Professional Documents
Culture Documents
In recent years, vehicle thefts are increasing at an alarming rate around the world.
People have started to use the theft control systems installed in their vehicles. The commercially
available anti-theft vehicular systems are very expensive. This project deals with the design &
development of a theft control system for an automobile, which is being used to prevent / control
the theft of a vehicle. The developed system makes Use of an embedded system based on
GSM /GPS technology (GPS technology is further enhancement of the base paper). The designed
& developed System is installed in the vehicle. An interfacing GSM MODEM (SIMCOMs
SIM300 GSM operates in the 900MHz and 1.8GHz bands GSM supports data transfer speeds of
up to 9.6 kbps) and the GPS which are connected to the microcontroller, which is in turn,
connected to the engine. Once, the vehicle is being stolen, the information is being used by the
vehicle owner for further processing. Where by sitting at a remote place, a particular number is
dialed by them to the interfacing GSM MODEM that is with the hardware kit which is installed
in the vehicle. By reading the signals received by the mobile, the engine is locked automatically
and sends the SMS to the dialed no stating the exact position using GPS modem. Again it will
come to the normal condition only after entering a secured password. The owner of the vehicle.
The main concept in this design is introducing the GSM and GPS Technologies
into the embedded system. The designed unit is very simple & low cost. The entire designed unit
is on a single chip. When the vehicle is stolen, owner will give a call to the kit placed in vehicle
engine automatically stop which is indicated by the DC motor in turn sends the SMS to the
authorized person showing the exact location using GPS. The car will unlock until the password
is entered with help of 4x3 key pad interfaced to LPC 2148 by the authorized person.
4. EMBEDDED SYSTEMS
4.1 INTRODUCTION
Embedded systems are designed to do some specific task, rather than be a generalpurpose computer for multiple tasks. Some also have real time performance constraints that must
be met, for reason such as safety and usability; others may have low or no performance
requirements, allowing the system hardware to be simplified to reduce costs.
4.2 CHARACTERISTICS
Embedded systems often use a (relatively) slow processor and small memory size with an
intentionally simplified architecture to minimize costs.
They often have no operating system or a speciali8zed embedded operating system (often a
real-time operating system ).
Programs on an embedded system often must run with resources: often there is no disk drive,
operating system, keyboard or screen. may replace rotating media, and a small keypad and
screen may be used instead of a PC's keyboard and screen.
Sprinklers.
LCD
GSM
MODEM
MICRO
MEMS
ADC
CONTROLL
ER
LED
KEYPAD
come to the normal condition only after entering a secured password. The owner of the vehicle & the
centre processing system will know this secured password. We can modify this concept such that the
vehicle owner also can lock the vehicle from his mobile phone.
The main concept in this design is introducing the mobile communications into the
embedded system. With the help of SIM tracking knows the location of vehicle and informs to the
local police or stops it from further movement.
6. HARDWARE
6.1 CONTROLLER (AT89S52)
A Micro controller consists of a powerful CPU tightly coupled with memory, various I/O
interfaces such as serial port, parallel port timer or counter, interrupt controller, data acquisition
interfaces-Analog to Digital converter, Digital to Analog converter, integrated on to a single silicon
chip.
If a system is developed with a microprocessor, the designer has to go for external
memory such as RAM, ROM, EPROM and peripherals. But controller is provided all these facilities
on a single chip. Development of a Micro controller reduces PCB size and cost of design.
One of the major differences between a Microprocessor and a Micro controller is that a
controller often deals with bits not bytes as in the real world application.
Intel has introduced a family of Micro controllers called the MCS-51.
NECESSITY OF MICROCONTROLLERS:
Microprocessors brought the concept of programmable devices and made many
applications of intelligent equipment. Most applications, which do not need large amount of data and
program memory, tended to be:
Costly:
The microprocessor system had to satisfy the data and program requirements so, sufficient
RAM and ROM are used to satisfy most applications .The peripheral control equipment also had to
be satisfied. Therefore, almost all-peripheral chips were used in the design. Because of these
additional peripherals cost will be comparatively high.
An example:
8085 chip needs An Address latch for separating address from multiplex address and data.32-KB
RAM and 32-KB ROM to be able to satisfy most applications. As also Timer / Counter, Parallel
programmable port, Serial port, Interrupt controller are needed for its efficient applications.
In comparison a typical Micro controller 8052 chip has all that the 8052 board has except
a reduced memory as follows. 4K bytes of ROM as compared to 32-KB, 128 Bytes of RAM as
compared to 32-KB.
Bulky:
On comparing a board full of chips (Microprocessors) with one chip with all components
in it (Micro controller)
Debugging:
Lots of Microprocessor circuitry and program to debug. In Micro controller there is no
Microprocessor circuitry to debug. Slower Development time: As we have observed
Microprocessors need a lot of debugging at board level and at program level, whereas, Micro
controller do not have the excessive circuitry and the built-in peripheral chips are easier to program
for operation.
So peripheral devices like Timer/Counter, Parallel programmable port, Serial
Communication Port, Interrupt controller and so on, which were most often used were integrated
with the Microprocessor to present the Micro controller .RAM and ROM also were integrated in the
same chip. The ROM size was anything from 256 bytes to 32Kb or more. RAM was optimized to
minimum of 64 bytes to 256 bytes or more.
Typical Micro controllers have all the following features:
8/16/32 CPU
Why AT 89C52? :
The system requirements and control specifications clearly rule out the use of 16, 32 or
64 bit micro controllers or microprocessors. Systems using these may be earlier to implement due to
large number of internal features. They are also faster and more reliable but, the above application is
satisfactorily served by 8-bit micro controller. Using an inexpensive 8-bit Micro controller will doom
the 32-bit product failure in any competitive market place.
Coming to the question of why to use AT89C52 of all the 8-bit Micro controller available
in the market the main answer would be because it has 8 Kb on chip flash memory which is just
sufficient for our application. The on-chip Flash ROM allows the program memory to be
reprogrammed in system or by conventional non-volatile memory Programmer. Moreover ATMEL is
the leader in
Flash technology in todays market place and hence using AT 89C52 is the optimal
solution.
8052 micro controller architecture:
The 8052 architecture consists of these specific features:
The power supply should be of +5V, with maximum allowable transients of 10mv. To
achieve a better / suitable contrast for the display, the voltage (VL) at pin 3 should be
adjusted properly.
A module should not be inserted or removed from a live circuit. The ground terminal
of the power supply must be isolated properly so that no voltage is induced in it. The
module should be isolated from the other circuits, so that stray voltages are not
induced, which could cause a flickering display.
All digital circuits require regulated power supply. In this article we are going to learn
how to get a regulated positive supply from the mains supply.
Figure 1 shows the basic block diagram of a fixed regulated power supply. Let us go
through each block.
6.3 GSM
The Global System for Mobile Communications (GSM) is the most popular standard for
mobile phones in the world. GSM phones are used by over a billion people across more than 200
countries. The ubiquity of the GSM standard makes international roaming very common between
mobile phone operators, which enable phone users to access their services in many other parts of the
world as well as their own country. GSM differs significantly from its predecessors in that both
signaling and speech channels are digital, which means that it is seen as a second generation (2G)
mobile phone system. This fact has also meant that data communication was built into the system
from very early on. GSM is an open standard, which is currently developed by the 3GPP.From the
point of view of the consumer, the key advantage of GSM systems has been higher digital voice
quality and low cost alternatives to making calls such as text messaging. The advantage for network
operators has been 8 the ability to deploy equipment from different vendors because the open
standard allows easy inter-operability. Also, the standards have allowed network operators to offer
roaming services, which mean the subscribers, can use their phone all over the world. GSM retained
backward-compatibility with the original GSM phones as the GSM standard continued to develop,
for example packet data capabilities were added in the Release '97 version of the standard, by means
of GPRS. Higher speed data transmission has also been introduced with EDGE in the Release '99
version of the standard.
ability
to
display
numbers,
characters
and
graphics.
This
is
in
6.6.2 USES
The LCD s used exclusively in watches, calculators and measuring instruments is the
simple seven-segment displays, having a limited amount of numeric data. The recent advances in
technology have resulted in better legibility, more information displaying capability and a wider
temperature range. These have resulted in the LCD s being extensively used in telecommunications
and entertainment electronics. The LCD s has even started replacing the cathode ray tubes (CRTs)
used for the display of text and graphics, and also in small TV applications.
symbol
I/O
Description
Vss
--
Ground
Vcc
--
VEE
--
Power
supply
to
control contrast
4
RS
RS=0
to
select
cmd register
Rs=1
to
select
data register
5
R/W
I/O
Enable
DB0
I/O
DB1
I/O
DB2
I/O
10
DB3
I/O
11
DB4
I/O
12
DB5
I/O
13
DB6
I/O
14
DB7
I/O
Return home
Decrement cursor
Increment cursor
10
14
18
1C
80
C0
38
LEDs are capable of emitting light of an intended color without the use of color filters that
traditional lighting methods require.
The shape of the LED package allows light to be focused. Incandescent and fluorescent
sources often require an external reflector to collect light and direct it in a useable manner.
LEDs are insensitive to vibration and shocks, unlike incandescent and discharge sources.
LEDs are built inside solid cases that protect them, making them hard to break and
extremely durable.
LEDs have an extremely long life span: typically ten years, twice as long as the best
fluorescent bulbs and twenty times longer than the best incandescent bulbs.
Further LEDs fail by dimming over time, rather than the abrupt burnout of incandescent
bulbs.
LEDs give off less heat than incandescent light bulbs with similar light output.
LEDs light up very quickly. An illumination LED will achieve full brightness in
approximately 0.01 seconds, 10 times faster than an incandescent light bulb (0.1 second), and
many times faster than a compact fluorescent lamp, which starts to come on after 0.5 seconds
or 1 second, but does not achieve full brightness for 30 seconds or more. A typical red
indicator LED will achieve full brightness in microseconds, or possibly less if it's used for
communication devices.
Disadvantages:
LEDs are currently more expensive than more conventional lighting technologies. The
additional expense partially stems from the relatively low lumen output (requiring more
light sources) and drive circuitry/power supplies needed. A good measure to compare
lighting technologies is lumen/dollar.
automotive/military applications where the device must operate over a large range of
temperatures, with government-regulated output.
Status indicators, e.g. on/off lights on professional instruments and consumers audio/video
equipment.
Seven segment displays, in calculators and measurement instruments, although now mostly
replaced by liquid crystal displays.
Thin, lightweight message displays, e.g. in public information signs (at airports and railway
stations and as destination displays for trains, buses, trams and ferries).
Red or yellow LEDs are used in indicator and [alpha] numeric displays in environments
where night vision must be retained: aircraft cockpits, submarine and ship bridges, astronomy
observatories, and in the field, e.g. night time animal watching and military field use.
LEDs find further application in safety devices, where high brightness and reliability are
critical:
In level crossing lights, red LEDs have been used to replace incandescent bulbs.
In car brake and indicator lights, where the quick-on characteristic of LEDs enhances safety.
Navigation lights on boats, which are red, green, and white and shine in specific directions.
Boats use direct current batteries to power their lights, so not only does that match the
requirements of LEDs, but the efficiency of colored LEDs is a big advantage.
In photographic darkrooms, red or yellow LEDs are also used for providing lighting, which
does not lead to unwanted exposure of the film.
As a replacement for incandescent and fluorescent bulbs in home and office lighting, an
application known as Solid State Lighting (SSL).
In projectors. LED projectors are smaller, lighter, and produce much less heat than
incandescent technology.
backward-compatibility with the original GSM phones as the GSM standard continued to develop,
for example packet data capabilities were added in the Release '97 version of the standard, by means
of GPRS. Higher speed data transmission has also been introduced with EDGE in the Release '99
version of the standard.
4.2 GSM SERVICES & GSM SECURITY:
From the beginning, the planners of GSM wanted ISDN compatibility in terms of the
services offered and the control signaling used. However, radio transmission limitations, in terms of
bandwidth and cost, do not allow the standard ISDN B-channel bit rate of 64 kbps to be practically
achieved. Using the ITU-T definitions, telecommunication services can be divided into bearer
services, teleservices, and supplementary services. The most basic teleservice supported by GSM is
telephony. As with all other communications, speech is digitally encoded and transmitted through the
GSM network as a digital stream. There is also an emergency service, where the nearest emergencyservice provider is notified by dialing three digits (similar to 911).
A variety of data services is offered. GSM users can send and receive data, at rates up to
9600 bps, to users on POTS (Plain Old Telephone Service), ISDN, Packet Switched Public Data
Networks, and Circuit Switched Public Data Networks using a variety of access methods and
protocols, such as X.25 or X.32. Since GSM is a digital network, a modem is not required between
the user and GSM network, although an audio modem is required inside the GSM network to
interwork with POTS. Other data services include Group 3 facsimile, as described in ITU-T
recommendation T.30, which is supported by use of an appropriate fax adaptor.
A unique feature of GSM, not found in older analog systems, is the Short Message
Service (SMS). SMS is a bi-directional service for short alphanumeric (upto160 bytes) Messages.
Messages are transported in a store-and-forward fashion. For point-to-point SMS, a message can be
sent to another subscriber to the service, and an of receipt acknowledgement is provided to the
sender. SMS can also be used in a cell-broadcast mode, for sending messages such as traffic updates
or news updates. Messages can also be stored in the SIM card for later retrieval. Supplementary
services are provided on top of tele services or bearer services.
specifications, they include several forms of call forward (such as call forwarding when the mobile
subscriber is unreachable by the network), and call barring of outgoing or incoming calls, for
example when roaming in another country. Many additional supplementary services will be provided
in the specifications, such as caller identification, call waiting, multi-party conversations.
GSM SECURITY:
GSM was designed with a moderate level of security. The system was designed to
authenticate the subscriber using shared-secret cryptography. Communications between the
subscriber and the base station can be encrypted. The development of UMTS introduces an optional
USIM, that uses a longer authentication key to give greater security, as well as mutually
authenticating the network and the user - whereas GSM only authenticated the user to the network
(and not vice versa). The security model therefore offers confidentiality and authentication, but
limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic
algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over the- air voice
privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United
States; A5/2 is weaker and used in countries that may not be able to support the infrastructure
necessary for A5/1.
A large security advantage of GSM is that the Ki, the crypto variable stored on the SIM
card that is the key to any GSM ciphering algorithm, is never sent over the air interface. Serious
weaknesses have been found in both algorithms, and it is possible to break A5/2 in real-time in a
cipher text-only attack.
enabled the rapid expansion of GSM in many developing countries where large sections of the
population do not have access to banks or bank accounts and countries where there are no effective
credit rating agencies. (In the USA, starting a non-prepaid contract with a cellular phone operator is
almost always subject to credit verification through personal information provided by credit rating
agencies).
3. The architecture of GSM allows for rapid flow of information by voice or data messaging (SMS).
Users now have access to more information, whether personal, technical, economic or political,
more quickly than was possible before the global presence of GSM. Even remote communities are
able to integrate into networks (sometimes global) thereby making information, knowledge and
culture accessible, in theory, to anyone.
4. One of the most appealing aspects of wireless communications is its mobility. Much of the success
of GSM is due to its mobility management, offering users the freedom and convenience to conduct
business from almost anywhere at any time.
5. GSM has been the catalyst in the tremendous shift in traffic volume from fixed networks to
mobile networks. This has resulted in the emergence of a mobile paradigm, whereby the mobile
phone has become the first choice of personal phone.
6. Higher digital voice quality.
7. Low cost alternatives to making calls such a text messaging.
USES OF GSM:
Data networking
Call forwarding
Caller ID U
Call waiting.
Multi-party conferencing
After a few turbulent years for the industry, we highlight some of the key factors we view as
critical for the continued success of GSM. These include:
AT - attention code
Command -
Argument -
=n
you may string commands together in one command line as long as the total length of command
does not exceed 63 bytes . The attention code, AT, is only required at the beginning of the command
line. A/, +++ are the only two commands which are not preceded by AT.
Using AT Commands
When issued to the fax modem, AT commands direct the fax modem to dial, answer, hang up, and to
perform many other communication tasks. Some of the most commonly used commands are:
AT (Attention). This is the command line prefix. (All the commands listed , except A/ and +++,
must be preceded by the command AT). A Answer an incoming call D Dial the following phone
number E Turn echo OFF H Hang up O Return to on-line state Z Reset the modem to the values
stored in the N.V. Ram +++ Return to the Command State A/ Repeat last command (Do not precede
this command with AT or follow it with <Enter>)
GSM uses TDMA and FDMA together. Graphically this can be shown below
Fig 1.
TDMA / FDMA
Duplexing
FDD
200
Modulation
GMSK
1000 / 125
Yes
RPE-LTP / 13
270.833
Channel coding
4.615
GSM was originally defined for the 900 Mhz range but after some time even the 1800 Mhz range
was used for cellular technology. The 1800 MHz range has its architecture and specifications
almost same to that of the 900 Mhz GSM technology but building the Mobile exchanges is easier
and the high frequency Synergy effects add to the advantages of the 1800 Mhz range.
GSM Radio Network This is concerned with the signaling of the system. Hand-overs
occur in the radio network. Each BTS is allocated a set of frequency channels.
GSM Mobile switching Network This network is concerned with the storage of data
required for routing and service provision.
GSM Operation and Maintenance The task carried out by it include Administration and
commercial operation , Security management, Network configuration, operation,
performance management and maintenance tasks.
RELAYS SPDT
Overview OF Relays
A relay is an electrically operated switch used to isolate one electrical circuit from another. In its
simplest form, a relay consists of a coil used as an electromagnet to open and close switch
contacts. Since the two circuits are isolated from one another, a lower voltage circuit can be used
to trip a relay, which will control a separate circuit that requires a higher voltage or amperage.
Relays can be found in early telephone exchange equipment, in industrial control circuits, in car
audio systems, in automobiles, on water pumps, in high-power audio amplifiers and as protection
devices.
switch. When you apply a voltage across the coil at points A and B, you create an
electromagnetic field, which attracts a lever in the switch, causing it to make or break contact in
the circuit at points C and D (depending if the design is NO or NC). The switch contacts remain
in this state until you remove the voltage to the coil. Relays come in different switch
configurations. The switches may have more than one "pole," or switch contact. The diagram
shows a "single pole single throw" configuration, referred to as SPST. This is similar to a wall
light switch in your home. With a single "throw" of the switch, you close the circuit.
This circuit is "closed." A gap between the contacts of point E and D creates an "open" circuit.
When you apply power to the coil, a metal level is pulled down, closing the circuit between
points E and D and opening the circuit between E and C. A single pole double throw relay can be
used to alternate which circuit a voltage or signal will be sent to.
SPDT Relay:
(Single Pole Double Throw Relay) an electromagnetic switch, consist of a coil (terminals 85 &
86), 1 common terminal (30), 1 normally closed terminal (87a), and one normally open terminal
(87) (Figure 1).
When the coil of an SPDT relay (Figure 1) is at rest (not energized), the common terminal (30)
and the normally closed terminal (87a) have continuity. When the coil is energized, the common
terminal (30) and the normally open terminal (87) have continuity.
The diagram below center (Figure 2) shows an SPDT relay at rest, with the coil not energized.
The diagram below right (Figure 3) shows the relay with the coil energized. As you can see, the
coil is an electromagnet that causes the arm that is always connected to the common (30) to pivot
when energized whereby contact is broken from the normally closed terminal (87a) and made
with the normally open terminal (87).
When energizing the coil of a relay, polarity of the coil does not matter unless there is a diode
across the coil. If a diode is not present, you may attach positive voltage to either terminal of the
coil and negative voltage to the other, otherwise you must connect positive to the side of the coil
that the cathode side (side with stripe) of the diode is connected and negative to side of the coil
that the anode side of the diode is connected.
bay. (We recommend Tyco (formerly Bosch) or Potter & Brumfield relays for all of the SPDT
and SPST relay applications shown on this site.)
DC MOTOR
DC motors are configured in many types and sizes, including brush less, servo, and gear
motor types. A motor consists of a rotor and a permanent magnetic field stator. The magnetic
field is maintained using either permanent magnets or electromagnetic windings. DC motors
are
most
commonly
used
in
variable
speed
and
torque.
Motion and controls cover a wide range of components that in some way are
used to generate and/or control motion. Areas within this category include bearings and
bushings, clutches and brakes, controls and drives, drive components, encoders and resolves,
Integrated motion control, limit switches, linear actuators, linear and rotary motion
components, linear position sensing, motors (both AC and DC motors), orientation position
sensing, pneumatics and pneumatic components, positioning stages, slides and guides, power
transmission
(mechanical),
seals,
slip
rings,
solenoids,
springs.
Motors are the devices that provide the actual speed and torque in a drive
system. This family includes AC motor types (single and multiphase motors, universal, servo
motors, induction, synchronous, and gear motor) and DC motors (brush less, servo motor, and
gear motor) as well as linear, stepper and air motors, and motor contactors and starters.
In any electric motor, operation is based on simple electromagnetism. A
current-carrying conductor generates a magnetic field; when this is then placed in an external
magnetic field, it will experience a force proportional to the current in the conductor, and to
the strength of the external magnetic field. As you are well aware of from playing with
magnets as a kid, opposite (North and South) polarities attract, while like polarities (North and
North, South and South) repel. The internal configuration of a DC motor is designed to
harness the magnetic interaction between a current-carrying conductor and an external
magnetic field to generate rotational motion.
Let's start by looking at a simple 2-pole DC electric motor (here red represents a magnet
or winding with a "North" polarization, while green represents a magnet or winding with a
"South" polarization).
Every DC motor has six basic parts -- axle, rotor (a.k.a., armature), stator, commutator, field
magnet(s), and brushes. In most common DC motors (and all that Beamers will see), the
external magnetic field is produced by high-strength permanent magnets1. The stator is the
stationary part of the motor -- this includes the motor casing, as well as two or more
permanent magnet pole pieces. The rotor (together with the axle and attached commutator)
rotates with respect to the stator. The rotor consists of windings (generally on a core), the
windings being electrically connected to the commutator. The above diagram shows a
common motor layout -- with the rotor inside the stator (field) magnets.
The geometry of the brushes, commutator contacts, and rotor
windings are such that when power is applied, the polarities of the
energized winding and the stator magnet(s) are misaligned, and the rotor
will rotate until it is almost aligned with the stator's field magnets. As the
rotor reaches alignment, the brushes move to the next commutator
contacts, and energize the next winding. Given our example two-pole
motor, the rotation reverses the direction of current through the rotor
winding, leading to a "flip" of the rotor's magnetic field, and driving it to
continue rotating.
In real life, though, DC motors will always have more than two poles (three is a
very common number). In particular, this avoids "dead spots" in the commutator. You can
imagine how with our example two-pole motor, if the rotor is exactly at the middle of its
rotation (perfectly aligned with the field magnets), it will get "stuck" there. Meanwhile, with a
two-pole motor, there is a moment where the commutator shorts out the power supply (i.e.,
both brushes touch both commutator contacts simultaneously). This would be bad for the
power supply, waste energy, and damage motor components as well. Yet another disadvantage
of such a simple motor is that it would exhibit a high amount of torque ripple" (the amount of
torque it could produce is cyclic with the position of the rotor).
So since most small DC motors are of a three-pole design, let's tinker with
the workings of one via an interactive animation (JavaScript required):
You'll notice a few things from this -- namely, one pole is fully energized at a time
(but two others are "partially" energized). As each brush transitions from one commutator
contact to the next, one coil's field will rapidly collapse, as the next coil's field will rapidly
charge up (this occurs within a few microsecond). We'll see more about the effects of this
later, but in the meantime you can see that this is a direct result of the coil windings' series
wiring:
There's probably no better way to see how an average dc motor is put together, than by
just opening one up. Unfortunately this is tedious work, as well as requiring the destruction of a
perfectly good motor.
SOFTWARE DEVELOPMENT:
5.1 Introduction:
In this chapter the software used and the language in which the program code is defined
is mentioned and the program code dumping tools are explained. The chapter also documents the
development of the program for the application. This program has been termed as Source code.
Before we look at the source code we define the two header files that we have used in the code.
5.2 Tools Used:
Source files are created by the Vision IDE and are passed to the C51 Compiler or A51
Macro Assembler. The compiler and assembler process source files and create replaceable object
files.
The Keil C51 Compiler is a full ANSI implementation of the C programming language
that supports all standard features of the C language. In addition, numerous features for direct
support of the 8051 architecture have been added.
5.4 VISION
What's New in Vision3?
Vision3 adds many new features to the Editor like Text Templates, Quick Function
Navigation, and Syntax Coloring with brace high lighting Configuration Wizard for dialog based
startup and debugger setup. Vision3 is fully compatible to Vision2 and can be used in parallel
with Vision2.
What is Vision3?
Vision3 is an IDE (Integrated Development Environment) that helps you write, compile,
and debug embedded programs. It encapsulates the following components:
A project manager.
A make facility.
Tool configuration.
Editor.
A powerful debugger.
To help you get started, several example programs (located in the \C51\Examples,
\C251\Examples, \C166\Examples, and \ARM\...\Examples) are provided.
HELLO is a simple program that prints the string "Hello World" using the Serial Interface.
TRAFFIC is a traffic light controller with the RTX Tiny operating system.