You are on page 1of 37

ABSTRACT

In recent years, vehicle thefts are increasing at an alarming rate around the world.
People have started to use the theft control systems installed in their vehicles. The commercially
available anti-theft vehicular systems are very expensive. This project deals with the design &
development of a theft control system for an automobile, which is being used to prevent / control
the theft of a vehicle. The developed system makes Use of an embedded system based on
GSM /GPS technology (GPS technology is further enhancement of the base paper). The designed
& developed System is installed in the vehicle. An interfacing GSM MODEM (SIMCOMs
SIM300 GSM operates in the 900MHz and 1.8GHz bands GSM supports data transfer speeds of
up to 9.6 kbps) and the GPS which are connected to the microcontroller, which is in turn,
connected to the engine. Once, the vehicle is being stolen, the information is being used by the
vehicle owner for further processing. Where by sitting at a remote place, a particular number is
dialed by them to the interfacing GSM MODEM that is with the hardware kit which is installed
in the vehicle. By reading the signals received by the mobile, the engine is locked automatically
and sends the SMS to the dialed no stating the exact position using GPS modem. Again it will
come to the normal condition only after entering a secured password. The owner of the vehicle.
The main concept in this design is introducing the GSM and GPS Technologies
into the embedded system. The designed unit is very simple & low cost. The entire designed unit
is on a single chip. When the vehicle is stolen, owner will give a call to the kit placed in vehicle
engine automatically stop which is indicated by the DC motor in turn sends the SMS to the
authorized person showing the exact location using GPS. The car will unlock until the password
is entered with help of 4x3 key pad interfaced to LPC 2148 by the authorized person.

4. EMBEDDED SYSTEMS
4.1 INTRODUCTION

Embedded systems are designed to do some specific task, rather than be a generalpurpose computer for multiple tasks. Some also have real time performance constraints that must
be met, for reason such as safety and usability; others may have low or no performance
requirements, allowing the system hardware to be simplified to reduce costs.

Wireless communication has become an important feature for commercial products


and a popular research topic within the last ten years. There are now more mobile phone
subscriptions than wired-line subscriptions. Lately, one area of commercial interest has been
low-cost, low-power, and short-distance wireless communication used for \personal wireless
networks." Technology advancements are providing smaller and more cost effective devices for
integrating computational processing, wireless communication, and a host of other
functionalities. These embedded communications devices will be integrated into applications
ranging from homeland security to industry automation and monitoring. They will also enable
custom tailored engineering solutions, creating a revolutionary way of disseminating and
processing information. With new technologies and devices come new business activities, and
the need for employees in these technological areas. Engineers who have knowledge of
embedded systems and wireless communications will be in high demand. Unfortunately, there
are few adorable environments available for development and classroom use, so students often
do not learn about these technologies during hands-on lab exercises. The communication
mediums were twisted pair, optical fiber, infrared, and generally wireless radio.

4.2 CHARACTERISTICS

Embedded systems often use a (relatively) slow processor and small memory size with an
intentionally simplified architecture to minimize costs.

Programs on embedded systems must often run with limited resources

Embedded system designers use compilers to develop an embedded system.

They often have no operating system or a speciali8zed embedded operating system (often a
real-time operating system ).

Programs on an embedded system often must run with resources: often there is no disk drive,
operating system, keyboard or screen. may replace rotating media, and a small keypad and
screen may be used instead of a PC's keyboard and screen.

Embedding a computer is to interact with the environment, often by monitoring and


controlling external machinery. In order to do this, analog inputs and outputs must be
transformed to and from digital signal levels.

4.3 APPLICATIONS OF EMBEDDED SYSTEMS


Some widely used applications of embedded systems are listed below:
Automatic teller machines
Cellular telephones.
Computer network.
Disc drives.
Thermo stats.

Sprinklers.

5. BLOCK DIAGRAM AND SCHEMATIC DIAGRAM


5.1 BLOCK-DIAGRAM

LCD

GSM
MODEM
MICRO

MEMS

ADC

CONTROLL
ER

LED
KEYPAD

FIG 5.1 Block diagram of vehicle theft control system

BLOCK DIAGRAM DESCRIPTION


The project GSM BASED VEHICLE THEFT CONTROL SYSTEM deals with the
design & development of a theft control system for automobiles which is being used to prevent /
control the theft of a vehicle. The developed system makes use of an embedded system based on
GSM technology. An interfacing mobile is also connected to the microcontroller, which is in turn,
connected to the engine.
Once, the vehicle is being stolen, the information is being used by the vehicle owner for
further processing. The information is passed onto the central processing insurance system, where by
sitting at a remote place, a particular number is dialed by them to the interfacing mobile that is with
the hardware kit which is installed in the vehicle. By reading the signals received by the mobile, one
can control the ignition of the engine; say to lock it or to stop the engine immediately. Again it will

come to the normal condition only after entering a secured password. The owner of the vehicle & the
centre processing system will know this secured password. We can modify this concept such that the
vehicle owner also can lock the vehicle from his mobile phone.
The main concept in this design is introducing the mobile communications into the
embedded system. With the help of SIM tracking knows the location of vehicle and informs to the
local police or stops it from further movement.

5.3 SCHEMATIC DIAGRAM

Fig 5.2 schematic diagram

5.2 SCHEMATIC DESCRIPTION


The operation of this circuit mainly depends on the MEM sensor. The actual position of
the MEM sensor should be 90 degrees with respect to ground. If there is any change in the actual
position of the MEM a control signal will be given to the ADC. The ADC will convert the analog
signal to the digital signal and it will send the digital signal to the micro controller.
Micro controller will send a signal to the GSM module. As GSM receives a signal from
micro controller it informs the owner as vehicle theft detected through an SMS. When the
owner receives the above message he will send a message to the GSM module to lock the engine.
As the GSM receives a secret code from the owner it sends a signal to the micro controller and
the micro controller will lock the engine. As this is a protocol we have shown the locking of the
engine by glowing led.
After locking the engine, the owner can able to find the location of the Automobile by
using the signals generated by GSM. After reaching the position where vehicle was locked, the
owner enters an secret code to unlock the engine. In this way we can protect the vehicles. And
we can also use this as a accident sensor.

6. HARDWARE
6.1 CONTROLLER (AT89S52)
A Micro controller consists of a powerful CPU tightly coupled with memory, various I/O
interfaces such as serial port, parallel port timer or counter, interrupt controller, data acquisition
interfaces-Analog to Digital converter, Digital to Analog converter, integrated on to a single silicon
chip.
If a system is developed with a microprocessor, the designer has to go for external
memory such as RAM, ROM, EPROM and peripherals. But controller is provided all these facilities
on a single chip. Development of a Micro controller reduces PCB size and cost of design.
One of the major differences between a Microprocessor and a Micro controller is that a
controller often deals with bits not bytes as in the real world application.
Intel has introduced a family of Micro controllers called the MCS-51.

Fig 3.1.1 Micro controller

NECESSITY OF MICROCONTROLLERS:
Microprocessors brought the concept of programmable devices and made many
applications of intelligent equipment. Most applications, which do not need large amount of data and
program memory, tended to be:
Costly:
The microprocessor system had to satisfy the data and program requirements so, sufficient
RAM and ROM are used to satisfy most applications .The peripheral control equipment also had to
be satisfied. Therefore, almost all-peripheral chips were used in the design. Because of these
additional peripherals cost will be comparatively high.
An example:
8085 chip needs An Address latch for separating address from multiplex address and data.32-KB
RAM and 32-KB ROM to be able to satisfy most applications. As also Timer / Counter, Parallel
programmable port, Serial port, Interrupt controller are needed for its efficient applications.

In comparison a typical Micro controller 8052 chip has all that the 8052 board has except
a reduced memory as follows. 4K bytes of ROM as compared to 32-KB, 128 Bytes of RAM as
compared to 32-KB.
Bulky:
On comparing a board full of chips (Microprocessors) with one chip with all components
in it (Micro controller)
Debugging:
Lots of Microprocessor circuitry and program to debug. In Micro controller there is no
Microprocessor circuitry to debug. Slower Development time: As we have observed
Microprocessors need a lot of debugging at board level and at program level, whereas, Micro
controller do not have the excessive circuitry and the built-in peripheral chips are easier to program
for operation.
So peripheral devices like Timer/Counter, Parallel programmable port, Serial
Communication Port, Interrupt controller and so on, which were most often used were integrated
with the Microprocessor to present the Micro controller .RAM and ROM also were integrated in the
same chip. The ROM size was anything from 256 bytes to 32Kb or more. RAM was optimized to
minimum of 64 bytes to 256 bytes or more.
Typical Micro controllers have all the following features:

8/16/32 CPU

Instruction set rich in I/O & bit operations.

One or more I/O ports.

One or more timer/counters.

One or more interrupt inputs and an interrupt controller

One or more serial communication ports.

Analog to Digital /Digital to Analog converter

Why AT 89C52? :
The system requirements and control specifications clearly rule out the use of 16, 32 or
64 bit micro controllers or microprocessors. Systems using these may be earlier to implement due to
large number of internal features. They are also faster and more reliable but, the above application is
satisfactorily served by 8-bit micro controller. Using an inexpensive 8-bit Micro controller will doom
the 32-bit product failure in any competitive market place.
Coming to the question of why to use AT89C52 of all the 8-bit Micro controller available
in the market the main answer would be because it has 8 Kb on chip flash memory which is just
sufficient for our application. The on-chip Flash ROM allows the program memory to be
reprogrammed in system or by conventional non-volatile memory Programmer. Moreover ATMEL is
the leader in
Flash technology in todays market place and hence using AT 89C52 is the optimal
solution.
8052 micro controller architecture:
The 8052 architecture consists of these specific features:

Compatible with MCS-51 Products

8K Bytes of In-System Programmable (ISP) Flash

4.0V to 5.5V Operating Range

Fully Static Operation: 0 Hz to 33 MHz

Three-level Program Memory Lock

256 x 8-bit Internal RAM

32 Programmable I/O Lines

Three 16-bit Timer/Counters

Eight Interrupt Sources

6.2 POWER SUPPLY

The power supply should be of +5V, with maximum allowable transients of 10mv. To
achieve a better / suitable contrast for the display, the voltage (VL) at pin 3 should be
adjusted properly.

A module should not be inserted or removed from a live circuit. The ground terminal
of the power supply must be isolated properly so that no voltage is induced in it. The
module should be isolated from the other circuits, so that stray voltages are not
induced, which could cause a flickering display.

All digital circuits require regulated power supply. In this article we are going to learn
how to get a regulated positive supply from the mains supply.

Figure 1 shows the basic block diagram of a fixed regulated power supply. Let us go
through each block.

6.3 GSM
The Global System for Mobile Communications (GSM) is the most popular standard for
mobile phones in the world. GSM phones are used by over a billion people across more than 200
countries. The ubiquity of the GSM standard makes international roaming very common between
mobile phone operators, which enable phone users to access their services in many other parts of the
world as well as their own country. GSM differs significantly from its predecessors in that both
signaling and speech channels are digital, which means that it is seen as a second generation (2G)

mobile phone system. This fact has also meant that data communication was built into the system
from very early on. GSM is an open standard, which is currently developed by the 3GPP.From the
point of view of the consumer, the key advantage of GSM systems has been higher digital voice
quality and low cost alternatives to making calls such as text messaging. The advantage for network
operators has been 8 the ability to deploy equipment from different vendors because the open
standard allows easy inter-operability. Also, the standards have allowed network operators to offer
roaming services, which mean the subscribers, can use their phone all over the world. GSM retained
backward-compatibility with the original GSM phones as the GSM standard continued to develop,
for example packet data capabilities were added in the Release '97 version of the standard, by means
of GPRS. Higher speed data transmission has also been introduced with EDGE in the Release '99
version of the standard.

6.6 LIQUID CRYSTAL DISPLAY


6.6.1 INTRODUCTION:
In recent years the LCD is finding widespread use replacing LED s (seven-segment LED
or other multi segment LED s).
This is due to the following reasons:
1. The declining prices of LCD s.
2. The

ability

to

display

numbers,

characters

and

graphics.

This

is

in

contract to LED s, which are limited to numbers and a few characters.


3. Incorporation of a refreshing controller into the LCD, there by relieving the CPU of the
task of refreshing the LCD. In the contrast, the LED must be refreshed by the CPU to
keep displaying the data.
4. Ease of programming for characters and graphics.

6.6.2 USES
The LCD s used exclusively in watches, calculators and measuring instruments is the
simple seven-segment displays, having a limited amount of numeric data. The recent advances in
technology have resulted in better legibility, more information displaying capability and a wider
temperature range. These have resulted in the LCD s being extensively used in telecommunications
and entertainment electronics. The LCD s has even started replacing the cathode ray tubes (CRTs)
used for the display of text and graphics, and also in small TV applications.

6.6.3 LCD PIN DIAGRAM:

6.6.3 LCD pin diagram

6.6.4 LCD PIN DESCRIPTION :


The LCD discussed in this section has 14 pins. The function of each pin is given in table.
Pin

symbol

I/O

Description

Vss

--

Ground

Vcc

--

+5V power supply

VEE

--

Power

supply

to

control contrast
4

RS

RS=0

to

select

cmd register
Rs=1

to

select

data register
5

R/W

R/W=0 for write


R/W=1 for read

I/O

Enable

DB0

I/O

The 8-bit data bus

DB1

I/O

The 8-bit data bus

DB2

I/O

The 8-bit data bus

10

DB3

I/O

The 8-bit data bus

11

DB4

I/O

The 8-bit data bus

12

DB5

I/O

The 8-bit data bus

13

DB6

I/O

The 8-bit data bus

14

DB7

I/O

The 8-bit data bus

6.6.5 LCD COMMAND CODES


Code(HEX)

COMMAND TO LCD INSTRUCTION REGISTER

Clear display screen

Return home

Decrement cursor

Increment cursor

Shift display right

Shift display left

Display off, cursor off

Display off, cursor on

Display on, cursor off

Display on, cursor on

Display on, cursor blinking

10

Shift cursor position to left

14

Shift cursor position to right

18

Shift the entire display to the left

1C

Shift the entire display to the right

80

Force cursor to beginning of 1st line

C0

Force cursor to beginning of 2nd line

38

2 lines and 5x7 matrix

6.6.6 LCD INTERFACING


SENDING COMMANDS AND DATA TO LCDS WITH A TIME DELAY:

Fig 3.6.2 LCD interfacing


To send any command from table 2 to the LCD, make pin RS=0. For data, make
RS=1.Then place a high to low pulse on the E pin to enable the internal latch of the LCD.
When RS is low (0), the data is to be treated as a command. When RS is high (1), the data being
sent is considered as text data which should be displayed on the screen.
When R/W is low (0), the information on the data bus is being written to the LCD. When RW is
high (1), the program is effectively reading from the LCD. Most of the times there is no need to
read from the LCD so this line can directly be connected to Gnd thus saving one controller line.

3.7 LIGHT EMITTING DIODE


3.7.1 Introduction:
The term LED stands for Light Emitting Diode. Modern electronics relies heavily upon
LED light bulbs. For instance, LEDs transmit information from remote controls, are used in traffic
lights, digital LED clocks, flashlights, and to form images on jumbo television screens.
These low-power, smaller-sized light emitting diode (LED) devices are based on the
company's existing standard and high brightness silicon carbide (sic) product technology. These new
devices consume 50% the power and represent cost savings over the current standard and high
brightness blue and green LEDs.
These devices are available in production quantities and are currently shipping into high
volume consumer applications. Target applications for these new devices include cellular phones,
high-resolution video boards and segmented LED displays.
Physical function:
A LED is a special type of semiconductor diode. Like a normal diode, it consists of a chip
of semi conducting material impregnated, or doped, with impurities to create a structure called a p-n
junction. As in other diodes, current flows easily from the p-side or anode to the n-side, or cathode,
but not in the reverse direction. Charge-carriers - electrons and holes flow into the junction from
electrodes with different voltages. When an electron meets a hole, it falls into a lower energy level,
and releases energy in the form of a photon as it does so.
The wavelength of the light emitted, and therefore its color, depends on the band gap
energy of the materials forming the p-n junction. In silicon or germanium diodes, the electrons and
holes recombine by a non - radiative transition which produces no optical emission, because these
are indirect band gap materials. The materials used for an LED have a direct band gap with energies
corresponding to near-infrared, visible or near-ultraviolet light.
LED development began with infrared and red devices made with gallium arsenide.
Advances in materials science have made possible the production of devices with ever-shorter
wavelengths, producing light in a variety of colors.

3.7.2 Advantages and Disadvantages of LEDs:


Advantages:

LEDs are capable of emitting light of an intended color without the use of color filters that
traditional lighting methods require.

The shape of the LED package allows light to be focused. Incandescent and fluorescent
sources often require an external reflector to collect light and direct it in a useable manner.

LEDs are insensitive to vibration and shocks, unlike incandescent and discharge sources.

LEDs are built inside solid cases that protect them, making them hard to break and
extremely durable.

LEDs have an extremely long life span: typically ten years, twice as long as the best
fluorescent bulbs and twenty times longer than the best incandescent bulbs.

Further LEDs fail by dimming over time, rather than the abrupt burnout of incandescent
bulbs.

LEDs give off less heat than incandescent light bulbs with similar light output.

LEDs light up very quickly. An illumination LED will achieve full brightness in
approximately 0.01 seconds, 10 times faster than an incandescent light bulb (0.1 second), and
many times faster than a compact fluorescent lamp, which starts to come on after 0.5 seconds
or 1 second, but does not achieve full brightness for 30 seconds or more. A typical red
indicator LED will achieve full brightness in microseconds, or possibly less if it's used for
communication devices.

Disadvantages:

LEDs are currently more expensive than more conventional lighting technologies. The
additional expense partially stems from the relatively low lumen output (requiring more
light sources) and drive circuitry/power supplies needed. A good measure to compare
lighting technologies is lumen/dollar.

LED performance largely depends on the ambient temperature of the operating


environment. "Driving" an LED 'hard' in high ambient temperatures may result in
overheating of the LED package, eventually to device failure. Adequate heat sinking is
required to maintain long life. This is especially important when considering

automotive/military applications where the device must operate over a large range of
temperatures, with government-regulated output.

3.7.3 LED applications:


.LEDs are used as informative indicators in various types of embedded systems:

Status indicators, e.g. on/off lights on professional instruments and consumers audio/video
equipment.

In toys, especially as light up "eyes" of robot toys.

Seven segment displays, in calculators and measurement instruments, although now mostly
replaced by liquid crystal displays.

Thin, lightweight message displays, e.g. in public information signs (at airports and railway
stations and as destination displays for trains, buses, trams and ferries).

Red or yellow LEDs are used in indicator and [alpha] numeric displays in environments
where night vision must be retained: aircraft cockpits, submarine and ship bridges, astronomy
observatories, and in the field, e.g. night time animal watching and military field use.

LEDs may also be used to transmit digital information:

Remote controls for TVs, VCRs, etc, using Infrared LEDs.

In fiber optic communications.

In dot matrix arrangements for displaying messages.

LEDs find further application in safety devices, where high brightness and reliability are
critical:

In traffic signals, LED clusters are replacing colored incandescent bulbs.

In level crossing lights, red LEDs have been used to replace incandescent bulbs.

In car brake and indicator lights, where the quick-on characteristic of LEDs enhances safety.

In bicycle lighting; also for pedestrians to be seen by car traffic.

Signaling and emergency beacons or strobes.

Navigation lights on boats, which are red, green, and white and shine in specific directions.
Boats use direct current batteries to power their lights, so not only does that match the
requirements of LEDs, but the efficiency of colored LEDs is a big advantage.

LEDs are also used for illumination:

In photographic darkrooms, red or yellow LEDs are also used for providing lighting, which
does not lead to unwanted exposure of the film.

In flashlights (US) / torches (UK), and backlights for LCD screens.

As a replacement for incandescent and fluorescent bulbs in home and office lighting, an
application known as Solid State Lighting (SSL).

In projectors. LED projectors are smaller, lighter, and produce much less heat than
incandescent technology.

. GSM MODEM AND AT-COMMANDS


4.1 GSM Fundamentals:
The Global System for Mobile Communications (GSM) is the most popular standard for
mobile phones in the world. GSM phones are used by over a billion people across more than 200
countries. The ubiquity of the GSM standard makes international roaming very common between
mobile phone operators, which enable phone users to access their services in many other parts of the
world as well as their own country. GSM differs significantly from its predecessors in that both
signaling and speech channels are digital, which means that it is seen as a second generation (2G)
mobile phone system. This fact has also meant that data communication was built into the system
from very early on. GSM is an open standard, which is currently developed by the 3GPP.From the
point of view of the consumer, the key advantage of GSM systems has been higher digital voice
quality and low cost alternatives to making calls such as text messaging. The advantage for network
operators has been 8 the ability to deploy equipment from different vendors because the open
standard allows easy inter-operability. Also, the standards have allowed network operators to offer
roaming services, which mean the subscribers, can use their phone all over the world. GSM retained

backward-compatibility with the original GSM phones as the GSM standard continued to develop,
for example packet data capabilities were added in the Release '97 version of the standard, by means
of GPRS. Higher speed data transmission has also been introduced with EDGE in the Release '99
version of the standard.
4.2 GSM SERVICES & GSM SECURITY:
From the beginning, the planners of GSM wanted ISDN compatibility in terms of the
services offered and the control signaling used. However, radio transmission limitations, in terms of
bandwidth and cost, do not allow the standard ISDN B-channel bit rate of 64 kbps to be practically
achieved. Using the ITU-T definitions, telecommunication services can be divided into bearer
services, teleservices, and supplementary services. The most basic teleservice supported by GSM is
telephony. As with all other communications, speech is digitally encoded and transmitted through the
GSM network as a digital stream. There is also an emergency service, where the nearest emergencyservice provider is notified by dialing three digits (similar to 911).
A variety of data services is offered. GSM users can send and receive data, at rates up to
9600 bps, to users on POTS (Plain Old Telephone Service), ISDN, Packet Switched Public Data
Networks, and Circuit Switched Public Data Networks using a variety of access methods and
protocols, such as X.25 or X.32. Since GSM is a digital network, a modem is not required between
the user and GSM network, although an audio modem is required inside the GSM network to
interwork with POTS. Other data services include Group 3 facsimile, as described in ITU-T
recommendation T.30, which is supported by use of an appropriate fax adaptor.
A unique feature of GSM, not found in older analog systems, is the Short Message
Service (SMS). SMS is a bi-directional service for short alphanumeric (upto160 bytes) Messages.
Messages are transported in a store-and-forward fashion. For point-to-point SMS, a message can be
sent to another subscriber to the service, and an of receipt acknowledgement is provided to the
sender. SMS can also be used in a cell-broadcast mode, for sending messages such as traffic updates
or news updates. Messages can also be stored in the SIM card for later retrieval. Supplementary
services are provided on top of tele services or bearer services.

In the current (Phase I)

specifications, they include several forms of call forward (such as call forwarding when the mobile
subscriber is unreachable by the network), and call barring of outgoing or incoming calls, for

example when roaming in another country. Many additional supplementary services will be provided
in the specifications, such as caller identification, call waiting, multi-party conversations.
GSM SECURITY:
GSM was designed with a moderate level of security. The system was designed to
authenticate the subscriber using shared-secret cryptography. Communications between the
subscriber and the base station can be encrypted. The development of UMTS introduces an optional
USIM, that uses a longer authentication key to give greater security, as well as mutually
authenticating the network and the user - whereas GSM only authenticated the user to the network
(and not vice versa). The security model therefore offers confidentiality and authentication, but
limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic
algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over the- air voice
privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United
States; A5/2 is weaker and used in countries that may not be able to support the infrastructure
necessary for A5/1.
A large security advantage of GSM is that the Ki, the crypto variable stored on the SIM
card that is the key to any GSM ciphering algorithm, is never sent over the air interface. Serious
weaknesses have been found in both algorithms, and it is possible to break A5/2 in real-time in a
cipher text-only attack.

4.3 GSM INTERFACING


Interfacing with PC:

Fig 4.3.1 GSM interfacing with pc


The GSM modem consists of a SIMCOM300 GSM module which is interfaced
with the MAX232 level converter with DB9 connector. The modem and the PC can be
connected using DB9 data cable via serial port of the PC. The modem can be tested by
connecting with PC and sending AT commands and notifying how it responds to ATCommands. With the modem, open a terminal application. Communication settings should
be found in the modem datasheet. In our application we required the settings of 9600 Baudrate, 8 Data-bits, None-Parity, 1 Stop-bit and Hardware Flow control as shown in below
figure. Now the connected system should enable sending AT-Commands from the terminal
window. Test with AT to verify this.

4.4 ADVANTAGES & USES OF GSM:


1. Roaming with GSM phones is a major advantage over the competing technology as roaming
across CDMA networks.
2. Another major reason for the growth in GSM usage, particularly between 1998 to 2002, was the
availability of prepaid calling from mobile phone operators. This allows people who are either
unable or unwilling to enter into a contract with an operator to have mobile phones. Prepaid also

enabled the rapid expansion of GSM in many developing countries where large sections of the
population do not have access to banks or bank accounts and countries where there are no effective
credit rating agencies. (In the USA, starting a non-prepaid contract with a cellular phone operator is
almost always subject to credit verification through personal information provided by credit rating
agencies).
3. The architecture of GSM allows for rapid flow of information by voice or data messaging (SMS).
Users now have access to more information, whether personal, technical, economic or political,
more quickly than was possible before the global presence of GSM. Even remote communities are
able to integrate into networks (sometimes global) thereby making information, knowledge and
culture accessible, in theory, to anyone.
4. One of the most appealing aspects of wireless communications is its mobility. Much of the success
of GSM is due to its mobility management, offering users the freedom and convenience to conduct
business from almost anywhere at any time.
5. GSM has been the catalyst in the tremendous shift in traffic volume from fixed networks to
mobile networks. This has resulted in the emergence of a mobile paradigm, whereby the mobile
phone has become the first choice of personal phone.
6. Higher digital voice quality.
7. Low cost alternatives to making calls such a text messaging.
USES OF GSM:

Uses encryption to make phone calls more secure

Data networking

Group III facsimile services

Short Message Service (SMS) for text messages and paging

Call forwarding

Caller ID U

Call waiting.

Multi-party conferencing

After a few turbulent years for the industry, we highlight some of the key factors we view as
critical for the continued success of GSM. These include:

Enabling convergence with other wireless technologies

Developing Mobile Centric Applications

Evolving the mobile business model

Mobile terminal enhancements and variety

Fostering industry partnerships and co-operations

Interoperability and Inter-generational roaming between various platforms.

4.5 GSM AT- COMMANDS


When a modem is connected to any device (computer, fax, etc.,) we need AT commands
to direct the modem for its operations. Basically we send commands directly to the modem after
activating Terminal mode . This mode is also called as local mode or direct mode. Apart from the
basic AT commands, to send the SMS message, it is required to have some special AT commands.
The basic regularly used AT commands along with the SMS AT commands are discussed below.
THE AT COMMAND FORMAT
Instructions sent to the modem are referred as AT commands because they are always
preceded by a prefix AT that are used to get the attention of the modem
<AT> <COMMAND>{Argument}{=n}<enter>

AT - attention code
Command -

a command consists of one letter

Argument -

Optional information that further defines the command

=n

- used when setting a register

you may string commands together in one command line as long as the total length of command
does not exceed 63 bytes . The attention code, AT, is only required at the beginning of the command
line. A/, +++ are the only two commands which are not preceded by AT.

Using AT Commands
When issued to the fax modem, AT commands direct the fax modem to dial, answer, hang up, and to
perform many other communication tasks. Some of the most commonly used commands are:
AT (Attention). This is the command line prefix. (All the commands listed , except A/ and +++,
must be preceded by the command AT). A Answer an incoming call D Dial the following phone
number E Turn echo OFF H Hang up O Return to on-line state Z Reset the modem to the values
stored in the N.V. Ram +++ Return to the Command State A/ Repeat last command (Do not precede
this command with AT or follow it with <Enter>)

BASICS OF WORKING AND SPECIFICATIONS OF GSM


The GSM architecture is nothing but a network of computers. The system has to partition
available frequency and assign only that part of the frequency spectrum to any base transreceiver station
and also has to reuse the scarce frequency as often as possible.

GSM uses TDMA and FDMA together. Graphically this can be shown below

Fig 1.

Representation of a GSM signal using TDMA & FDMA with

respect to the transmitted power.


Some of the technical specifications of GSM are listed below
Multiple Access Method

TDMA / FDMA

Uplink frequencies (MHz)

933-960 (basic GSM)

Downlink frequencies (MHz)

890-915 (basic GSM)

Duplexing

FDD

Channel spacing, kHz

200

Modulation

GMSK

Portable TX power, maximum / average (mW)

1000 / 125

Power control, handset and BSS

Yes

Speech coding and rate (kbps)

RPE-LTP / 13

Speech Channels per RF channel:

Channel rate (kbps)

270.833

Channel coding

Rate 1/2 convolutional

Frame duration (ms)

4.615

GSM was originally defined for the 900 Mhz range but after some time even the 1800 Mhz range
was used for cellular technology. The 1800 MHz range has its architecture and specifications
almost same to that of the 900 Mhz GSM technology but building the Mobile exchanges is easier
and the high frequency Synergy effects add to the advantages of the 1800 Mhz range.

4. ARCITECTURE AND BUILDIGN BLOCKS


GSM is mainly built on 3 building blocks. (Ref Fig. 2)

GSM Radio Network This is concerned with the signaling of the system. Hand-overs
occur in the radio network. Each BTS is allocated a set of frequency channels.

GSM Mobile switching Network This network is concerned with the storage of data
required for routing and service provision.

GSM Operation and Maintenance The task carried out by it include Administration and
commercial operation , Security management, Network configuration, operation,
performance management and maintenance tasks.

Fig.2 The basic blocks of the whole GSM system

RELAYS SPDT

Overview OF Relays
A relay is an electrically operated switch used to isolate one electrical circuit from another. In its
simplest form, a relay consists of a coil used as an electromagnet to open and close switch
contacts. Since the two circuits are isolated from one another, a lower voltage circuit can be used
to trip a relay, which will control a separate circuit that requires a higher voltage or amperage.
Relays can be found in early telephone exchange equipment, in industrial control circuits, in car
audio systems, in automobiles, on water pumps, in high-power audio amplifiers and as protection
devices.

Relay Switch Contacts


The switch contacts on a relay can be "normally open" (NO) or "normally closed" (NC)--that is,
when the coil is at rest and not energized (no current flowing through it), the switch contacts are
given the designation of being NO or NC. In an open circuit, no current flows, such as a wall
light switch in your home in a position that the light is off. In a closed circuit, metal switch
contacts touch each other to complete a circuit, and current flows, similar to turning a light
switch to the "on" position. In the accompanying schematic diagram, points A and B connect to
the coil. Points C and D connect to the

switch. When you apply a voltage across the coil at points A and B, you create an
electromagnetic field, which attracts a lever in the switch, causing it to make or break contact in
the circuit at points C and D (depending if the design is NO or NC). The switch contacts remain
in this state until you remove the voltage to the coil. Relays come in different switch
configurations. The switches may have more than one "pole," or switch contact. The diagram
shows a "single pole single throw" configuration, referred to as SPST. This is similar to a wall
light switch in your home. With a single "throw" of the switch, you close the circuit.

The Single Pole Double Throw Relay


A single pole double throw (SPDT) relay configuration switches one common pole to two other
poles, flipping between them. As shown in the schematic diagram, the common point E
completes a circuit with C when the relay coil is at rest, that is, no voltage is applied to it.

This circuit is "closed." A gap between the contacts of point E and D creates an "open" circuit.
When you apply power to the coil, a metal level is pulled down, closing the circuit between
points E and D and opening the circuit between E and C. A single pole double throw relay can be
used to alternate which circuit a voltage or signal will be sent to.
SPDT Relay:
(Single Pole Double Throw Relay) an electromagnetic switch, consist of a coil (terminals 85 &
86), 1 common terminal (30), 1 normally closed terminal (87a), and one normally open terminal
(87) (Figure 1).
When the coil of an SPDT relay (Figure 1) is at rest (not energized), the common terminal (30)
and the normally closed terminal (87a) have continuity. When the coil is energized, the common

terminal (30) and the normally open terminal (87) have continuity.
The diagram below center (Figure 2) shows an SPDT relay at rest, with the coil not energized.
The diagram below right (Figure 3) shows the relay with the coil energized. As you can see, the
coil is an electromagnet that causes the arm that is always connected to the common (30) to pivot
when energized whereby contact is broken from the normally closed terminal (87a) and made
with the normally open terminal (87).
When energizing the coil of a relay, polarity of the coil does not matter unless there is a diode
across the coil. If a diode is not present, you may attach positive voltage to either terminal of the
coil and negative voltage to the other, otherwise you must connect positive to the side of the coil
that the cathode side (side with stripe) of the diode is connected and negative to side of the coil
that the anode side of the diode is connected.

Why do I want to use a relay and do I really need to?


Anytime you want to switch a device which draws more current than is provided by an output of
a switch or component you'll need to use a relay. The coil of an SPDT or an SPST relay that we
most commonly use draws very little current (less than 200 milliamps) and the amount of current
that you can pass through a relay's common, normally closed, and normally open contacts will
handle up to 30 or 40 amps. This allows you to switch devices such as headlights, parking lights,
horns, etc., with low amperage outputs such as those found on keyless entry and alarm systems,
and other components. In some cases you may need to switch multiple things at the same time
using one output. A single output connected to multiple relays will allow you to open continuity
and/or close continuity simultaneously on multiple wires.
There are far too many applications to list that require the use of a relay, but we do show many of
the most popular applications in the pages that follow and many more in our Relay Diagrams Quick Reference application. If you are still unclear about what a relay does or if you should use
one after you browse through the rest of this section, please post a question in the12volt's install

bay. (We recommend Tyco (formerly Bosch) or Potter & Brumfield relays for all of the SPDT
and SPST relay applications shown on this site.)

DC MOTOR

DC motors are configured in many types and sizes, including brush less, servo, and gear
motor types. A motor consists of a rotor and a permanent magnetic field stator. The magnetic
field is maintained using either permanent magnets or electromagnetic windings. DC motors
are

most

commonly

used

in

variable

speed

and

torque.

Motion and controls cover a wide range of components that in some way are
used to generate and/or control motion. Areas within this category include bearings and
bushings, clutches and brakes, controls and drives, drive components, encoders and resolves,
Integrated motion control, limit switches, linear actuators, linear and rotary motion
components, linear position sensing, motors (both AC and DC motors), orientation position
sensing, pneumatics and pneumatic components, positioning stages, slides and guides, power
transmission

(mechanical),

seals,

slip

rings,

solenoids,

springs.

Motors are the devices that provide the actual speed and torque in a drive
system. This family includes AC motor types (single and multiphase motors, universal, servo
motors, induction, synchronous, and gear motor) and DC motors (brush less, servo motor, and
gear motor) as well as linear, stepper and air motors, and motor contactors and starters.
In any electric motor, operation is based on simple electromagnetism. A
current-carrying conductor generates a magnetic field; when this is then placed in an external

magnetic field, it will experience a force proportional to the current in the conductor, and to
the strength of the external magnetic field. As you are well aware of from playing with
magnets as a kid, opposite (North and South) polarities attract, while like polarities (North and
North, South and South) repel. The internal configuration of a DC motor is designed to
harness the magnetic interaction between a current-carrying conductor and an external
magnetic field to generate rotational motion.
Let's start by looking at a simple 2-pole DC electric motor (here red represents a magnet
or winding with a "North" polarization, while green represents a magnet or winding with a
"South" polarization).

Every DC motor has six basic parts -- axle, rotor (a.k.a., armature), stator, commutator, field
magnet(s), and brushes. In most common DC motors (and all that Beamers will see), the
external magnetic field is produced by high-strength permanent magnets1. The stator is the
stationary part of the motor -- this includes the motor casing, as well as two or more
permanent magnet pole pieces. The rotor (together with the axle and attached commutator)
rotates with respect to the stator. The rotor consists of windings (generally on a core), the
windings being electrically connected to the commutator. The above diagram shows a
common motor layout -- with the rotor inside the stator (field) magnets.
The geometry of the brushes, commutator contacts, and rotor
windings are such that when power is applied, the polarities of the
energized winding and the stator magnet(s) are misaligned, and the rotor
will rotate until it is almost aligned with the stator's field magnets. As the
rotor reaches alignment, the brushes move to the next commutator
contacts, and energize the next winding. Given our example two-pole

motor, the rotation reverses the direction of current through the rotor
winding, leading to a "flip" of the rotor's magnetic field, and driving it to
continue rotating.
In real life, though, DC motors will always have more than two poles (three is a
very common number). In particular, this avoids "dead spots" in the commutator. You can
imagine how with our example two-pole motor, if the rotor is exactly at the middle of its
rotation (perfectly aligned with the field magnets), it will get "stuck" there. Meanwhile, with a
two-pole motor, there is a moment where the commutator shorts out the power supply (i.e.,
both brushes touch both commutator contacts simultaneously). This would be bad for the
power supply, waste energy, and damage motor components as well. Yet another disadvantage
of such a simple motor is that it would exhibit a high amount of torque ripple" (the amount of
torque it could produce is cyclic with the position of the rotor).

So since most small DC motors are of a three-pole design, let's tinker with
the workings of one via an interactive animation (JavaScript required):

You'll notice a few things from this -- namely, one pole is fully energized at a time
(but two others are "partially" energized). As each brush transitions from one commutator
contact to the next, one coil's field will rapidly collapse, as the next coil's field will rapidly

charge up (this occurs within a few microsecond). We'll see more about the effects of this
later, but in the meantime you can see that this is a direct result of the coil windings' series
wiring:

There's probably no better way to see how an average dc motor is put together, than by
just opening one up. Unfortunately this is tedious work, as well as requiring the destruction of a
perfectly good motor.

SOFTWARE DEVELOPMENT:
5.1 Introduction:
In this chapter the software used and the language in which the program code is defined
is mentioned and the program code dumping tools are explained. The chapter also documents the
development of the program for the application. This program has been termed as Source code.
Before we look at the source code we define the two header files that we have used in the code.
5.2 Tools Used:

Figure 4.1 Keil Software- internal stages


Keil development tools for the 8051 Microcontroller Architecture support every level of
software developer from the professional applications

5.3 C51 Compiler & A51 Macro Assembler:

Source files are created by the Vision IDE and are passed to the C51 Compiler or A51
Macro Assembler. The compiler and assembler process source files and create replaceable object
files.
The Keil C51 Compiler is a full ANSI implementation of the C programming language
that supports all standard features of the C language. In addition, numerous features for direct
support of the 8051 architecture have been added.

5.4 VISION
What's New in Vision3?
Vision3 adds many new features to the Editor like Text Templates, Quick Function
Navigation, and Syntax Coloring with brace high lighting Configuration Wizard for dialog based
startup and debugger setup. Vision3 is fully compatible to Vision2 and can be used in parallel
with Vision2.
What is Vision3?
Vision3 is an IDE (Integrated Development Environment) that helps you write, compile,
and debug embedded programs. It encapsulates the following components:

A project manager.

A make facility.

Tool configuration.

Editor.

A powerful debugger.
To help you get started, several example programs (located in the \C51\Examples,
\C251\Examples, \C166\Examples, and \ARM\...\Examples) are provided.

HELLO is a simple program that prints the string "Hello World" using the Serial Interface.

MEASURE is a data acquisition system for analog and digital systems.

TRAFFIC is a traffic light controller with the RTX Tiny operating system.

SIEVE is the SIEVE Benchmark.

DHRY is the Dhrystone Benchmark.

WHETS is the Single-Precision Whetstone Benchmark.


Additional example programs not listed here are provided for each device architecture.

You might also like