Académique Documents
Professionnel Documents
Culture Documents
BACHELOR OF TECHNOLOGY
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
Submitted By
K.NAVYA REGD.NO:11631A0449
S.HARI KRISHNA REGD.NO:11631A0421
P.GANESH REGD.NO:11631A0418
N.RAJIV REGD.NO:11631A0458
Under the esteemed guidance of
B.SWETHA M.Tech
i
SRI VENKATESWARA ENGINEERING COLLEGE
Amaravadi Nagar, Sponsored by The Exhibition Society, HYDERABAD, Approved by AICTE, Affiliated to
Jawaharlal Nehru Technological University, Hyderabad Suryapet-508213, Nalgonda Dist.
2014-2015
Department of Electronics & Communication Engineering
CERTIFICATE
This is to certify that the project report titled as GSM BASED WIRELESS
NOTICE BOARD being submitted by K.NAVYA (11631A0449), S.HARI
KRISHNA (11631A0421), P.GANESH (11631A0418), and N.RAJIV (11631A0458)
from IV B.Tech II semester of Electronics and Communication Engineering is a record
bonafide work carried out by us. The results embodied in this report have not been
submitted to any other University for the award of any degree.
ii
DECLARATION
To the Best of us Knowledge and belief we hereby declare that this project bears
no resemblance to any other project submitted at Sri Venkateswara Engineering College,
Suryapet or any other college affiliated to Jawaharlal Nehru Technological University,
Hyderabad for the award of the degree.
Place:
Date:
Project associates
K.NAVYA - 11631A0449
S.HARI KRISHNA - 11631A0421
P. GANESH - 11631A0418
N.RAJIV - 11631A0458
iii
ACKNOWLEDGEMENT
By
K.NAVYA - 11631A0449
S.HARI KRISHNA - 11631A0421
P. GANESH - 11631A0418
N.RAJIV - 11631A0458
iv
ABSTRACT
v
INDEX
CONTENTS PAGE NO
CHAPTER-1 INTRODUCTION
1.1 EMBEDDED SYSTEMS 1
1.2 CHARACTERISTICS OF EMBEDDED SYSTEMS 1
1.3 APPLICATIONS 2
1.4 CLASSIFICATION 2
1.4.1 RTS CLASSIFICATION 2
1.4.1.1 HARD REAL TIME SYSTEM 2
1.4.1.2 SOFT REAL TIME SYSTEM 3
CHAPTER-2 GSM BASED LED SCROLLING DISPLAY BOARD 4
CHAPTER-3 HARDWARE COMPONENTS 7
3.1 POWER SUPPLY 7
3.1.1 TRANSFORMER 7
3.1.2. IDEAL POWER EQUATION 8
3.1.3. VOLTAGE REGULATOR 7805 9
3.1.3.1 INTERNAL BLOCK DIAGRAM 10
3.1.3.2 ABSOLUTE MAXIMUM RATINGS 10
3.1.4 RECTIFIER 11
3.1.5 FILTER 11
3.2 INTRODUCTION TO LPC2148 MICROCONTROLLER 12
3.2.1 INTRODUCTION 12
3.2.2 FEATURES 13
3.2.3 APPLICATIONS 14
3.2.4 ARCHITECTURAL OVERVIEW 14
3.2.5 ARM7TDMI-S PROCESSOR 14
3.2.5.1 ON-CHIP FLASH MEMORY SYSTEM 15
3.2.5.2 ON-CHIP STATIC RAM (SRAM) 15
3.2.6 BLOCK DIAGRAM 17
vi
3.2.6.1 MEMORY MAPS 18
3.2.7 GENERAL PURPOSE INPUT OUTPUT PORTS 20
3.2.7.1 FEATURES 20
3.2.7.2 APPLICATIONS 20
3.2.8 LPC2148 PIN CONNECT BLOCK 21
3.2.8.1 FEATURES 21
3.2.8.2 APPLICATIONS 21
3.2.8.3DESCRIPTION 21
3.2.8.4 REGISTER DESCRIPTION 22
3.2.8.5 LPC2148 PINOUT 22
3.3 GSM TECHNOLOGY 23
3.3.1 TIME-DIVISION MULTIPLE ACCESS (TDMA) 23
3.3.2 GLOBAL SYSTEM FOR MOBILE COMMUNICATION 24
3.3.3 THE GENERATIONS OF MOBILE NETWORKS 26
3.3.4 HISTORY OF GSM 27
3.3.4.1 ARCHITECTURE OF THE GSM NETWORK 29
3.3.4.2 MOBILE STATION 29
3.3.4.3 BASE STATION SUBSYSTEM 30
3.3.4.4 NETWORK SUBSYSTEM 30
3.3.4.5 GSM FREQUENCIES USING AROUND
THE WORLD 31
3.3.5 GSM SECURITY 32
3.3.5.1 SOME DEFINITIONS 32
3.3.5.2 USER AND SIGNALING DATA
CONFIDENTIALITY 35
3.3.5.3 SUBSCRIBER IDENTITY CONFIDENTIALITY 35
3.3.5.4 SOLUTIONS TO CURRENT
SECURITY ISSUES 36
3.3.5.5 SHORT MESSAGE SERVICE 36
3.4 MAX232 IC 36
3.4.1 FUNCTIONS OF PINS 38
vii
3.5 LIGHT-EMITTING DIODE 39
3.5.1 TECHNOLOGY 40
3.5.2 ADVANTAGES 41
3.5.3 DISADVANTAGES 42
3.5.4 APPLICATIONS 44
CHAPTER-4 SOFTWARE REQUIREMENTS 45
4.1 INTRODUCTION TO KEIL MICRO VISION (IDE) 45
4.2 CONCEPT OF COMPILER 45
4.3 CONCEPT OF CROSS COMPILER 46
4.4 KEIL C CROSS COMPILER 46
4.5 BUILDING APPLICATIONS IN VISION2 46
4.6 CREATING YOUR OWN APPLICATION IN VISION 47
4.7 DEBUGGING AN APPLICATION IN VISION2 47
4.8 STARTING VISION2AND CREATING A PROJECT 47
4.9 WINDOW-FILES 48
4.10 BUILDING PROJECTS AND CREATING HEX FILES 48
4.11 CPU SIMULATION 48
4.12 DATABASE SELECTION 48
4.13 START DEBUGGING 49
4.14 DISASSEMBLY WINDOW 49
4.15 EMBEDDED C 50
CHAPTER-5 SCHEMATIC DIAGRAM 51
CHAPTER-6 PROJECT CODE 52
6.1 SOURCE CODE 52
CHAPTER-7 ADVANTAGES AND APPLICATIONS 59
7.1 ADVANTAGES 59
7.2 DISADVANTAGES 59
7.3 APPLICATIONS 59
7.4 FUTURE SCOPE 59
CHAPTER-8 CONCLUSION 60
CHAPTER-9 BIBLIOGRAPHY 61
viii
LIST OF FIGURES
ix
LIST OF TABLES
x
ABBREVIATIONS
ALTERNATING CURRENT AC
DIRECT CURRENT DC
BROWN-OUT DETECT BOD
REAL-TIME CLOCK RTC
ADVANCED HIGH-PERFORMANCE BUS AHB
ADVANCED PERIPHERAL BUS APB
REDUCED INSTRUCTION SET COMPUTER RISC
IN APPLICATION PROGRAMMING IA
IN SYSTEM PROGRAMMING ISP
STATIC RAM SRAM
LOW POWER CONSUMPTION LPC
TIME-DIVISION MULTIPLE ACCESS TDMA
FREQUENCY DIVISION MULTIPLE ACCESS FDMA
GLOBAL SYSTEM FOR MOBILE COMMUNICATION GSM
GENERAL PACKET RADIO SERVICES GPRS
ENHANCED DATA RATES FOR GSM EVOLUTION EDGE
THIRD GENERATION 3G
FOURTH GENERATION 4G
SECOND GENERATION 2G
3RD GENERATION PARTNERSHIP PROJECT 3GPP
AMERICAN PERSONAL COMMUNICATIONS APC
ADVANCED MOBILE PHONE SYSTEM AMPS
INTEGRATED SERVICES DIGITAL NETWORK ISDN
PERSONAL DIGITAL CELLULAR PDC
CONFERENCE OF POSTAL AND TELECOMMUNICATIONS
ADMINISTRATIONS CEPT
EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE ETSI
MULTIMEDIA MESSAGING SERVICES MMS
MOBILE SERVICES SWITCHING CENTER MSC
xi
MOBILE STATION MS
SUBSCRIBER IDENTITY MODULE SIM
INTERNATIONAL MOBILE EQUIPMENT IDENTITY IMEI
INTERNATIONAL MOBILE SUBSCRIBER IDENTITY IMSI
BASE TRANSCEIVER STATION BTS
BASE STATION CONTROLLER BSC
SIGNALING SYSTEM NUMBER 7 SS7
HOME LOCATION REGISTER HLR
VISITOR LOCATION REGISTER VLR
EQUIPMENT IDENTITY REGISTER EIR
AUTHENTICATION CENTER AUC
MOBILE COUNTRY CODE MCC
MOBILE NETWORK CODE MNC
MOBILE SUBSCRIBER IDENTIFICATION CODE MSIC
RANDOM NUMBER RAND
SIGNED RESPONSE SRES
CIPHERING KEY KC
TEMPORARY MOBILE SUBSCRIBER IDENTITY TMSI
SHORT MESSAGE SERVICE SMS
LIGHT-EMITTING DIODE LED
POWER-ON RESET POR
ULTRA-HIGH-FREQUENCY UHF
ANALOG-TO-DIGITAL CONVERSION ADC
TEMPORARY MOBILE SUBSCRIBER IDENTITY TMSI
INTEGRATED DEVELOPMENT ENVIRONMENT IDE
LOW PROFILE QUAD FLAT PACKAGE LQFP
UNIVERSAL SERIAL BUS USB
DIRECT MEMORY ACCESS DMA
UNIVERSAL ASYNCHRONOUS RECEIVER/TRANSMITTER UART
THUMB INSTRUCTION DEBUGGER MULTIPLIER TDMI
xii
INTERNATIONAL CONFERENCE ON ENVIRONMENTAL
RESEARCH AND TECHNOLOGY I CE RT
ADVANCED PERIPHERAL BUS APB
INTERIM STANDARD IS
GENERAL PACKET RADIO SERVICE GPRS
ENHANCED DATA-RATES FOR GLOBAL EVOLUTION EDGE
LONG TERM EVOLUTION LTE
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM UMTS
INTENTIONAL ELECTRO-MAGNETIC INTERFERENCE IEMI
SUBSCRIBER IDENTITY MODULE SIM
INTERNATIONAL MOBILE SUBSCRIBER IDENTITY IMSI
PUBLIC SWITCHED TELEPHONE NETWORK PSTN
TEMPORARY MOBILE SUBSCRIBER IDENTITY TMSI
INTERNATIONAL MOBILE SUBSCRIBER IDENTITY IMSI
HIGH INTENSITY DISCHARGE HID
CODE DIVISION MULTIPLE ACCESS DMA
HIGH SPEED DATA PACKET ACCESS HSDPA
HIGH SPEED UPLINK PACKET ACCESS HSUPA
ELECTRONIC INDUSTRIES ALLIANCE/TELECOMMUNICATION
INDUSTRIES ASSOCIATION EIA/TIA
xiii
GSM BASED WIRELESS NOTICE BOARD
CHAPTER-1
INTRODUCTION
An embedded system is any computer system hidden inside a product other
than a computer.
They will encounter a number of difficulties when writing embedded system
software in addition to those we encounter when we write applications.
Throughput Our system may need to handle a lot of data in a short period of
time.
ResponseOur system may need to react to events quickly.
TestabilitySetting up equipment to test embedded software can be difficult.
Debug abilityWithout a screen or a keyboard, finding out what the software
is doing wrong (other than not working) is a troublesome problem.
Reliability embedded systems must be able to handle any situation without
human intervention.
Memory space Memory is limited on embedded systems, and you must
make the software and the data fit into whatever memory exists.
Program installation you will need special tools to get your software into
embedded systems.
Power consumption Portable systems must run on battery power, and the
software in these systems must conserve power.
Processor hogs computing that requires large amounts of CPU time can
complicate the response problem.
Cost Reducing the cost of the hardware is a concern in many embedded system
projects; software often operates on hardware that is barely adequate for the job.
Embedded systems have a microprocessor/ microcontroller and a memory.
Some have a serial port or a network connection. They usually do not have
keyboards, screens or disk drives.
1.3 APPLICATIONS
Military and aerospace embedded software applications.
Communication applications.
Industrial automation and process control software.
Mastering the complexity of applications.
Reduction of product design time.
Real time processing of ever increasing amounts of data.
Intelligent, autonomous sensors.
1.4 CLASSIFICATION
Real Time Systems.
RTS is one which has to respond to events within a specified deadline.
A right answer after the dead line is a wrong answer.
"Soft" real-time systems have reduced constrains on "lateness" but still must
operate very quickly and repeatable.
Example: Railway reservation system takes a few extra seconds the data
remains valid.
CHAPTER-2
AIM
ABSTRACT
BLOCK DIAGRAM
DESCRIPTION
The system required for this purpose is nothing but, a Microcontroller based
SMS box. The main components of the kit includes Microcontroller, GSM modem.
These components are integrated with the display board and thus incorporate the
wireless features. The GSM modem receives the SMS. The AT commands are serially
transferred to the modem through MAX232. In return the modem transmits the stored
message through the COM port. The microcontroller validates the SMS and then
displays the message in the LED display board. Various time division multiplexing
techniques have been suggested to make the display boards function efficiently. The
microcontroller used in this case is AT89s52, Motorola C168 is used as the GSM
modem. In this prototype model, LED display is used for simulation purpose. During
the process of implementation this can be replaced by actual display boards. In
addition to address matching, data can be received only by the dedicated receiver, and
this data is displayed on LED. It displays the same message untill its receives another
verified message.
ALGORITHM
1. When a valid mobile user sends the SMS to GSM module, he gets an
acknowledgement.
2. The GSM processor receives the message, verifies it and transfers to the
microcontroller.
3. Microcontroller processes the message and sends it to the LED Display Board.
4. LED Display Board displays the previous message untill a new verified message is
received.
CHAPTER-3
HARDWARE REQUIREMENTS
HARDWARE COMPONENTS:
POWER SUPPLY
MICROCONTROLLER (LPC2148)
GSM
MAX232
LED BOARD
3.1.1 TRANSFORMER
The input coil is called the primary and the output coil is called the secondary.
There is no electrical connection between the two coils; instead they are linked by an
alternating magnetic field created in the soft-iron core of the transformer. The two
lines in the middle of the circuit symbol represent the core. Transformers waste very
little power so the power out is (almost) equal to the power in. Note that as voltage is
stepped down and current is stepped up.
The ratio of the number of turns on each coil, called the turns ratio, determines
the ratio of the voltages. A step-down transformer has a large number of turns on its
primary(input) coil which is connected to the high voltage mains supply, and a small
number of turns on its secondary (output) coil to give a low output voltage.
TURNS RATIO = (Vp / Vs) = (Np / Ns)
Where,
Vp = primary (input) voltage.
Vs = secondary (output) voltage
Np = number of turns on primary coil
Ns = number of turns on secondary coil
Ip = primary (input) current
Is = secondary (output) current.
If the secondary coil is attached to a load that allows current to flow, electrical
power is transmitted from the primary circuit to the secondary circuit. Ideally, the
transformer is perfectly efficient; all the incoming energy is transformed from the
primary circuit to the magnetic field and into the secondary circuit. If this condition is
met, the incoming electric power must equal the outgoing power:
If the voltage is increased, then the current is decreased by the same factor. The
impedance in one circuit is transformed by the square of the turns ratio. For example, if
an impedance Zs is attached across the terminals of the secondary coil, it appears to the
2
primary circuit to have an impedance of (Np/Ns) Zs. This relationship is reciprocal, so that
2
the impedance Zp of the primary circuit appears to the secondary to be (Ns/Np) Zp.
FEATURES
Output Current up to 1A.
Output Voltages of 5.
Thermal Overload Protection.
Short Circuit Protection.
Output Transistor Safe Operating Area Protection.
DESCRIPTION
3.1.4 RECTIFIER
3.1.5 FILTER
Capacitive filter is used in this project. It removes the ripples from the output
of rectifier and smoothens the D.C. Output received from this filter is constant until
the mains voltage and load is maintained constant. However, if either of the two is
varied, D.C. voltage received at this point changes. Therefore a regulator is applied at
the output stage.
The simple capacitor filter is the most basic type of power supply filter. The use of
this filter is very limited. It is sometimes used on extremely high-voltage, low-current
power supplies for cathode-ray and similar electron tubes that require very little load
current from the supply. This filter is also used in circuits where the power-supply ripple
frequency is not critical and can be relatively high. Below figure can show how the
capacitor charges and discharges.
3.2.1 INTRODUCTION
DAC, PWM channels and 45 fast GPIO lines with up to nine edge or level sensitive
external interrupt pins make these microcontrollers particularly suitable for
industrial control and medical systems.
3.2.2 FEATURES
3.2.3 APPLICATIONS
Industrial control
Medical systems
Access control
Point-of-sale
Communication gateway
Embedded soft modem
General purpose applications
AHB address space. LPC2141/2/4/6/8 peripheral functions (other than the interrupt
controller) are connected to the APB bus. The AHB to APB bridge interfaces the
APB bus to the AHB bus. APB peripherals are also allocated a 2 megabyte range of
addresses, beginning at the 3.5 gigabyte address point. Each APB peripheral is
allocated a 16 kB address space within the APB address space.
The THUMB sets 16-bit instruction length allows it to approach twice the
density of standard ARM code while retaining most of the ARMs performance
advantage over a traditional 16-bit processor using 16-bit registers. This is possible
because THUMB code operates on the same 32-bit register set as ARM code. THUMB
code is able to provide up to 65% of the code size of ARM, and 160% of the
performance of an equivalent ARM processor connected to a 16-bit memory system.
3.2.5.1 ON-CHIP FLASH MEMORY SYSTEM
The LPC2141/2/4/6/8 incorporates a 32 kB, 64 kB, 128 kB, 256 kB, and 512
kB Flash memory system, respectively. This memory may be used for both code and
On-chip SRAM may be used for code and/or data storage. The on-chip
SRAM may be accessed as 8-bits, 16-bits, and 32-bits. The LPC2141/2/4/6/8 provide
8/16/32 kB of static RAM, respectively.
Figures 3.2.6.2 through 4 and Table 2 show different views of the peripheral
address space. Both the AHB and APB peripheral areas are 2 megabyte spaces which
are divided up into 128 peripherals. Each peripheral space is 16 kilobytes in size.
This allows simplifying the address decoding for each peripheral. All peripheral
register addresses are word aligned (to 32-bit boundaries) regardless of their size.
This eliminates the need for byte lane mapping hardware that would be required to
allow byte (8-bit) or half-word (16-bit).accesses to occur at smaller boundaries. An
implication of this is that word and half-word registers must be accessed all at once.
For example, it is not possible to read or write the upper byte of a word register
separately.
3.2.7.1 FEATURES
Every physical GPIO port is accessible via either the group of registers
providing an
enhanced features and accelerated port access or the legacy group of
register.ccelerated GPIO functions:
GPIO registers are relocated to the ARM local bus so that the fastest possible
I/O
timing can be achieved.
Bit-level set and clear registers allow a single instruction set or clear of any
number of bits in
one port.
Direction control of individual bits.
All I/O default to inputs after reset..
3.2.7.2 APPLICATIONS
General purpose I/O
Driving LEDs, or other indicators
Controlling off-chip devices
Sensing digital inputs
3.2.8.1 FEATURES
3.2.8.2 APPLICATIONS
The purpose of the Pin connect block is to configure the microcontroller
pins to the desired functions.
3.2.8.3 DESCRIPTION
The pin connect block allows selected pins of the microcontroller to have more
than one function. Configuration registers control the multiplexers to allow connection
between the pin and the on chip peripherals. Peripherals should be connected to the
appropriate pins prior to being activated, and prior to any related interrupt(s) being
enabled. Activity of any enabled peripheral function that is not mapped to a related pin
should be considered undefined. Selection of a single function on a port pin completely
excludes all other functions otherwise available on the same pin. The only partial
exception from the above rule of exclusion is the case of inputs to the A/D converter.
Regardless of the function that is selected for the port pin that also hosts the A/D input,
this A/D input can be read at any time and variations of the voltage level on this pin will
be reflected in the A/D readings. However, valid analog reading(s) can be obtained if
and only if the function of an analog input is selected. Only in this case proper interface
circuit is active in between the physical pin and the A/D module. In all other cases, a
part of digital logic necessary for the digital function to be performed will be active, and
will disrupt proper behavior of the A/D.
register 2.
1. What is TDMA?
2. How it Works?
System for Mobile communications, and PDC. However, each of these systems
implements TDMA in a somewhat different and incompatible way. TDMA was first
specified as a standard in EIA/TIA Interim Standard 54 (IS-54). IS-136, an evolved
version of IS-54, is the United States standard for TDMA for both the cellular (850
MHz) and personal communications services (1.9 GHz) spectrums. TDMA is also
used for Digital Enhanced Cordless Telecommunications.
CDMA
The term CDMA refers to any of several protocols used in so-called 2G and
3G wireless communications. As the term implies, CDMA is a form of multiplexing,
which allows numerous signals to occupy a single transmission channel, optimizing
the use of available bandwidth. The technology is used in UHF cellular telephone
systems in the 800-MHz and 1.9-GHz bands. CDMA employs ADC in combination
with spread spectrum technology. Audio input is first digitized into binary elements.
The frequency of the transmitted signal is then made to vary according to a defined
pattern (code), so it can be intercepted only by a receiver whose frequency response is
programmed with the same code, so it follows exactly along with the transmitter
frequency. There are trillions of possible frequency-sequencing codes; this enhances
privacy and makes cloning difficult.
The CDMA channel is nominally 1.23 MHz wide. CDMA networks use a
scheme called soft handoff, which minimizes signal breakup as a handset passes from
one cell to another. The combination of digital and spread-spectrum modes supports
several times as many signals per unit bandwidth as analog modes. CDMA is
compatible with other cellular technologies; this allows for nationwide roaming. The
original CDMA standard, also known as CDMA One and still common in cellular
telephones in the U.S., offers a transmission speed of only up to 14.4 Kbps in its
single channel form and up to 115 Kbps in an eight-channel form. CDMA2000 and
wideband CDMA deliver data many times faster.
1. What is GSM?
The Global System for Mobile communication, usually called GSM, (ETSI) to
describe protocols for 2G digital cellular networks used by mobile phones. The GSM
standard was developed as a replacement for 1G analog cellular networks, and
originally described a digital, circuit switched network optimized for full duplex voice
telephony. This was expanded over time to include data communications, first by circuit
switched transport, then packet data transport via GPRS and EDGE. Further
improvements were made when the 3GPP developed 3G UMTS standards followed by
4G LTE Advanced standards. "GSM" is a trademark owned by the GSM Association.
GSM is a cellular network, which means that mobile phones connect to it by
searching for cells in the immediate vicinity.
The ubiquity of the GSM standard makes international roaming very common
between mobile phone operators, enabling subscribers to use their phones in many parts
of the world. GSM differs significantly from its predecessors in that both signalling and
speech channels are Digital call quality, which means that it is considered a 2G mobile
phone system. This fact has also meant that data communication was built into the system
from the 3rd Generation Partnership Project 3GPP.
GSM is a digital mobile telephone system that is widely used in Europe and
other parts of the world. GSM uses a variation of time division multiple access (Time
Division Multiple Access) and is the most widely used of the three digital wireless
telephone technologies GSM digitizes and compresses data, then sends it down a
channel with two other streams of user data, each in its own time slot. It operates at
either the 900 MHz or 1800 MHz frequency band.
GSM is the de facto wireless telephone standard in Europe. GSM has over 120
million users worldwide and is available in 120 countries, according to the GSM MOU
Association. Since many GSM network operators have roaming agreements with
foreign operators, users can often continue to use their mobile phones when they
travel to other countries.
American Personal Communications a subsidiary of Sprint, is using GSM as
the technology for a broadband personal communications service (personal
communications services). The service will ultimately have more than 400 base
stations for the palm-sized handsets that are being made by Ericsson, Motorola, and
Nokia. The handsets include a phone, a text pager, and an answering machine.
GSM together with other technologies is part of an evolution of wireless
mobile telecommunication that includes High-Speed Circuit-Switched Data (High-
Speed Circuit-Switched Data), General Packet Radio System (General Packet Radio
Services), Enhanced Data GSM Environment (Enhanced Data GSM Environment),
and Universal Mobile Telecommunications Service (Universal Mobile
Telecommunications System).
spectrum with a lower frequency and greater wavelength than subsequent standards,
providing a significant signal range per cell along with a high propensity for
interference. Nonetheless, it is worth noting the continuing persistence of analog
AMPS technologies in North America and Latin America through the 1990s.
Initial deployments of second-generation wireless networks occurred in Europe in
the 1980s. These networks were based on digital, rather than analog technologies, and
were circuit-switched. Circuit-switched cellular data is still the most widely used mobile
wireless data service. Digital technology offered an appealing combination of
performance and spectral efficiency (in terms of management of scarce frequency bands),
as well as the development of features like speech security and data communications over
high quality transmissions. It is also compatible with Integrated Services Digital Network
ISDN technology, which was being developed for land-based telecommunication systems
throughout the world, and which would be necessary for GSM to be successful. Moreover
in the digital world, it would be possible to employ very large-scale integrated silicon
technology to make handsets more affordable.
To a certain extent, the late 1980s and early 1990s were characterized by the
perception that a complete migration to digital cellular would take many years, and
that digital systems would suffer from a number of technical difficulties (i.e., handset
technology). However, second-generation equipment has since proven to offer many
advantages over analog systems, including efficient use of radio-magnetic spectrum,
enhanced security, extended battery life, and data transmission capabilities. There are
four main standards for 2G networks: TDMA, GSM and CDMA; there is also PDC,
which is used exclusively in Japan. In the meantime, a variety of 2.5G standards (to be
discussed in Section 2.7) have been developed. Going digital has led to the
emergence of several major 2G mobile wireless systems.
Administrations created the Groupe Spcial Mobile committee and provided a permanent
group of technical support personnel, based in Paris. Five years later in 1987,
15 representatives from 13 European countries signed a memorandum of
understanding in Copenhagen to develop and deploy a common cellular telephone
system across Europe, and European Union rules were passed to make GSM a
mandatory standard. The decision to develop a continental standard eventually
resulted in a unified, open, standard-based network which was larger than that in the
United States. In 1989, the Groupe Spcial Mobile committee was transferred from to
the European Telecommunications Standards Institute
In parallel, France and Germany signed a joint development agreement in
1984 and were joined by Italy and the UK in 1986. In 1986 the European Commission
proposed reserving the 900 MHz spectrum band for GSM.
Phase I of the GSM specifications were published in 1990. The world's first GSM
call was made by the Finnish prime minister Harri Holkeri to Kaarina Suonio (mayor in
city ofTampere) on 1 July 1991 on a network built by Telenokia and Siemens and
operated by Radiolinja. The following year in 1992, the first short messaging service
(SMS or "text message") message was sent and Vodafone UK and Telecom
Finland signed the first international roaming agreement.
Work begun in 1991 to expand the GSM standard to the 1800 MHz frequency band and
the first 1800 MHz network became operational in the UK by 1993. Also that year,
Telecom Australia became the first network operator to deploy a GSM network outside
Europe and the first practical hand-held GSM mobile phone became available.
In 1995, fax, data and SMS messaging services were launched commercially,
the first 1900 MHz GSM network became operational in the United States and GSM
subscribers worldwide exceeded 10 million. Also this year, the GSM Association was
formed. Pre-paid GSM SIM cards were launched in 1996 and worldwide GSM
subscribers passed 100 million in 1998.
In 2000, the first commercial GPRS services were launched and the first GPRS
compatible handsets became available for sale. In 2001 the first UMTS (W-CDMA)
network was launched and worldwide GSM subscribers exceeded 500 million. In 2002
the first multimedia messaging services were introduced and the first GSM network in
the 800 MHz frequency band became operational. EDGE services first became
operational in a network in 2003 and the number of worldwide GSM subscribers
exceeded 1 billion in 2004.
By 2005, GSM networks accounted for more than 75% of the worldwide
cellular network market, serving 1.5 billion subscribers. In 2005, the first HSDPA
capable network also became operational. The first HSUPA network was launched in
2007 and worldwide GSM subscribers exceeded two billion in 2008.
The GSM Association estimates that technologies defined in the GSM
standard serve 80% of the global mobile market, encompassing more than 5 billion
people across more than 212 countries and territories, making GSM the most
ubiquitous of the many standards for cellular networks.
Macau phased out their GSM network in January 2013 (except for roaming
services), making it the first region to decommission a GSM network.
The Base Station Subsystem is composed of two parts, the Base Transceiver
Station and the Base Station Controller. These communicate across the standardized
Abis interface, allowing (as in the rest of the system) operation between components
made by different suppliers.
The Base Transceiver Station houses the radio transceivers that define a cell
and handles the radio-link protocols with the Mobile Station. In a large urban area,
there will potentially be a large number of BTSs deployed, thus the requirements for a
BTS are ruggedness, reliability, portability, and minimum cost.
The Base Station Controller manages the radio resources for one or more
BTSs. It handles radio-channel setup, frequency hopping, and handovers. The BSC is
the connection between the mobile station and the Mobile service Switching Center .
uses Signaling System Number 7, used for trunk signaling in ISDN and widely used
in current public networks.
The Home Location Register and Visitor Location Register, together with the
MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains
all the administrative information of each subscriber registered in the corresponding
GSM network, along with the current location of the mobile. The location of the
mobile is typically in the form of the signaling address of the VLR associated with the
mobile station. There is logically one HLR per GSM network, although it may be
implemented as a distributed database.
The Visitor Location Register contains selected administrative information
from the HLR, necessary for call control and provision of the subscribed services, for
each mobile currently located in the geographical area controlled by the VLR. The
geographical area controlled by the MSC corresponds to that controlled by the VLR.
Note that the MSC contains no information about particular mobile stations --- this
information is stored in the location registers.
The other two registers are used for authentication and security purposes. The
Equipment Identity Register is a database that contains a list of all valid mobile
equipment on the network, where each mobile station is identified by its International
Mobile Equipment Identity . An IMEI is marked as invalid if it has been reported
stolen or is not type approved. The Authentication Center is a protected database that
stores a copy of the secret key stored in each subscriber's SIM card, which is used for
authentication and encryption over the radio channel.
Soon some countries will use GSM-850/900/1800/1900 MHz like the Dominican
Republic, Trinidad & Tobago and Venezuela.
In Brazil, the 1,900 MHz band is paired with 2,100 MHz to form the IMT-
compliant 2,100 MHz band for 3G services. The result is a mixture of usage in the
Americas that requires travelers to confirm that the phones they have are compatible
with the band of the networks at their destinations.Frequency compatibility problems
can be avoided through the use of multi-band (tri-band or, especially, quad-band)
phones.
In Africa, Europe, Middle East and Asia, most of the providers use 900 MHz
and 1800 MHz bands. GSM-900 is most widely used. Fewer operators use DCS-1800
and GSM-1800. A dual-band 900/1800 phone is required to be compatible with almost
all operators. At least the GSM-900 band must be supported in order to be compatible
with many operators. However, Thailand has also approved for some time now the use
of the GSM-1900 band in an attempt to alleviate network congestion.
3.3.5 GSM SECURITY
The security features in the GSM network can be divided into three sub parts:
subscriber identity authentication, user and signaling data confidentiality, and
subscriber identity confidentiality. The security mechanisms include secret keys,
algorithms and computed numbers.
3.3.5.1 SOME DEFINITIONS
The base mechanism shows where the different keys and algorithms are
stored. The secret key Ki is used to authenticate the identity of a subscriber. The key
Ki is given to the subscriber when he opens a new network account. Only the network
operator knows the key. The Ki is stored in the subscribers SIM card and the AuC of
the subscribers home network. The Ki is never transmitted over the network.
In order to identify the subscriber the MS sends the IMSI to the visited
network. With the IMSI the subscriber is identified to the system. The IMSI is up to
15 digits and comprises the following parts:
A 3-digit Mobile Country Code. This identifies the country where the GSM
system operates. Finland has number 244.
A 2-digit Mobile Network Code. This uniquely identifies each cellular
provider. Sonera has number 91.
The Mobile Subscriber Identification Code. This uniquely identifies each
customer of the provider. The length is 10 digits.
So called security triplets are calculated in the AuC. The triplets consist of a
random number, a signed response and a ciphering key. The SRES is used to
authenticate the subscriber and Kc is used as input by the ciphering algorithm A5
As the visited network has received the security triplets the actual
authentication can take place (see Figure 3.3.4.4). If the number sent by the MS to the
BTS is the same as the one calculated by the AuC, the subscriber is authenticated.
The Ciphering key is used for the final encryption of the radio link. One copy
of the needed Kc is stored in the VLR and another copy is calculated in the MS by the
A8 algorithm. The same Ki and RAND numbers are used as in the authentication
process. The A5 algorithm creates 114-bit sequence. This sequence is then XORed
with every 114 user data bits and the resulting bit streams are sent over the two 57 bit
parts of every GSM slot. All traffic between the MS and the BTS is then secured.
The IMSI is the primary key for subscriber identification. However a temporary
identity, TMSI can be given to a subscriber for identification. After initial registration
done with the IMSI, the serving network stores the IMSI in the VLR and generates a
TMSI for the subscriber. The TMSI is then transmitted back to the MS and it will be used
for identification as long as the subscriber is registered in that specific network.
A corrected version of the COMP 128 has been developed; however, the cost
to replace all SIM chips and include the new algorithm is too costly to cellular phone
companies. The new release of 3GSM will include a stronger version of the COMP
128 algorithm and a new A5 algorithm implementation. The A5/3 is expected to solve
current confidentiality and integrity problems. Fixed network transmission could be
fixed by simply applying some type of encryption to any data transferred on the fixed
network.
Short Message Service (more commonly known as text messaging) has become
the most used data application on mobile phones, with 74% of all mobile phone users
worldwide already as active users of SMS, or 2.4 billion people by the end of 2007. SMS
text messages may be sent by mobile phone users to other mobile users or external
services that accept SMS. The messages are usually sent from mobile devices via theShort
Message Service Centre using the MAP protocol. The SMSC is a central routing hubs for
Short Messages. Many mobile service operators use their SMSCs as gateways to external
systems, including the Internet, incoming SMS news feeds, and other mobile operators
(often using the de facto SMPP standard for SMS exchange).
3.4 MAX232 IC
transmission pin of RS232 serial port and give serial output to microcontrollers
receiver pin. MAX232 needs four external capacitors whose value ranges from 1F to
22F.
3.4.1FUNCTIONS OF PINS
Pin
Function Name
No
1 Capacitor 1 +
2 Capacitor 3 +
3 Capacitor 1 -
Capacitor connection pins
4 Capacitor 2 +
5 Capacitor 2 -
6 Capacitor 4 -
7 Output pin; outputs the serially transmitted data at RS232 T2 Out
logic level; connected to receiver pin of PC serial port
8 Input pin; receives serially transmitted data at RS 232 logic R2 In
level; connected to transmitter pin of PC serial port
9 Output pin; outputs the serially transmitted data at TTL R2 Out
logic level; connected to receiver pin of controller.
10 Input pins; receive the serial data at TTL logic level; T2 In
11 connected to serial transmitter pin of controller. T1 In
12 Output pin; outputs the serially transmitted data at TTL R1 Out
logic level; connected to receiver pin of controller.
13 Input pin; receives serially transmitted data at RS 232 logic R1 In
level; connected to transmitter pin of PC serial port
14 Output pin; outputs the serially transmitted data at RS232 T1 Out
logic level; connected to receiver pin of PC serial port
15 Ground (0V) Ground
16 Supply voltage; 5V (4.5V 5.5V) Vcc
LEDs have allowed new text, video displays, and sensors to be developed, while
their high switching rates are also useful in advanced communications technology.
3.5.1 TECHNOLOGY
An LED will begin to emit light when more than 2 or 3 volts is applied to it.
Some external system must control the current through the LED to prevent destruction
by overheating.
The wavelength of the light emitted, and thus its color, depends on the band
gap energy of the materials forming the p-n junction. In silicon or germanium diodes,
the electrons and holes usually recombine by a non-radiative transition, which
produces no optical emission, because these are indirect band gap materials. The
materials used for the LED have a direct band gap with energies corresponding to
near-infrared, visible, or near-ultraviolet light.
LED development began with infrared and red devices made with gallium
arsenide. Advances in materials science have enabled making devices with ever-
shorter wavelengths, emitting light in a variety of colors.LEDs are usually built on an
n-type substrate, with an electrode attached to the p-type layer deposited on its
surface. P-type substrates, while less common, occur as well. Many commercial
LEDs, especially GaN/InGaN, also use sapphire substrate.
Most materials used for LED production have very high refractive indices.
This means that much light will be reflected back into the material at the material/air
surface interface. Thus, light extraction in LEDs is an important aspect of LED
production, subject to much research and development.
such as traffic signals or in-pavement signal lights, and that are utilized in climates
where the temperature within the light fixture gets very high, could result in low
signal intensities or even failure.
LED light output rises at lower temperatures, leveling off, depending on type,
at around 30 C (22 F Thus, LED technology may be a good replacement in uses
such as supermarket freezer lighting and will last longer than other technologies.
Because LEDs emit less heat than incandescent bulbs, they are an energy-efficient
technology for uses such as in freezers and refrigerators. However, because they emit
little heat, ice and snow may build up on the LED light fixture in colder climates.
Similarly, this lack of waste heat generation has been observed to sometimes cause
significant problems with street traffic signals and airport runway lighting in snow-
prone areas. In response to this problem, some LED lighting systems have been
designed with an added heating circuit at the expense of reduced overall electrical
efficiency of the system; additionally, research has been done to develop heat sink
technologies that will transfer heat produced within the junction to appropriate areas
of the light fixture.
3.5.2 ADVANTAGES
Efficiency: LEDs emit more lumens per watt than incandescent light bulbs.
The efficiency of LED lighting fixtures is not affected by shape and size,
unlike fluorescent light bulbs or tubes.
Color: LEDs can emit light of an intended color without using any color filters
as traditional lighting methods need. This is more efficient and can lower
initial costs.
2
Size: LEDs can be very small (smaller than 2 mm ) and are easily attached to
printed circuit boards.
On/Off time: LEDs light up very quickly. A typical red indicator LED will
achieve full brightness in under a microsecond. LEDs used in communications
devices can have even faster response times.
Cycling: LEDs are ideal for uses subject to frequent on-off cycling, unlike
incandescent and fluorescent lamps that fail faster when cycled often, or High-
intensity discharge lamps (HID lamps) that require a long time before restarting.
Dimming: LEDs can very easily be dimmed either by pulse-width modulation or
lowering the forward current. This pulse-width modulation is why LED lights,
particularly headlights on cars, when viewed on camera or by some people,
appear to be flashing or flickering. This is a type of stroboscopic effect.
Cool light: In contrast to most light sources, LEDs radiate very little heat in
the form of IR that can cause damage to sensitive objects or fabrics. Wasted
energy is dispersed as heat through the base of the LED.
Slow failure: LEDs mostly fail by dimming over time, rather than the abrupt
failure of incandescent bulbs.
Lifetime: LEDs can have a relatively long useful life. One report estimates
35,000 to 50,000 hours of useful life, though time to complete failure may be
longer. Fluorescent tubes typically are rated at about 10,000 to 15,000 hours,
depending partly on the conditions of use, and incandescent light bulbs at
1,000 to 2,000 hours. Several DOE demonstrations have shown that reduced
maintenance costs from this extended lifetime, rather than energy savings, is
the primary factor in determining the payback period for an LED product.
Shock resistance: LEDs, being solid-state components, are difficult to damage
with external shock, unlike fluorescent and incandescent bulbs, which are
fragile.
Focus: The solid package of the LED can be designed to focus its light.
Incandescent and fluorescent sources often require an external reflector to
collect light and direct it in a usable manner. For larger LED packages total
internal reflection (TIR) lenses are often used to the same effect. However,
when large quantities of light are needed many light sources are usually
deployed, which are difficult to focus or collimate towards the same target.
3.5.3 DISADVANTAGES
High initial price: LEDs are currently more expensive, price per lumen, on an
initial capital cost basis, than most conventional lighting technologies. As of
2012, the cost per thousand lumens (kilolumen) was about $6. The price was
expected to reach $2/kilolumen by 2013. At least one manufacturer claims to
have reached $1 per kilolumen as of March 2014. The additional expense
partially stems from the relatively low lumen output and the drive circuitry
and power supplies needed.
Temperature dependence: LED performance largely depends on the ambient
temperature of the operating environment or "thermal management"
properties. Over-driving an LED in high ambient temperatures may result in
overheating the LED package, eventually leading to device failure. An
adequate heat sink is needed to maintain long life. This is especially important
in automotive, medical, and military uses where devices must operate over a
wide range of temperatures, which require low failure rates. Toshiba has
produced LEDs with an operating temperature range of -40 to 100 C, which
suits the LEDs for both indoor and outdoor use in applications such as lamps,
ceiling lighting, street lights, and floodlights.
Voltage sensitivity: LEDs must be supplied with the voltage above the
threshold and a current below the rating. Current and lifetime change greatly
with small change in applied voltage. They thus require a current-regulated
supply (usually just a series resistor for indicator LEDs)
Light quality: Most cool-white LEDs have spectra that differ significantly
from a black body radiator like the sun or an incandescent light. The spike at
460 nm and dip at 500 nm can cause the color of objects to be perceived
differently under cool-white LED illumination than sunlight or incandescent
sources, due to metamerism red surfaces being rendered particularly badly by
typical phosphor-based cool-white LEDs. However, the color-rendering
properties of common fluorescent lamps are often inferior to what is now
available in state-of-art white LEDs.
Area light source: Single LEDs do not approximate a point source of light
giving a spherical light distribution, but rather a lambertian distribution. So
LEDs are difficult to apply to uses needing a spherical light field; however,
different fields of light can be manipulated by the application of different
optics or "lenses". LEDs cannot provide divergence below a few degrees. In
contrast, lasers can emit beams with divergences of 0.2 degrees or less.
Electrical polarity: Unlike incandescent light bulbs, which illuminate regardless of
the electrical polarity, LEDs will only light with correct electrical polarity. To
automatically match source polarity to LED devices, rectifiers can be used.
Blue hazard: There is a concern that blue LEDs and cool-white LEDs are now
capable of exceeding safe limits of the so-called blue-light hazard as defined in
eye safety specifications such as ANSI/IESNA RP-27.105: Recommended
Practice for Ph0tobiological Safety for Lamp and Lamp Systems.
Blue pollution: Because cool-white LEDs with high color temperature emit
proportionally more blue light than conventional outdoor light sources such as
high-pressure sodium vapor lamps, the strong wavelength dependence of
Rayleigh scattering means that cool-white LEDs can cause more light pollution
than other light sources. The International Dark-Sky Association discourages
using white light sources with correlated color temperature above 3,000 K.
Efficiency droop: The luminous efficacy of LEDs decreases as the electrical
current increases. Heating also increases with higher currents which
compromises the lifetime of the LED. These effects put practical limits on the
current through an LED in high power applications.
Impact on insects: LEDs are much more attractive to insects than sodium-
vapor lights, so much so that there has been speculative concern about the
possibility of disruption to food webs.
3.5.4 APPLICATIONS
Visual signals where light goes more or less directly from the source to the
human eye, to convey a message or meaning.
Illumination where light is reflected from objects to give visual response of
these objects.
Measuring and interacting with processes involving no human vision.
Narrow band light sensors where LEDs operate in a reverse-bias mode and
respond to incident light, instead of emitting light. See LEDs as light sensors.
CHAPTER-4
SOFTWARE REQUIREMENTS
Compilers are programs used to convert a High Level Language to object code.
Desktop compilers produce an output object code for the underlying microprocessor, but
not for other microprocessors. I.E the programs written in one of the HLL like
C will compile the code to run on the system for a particular processor like x86
(underlying microprocessor in the computer). For example compilers for Dos platform
is different from the Compilers for Unix platform So if one wants to define a compiler
then compiler is a program that translates source code into object code.
The compiler derives its name from the way it works, looking at the entire
piece of source code and collecting and reorganizing the instruction. See there is a bit
little difference between compiler and an interpreter. Interpreter just interprets whole
program at a time while compiler analyses and execute each line of source code in
succession, without looking at the entire program.
The advantage of interpreters is that they can execute a program immediately.
Secondly programs produced by compilers run much faster than the same programs
A cross compiler is similar to the compilers but we write a program for the
target processor (like 8051 and its derivatives) on the host processors (like computer
of x86). It means being in one environment you are writing a code for another
environment is called cross development. And the compiler used for cross
development is called cross compiler. So the definition of cross compiler is a compiler
that runs on one computer but produces object code for a different type of computer.
The Keil ARM tool kit includes three main tools, assembler, compiler and
linker. An assembler is used to assemble the ARM assembly program. A compiler is
used to compile the C source code into an object file. A linker is used to create an
absolute object module suitable for our in-circuit emulator.
4.9 WINDOW-FILES
Now use from the menu Project Select Device for Target and select a CPU
for your project. The Select Device dialog box shows the Vision2 device data base.
Just select the microcontroller you use. We are using for our examples the Philips
80C51RD+ CPU. This selection sets necessary tool Options for the 80C51RD+ device
and simplifies in this way the tool Configuration.
Typical, the tool settings under Options Target are all you need to start a new
application. You may translate all source files and line the application with a click on
the Build Target toolbar icon. When you build an application with syntax errors,
Vision2 will display errors and warning messages in the Output Window Build
page. A double click on a message line opens the source file on the correct location in
a Vision2 editor window. Once you have successfully generated your application you
can start debugging.
After you have tested your application, it is required to create an Intel HEX
file to download the software into an EPROM programmer or simulator. Vision2
creates HEX files with each build process when Create HEX files under Options for
Target Output is enabled. You may start your PROM programming utility after the
make process when you specify the program under the option Run User Program #1.
You have made when you create your project target. Refer to page 58 for more
Information about selecting a device. You may select and display the on-chip peripheral
components using the Debug menu. You can also change the aspects of each
peripheral using the controls in the dialog boxes.
You start the debug mode of Vision2 with the Debug Start/Stop Debug Session
Command. Depending on the Options for Target Debug Configuration, Vision2 will
load the application program and run the startup code Vision2 saves the editor screen
layout and restores the screen layout of the last debug session. If the program execution
stops, Vision2 opens an editor window with the source text or shows CPU instructions in
the disassembly window. The next executable statement is marked with a yellow arrow.
During debugging, most editor features are still available.
For example, you can use the find command or correct program errors.
Program source text of your application is shown in the same windows. The Vision2
debug mode differs from the edit mode in the following aspects:
The Debug Menu and Debug Commands described on page 28 are
available. The additional debug windows are discussed in the following.
The project structure or tool parameters cannot be modified. All build commands are
disabled.
The Disassembly window shows your target program as mixed source and
assembly program or just assembly code. A trace history of previously executed
instructions may be displayed with Debug View Trace Records. To enable the trace
history, set Debug Enable/Disable Trace Recording.
If you select the Disassembly Window as the active window all program step
commands work on CPU instruction level rather than program source lines. You can
select a text line and set or modify code breakpoints using toolbar buttons or the
context menu commands.
You may use the dialog Debug Inline Assembly to modify the CPU
instructions. That allows you to correct mistakes or to make temporary changes to the
target program you are debugging. Numerous example programs are included to help
you get started with the most popular embedded 8051 devices.
4.15 EMBEDDED C
CHAPTER-5
SCHEMATIC DIAGRAM
CHAPTER-6
PROJECT CODE
void uart0_init(void);
void put_char(uc dt);
void uart1_puts(const unsigned char
*str); int uart0_getc (void);
void _delay_ms(unsigned int k)
{
int i,j;
for(i=0;i<k;i++)
{
for(j=0;j<3000;j++);
}
}
void Delay(unsigned int time)
{
unsigned int i,j;
for(i=0;i<time;i++)
for(j=0;j<25000;j++);
void uart0_putc(char c)
{
while(!(U0LSR & 0x20)); // Wait until UART0 ready to send character
U0THR = c; // Send character
Delay(30);
}
void uart0_puts(char *p)
{
while(*p) // Point to character
{
uart0_putc(*p++); // Send character then point to next character
}
}
int uart0_getc (void)
{
while (!(U0LSR &
0x01)); return (U0RBR);
}
void uart1_putc(unsigned char data)
{
U1THR = data;
while( (U1LSR&0x40)==0 );
Delay(15);
}
unsigned char uart1_getc()
{
while( (U1LSR&0x01)==0 );
return(U1RBR);
}
void uart1_puts(const unsigned char *str)
{
while(1)
{
if( *str == '\0' ) break;
uart1_putc(*str++);
}
}
void LEDdisplay()
{
IO1SET |=(1<<16)| (1<<17) | (1<<18) |(1<<19)| (1<<20) | (1<<21) |
(1<<22); _delay_ms(2000);
uart1_putc('#');
_delay_ms(2000);
uart1_putc('3')
_delay_ms(2000);
uart1_putc('5');
_delay_ms(2000);
uart1_putc('*');
_delay_ms(2000);
uart1_puts("<M
"); uart1_puts(s2);
uart1_puts(" >DEF 2><S 1><D
L1>"); uart1_putc('\r');
_delay_ms(2000);
IO1CLR |=(1<<16)| (1<<17) | (1<<18) |(1<<19)| (1<<20) | (1<<21) |
(1<<22); _delay_ms(1000);
}
void UART0_ISR(void) irq
{
char v1;
if( U0IIR & RDA) /* Check if Recive data Interrupt event */
{
if(byteCount < MAX_BUFF_SZ) /* Validation for buffer overflow */
{
v1 = U0RBR;
if(v1 == '+')
{
if(uart0_getc() == 'C')
{
if(uart0_getc() == 'M')
{
if(uart0_getc() == 'T')
{
if(uart0_getc() == 'I')
{
if(uart0_getc() == ':')
{
while(uart0_getc() !=
','); msgno=uart0_getc();
while(uart0_getc()!='\r');
uart0_puts("AT");
uart0_putc('\r');
Delay(100);
for(i=0;i<100;i++)
s2[i]='\0';
uart0_puts("AT+CMGF=1");
uart0_putc('\r');
Delay(100);
uart0_puts("AT+CMGR=");
uart0_putc(msgno);
uart0_putc('\r');
while(uart0_getc()!='?');
for(i=0;(s2[i]=uart0_getc())!='$';i++);
s2[i]=' ';
uart0_putc('\r'); LEDdisplay();
uart0_puts("AT+CMGDA=");
uart0_putc('"');
uart0_puts("DEL ALL");
uart0_putc('"'); uart0_putc('\r');
}
}
}
}
}
}
}
}
VICVectAddr = 0x00;
DWORD UARTInit(BYTE uart_num, DWORD baud )
{
switch(uart_num)
{
case UART0:
PINSEL0 &= ~(0x0000000F);
PINSEL0 |= 0x00000005;
U0LCR = 0x83;
U0DLL = baud;
U0DLM = (baud >>
8); U0LCR = 0x03;
U0FCR = 0x07;
if ( install_irq( UART0_INT, (void *)UART0_ISR ) == FALSE )
{
return (FALSE);
}
break;
case UART1:
PINSEL0 &=
~(0x000F0000); PINSEL0 |=
0x00050000; U1LCR = 0x83;
U1DLL = baud;
U1DLM = (baud >>
8); U1LCR = 0x03;
break;
}
return (TRUE);
}
int main (void)
{
int i1,j1;
IODIR1 = 0xffffffff;
IODIR0 =0x00000202;
init_VIC();
UARTInit(UART0,UART_BAUD(UART0_HOST_BAUD));
UARTInit(UART1,UART_BAUD(UART1_HOST_BAUD));
IOCLR1=0X00000000;
U0IER = 0;
uart0_puts("AT");
uart0_putc('\r');
Delay(100);
uart0_puts("AT+CMGF=1");
uart0_putc('\r');
Delay(100);
uart0_puts("AT+CMGDA=");
uart0_putc('"');
uart0_puts("DEL ALL");
uart0_putc('"');
uart0_putc('\r');
Delay(100);
U0IER = IER_RBR | IER_THRE | IER_RLS;
IO1CLR |=(1<<16)| (1<<17) | (1<<18) |(1<<19)| (1<<20) | (1<<21) |
(1<<22); while (1)
{
}
}
CHAPTER-7
ADVANTAGES AND APPLICATIONS
7.1 ADVANTAGES
Using GSM mobile we can send message to any distant locations , from any
part of the World.
As it's a GSM wireless transmission system it has very less errors and needs
less maintenance.
Prevents unauthorized access of notice board (password).
Multiple Users are authorized to update notices on the electronic notice board.
No printing and photocopying costs. Thus saves time, Energy and finally
environment.
7.2 DISADVANTAGE
When there is network problem gsm doesnt work.
7.3 APPLICATIONS
Educational institutions & organizations
Managing traffic
Advertisement Conference hall
Bus/Railway station
Any Public utility places
CHAPTER-8
CONCLUSION
We can use this Project in college Notice Board, a Professor can send message
for the immediate gathering of students at department. It can be used on Highways
for traffic control, like traffic on one side of the road may be blocked in view of
VVIP movement or jam ahead.
FUTURE SCOPE
The use of microcontroller in place of a general purpose computer allows us to
theorize on many further improvements on this project prototype.
Temperature display during periods wherein no message buffers are empty is
one such theoretical improvement that is very possible.
The ideal state of the microcontroller is when the indices or storage space in
the SIM memory are empty and no new message is there to display.
With proper use of interrupt routines the incoming message acts as an
interrupt, the temperature display is halted and the control flow jumps over to
the specific interrupt service routine which first validates the senders number
and then displays the information field.
Another very interesting and significant improvement would be to
accommodate multiple receiver MODEMS at the different positions in a
geographical area carrying duplicate SIM cards.
CHAPTER-9
BIBLIOGRAPHY
REFERENCES
Peter Seiler, Bong sob Song, J. Karl Hedrick Development of a Collision Avoidance
System