Professional Documents
Culture Documents
Certificate
Acknowledgement
Table of Contents
List of Figures
List of Tables
Abbreviations
Chapter 1: Introduction to VTS
1.1 Introduction
1.2 ATM Security using VTS
1.3 Active versus Passive Tracking
1.4 Types of ATM
1.5 Typical Architecture
1.6 History of ATM
1.6.1 Early Technology
1.6.2 New development in technology
1.7 ATM System Features
1.7.1 ATM Benefits
1.8 ATM in India
Chapter 2: Block Diagram of ATM
2.1 Block Diagram of anti theft ATM Using GSM and Modem
2.2 Hardware Components
2.2.1
2.2.1.1 Working of
2.2.1.2 Triangulation
2.2.1.3 Augmentation
2.2.2 GSM
2.2.3 RS232 Interface
2.2.3.1 The scope of the standard
2.2.3.2 History of RS 232
2.2.3.3 Limitation of Standard
2.2.3.4 Standard details
2.2.3.5 Connectors
2.2.3.6 Cables
2.2.3.7 Conventions
2.2.3.8 RTS/CTS handshaking
2.2.3.9 3-wire and 5-wire RS-232
2.2.3.10 Seldom used features
2.2.3.11 Timing Signals
2.2.3.12 Other Serial interfaces similar to RS-232
2.2.4 LCD
2.2.4.1 Advantages and Disadvantages
INTRODUCTION:
The ARM was originally developed at Acorn Computers Limited of Cambridge , England,
between 1983 and 1985. It was the first RISC microprocessor developed for commercial use and
has some significant differences from subsequent RISC architectures. In 1990 ARM Limited
was established as a separate company specifically to widen the exploitation of ARM technology
and it is established as a market-leader for low-power and cost-sensitive embedded
applications. The ARM is supported by a toolkit which includes an instruction set emulator for
hardware modelling and software testing and benchmarking, an assembler, C and C++
compilers, a linker and a symbolic debugger.
The 16-bit CISC microprocessors that were available in 1983 were slower than standard memory
parts. They also had instructions that took many clock cycles to complete (in some cases, many
hundreds of clock cycles), giving them very long interrupt latencies.As a result of these
frustrations with the commercial microprocessor offerings, the design of a proprietary
microprocessor was considered and ARM chip was designed.
ARM 7TDMI-S Processor : The ARM7TDMI-S processor is a member of the ARM family of
general-purpose 32-bit microprocessors. The ARM family offers high performance for very
low-power consumption and gate count. The ARM7TDMI-S processor has a Von Neumann
architecture, with a single 32-bit data bus carrying both instructions and data. Only load, store,
and swap instructions can access data from memory. The ARM7TDMI-S processor uses a three
stage pipeline to increase the speed of the flow of instructions to the processor. This enables
several operations to take place simultaneously, and the processing, and memory systems to
operate continuously. In the three-stage pipeline the instructions are executed in three stages.
The three stage pipelined architecture of the ARM7 processor is shown in the above figure.
ARM7TDMIS stands for
T: THUMB ;
D for on-chip Debug support, enabling the processor to halt in response to a debug request,
M: enhanced Multiplier, yield a full 64-bit result, high performance
I: Embedded ICE hardware (In Circuit emulator)
S : Synthesizable
The ARM processors are based on RISC architectures and this architecture has provided small
implementations, and very low power consumption. Implementation size, performance, and very
low power consumption remain the key features in the development of the ARM devices.
The main bank of 16 registers is used by all unprivileged code. These are the User mode
registers. User mode is different from all other modes as it is unprivileged. In addition to this
register bank ,there is also one 32-bit Current Program status Register(CPSR)
In the 15 registers ,the r13 acts as a stack pointer register and r14 acts as a link register and r15
acts as a program counter register.
Register r13 is the sp register ,and it is used to store the address of the stack top. R13 is used by
the PUSH and POP instructions in T variants, and by the SRS and RFE instructions from
ARMv6.
Register 14 is the Link Register (LR). This register holds the address of the next instruction after
a Branch and Link (BL or BLX) instruction, which is the instruction used to make a subroutine
call. It is also used for return address information on entry to exception modes. At all other times,
R14 can be used as a general-purpose register.
Register 15 is the Program Counter (PC). It can be used in most instructions as a pointer to the
instruction which is two instructions after the instruction being executed.
The remaining 13 registers have no special hardware purpose.
CPSR : The ARM core uses the CPSR register to monitor and control internal operations. The
CPSR is a dedicated 32-bit register and resides in the register file. The CPSR is divided into
four fields, each of 8 bits wide : flags, status, extension, and control. The extension and status
fields are reserved for future use. The control field contains the processor mode, state, and
interrupt mask bits. The flags field contains the condition flags. The 32-bit CPSR register is
shown below.
Processor Modes: There are seven processor modes .Six privileged modes abort, fast interrupt
request, interrupt request, supervisor, system, and undefined and one non-privileged mode
called user mode.
The processor enters abort mode when there is a failed attempt to access memory. Fast interrupt
request and interrupt request modes correspond to the two interrupt levels available on the ARM
processor. Supervisor mode is the mode that the processor is in after reset and is generally the
mode that an operating system kernel operates in. System mode is a special version of user mode
that allows full read-write access to the CPSR. Undefined mode is used when the processor
encounters an instruction that is undefined or not supported by the implementation. User mode is
used for programs and applications.
Banked Registers : Out of the 32 registers , 20 registers are hidden from a program at different
times. These registers are called banked registers and are identified by the shading in the
diagram. They are available only when the processor is in a particular mode; for example, abort
mode has banked registers r13_abt , r14_abt and spsr _abt. Banked registers of a particular
mode are denoted by an underline character post-fixed to the mode mnemonic or _mode.
When the T bit is 1, then the processor is in Thumb state. To change states the core executes a
specialized branch instruction and when T= 0 the processor is in ARM state and executes ARM
instructions. There are two interrupt request levels available on the ARM processor core
interrupt request (IRQ) and fast interrupt request (FIQ).
PIPE LINE : Pipeline is the mechanism used by the RISC processor to execute instructions at
an increased speed. This pipeline speeds up execution by fetching the next instruction while
other instructions are being decoded and executed. During the execution of an instruction ,the
processor Fetches the instruction .It means loads an instruction from memory.And decodes the
instruction i.e identifies the instruction to be executed and finally Executes the instruction and
writes the result back to a register.
The ARM7 processor has a three stage pipelining architecture namely Fetch , Decode and
Execute.And the ARM 9 has five stage Pipe line architecture.The three stage pipelining is
explained as below.
To explain the pipelining ,let us consider that there are three instructions Compare, Subtract and
Add.The ARM7 processor fetches the first instruction CMP in the first cycle and during the
second cycle it decodes the CMP instruction and at the same time it will fetch the SUB
instruction. During the third cycle it executes the CMP instruction , while decoding the SUB
instruction and also at the same time will fetch the third instruction ADD. This will improve the
speed of operation. This leads to the concept of parallel processing .This pipeline example is
shown in the following diagram.
As the pipeline length increases, the amount of work done at each stage is reduced, which allows
the processor to attain a higher operating frequency. This in turn increases the performance. One
important feature of this pipeline is the execution of a branch instruction or branching by the
direct modification of the PC causes the ARM core to flush its pipeline.
Exceptions, Interrupts, and the Vector Table :
Exceptions are generated by internal and external sources to cause the ARM processor to handle
an event, such as an externally generated interrupt or an attempt to execute an Undefined
instruction. The processor state just before handling the exception is normally preserved so that
the original program can be resumed after the completion of the exception routine. More than
one exception can arise at the same time.ARM exceptions may be considered in three groups
1. Exceptions generated as the direct effect of executing an instruction.Software interrupts,
undefined instructions (including coprocessor instructions where the requested coprocessor is
absent) and prefetch aborts (instructions that are invalid due to a memory fault occurring during
fetch) come under this group.
2. Exceptions generated as a side-effect of an instruction.Data aborts (a memory fault during a
load or store data access) are in this group.
3. Exceptions generated externally, unrelated to the instruction flow.Reset, IRQ and FIQ are in
this group.
Undefined instruction vector is used when the processor cannot decode an instruction.
Software interrupt vector is called when you execute a SWI instruction. The SWI instruction is
frequently used as the mechanism to invoke an operating system routine.
Pre-fetch abort vector occurs when the processor attempts to fetch an instruction from an address
without the correct access permissions. The actual abort occurs in the decode stage.
Data abort vector is similar to a prefetch abort but is raised when an instruction attempts to
access data memory without the correct access permissions.
Interrupt request vector is used by external hardware to interrupt the normal execution flow of
the processor. It can only be raised if IRQs are not masked in the CPSR.
The ARM7 core has a Von Neumannstyle architecture, where both data and instructions use the
same bus. The core has a three-stage pipeline and executes the architecture ARMv4T instruction
set. The ARM7TDMI was introduced in 1995 by ARM. It is currently a very popular core and is
used in many 32-bit embedded processors.
The ARM9 family was released in 1997. It has five stage pipeline architecture .Hence , the
ARM9 processor can run at higher clock frequencies than the ARM7 family. The extra stages
improve the overall performance of the processor. The memory system has been redesigned to
follow the Harvard architecture, with separate data and instruction .buses. The first processor in
the ARM9 family was the ARM920T, which includes a separate D + I cache and an MMU. This
processor can be used by operating systems requiring virtual memory support. ARM922T is a
variation on the ARM920T but with half the D +I cache size.
The latest core in the ARM9 product line is the ARM926EJ-S synthesizable processor core,
announced in 2000. It is designed for use in small portable Java-enabled devices such as 3G
phones and personal digital assistants (PDAs).
The ARM10 was released in 1999 . It extends the ARM9 pipeline to six stages. It also supports
an optional vector floating-point (VFP) unit, which adds a seventh stage to the ARM10 pipeline.
The VFP significantly increases floating-point performance and is compliant with the IEEE
754.1985 floating-point standard.
The ARM1136J-S is the ARM11 processor released in the year 2003 and it is designed for high
performance and power efficient applications. ARM1136J-S was the first processor
implementation to execute architecture ARMv6 instructions. It incorporates an eight-stage
pipeline with separate load store and arithmetic pipelines.
A brief comparison of different ARM families is presented below.
ARM Year of Architecture Pipeline Operational Multiplier MIPS
Family Release Frequency
ARM7 1995 Von Neumann 3 stage 80 M.Hz 8x32 0.97
ARM9 1997 Harvard 5 stage 150M.Hz 8x32 1.1
ARM10 1999 Harvard 6 stage 260M.Hz 16x32 1.3
ARM11 2003 Harvard 8 stage 335M.Hz 16x32 1.2
ARM instructions are classified into data processing instructions, branch instructions, load-store
instructions, software interrupt instruction, and program status register instructions.
Data processing instructions are processed within the arithmetic logic unit (ALU). A unique and
powerful feature of the ARM processor is the ability to shift the 32-bit binary pattern in one of
the source registers left or right by a specific number of positions before it enters the ALU. This
shift increases the power and flexibility of many data processing operations.
There are data processing instructions that do not use the barrel shift, for example, the MUL
(multiply), CLZ (count leading zeros), and QADD (signed saturated 32-bit add) instructions.
i.Move Instructions : Move instruction copies R into a destination register Rd, where R is a
register or immediate value. This instruction is useful for setting initial values and transferring
data between registers.
Example1 : PRE r5 = 5
r7 = 8
MOV r7, r5 ;
POST r5 = 5
r7 = 5
The MOV instruction takes the contents of register r5 and copies them into register r7.
Example 2: MOVS r0, r1, LSL #1
SUB r0, r1, r2 ; This subtract instruction subtracts a value stored in register r2 from a value
stored in register r1. The result is stored in register r0.
RSB r0, r1, #0 ; This reverse subtract instruction (RSB) subtracts r1 from the constant value #0,
writing. the result to r0. You can use this instruction to negate numbers.
SUBS r1, r1, #1 ; The SUBS instruction is useful for decrementing loop counters. In this
example we subtract the immediate value one from the value one stored in
register r1. The result value zero is written to register r1.
Logical Instructions : These Logical instructions perform bitwise logical operations on the two
source registers.
BIC r0, r1, r2 ; BIC, carries out a logical bit clear. register r2 contains a binary pattern where
every binary 1 in r2 clears a corresponding bit location in register r1. This instruction is
particularly useful when clearing status bits and is frequently used to change interrupt masks in
the cpsr.
Comparison Instructions : The comparison instructions are used to compare or test a register
with a 32-bit value. This instruction affects only CPSR register flags.
Branch Instructions: A branch instruction changes the normal flow of execution of a main
program or is used to call a subroutine routine. This type of instruction allows programs to have
subroutines, if-then-else structures, and loops. The change of execution flow forces the program
counter pc to point to a new address.
Example 1: B forward ; (unconditional branch to forward)
The branch with link, or BL, instruction is similar to the B instruction but overwrites the
Subroutine
The Branch Exchange (BX) and Branch Exchange with Link (BLX) are the third type of branch
instruction. The BX instruction uses an absolute address stored in register Rm. It is primarily
used to branch to and from Thumb code. The T bit in the cpsr is updated by the least significant
bit of the branch register. Similarly the BLX instruction updates the T bit of the cpsr with the
least significant bit and additionally sets the link register with the return address.
The details of the branch instructions are given in the table above.
Load-Store Instructions : Load-store instructions transfer data between memory and processor
registers. There are three types of load-store instructions:
Single-register transfer
Multiple-register transfer, and
Swap.
Single-Register Transfer : These instructions are used for moving a single data item in and out
of a register. The data types supported are signed and unsigned words (32-bit), half-words (16-
bit), and bytes. Ex1: STR r0, [r1] ; = STR r0, [r1, #0] ; store the contents of register r0 to the
memory address pointed to by register r1.
Ex2 : LDR r0, [r1] ; = LDR r0, [r1, #0] ; load register r0 with the contents of the
Load-store multiple instructions can increase interrupt latency. ARM implementations do not
usually interrupt instructions while they are executing. For example, on an ARM7 a load
multiple instruction takes 2 + N.t cycles, where N is the number of registers to load and t is the
number of cycles required for each sequential access to memory. If an interrupt has been raised,
then it has no effect until the load-store multiple instruction is complete.
Example 1: LDMIA r0!, {r1-r3} ; In this example, register r0 is the base register Rn and is
followed by !, indicating that the register is updated after the instruction is executed. In this case
the range is from register r1 to r3.
A stack is either ascending (A) or descending (D). Ascending stacks grow towards higher
memory addresses; in contrast, descending stacks which grow towards lower memory addresses.
When a full stack (F)is used , the stack pointer sp points to an address that is the last used or full
location (i.e., sp points to the last item on the stack). In contrast, if an empty stack (E) is used ,
the sp points to an address that is the first unused or empty location (i.e., it points after the last
item on the stack).
Example1 : The STMFD instruction pushes registers onto the stack, updating the sp.
PRE r1 = 0x00000002
r4 = 0x00000003
sp = 0x00080014
POST r1 = 0x00000002
r4 = 0x00000003
sp = 0x0008000c.
Example2: The STMED instruction pushes the registers onto the stack but updates register sp to
point to the next empty location as shown in the below diagram..
PRE r1 = 0x00000002
r4 = 0x00000003
sp = 0x00080010
POST r1 = 0x00000002
r4 = 0x00000003
sp = 0x00080008
Swap Instruction :
The Swap instruction is a special case of a load-store instruction. It swaps (Similar to exchange)
the contents of memory with the contents of a register. This instruction is an atomic operation
it reads and writes a location in the same bus operation, preventing any other instruction from
reading or writing to that location until it completes.Swap cannot be interrupted by any other
instruction or any other bus access. So, the system holds the bus until the transaction is
complete.
Ex 1: SWP : Swap a word between memory and a register tmp = mem32[Rn]
mem32[Rn] =Rm
Rd = tmp
Ex2 : SWPB Swap a byte between memory and a register tmp = mem8[Rn]
mem8[Rn] =Rm
Rd = tmp.
Ex 3: SWP r0, r1, [r2] ; The swap instruction loads a word from memory into register
r0 and overwrites the memory with register r1.
Here 0x123456, is the SWI number used by ARM toolkits as a debugging SWI. Typically
the SWI instruction is executed in user mode.
Program Status Register Instructions : There are two instructions available to directly control
a program status register (PSR). The MRS instruction transfers the contents of either the CPSR
or SPSR into a register.Similarly the MSR instruction transfers the contents of a register into
the CPSR or SPSR .These instructions together are used to read and write the CPSR and
SPSR.
MRS : copy program status register to a general-purpose register , Rd= PSR
MSR : move a general-purpose register to a program status register, PSR[field]=Rm
MSR : move an immediate value to a program status register, PSR[field]=immediate
Here the LDR instruction loads a 32-bit constant 0xff00ffff into register r0.
Example 3: The same constant can be loaded into the register r0 using the MVN instruction also.
MVN r0, #0x00ff0000
After execution r0 = 0xff00ffff.
Introduction to Thumb instruction set : Thumb encodes a subset of the 32-bit ARM
instructions into a 16-bit instruction set space. Since Thumb has higher performance than ARM
on a processor with a 16-bit data bus, but lower performance than ARM on a 32-bit data bus, use
Thumb for memory-constrained systems. Thumb has higher code densitythe space taken up in
memory by an executable programthan ARM. For memory-constrained embedded systems,
for example, mobile phones and PDAs, code density is very important. Cost pressures also limit
memory size, width, and speed.
Thumb execution is flagged by the T bit (bit [5] ) in the CPSR. A Thumb implementation of the
same code takes up around 30% less memory than the equivalent ARM implementation. Even
though the Thumb implementation uses more instructions ; the overall memory footprint is
reduced. Code density was the main driving force for the Thumb instruction set. Because it was
also designed as a compiler target, rather than for hand-written assembly code. Below example
explains the difference between ARM and Thumb code
From the above example it is clear that the Thumb code is more denser than the ARM code.
Exceptions generated during Thumb execution switch to ARM execution before executing the
exception handler . The state of the T bit is preserved in the SPSR, and the LR of the exception
mode is set so that the normal return instruction performs correctly, regardless of whether the
exception occurred during ARM or Thumb execution.
In Thumb state, all the registers can not be accessed . Only the low registers r0 to r7 can be
accessed. The higher registers r8 to r12 are only accessible with MOV, ADD, or CMP
instructions. CMP and all the data processing instructions that operate on low registers update
the condition flags in the CPSR
The list of registers and their accessibility in Thumb mode are shown in the following table..
ARM-Thumb interworking is the method of linking ARM and Thumb code together for both
assembly and C/C++. It handles the transition between the two states. To call a Thumb routine
from an ARM routine, the core has to change state. This is done with the T bit of CPSR . The
BX and BLX branch instructions cause a switch between ARM and Thumb state while branching
to a routine. The BX lr instruction returns from a routine, also with a state switch if necessary.
The data processing instructions manipulate data within registers. They include move
instructions, arithmetic instructions, shifts, logical instructions, comparison instructions, and
multiply instructions. The Thumb data processing instructions are a subset of the ARM data
processing instructions.
Note : Thumb deviates from the ARM style in that the barrel shift operations (ASR, LSL, LSR,
and ROR) are separate instructions.
A variety of data services is offered. GSM users can send and receive data, at rates up to 9600
bps, to users on POTS (Plain Old Telephone Service), ISDN, Packet Switched Public Data
Networks, and Circuit Switched Public Data Networks using a variety of access methods and
protocols, such as X.25 or X.32. Since GSM is a digital network, a modem is not required
between the user and GSM network, although an audio modem is required inside the GSM
network to interwork with POTS.
Other data services include Group 3 facsimile, as described in ITU-T recommendation T.30,
which is supported by use of an appropriate fax adaptor. A unique feature of GSM, not found in
older analog systems, is the Short Message Service (SMS). SMS is a bidirectional service for
short alphanumeric (up to 160 bytes) messages. Messages are transported in a store-and-forward
fashion. For point-to-point SMS, a message can be sent to another subscriber to the service, and
an acknowledgement of receipt is provided to the sender. SMS can also be used in a cell-
broadcast mode, for sending messages such as traffic updates or news updates. Messages can
also be stored in the SIM card for later retrieval.
Supplementary services are provided on top of teleservices or bearer services. In the current
(Phase I) specifications, they include several forms of call forward (such as call forwarding when
the mobile subscriber is unreachable by the network), and call barring of outgoing or incoming
calls, for example when roaming in another country. Many additional supplementary services
will be provided in the Phase 2 specifications, such as caller identification, call waiting, multi-
party conversations.
5.13 Handover
In a cellular network, the radio and fixed links required are not permanently allocated for the
duration of a call. Handover, or handoff as it is called in North America, is the switching of an
on-going call to a different channel or cell. The execution and measurements required for
handover form one of basic functions of the RR layer.
There are four different types of handover in the GSM system, which involve transferring a call
between:
1. Channels (time slots) in the same cell
2. Cells (Base Transceiver Stations) under the control of the same Base Station Controller (BSC),
3. Cells under the control of different BSCs, but belonging to the same Mobile services
Switching Centre (MSC), and
4. Cells under the control of different MSCs.
The first two types of handover, called internal handovers, involve only one Base Station
Controller (BSC). To save signalling bandwidth, they are managed by the BSC without
involving the Mobile services Switching Centre (MSC), except to notify it at the completion of
the handover. The last two types of handover, called external handovers, are handled by the
MSCs involved. An important aspect of GSM is that the original MSC, the anchor MSC, remains
responsible for most call-related functions, with the exception of subsequent inter-BSC
handovers under the control of the new MSC, called the relay MSC.
Handovers can be initiated by either the mobile or the MSC (as a means of traffic load
balancing). During its idle time slots, the mobile scans the BroadcastControl Channel of up to 16
neighbouring cells, and forms a list of the six best candidates for possible handover, based on the
received signal strength. This information is passed to the BSC and MSC, at least once per
second, and is used by the handover algorithm.
The algorithm, for when a hand over decision should be taken is not specified in the GSM
recommendations. There are two basic algorithms used, both closely tied in with power control.
This is because the BSC usually does not know whether the poor signal quality is due to
multipath fading or to the mobile having moved to another cell. This is especially true in small
urban cells.
The 'minimum acceptable performance' algorithm gives precedence to power control over
handover, so that when the signal degrades beyond a certain point, the power level of the mobile
is increased. If further power increases do not improve the signal, then a handover is considered.
This is the simpler and more common method, but it creates 'smeared' cell boundaries when a
mobile transmitting at peak power goes some distance beyond its original cell boundaries into
another cell.
The 'power budget' method uses handover to try to maintain or improve a certain level of signal
quality at the same or lower power level. It thus gives precedence to handover over power
control. It avoids the 'smeared' cell boundary problem and reduces co-channel interference, but it
is quite complicated.
The location updating procedures, and subsequent call routing, use the MSC and two location
registers: the Home Location Register (HLR) and the Visitor Location Register (VLR). When a
mobile station is switched on in a new location area, or it moves to a new location area or
different operator's PLMN, it must register with the network to indicate its current location. In
the normal case, a location update message is sent to the new MSC/VLR, which records the
location area information, and then sends the location information to the subscriber's HLR. The
information sent to the HLR is normally the SS7 address of the new VLR, although it may be a
routing number. The reason a routing number is not normally assigned, even though it would
reduce signalling, is that there is only a limited number of routing numbers available in the new
MSC/VLR and they are allocated on demand for incoming calls. If the subscriber is entitled to
service, the HLR sends a subset of the subscriber information, needed for call control, to the new
MSC/VLR, and sends a message to the old MSC/VLR to cancel the old registration.
A procedure related to location updating is the IMSI (International Mobile Subscriber Identity)
attach and detach. A detach lets the network know that the mobile station is unreachable, and
avoids having to needlessly allocate channels and send paging messages. an attach is similar to a
location update, and informs the system that the mobile is reachable again. The activation of
IMSI attach/detach is up to the operator on an individual cell basis.
When some technology comes to be used at practical level it happens to cherish both plus as well
as minus points of its own. But sometimes technology may be positive in itself but its application
can be misused. Before we go ahead to give space to any technology in our house or work place
we should have pre-estimates of its fall outs.
The positive aspects of the tracking system can be summarized as follows:
1. Core benefit of tracking vehicle is that one can monitor ones vehicle from a distance whether
on individual or commercial level. It helps busy parents to keep a watch on the children even
from their office and control their roaming here and there. Thus can put a check on their rash
driving. This gives immense relief to business owners as it gives them information about the
misuse of company vehicle or delay in delivering services or drivers violation of speed code, if
any. All this keeps a check on wastage of fuel, time and ensures the better services. With the use
of this technology one need not enquire the location of the vehicle by phone again and again.
One can get all the required details just by a click on the internet. Map on the screen displays the
position of vehicle at a particular time.
2. In view of long journeys and night journeys by car the technology can provide a safety
network to the person in condition of emergency. It can cut time of journey short by providing
the information regarding location, speed, distance from the destination leading to best route
planning.
3. Best feature of the technology is that it is easy to use. just an automated unit is needed to be
installed in the vehicle and connected to the centre which may be provided by some company.
This instrument is monitored by the tracking company which keeps all the records or its
customers locations. All details of location etc. are communicated to the user by cell phone or
internet connection. Increasing productivity of your mobile workers.
4. It helps monitoring employee driving habits and activities.
5. Helps you locate your employees are on-the-road.
6. Helps you verify the employee time sheet.
7. Helps you in monitoring all your vehicles.
8. Helps you in timely delivery of the consignments
9. Helps you monitor the vehicle speeds
10. Helps you in tracking the movement of vehicles on the road
8.1 Applications
Commercial fleet operators are by far the largest users of vehicle tracking systems. These
systems are used for operational functions such as routing, security, dispatch and collecting on-
board information.
These systems are also used in consumer vehicles as devices for preventing theft and retrieving
stolen/lost vehicles. The signal sent out by the installed device help the police to track the
vehicle. These tracking systems can be used as an alternative for traditional car alarms or in
combination with it. Installing tracking systems can thus bring down the insurance costs for your
vehicle by reducing the risk factor.
Vehicle Tracking systems often have several alternatives, like sending automatic alerts to a
phone or email if the vehicle is moved without due authorization. They can also work as one
layer of several combined security measures.
Apart from security concerns, the tracking systems can also help users such as taxi services to
improve their customer service. The systems enable the operators to identify the empty taxis and
direct the nearest one to pick up the customer.
Vehicle tracking systems can also be applied for monitoring driving behaviour for both
commercial and individual situations. Parents for instance can use tracking devices to keep an
eye on their teenage sons driving.
The applications for this project are in military, navigation, automobiles, aircrafts, fleet
management, remote monitoring, remote control, security systems, teleservices, etc.
8.2 Limitations
1. This program is highly sensitive to the camera position and the environment, so a considerable
amount of tuning has to be done each time a new video is taken or camera position is changed
and even more so if the video is of an entirely new environment.
2. The other limitation is the traffic problem, the program will not able to detect which vehicle to
track if it finds some vehicle in the -6*step_y and +6*step_y of the current guess. If the nearby
vehicle is same as the one in the model. As in our data images if we bring maruti-800 near the
car than the probability of error increases manifolds.
3. If there is noise in the edge detected image, we can't really track the vehicle. What is meant by
noise is that if some humans are coming near to the car then the edge detected image will have
the edges of that human or animal or tree, then the program will try to match those edges with
the car model. The program might treat this match as a success but really it will be off the track.
4. We could not model the curves in the maruti-800, like in some images the driver and the
steering can be seen, but we could not find a solution for that. Also the body of the Maruti can be
best modelled as combination of curves and the lines.
5. Also if distance between the vehicle positions in the two consecutive frames is too much then
this tracking program can't detect the vehicle in the second frame and will try to track it in the
subsequent frame.
6. The main limitation of the software is the real time implementation, this cant be implemented
with this much time efficiency in any of the real time applications. This limitation is mainly due
to the processing time.
CHAPTER 9
RESULT ANALYSIS
We a team of 4 members have successfully completed our Project on Tracking Down Vehicle
and Locking it remotely using GSM technologies.
We first tried to understand the working of our project through the schematic and then we
proceeded to build the circuit as per the schematic. Initially we faced few problems with the
modem, as it wont work efficiently inside buildings. And also the GSM modem suffered
problems with the coverage area of the Mobile Service Provider. So, we used Airtel as it has
maximum coverage area. In order to solve this problem we can use dedicated servers and
purchasing satellite space so that we can track down the vehicle anytime and anywhere.
The overall developed circuit looks as in the following figure:
The above circuit works mainly by receiving messages from a mobile phone. There are three
messages/commands by which we can track and control the vehicle. They are,
i) TRACK
ii) LOCKD
iii) NLOCK
i) TRACK: Initiates the modem and receives the Latitude and Longitude position and this
information will be sent to the mobile from which it received the message.
ii) LOCKD: When this message is sent, then the Microcontroller initiates the motor which is
located in between the passage of fuel to stop and which in turn stops the vehicle.
iii) NLOCK: This command makes the motor to start again so that the vehicle starts running.
This project can further be crafted by restricting the usage of limited mobile numbers to get
access to the device. This can be made by altering the program.
The message which is sent to the mobile will be as shown in the following figure:
With the knowledge in Electronics and Communications we have successfully completed our
project with perfect results.
CHAPTER 10
CONCLUSION & FUTURE SCOPE
The project titled tracing down the vehicle using GSM and satellite communication is a model
for vehicle tracking unit with the help of receivers and GSM modem. Vehicle Tracking System
resulted in improving overall productivity with better fleet management that in turn offers better
return on your investments. Better scheduling or route planning can enable you handle larger
jobs loads within a particular time. Vehicle tracking both in case of personal as well as business
purpose improves safety and security, communication medium, performance monitoring and
increases productivity. So in the coming year, it is going to play a major role in our day-to-day
living.
We have completed the project as per the requirements of our project. Finally the aim of the
project i.e. to trace the vehicle is successfully achieved.
Future Scope
1. We can use the EEPROM to store the previous Navigating positions up to 256 locations and
we can navigate up to N number of locations by increasing its memory.
2. We can reduce the size of the kit by using +GSM on the same module.
3. We can increase the accuracy up to 3m by increasing the cost of the receivers.
4. We can use our kit for detection of bomb by connecting to the bomb detector.
5. With the help of high sensitivity vibration sensors we can detect the accident.
6. Whenever vehicle unexpectedly had an accident on the road with help of vibration sensor we
can detect the accident and we can send the location to the owner, hospital and police.
7. We can use our kit to assist the traffic. By keeping the kits in the entire vehicles and by
knowing the locations of all the vehicles.
8. If anybody steals our car we can easily find our car around the globe. By keeping vehicle
positioning vehicle on the vehicle.
References
[1]. Chen, H., Chiang, Y. Chang, F., H. Wang, H. (2010). Toward Real-Time Precise Point
Positioning: Differential Based on IGS Ultra Rapid Product, SICE Annual Conference, The
Grand Hotel, Taipei, Taiwan August 18-21.
[2]. Asaad M. J. Al-Hindawi, IbraheemTalib, Experimentally Evaluation of /GSM Based
System Design, Journal of Electronic Systems Volume 2 Number 2 June 2012
[3]. Chen Peijiang, Jiang Xuehua, Design and Implementation of Remote monitoring system
based on GSM, vol.42, pp.167-175. 2008.
[4]. V.Ramya, B. Palaniappan, K. Karthick, Embedded Controller for Vehicle In-Front Obstacle
Detection and Cabin Safety Alert System, International Journal of Computer Science &
Information Technology (IJCSIT) Vol 4, No 2, April 2012.
[5]. www.8051projects.com
[6]. www.wikipedia.org.com
[7]. www.atmel.com
[8]. www.tatateleservices.com
[9]. www.roseindia.net