs not listed here are provided for each device architecture.
Building an Application in µVision2
To build (compile, assemble, and link) an application in µVision2, you must:
Select Project -(forexample,166\EXAMPLES\HELLO\HELLO.UV2).
Select Project - Rebuild all target files or Build target.
µVision2 compiles, assembles, and links the files in your project.
6.1 Overview of Keil cross C compiler:
It is possible to create the source files in a text editor such as notepad, run the compiler
On each c source file, specifying a list of controls, run the Assembler on each Assembler
Source file, specifying another list of controls, run either the Library Manager or Linker
(Again specifying a list of controls) and finally running the Object-HEX converter to convert
The linker output file to an Intel HEX File. Once that has been completed the HEX File can
93
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Be downloaded to the target hardware and debugged. Alternatively KEIL can be used to
Create source files; automatically compile, link and convert using options set with an easy to
Use user interface and finally stimulate or perform debugging on the hardware with access to
C variables and memory. Unless you have to use the tolls on the command line, the choice is
Clear. KEIL Greatly simplifies the process of creating and testing an embedded application.
Creating Your Own Application in µVision2
To create a new project in µVision2, you must:
Select Project - New Project.
Select a directory and enter the name of the project file.
Select Project - Select Device and select an 8052, 251, or C16x/ST10 device from the
Device Database™.
Create source files to add to the project.
Select Project - Targets, Groups, Files. Add/Files, select Source Group1, and add the
source files to the project.
Select Project - Options and set the tool options. Note when you select the target device
from the Device Database™ all special options are set automatically. You typically only
need to configure the memory map of your target hardware. Default memory model
settings are optimal for most applications.
Select Project - Rebuild all target files or Build target.
Debugging an Application in µVision2
To debug an application created using µVision2, you must:
Select Debug - Start/Stop Debug Session.
Use the Step toolbar buttons to single-step through your program. You may enter G,
main in the Output Window to execute to the main C function.
Open the Serial Window using the Serial #1 button on the toolbar.
Debug your program using standard options like Step, Go, Break, and so on.
94
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Starting µVision2 and creating a Project
µVision2 is a standard Windows application and started by clicking on the program icon. To
create a new project file select from the µVision2 menu
Project – New Project…. This opens a standard Windows dialog that asks you
for the new project file name.
We suggest that you use a separate folder for each project. You can simply use
the icon Create New Folder in this dialog to get a new empty folder. Then
select this folder and enter the file name for the new project, i.e. Project1.
µVision2 creates a new project file with the name PROJECT1.UV2 which contains
a default target and file group name. You can see these names in the Project
Window – Files.
Now use from the menu Project – Select Device for Target and select a CPU
for your project. The Select Device dialog box shows the µVision2 device
database. Just select the microcontroller you use. We are using for our examples the Philips
80C51RD+ CPU. This selection sets necessary tool
options for the 80C51RD+ device and simplifies in this way the tool Configuration
Building Projects and Creating a HEX Files
Typical, the tool settings under Options – Target are all you need to start a new
application. You may translate all source files and line the application with a
click on the Build Target toolbar icon. When you build an application with
syntax errors, µVision2 will display errors and warning messages in the Output
95
GSM BASED VEHICLE THEFT CONTROL SYSTEM
Window – Build page. A double click on a message line opens the source file
on the correct location in a µVision2 editor window.
Once you have successfully generated your application you can start debugging.
After you have tested your application, it is required to create an Intel HEX file to download the
software into an EPROM programmer or simulator. µVision2 creates HEX files with each build
process when Create HEX files under Options for Target – Output is enabled. You may start
your PROM programming utility after the make process when you specify the program under the
option Run User Program #1.
CPU Simulation
µVision2 simulates up to 16 Mbytes of memory from which areas can be
mapped for read, write, or code execution access. The µVision2 simulator traps
and reports illegal memory accesses.
In addition to memory mapping, the simulator also provides support for the
integrated peripherals of the various 8052 derivatives. The on-chip peripherals
of the CPU you have selected are configured from the Device
Database selection
you have made when you create your project target. Refer to page 58 for more
Information about selecting a device. You may select and display the on-chip
peripheral components using the Debug menu. You can also change the aspects of each
peripheral using the controls in the dialog boxes.
Start Debugging
96
GSM BASED VEHICLE THEFT CONTROL SYSTEM
You start the debug mode of µVision2 with the Debug – Start/Stop Debug
Session command. Depending on the Options for Target – Debug
Configuration, µVision2 will load the application program and run the startup
code µVision2 saves the editor screen layout and restores the screen layout of the last debug
session. If the program execution stops, µVision2 opens an editor window with the source text
or shows CPU instructions in the disassembly window. The next executable statement is marked
with a yellow arrow. During debugging, most editor features are still available.
For example, you can use the find command or correct program errors. Program source text of
your application is shown in the same windows. The µVision2 debug mode differs from the edit
mode in the following aspects:
_ The “Debug Menu and Debug Commands” described on page 28 are
Available. The additional debug windows are discussed in the following.
_ The project structure or tool parameters cannot be modified. All build
Commands are disabled.
Disassembly Window
The Disassembly window shows your target program as mixed source and assembly program or
just assembly code. A trace history of previously executed instructions may be displayed with
Debug – View Trace Records. To enable the trace history, set Debug – Enable/Disable Trace
Recording.
If you select the Disassembly Window as the active window all program step commands work
on CPU instruction level rather than program source lines. You can select a text line and set or
modify code breakpoints using toolbar buttons or the context menu commands.
You may use the dialog Debug – Inline Assembly… to modify the CPU instructions.
That allows you to correct mistakes or to make temporary changes to the target program you are
debugging.
97
GSM BASED VEHICLE THEFT CONTROL SYSTEM
6.2 Steps for Executing Keil Programs:
1. Click on the Keil uVision Icon on Desktop
2. The following fig will appear
3. Click on the Project menu from the title bar
4. Then Click on New Project
98
GSM BASED VEHICLE THEFT CONTROL SYSTEM
5. Save the Project by typing suitable project name with no extension in u r own folder sited in
either C:\ or D:\
6. Then Click on save button above.
7. Select the component for u r project. i.e. Atmel……
99
GSM BASED VEHICLE THEFT CONTROL SYSTEM
8. Click on the + Symbol beside of Atmel
9. Select AT89C51 as shown below
10. Then Click on “OK”
11. The Following fig will appear
100
GSM BASED VEHICLE THEFT CONTROL SYSTEM
12. Then Click either YES or NO………mostly “NO”
13. Now your project is ready to USE
14. Now double click on the Target1, you would get another option “Source group 1” as
shown in next page.
15. Click on the file option from menu bar and select “new”
101
GSM BASED VEHICLE THEFT CONTROL SYSTEM
16.The next screen will be as shown in next page, and just maximize it by double clicking on its
blue boarder.
17. Now start writing program in either in “C” or “ASM”
18. For a program written in Assembly, then save it with extension “. asm” and for “C” based
program save it with extension “ .C”
102
GSM BASED VEHICLE THEFT CONTROL SYSTEM
19.Now right click on Source group 1 and click on “Add files to Group Source”
103
GSM BASED VEHICLE THEFT CONTROL SYSTEM
20. Now you will get another window, on which by default “C” files will appear.
21. Now select as per your file extension given while saving the file
22. Click only one time on option “ADD”
23. Now Press function key F7 to compile. Any error will appear if so happen.
104
GSM BASED VEHICLE THEFT CONTROL SYSTEM
24. If the file contains no error, then press Control+F5 simultaneously.
25. The new window is as follows
26.Then Click “OK”
105
GSM BASED VEHICLE THEFT CONTROL SYSTEM
27. Now Click on the Peripherals from menu bar, and check your required port as shown in fig
below
28.Drag the port a side and click in the program file.
29. Now keep Pressing function key “F11” slowly and observe.
30. You are running your program successfully
106
GSM BASED VEHICLE THEFT CONTROL SYSTEM
6.3 SOURCE CODE:
#include <REGX51.H>
#include<UART.h>
#include<lcd.h>
#include<gsm.c>
void get_axis();
sbit lock = P2^0;
sbit cval = P2^1;
sbit oval = P2^2;
unsigned char z;
int xaxis, yaxis;
unsigned char tmp, *lon=0x50; // *lat=0x50, *lon=0x80; //, patt[]="GPRMC", tmp,i;
sbit a = P3^4;
//sbit b = P3^3;
//sbit c = P3^2;
unsigned char d1,d2,d3, xval;
void ext(void) interrupt 0 using 1
{
while(P3_2==0);
flag=1;
}
void delay_wait()
{
unsigned int i;
107
GSM BASED VEHICLE THEFT CONTROL SYSTEM
for(i=0; i<=25000; i++);
}
void main()
{
cval=0;
oval=1; //device
init_lcd(); //lcd init
serial_init();
init_gsm();
del();
command(0x01);
command(0x80);
prints(" Embedded ");
command(0xc0);
prints(" Smart Vehicle ");
delay_wait();
command(0x01);
command(0x80);
prints(" Developed on: ");
command(0xc0);
prints("15-03-2011, v1.0");
delay_wait();
while(1)
{
get_axis();
108
GSM BASED VEHICLE THEFT CONTROL SYSTEM
if(lock==1)
{
get_axis();
command(0x01);
command(0x80);
prints("lock mode..");
if(xaxis<122 || xaxis>127 || yaxis<122 || yaxis>127)
{
send("Vehicle theft Detected","9603641895");
msdelay(1500);
msdelay(1000);
check_ifsms();
msdelay(1000);
read();
rec=0x40;
command(0x01);
command(0x80);
prints(rec);
msdelay(700);
command(0x01);
command(0x80);
if(!strcmp(rec,"123"))
{
cval=1;
109
GSM BASED VEHICLE THEFT CONTROL SYSTEM
oval=0;
prints("Vehicle Locked");
}
del();
msdelay(1500);
msdelay(1000);
check_ifsms();
msdelay(1000);
read();
rec=0x40;
command(0x01);
command(0x80);
prints(rec);
msdelay(700);
command(0x01);
command(0x80);
if(!strcmp(rec,"123"))
{
cval=0;
oval=1;
prints("Vehicle Unlocked");
}
while(1);
}
}
110
GSM BASED VEHICLE THEFT CONTROL SYSTEM
if(lock==0)
{
command(0x01);
command(0x80);
prints("run mode..");
get_axis();
if(xaxis<115 || xaxis>135 || yaxis<115 || yaxis>135)
{
send("Vehicle Accident Detected","9603641895");
del();
while(1);
}
}
}
}
void get_axis()
{
command(0x80);
printc('1');
a=0;
printc('2');
xaxis = P1;
printc('3');
111
GSM BASED VEHICLE THEFT CONTROL SYSTEM
// xval = xval/10;
d1=(xaxis/100)+0x30;
d2=((xaxis%100)/10)+0x30;
d3=(xaxis%10)+0x30;
command(0xc0);
printc(d1);
printc(d2);
printc(d3);
printc('-');
a=1;
yaxis = P1;
// xval = xval/10;
d1=(yaxis/100)+0x30;
d2=((yaxis%100)/10)+0x30;
d3=(yaxis%10)+0x30;
command(0xc4);
printc(d1);
printc(d2);
printc(d3);
}
112
GSM BASED VEHICLE THEFT CONTROL SYSTEM
7. APPLICATIONS
As a security System
As Accident Report System
7.1 MERITS:
Low Cost
Less Complexity
Huge Scope For Research And Development
7.2 DEMERITS:
The only dis merit of this project is this can be used in the place where signal strength
is high
113
GSM BASED VEHICLE THEFT CONTROL SYSTEM
8. CONCLUSION
The project “DESIGN & DEVELOPMENT OF GSM BASED VEHICLE THEFT CONTROL
SYSTEM” has been successfully designed and tested.
It has been developed by integrating features of all the hardware components used. Presence
of every module has been reasoned out and placed carefully thus contributing to the best working
of the unit.
Secondly, using highly advanced IC’s and with the help of growing technology the
project has been successfully implemented.
Finally we conclude that “DESIGN & DEVELOPMENT OF GSM BASED VEHICLE
THEFT CONTROL SYSTEM” is an emerging field and there is a huge scope for research and
development.
FUTURE ENHANCEMENT
We can enhance this project by using the GPRS technology using which we can able to locate
the exact position of the automobile.
114
GSM BASED VEHICLE THEFT CONTROL SYSTEM
9. Bibliography
The 8052 Micro controller and Embedded Systems
-Muhammad Ali Mazidi &
Janice Gillispie Mazidi
The 8052 Micro controller Architecture, Programming & Applications
-Kenneth J.Ayala
Fundamentals Of Micro processors and Micro computers
-B.Ram
Micro processor Architecture, Programming & Applications
-Ramesh S. Gaonkar
Electronic Components
-D.V. Prasad
Wireless Communications
- Theodore S. Rappaport
Mobile Tele Communications
- William C.Y. Lee
References on the Web:
www.national.com
www.atmel.com
www.microsoftsearch.com
www.geocities.com
115