Vous êtes sur la page 1sur 66

MAHATMA GANDHI INSTITUTE OF TECHNOLOGY

(Affiliated to Jawaharlal Nehru Technological University, Hyderabad, Telangana)

Chaitanya Bharathi P.O., Gandipet, Hyderabad-500 075

Department of Electronics and Communication Engineering

CERTIFICATE
Date: April 2019

This is to certify that the Mini project work entitled “RFID BASED SECURITY SYSTEM” is a bonafide
work carried out by

N.V.SREEKANTH (15261A04G2)
SAKSHI V MANGNANI (15261A04H2)
L.YASHWANTH (15261A04F1)

in partial fulfilment of the requirements for the degree of BACHELOR OF


TECHNOLOGY in ELECTRONICS & COMMUNICATION ENGINEERING by the Jawaharlal Nehru
Technological University, Hyderabad during the academic year 2018-19.
The results embodied in this report have not been submitted to any other University or Institution for the award
of any degree or diploma.

----------------------- ----------------------
(Mrs. J.Sneha Latha (Dr. S. P. Singh)
Assistant Professor, ECE Department Professor & Head of ECE Department
Faculty Advisor/Liaison

i
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompanies the successful completion of any task would be incomplete
without the mention of the people who made it possible and whose guidance and encouragement towards have
crowned our efforts with success. We express our deep gratitude towards our internal guide Mrs. J. , Assistant
Professor, for her guidance, comments and encouragement during the course of the present work.
We gratefully acknowledge the inspiring guidance, encouragement and continuous support of Dr. S. P. Singh,
Head of the Department of Electronics and Communication

Engineering. His helpful suggestion and constant encouragement have gone a long way in the completion of
dissertation. It was a pleasure working under his alert, human and technical supervision.

We would like to express our deep sense of gratitude to the MAHATMA GANDHI INSTITUTE OF
TECHNOLOGY for giving us the opportunity to take up the project work. We express our sincere thanks to Dr. K.
Sudhakar Reddy, Principal M.G.I.T, for this Administration, made us enjoy wonderful environment of education.

We thank all Technicians of labs for their valuable encouragement and help. We also thank all those who
helped us directly and indirectly in completing this project work.

N.V.SREEKANTH (15261A04G2)
SAKSHI V MANGNANI (15261A04H2)
L.YASHWANTH (15261A04F1)

ii
ABSTRACT
This project aimed to develop a wireless system to detect and allow only the authorized persons.
The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The
passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers
information about the Tag ID and sends this information to the base station.

The base station receives, decodes and checks the information available in its Database and
Manchester code was used to send that information. The system performed as desired with a 10cm diameter antenna
attached to the transponder. The Base Station is built by using the LPC2148. It gets the tag ID and if the tag ID is
stored in its memory then the microcontroller will allow the person inside. RFID Reader Module, are also called as
interrogators.

They convert radio waves returned from the RFID tag into a form that can be passed on to
Controllers, which can make use of it and is used for Door accessing system. This report provides a clear picture of
hardware and software used in the system. It also provides an overall view with detailed discussion of the operation
of the system.

HARDWARE:

1. LPC2148 MICROCONTROLLER.
2. LCD MODULE.
3. RFID MODULE.
4. RFID LOGIN CARDS.
5. POWER SUPPLY.
6. DC MOTOR

LCD 2X16
POWER
SUPPLY

RFID MAX
CARD 232 LPC2148 DC MOTOR

READER

APPLICATIONS AND ADVANTAGES:

1. RFID avoids the limitations of barcode scanning, which requires line-of-sight access to each barcode and
can only be used to scan one item at a time.
2. RFID tags are used for tracking luggage as well as for monitoring health history of patients in the hospitals.
3. RFID technology is used at IT Asset Tracking, Race Timing and Transportation Payments.

FUTURE DEVELOPMENT:
1. A hex key pad can be interfaced to microcontroller board by which user can enter his password then only the lock
can be opened. This ensures even if some one has card then also without the password he can’t get access.
2. Implementing the security systems with different levels by using different types of mifare cards.
iv

TABLE OF CONTENTS
CERTIFICATE i

ACKNOWLEDGEMENT ii

ABSTRACT iii-iv

CHAPTER 1: OVERVIEW OF THE PROJECT

1.1Introduction 7
1.2Aim of the project 8
1.3Methodology 8
1.4Significance 9

CHAPTER 2: COMPONENTS USED IN DESIGNING 10

2.1Introduction to RFID 10
2.1.1 Objective 12
2.1.2 Identification 12
2.2Technology 14
2.2.1 Hardware 14
2.2.2 Software and algorithms 49

2.3Principle of operation 49

CHAPTER 3: SYSTEM DESIGN DESCRIPTION 50

3.1Architecture 50
3.2Application Configuration 51

CHAPTER 4: IMPLEMENTATION & DEVELOPMENT OF APPLICATION 52


4.1 Software learning 52
4.2 Code 60
4.3 Result 64

CHAPTER 5: ADVANTAGES & APPLICATIONS 65

CHAPTER 6: CONCLUSION & FUTURE SCOPE 66-67

REFERENCES 68

vi
CHAPTER-1
OVERVIEW OF THE PROJECT

1.1 Introduction
In current years, radio frequency identification technology has enthused from obscurity into mainstream
applications that help speed the handling of manufactured goods and materials. RFID (Radio Frequency
Identification) enables identification from a distance, and unlike earlier bar-code technology, it does so without
requiring a line of sight. RFID tags support a larger set of unique IDs than bar codes and can incorporate
additional data such as manufacturer, product type, and even measure environmental factors such as temperature.
Furthermore, RFID systems can discern many different tags located in the same general area without human
assistance. In contrast, consider a supermarket checkout counter, where you must orient each bar-coded item
toward a reader before scanning it. So why has it taken over 50 years for this technology to become main stream?
The primary reason is cost. For electronic identification technologies to compete with the rock-bottom pricing
of printed symbols, they must either be equally low-cost or provide enough added value for an organization to
recover the cost elsewhere. RFID isn’t as cheap as traditional labelling technologies, but it does offer added
value and is now at a critical price point that could enable its large-scale adoption for managing consumer retail
goods. Here, we introduce the principles of RFID, discuss its primary technologies and applications, and review
the challenges organizations will face in deploying this technology.
RFID is used to automatic data capture allowing contact less identification of objects using radio frequency.

RFID compared to BAR CODES


1. Similarly - a support tool to automate processes and to improve operations management.
2. Reduces labour, eliminates human errors.
3. Puts a wealth of data at your fingertips. Different, in that:
4. Tags can be embedded and hidden with no need for line-of-sight. They can be read through wood,
plastic, cardboard, any material except metal.
5. Tags can reprogrammed on-the-fly.
6. Applicable in harsh environments, such as outdoors, around chemicals, moisture and high
temperatures
1.2 Aim of the Project

This project aimed to develop a wireless system to detect and allow only the authorized persons.
The system is based on Radio Frequency Identification (RFID) technology and consists of a
passive RFID tag.

1.3 Methodology
\\Whenever any person buys a vehicle, one first needs to get his or her vehicle registered at the
RTO office. RTO officials will not only assign a number plate to it but also will give a RFID
enabled smart card or a tag.

This card will have a unique ID feasible to use with that vehicle only. They will also create an
account for the use of that particular smart card and maintain transaction history in database.
User needs to deposit some minimum amount to this account.

Every time a registered vehicle approaches the toll booth, first the Infrared sensors will detect
the presence of the vehicle. It will in turn activate the RFID circuit to read the RFID enable
smart card fixed on the windscreen of the vehicle. Transaction will begin, depending upon the
balance available toll will be deducted directly or the vehicle will be directed towards another
lane to pay tax manually.

Whenever any vehicle owner registers a complaint to RTO office regarding theft respective
entry is made in the database. Now any vehicle arriving at toll booth with same ID as already
present in stolen vehicle category will be easily identified as the ID assigned with it is unique.

Every toll plaza will be connected to each other along with the centralized server in the form
of LAN. Updates of any sort of transaction will be immediately updated to local database and
centralized server.\\

1.4 Significance

\\The base idea behind implementing RFID Based Toll System is to automate the
toll collection process and thereby reducing manual operation in toll booths and the long queues
at toll booths using RFID tags installed on the vehicles. In addition to we can not only help the
vehicle owners and system administrators from vehicle theft detection but also can track over
speeding vehicles, and crossing the signals.

Here we are going to see some points regarding to purpose behind choosing this
topic & what is the requirement of this type of the project in our day to day life.
● Avoid the fuel loss.
● Avoid financial loss.
● Saving of time in collecting toll.
● To monitor the traffic.\\
CHAPTER-2
COMPONENTS USED IN DESIGNING
2.1 Introduction to RFID
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify
and track tags attached to objects. The tags contain electronically-stored information. Passive
tags collect energy from a nearby RFID reader's interrogating radio waves. Active tags have a
local power source (such as a battery) and may operate hundreds of meters from the RFID
reader. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may
be embedded in the tracked object. RFID is one method for Automatic Identification and
Data Capture (AIDC).

RFID tags are used in many industries, for example, an RFID tag attached to an automobile
during production can be used to track its progress through the assembly line; RFID-tagged
pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in
livestock and pets allows for positive identification of animals.

Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals
and people, the possibility of reading personally-linked information without consent has
raised serious privacy concerns. These concerns resulted in standard specifications
development addressing privacy and security issues. ISO/IEC 18000and ISO/IEC 29167 use
on-chip cryptography methods for untraceability, tag and reader authentication, and over-the-
air privacy. ISO/IEC 20248 specifies a digital signature data structure for RFID
and barcodes providing data, source and read method authenticity. This work is done
within ISO/IEC JTC 1/SC 31 Automatic identification and data capture techniques. Tags can
also be used in shops to expedite checkout, and to prevent theft by customers and employees.

In 2014, the world RFID market was worth US$8.89 billion, up from US$7.77 billion in 2013
and US$6.96 billion in 2012. This figure includes tags, readers, and software/services for
RFID cards, labels, fobs, and all other form factors. The market value is expected to rise to
US$18.68 billion by 2026.
Figure: FasTrak, an RFID tag used for electronic toll collection in California

In 1945, Léon Theremin invented a listening device for the Soviet Union which retransmitted
incident radio waves with the added audio information. Sound waves vibrated
a diaphragm which slightly altered the shape of the resonator, which modulated the reflected
radio frequency. Even though this device was a covert listening device, rather than an
identification tag, it is considered to be a predecessor of RFID because it was passive, being
energized and activated by waves from an outside source.

Similar technology, such as the IFF transponder, was routinely used by the allies and
Germany in World War II to identify aircraft as friend or foe. Transponders are still used by
most powered aircraft. Another early work exploring RFID is the landmark 1948 paper by
Harry Stockman, who predicted that "... considerable research and development work has to
be done before the remaining basic problems in reflected-power communication are solved,
and before the field of useful applications is explored."

Mario Cardullo's device, patented on January 23, 1973, was the first true ancestor of modern
RFID, as it was a passive radio transponder with memory. The initial device was passive,
powered by the interrogating signal, and was demonstrated in 1971 to the New York Port
Authority and other potential users. It consisted of a transponder with 16 bit memory for use
as a toll device. The basic Cardullo patent covers the use of RF, sound and light as
transmission media. The original business plan presented to investors in 1969 showed uses in
transportation (automotive vehicle identification, automatic toll system, electronic license
plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking
(electronic check book, electronic credit card), security (personnel identification, automatic
gates, surveillance) and medical (identification, patient history).

An early demonstration of reflected power (modulated backscatter) RFID tags, both passive
and semi-passive, was performed by Steven Depp, Alfred Koelle, and Robert Frayman at
the Los Alamos National Laboratory in 1973. The portable system operated at 915 MHz and
used 12-bit tags. This technique is used by the majority of today's UHFID and microwave
RFID tags.

The first patent to be associated with the abbreviation RFID was granted to Charles Walton in
1983.

2.1.1 Objective
The project aims in designing a completely automated security access system for domestic
and industrial applications. Security is the bigger concern for an individual or a firm.
Recognizing the need of security we developed an automated security access system with
user friendly access. Automation is the most frequently spelled term in the field of
electronics. The hunger for automation brought many revolutions in the existing
technologies. One among the technologies which had greater developments is RF
communications. The result of this is the RFID cards which transmit a unique identification
number. This number transmitted by the RFID can be read with the help of a RF reader. The
authentication to the house/industry can be provided in full or limited depending on the RFID
cards. The decisions like full access or limited access are taken by an onboard computer to
which the RF reader is interfaced. The doors of the house/industry form the output module
and are interfaced to the same onboard computer through a stepper motor.

2.1.2 Identification
The development is done with the help of many supporting softwares. The one we are using
is Keil Software.

This document presents the design description of RFID based Security System. The
development includes following activities:

1.Working Principle of RFID based Security system

2.Demonstration of functionality

3.Validation of system

4.Testing of the system

5.Analysis of the outputs.

2.2 Technology
2.2.1 Hardware
1. Microcontroller
2. LCD
3. DC motor
4. RFID module
5. L293D
6. MAX 232
7. Power Supply

1.Microcontroller:
Microprocessors vs. Microcontrollers:
• Microprocessors are single-chip CPUs used in microcomputers.
• Microcontrollers and microprocessors are different in three main aspects: hardware
architecture, applications, and instruction set features.

• Hardware architecture: A microprocessor is a single chip CPU while a microcontroller is a


single IC contains a CPU and much of remaining circuitry of a complete computer (e.g.,
RAM, ROM, serial interface, parallel interface, timer, interrupt handling circuit).

• Applications: Microprocessors are commonly used as a CPU in computers while


microcontrollers are found in small, minimum component designs performing control-
oriented activities.

• Microprocessor instruction sets are processing Intensive.

• Their instructions operate on nibbles, bytes, words, or even double words.

• Addressing modes provide access to large arrays of data using pointers and offsets.

• They have instructions to set and clear individual bits and perform bit operations.

• They have instructions for input/output operations, event timing, enabling and setting
priority levels for interrupts caused by external stimuli.

Difference between 8051 and 8052:

The 8052 microcontroller is the 8051's "big brother." It is a slightly more powerful
microcontroller, sporting a number of additional features which the developer may make use
of:

 256 bytes of Internal RAM (compared to 128 in the standard 8051).

 A third 16-bit timer, capable of a number of new operation modes and 16-bit reloads.

 Additional SFRs to support the functionality offered by the third timer.

AT89S52:
Features:

• Compatible with MCS-51 Products

• 8K Bytes of In-System Programmable (ISP) Flash Memory

• 4.0V to 5.5V Operating Range

• Fully Static Operation: 0 Hz to 33 MHz

• Three-level Program Memory Lock

• 256K Internal RAM


• 32 Programmable I/O Lines

• 3 16-bit Timer/Counters

• Eight Interrupt Sources

• Full Duplex UART Serial Channel

• Low-power Idle and Power-down Modes

• Interrupt Recovery from Power-down Mode

• Watchdog Timer

• Dual Data Pointer

• Power-off Flag

Description of microcontroller 89s52:


The AT89S52 is a low-power, high-performance CMOS 8-bit micro controller with 8Kbytes
of in-system programmable Flash memory. The device is manufactured using Atmel’s high-
density nonvolatile memory technology and is compatible with the industry-standard 80C51
micro controller. The on-chip Flash allows the program memory to be reprogrammed in-
system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit
CPU with in-system programmable flash one monolithic chip; the Atmel AT89S52 is a
powerful micro controller, which provides a highly flexible and cost-effective solution to
many embedded control applications.
The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of
RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, full
duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is
designed with static logic for operation down to zero frequency and supports two software
selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM
timer/counters, serial port, and interrupt system to continue functioning. The Power-down
mode saves the RAM contents but freezes the oscillator, disabling all other chip functions
until the next interrupt or hardware reset.

Pin Description of microcontroller 89s52


VCC: Supply voltage.

GND: Ground.

Port 0
Port 0 is an 8-bit open drain bi-directional I/O port. As an output port, each pin can
sink eight TTL inputs. When 1sare written to port 0 pins, the pins can be used as high
impedance inputs. Port 0 can also be configured to be the multiplexed low order address/data
bus during accesses to external program and data memory. In this mode, P0 has internal pull-
ups. Port 0 also receives the code bytes during Flash programming and outputs the code bytes
during program verification. External pull-ups are required during program verification

Port 1
Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1 Output buffers
can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by
the internal pull-ups and can be used as inputs. In addition, P1.0 and P1.1 can be configured
to be the timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger input
P1.1/T2EX), respectively, as shown in the following table. Port 1 also receives the low-order
address bytes during Flash programming and verification.

Port 2
Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output buffers
can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by
the internal pull-ups and can be used as inputs. Port 2 emits the high-order address byte
during fetches from external program memory and during accesses to external data memory
that use 16-bit addresses (MOVX @DPTR). In this application, Port 2 uses strong internal
pull-ups when emitting 1s. During accesses to external data memory that use 8-bit addresses
(MOVX @ RI), Port 2emits the contents of the P2 Special Function Register.

Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output buffers
can sink/source four TTL inputs. When 1s are written, 1s are written to Port 3 pins, they are
pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are
externally being pulled low will source current (IIL) because of the pull-ups. Port 3 also
serves the functions of various special features of the AT89S52, as shown in the following
table.

Port 3 also receives some control signals for Flash programming

And verification.
RST
Reset input. A high on this pin for two machine cycles while the oscillator is running
resets the device.

ALE/PROG
Address Latch Enable (ALE) is an output pulse for latching the low byte of the address
during accesses to external memory. This pin is also the program pulse input (PROG) during
Flash programming. In normal operation, ALE is emitted at a constant rate of1/6 the
oscillator frequency and may be used for external timing or clocking purposes. Note,
however, that one ALE pulse is skipped during each access to external data Memory. If
desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set,
ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly
pulled high. Setting the ALE-disable bit has no effect if the micro controller is in external
execution mode.

PSEN
Program Store Enable (PSEN) is the read strobe to external program memory. When
the AT89S52 is executing code from external program memory, PSEN is activated twice
each machine cycle, except that two PSEN activations are skipped during each access to
external data memory.

EA/VPP
External Access Enable. EA must be strapped to GND in order to enable the device to
fetch code from external program memory locations starting at 0000H up to FFFFH. Note,
however, that if lock bit 1 is programmed, EA will be internally latched on reset. A should be
strapped to VCC for internal program executions. This pin also receives the 12-
voltProgramming enables voltage (VPP) during Flash programming.

XTAL1
Input to the inverting oscillator amplifier and input to the internal clock operating circuit.

XTAL2
Output from the inverting oscillator amplifier.

Figure 1. Oscillator Connections

Special Function Register (SFR) Memory: -


Special Function Registers (SFR s) are areas of memory that control specific
functionality of the 8051 processor. For example, four SFRs permit access to the 8051’s 32
input/output lines. Another SFR allows the user to set the serial baud rate, control and access
timers, and configure the 8051’s interrupt system.

The Accumulator: The Accumulator, as its name suggests is used as a general register to
accumulate the results of a large number of instructions. It can hold 8-bit (1-byte) value and
is the most versatile register.

The “R” registers: The “R” registers are a set of eight registers that are named R0, R1. Etc.
up to R7. These registers are used as auxiliary registers in many operations.

The “B” registers: The “B” register is very similar to the accumulator in the sense that it
may hold an 8-bit (1-byte) value. Two only uses the “B” register 8051 instructions: MUL AB
and DIV AB.

The Data Pointer: The Data pointer (DPTR) is the 8051’s only user accessible 16-bit
(2Bytes) register. The accumulator, “R” registers are all 1-Byte values. DPTR, as the name
suggests, is used to point to data. It is used by a number of commands, which allow the 8051
to access external memory.

ADDRESSING MODES:
An “addressing mode” refers that you are addressing a given memory
location. In summary, the addressing modes are as follows, with an example of each:

Each of these addressing modes provides important flexibility.

Immediate Addressing MOV A, #20 H


Direct Addressing MOV A, 30 H
Indirect Addressing MOV A, @R0
Indexed Addressing
a. External Direct MOVX A, @DPTR
b. Code In direct MOVC A, @A+DPTR

Timer 0
Timer 0 functions as either a timer or event counter in four modes of operation. Timer 0 is
controlled by the four lower bits of the TMOD register and bits 0, 1, 4 and 5 of the TCON
register

Mode 0 (13-bit Timer)


Mode 0 configures timer 0 as a 13-bit timer which is set up as an 8-bit timer (TH0
register) with a modulo 32 prescaler implemented with the lower five bits of the TL0
register. The upper three bits of TL0 register are indeterminate and should be ignored.
Prescaler overflow increments the TH0 register.

Mode 1 (16-bit Timer)


Mode 1 is the same as Mode 0, except that the Timer register is being run with
all 16 bits. Mode 1 configures timer 0 as a 16-bit timer with the TH0 and TL0
registers connected in cascade. The selected input increments the TL0 register.

Mode 2 (8-bit Timer with Auto-Reload)


Mode 2 configures timer 0 as an 8-bit timer (TL0 register) that automatically reloads
from the TH0 register. TL0 overflow sets TF0 lag in the TCON register and
reloads TL0 with the contents of TH0, which is preset by software.

Mode 3 (Two 8-bit Timers)


Mode 3 configures timer 0 so that registers TL0 and TH0 operate as separate 8-bit
timers. This mode is provided for applications requiring an additional 8-bit timer or
counter .

Timer 1
Timer 1 is identical to timer 0, except for mode 3, which is a hold-count mode .

Mode 3 ( Halt )
Placing Timer 1 in mode 3 causes it to halt and hold its count . This can be
used to halt Timer 1 when TR1 run control bit is not available i.e. , when Timer 0
is in mode 3 .

Baud Rates:
The baud rate in Mode 0 is fixed. The baud rate in Mode 2 depends on the value of bit
SMOD in Special Function Register PCON. If SMOD = 0 (which is its value on reset), the
baud rate is 1/64 the oscillator frequency. If SMOD=1, the baud rate is 1/32 the oscillator
frequency. In the 89S52, the baud rates in Modes 1 and 3 are determined by the Timer 1
overflow rate. In case of Timer 2, these baud rates can be determined by Timer 1, or by
Timer 2, or by both (one for transmit and the other for receive ).

TCON REGISTER:
Timer/counter Control Register
TMOD REGISTER:
Timer/Counter 0 and 1 Modes
2.LCD:
Introduction:
A liquid crystal display (LCD) is a thin, flat display device made up of any
number of color or monochrome pixels arrayed in front of a light source or reflector. Each
pixel consists of a column of liquid crystal molecules suspended between two transparent
electrodes, and two polarizing filters, the axes of polarity of which are perpendicular to each
other. Without the liquid crystals between them, light passing through one would be blocked
by the other. The liquid crystal twists the polarization of light entering one filter to allow it to
pass through the other.

A program must interact with the outside world using input and output devices
that communicate directly with a human being. One of the most common devices attached to
an controller is an LCD display. Some of the most common LCDs connected to the contollers
are 16X1, 16x2 and 20x2 displays. This means 16 characters per line by 1 line 16 characters
per line by 2 lines and 20 characters per line by 2 lines, respectively.

Shapes and Sizes


Line lengths of 8, 16, 20, 24, 32 and 40 characters are all standard, in one, two.

Many microcontroller devices use 'smart LCD' displays to output visual information.
LCD displays designed around LCD NT-C1611 module, are inexpensive, easy to use, and it
is even possible to produce a readout using the 5X7 dots plus cursor of the display. They
have a standard ASCII set of characters and mathematical symbols. For an 8-bit data bus, the
display requires a +5V supply plus 10 I/O lines (RS RW D7 D6 D5 D4 D3 D2 D1 D0). For
a 4-bit data bus it only requires the supply lines plus 6 extra lines(RS RW D7 D6 D5 D4).
When the LCD display is not enabled, data lines are tri-state and they do not interfere with
the operation of the microcontroller.

Features:
(1) Interface with either 4-bit or 8-bit microprocessor.

(2) Display data RAM

(3) 80x8 bits (80 characters).

(4) Character generator ROM


(5). 160 different 5 7 dot-matrix character patterns.

(6) Character generator RAM

(7) 8 different user programmed 5 7 dot-matrix patterns.

(8).Display data RAM and character generator RAM may be accessed by the
microprocessor.

(9) Numerous instructions

(10) .Clear Display, Cursor Home, Display ON/OFF, Cursor ON/OFF,

Blink Character, Cursor Shift, Display Shift.

(11). Built-in reset circuit is triggered at power ON.

(12). Built-in oscillator.

Data can be placed at any location on the LCD. For 16×1 LCD, the address locations are:

Fig : Address locations for a 1x16 line LCD


Even limited to character based modules, there is still a wide variety of shapes and sizes
available. Line lengths of 8,16,20,24,32 and 40 characters are all standard, in one, two and
four line versions.

Some modules are available with back lighting, so that they can be viewed in dimly-lit
conditions. The back lighting may be either “electro-luminescent”, requiring a high voltage
inverter circuit, or simple LED illumination.

Electrical block diagram:

Power supply for LCD driving:


PIN DESCRIPTION:
Most LCDs with 1 controller has 14 Pins and LCDs with 2 controller has 16 Pins (two pins
are extra in both for back-light LED connections).

Fig: pin diagram of 1x16 lines LCD

CONTROL LINES:

EN:
Line is called "Enable." This control line is used to tell the LCD that you are sending it data.
To send data to the LCD, your program should make sure this line is low (0) and then set the
other two control lines and/or put data on the data bus. When the other lines are completely
ready, bring EN high (1) and wait for the minimum amount of time required by the LCD
datasheet (this varies from LCD to LCD), and end by bringing it low (0) again.

RS:
Line is the "Register Select" line. When RS is low (0), the data is to be treated as a command
or special instruction (such as clear screen, position cursor, etc.). When RS is high (1), the
data being sent is text data which sould be displayed on the screen. For example, to display
the letter "T" on the screen you would set RS high.

RW:
Line is the "Read/Write" control line. When RW is low (0), the information on the data bus is
being written to the LCD. When RW is high (1), the program is effectively querying (or
reading) the LCD. Only one instruction ("Get LCD status") is a read command. All others are
write commands, so RW will almost always be low.

Logic status on control lines:

• E - 0 Access to LCD disabled - 1 Access to LCD enabled


• R/W - 0 Writing data to LCD- 1 Reading data from LCD
• RS - 0 Instructions -1 Character
Writing data to the LCD:
1) Set R/W bit to low
2) Set RS bit to logic 0 or 1 (instruction or character)
3) Set data to data lines (if it is writing)
4) Set E line to high
5) Set E line to low
Read data from data lines (if it is reading) on LCD:
1) Set R/W bit to high
2) Set RS bit to logic 0 or 1 (instruction or character)
3) Set data to data lines (if it is writing)
4) Set E line to high
5) Set E line to low

Entering Text:
First, a little tip: it is manually a lot easier to enter characters and commands in hexadecimal
rather than binary (although, of course, you will need to translate commands from binary
couple of sub-miniature hexadecimal rotary switches is a simple matter, although a little bit
into hex so that you know which bits you are setting). Replacing the d.i.l. switch pack with a
of re-wiring is necessary.

The switches must be the type where On = 0, so that when they are turned to the zero
position, all four outputs are shorted to the common pin, and in position “F”, all four outputs
are open circuit.
Initialization by Instructions:

If the power conditions for the normal operation of the internal reset circuit are not
satisfied, then executing a series of instructions must initialize LCD unit. The procedure for
this initialization process is as above show.
3.DC Motor:
Introduction:
A DC motor is designed to run on DC electric power. Two examples of pure DC designs are
Michael Faraday's homopolar motor (which is uncommon), and the ball bearing motor, which
is (so far) a novelty. By far the most common DC motor types are the brushed and brushless
types, which use internal and external commutation respectively to create an oscillating AC
current from the DC source -- so they are not purely DC machines in a strict sense.

Types of DC Motors:
1. Brushed DC Motors

2. Brushless DC motors

3. Coreless DC motors

Brushed DC motors:
The classic DC motor design generates an oscillating current in a wound rotor with a
split ring commutator, and either a wound or permanent magnet stator. A rotor consists of a
coil wound around a rotor which is then powered by any type of battery.

Many of the limitations of the classic commutator DC motor are due to the need for brushes
to press against the commutator. This creates friction. At higher speeds, brushes have
increasing difficulty in maintaining contact. Brushes may bounce off the irregularities in the
commutator surface, creating sparks. This limits the maximum speed of the machine. The
current density per unit area of the brushes limits the output of the motor. The imperfect
electric contact also causes electrical noise. Brushes eventually wear out and require
replacement, and the commutator itself is subject to wear and maintenance. The commutator
assembly on a large machine is a costly element, requiring precision assembly of many parts.
there are three types of dc motor 1. dc series motor 2. dc shunt motor 3. dc compound motor -
these are also two type a. cumulative compound b. differential compound
Brushless DC motors:
Some of the problems of the brushed DC motor are eliminated in the brushless design. In this
motor, the mechanical "rotating switch" or commutator/brush gear assembly is replaced by an
external electronic switch synchronized to the rotor's position. Brushless motors are typically
85-90% efficient, whereas DC motors with brush gear are typically 75-80% efficient.

Midway between ordinary DC motors and stepper motors lies the realm of the brushless DC
motor. Built in a fashion very similar to stepper motors, these often use a permanent magnet
external rotor, three phases of driving coils, one or more Hall effect sensors to sense the
position of the rotor, and the associated drive electronics. The coils are activated, one phase
after the other, by the drive electronics as cued by the signals from the Hall effect sensors. In
effect, they act as three-phase synchronous motors containing their own variable-frequency
drive electronics. A specialized class of brushless DC motor controllers utilize EMF feedback
through the main phase connections instead of Hall effect sensors to determine position and
velocity. These motors are used extensively in electric radio-controlled vehicles. When
configured with the magnets on the outside, these are referred to by modelists as out runner
motors.

Brushless DC motors are commonly used where precise speed control is necessary, as in
computer disk drives or in video cassette recorders, the spindles within CD, CD-ROM (etc.)
drives, and mechanisms within office products such as fans, laser printers and photocopiers.

Modern DC brushless motors range in power from a fraction of a watt to many kilowatts.
Larger brushless motors up to about 100 kW rating are used in electric vehicles. They also
find significant use in high-performance electric model aircraft.

Coreless DC motors:
Nothing in the design of any of the motors described above requires that the iron (steel)
portions of the rotor actually rotate; torque is exerted only on the windings of the
electromagnets. Taking advantage of this fact is the coreless DC motor, a specialized form of
a brush or brushless DC motor. Optimized for rapid acceleration, these motors have a rotor
that is constructed without any iron core. The rotor can take the form of a winding-filled
cylinder inside the stator magnets, a basket surrounding the stator magnets, or a flat pancake
(possibly formed on a printed wiring board) running between upper and lower stator magnets.
The windings are typically stabilized by being impregnated with Electrical epoxy potting
systems. Filled epoxies that have moderate mixed viscosity and a long gel time. These
systems are highlighted by low shrinkage and low exotherm. Typically UL 1446 recognized
as a potting compound for use up to 180C (Class H) UL File No. E 210549.

Because the rotor is much lighter in weight (mass) than a conventional rotor formed from
copper windings on steel laminations, the rotor can accelerate much more rapidly, often
achieving a mechanical time constant under 1 ms. This is especially true if the windings use
aluminum rather than the heavier copper. But because there is no metal mass in the rotor to
act as a heat sink, even small coreless motors must often be cooled by forced air.

These motors were commonly used to drive the capstan(s) of magnetic tape drives and are
still widely used in high-performance servo-controlled systems, like radio-controlled
vehicles/aircraft, humanoid robotic systems, industrial automation, medical devices, etc.

Motor Driver
L293, L293D (QUADRUPLE HALF H-DRIVERS)

Introduction:
The L293 and L293D are quadruple high-current half-H drivers. The L293 is designed
to provide bidirectional drive currents of up to 1 A at voltages from 4.5 V to 36 V. The
L293D is designed to provide bidirectional drive currents of up to 600-mA at voltages from
4.5 V to 36 V. Both devices are designed to drive inductive loads such as relays, solenoids,
dc and bipolar stepping motors, as well as other high-current/high-voltage loads in positive-
supply applications. All inputs are TTL compatible. Each output is a complete totem-pole
drive circuit, with a Darlington transistor sink and a pseudo- Darlington source. Drivers are
enabled in pairs, with drivers 1 and 2 enabled by 1,2EN and drivers 3 and 4 enabled by
3,4EN. When an enable input is high, the associated drivers are enabled, and their outputs are
active and in phase with their inputs. When the enable input is low, those drivers are disabled,
and their outputs are off and in the high-impedance state. With the proper data inputs, each
pair of drivers forms a full-H (or bridge) reversible drive suitable for solenoid or motor
applications.

Features:
 Featuring Unitrode L293 and L293D

Products Now From Texas Instruments

 Wide Supply-Voltage Range: 4.5 V to 36 V

 Separate Input-Logic Supply

 Internal ESD Protection

 Thermal Shutdown

 High-Noise-Immunity Inputs

 Functionally Similar to SGS L293 and


SGS L293D

 Output Current 1 A Per Channel

(600 mA for L293D)

 Peak Output Current 2 A Per Channel

(1.2 A for L293D)

 Output Clamp Diodes for Inductive

Transient Suppression (L293D)

Pin diagram:

Description:
On the L293, external high-speed output clamp diodes should be used for inductive transient
suppression. A VCC1 terminal, separate from VCC2, is provided for the logic inputs to
minimize device power dissipation. The L293and L293D are characterized for operation from
0°C to 70°C.

Block diagram:
Logic diagram:

Applications:
 Audio
 Automotive
 Broadband
 Digital control
 Military
 Optical networking
 Security
 Telephony
 Video & Imaging
 Wire less

4.RFID module
A radio frequency identification reader (RFID reader) is a device used to gather information
from an RFID tag, which is used to track individual objects. Radio waves are used to transfer
data from the tag to a reader.

RFID is a technology similar in theory to bar codes. However, the RFID tag does not have to
be scanned directly, nor does it require line-of-sight to a reader. The RFID tag it must be
within the range of an RFID reader, which ranges from 3 to 300 feet, in order to be read.
RFID technology allows several items to be quickly scanned and enables fast identification of
a particular product, even when it is surrounded by several other items.

RFID tags have not replaced bar codes because of their cost and the need to individually
identify every item.

Techopedia explains Radio Frequency Identification Reader (RFID Reader)


RFID technology may be used in a variety of applications including:

 Passports

 Smart cards

 Airplane luggage

 Toll booth passes

 Home appliances

 Merchandise tags

 Animal and pet tags

 Automobile key-and-lock
 Monitoring heart patients

 Pallet tracking for inventory

 Telephone and computer networks

 Operation of spacecraft and satellites

RFID technology uses digital data in an RFID tag, which is made up of integrated circuits
containing a tiny antenna for transferring information to an RFID transceiver. The majority of
RFID tags contain at least an integrated circuit for modulating and demodulating radio
frequency and an antenna for transmitting and receiving signals. Frequency ranges vary from
low frequencies of 125 to 134 kHz and 140 to 148.5 kHz, and high frequencies of 850 to 950
MHz and 2.4 to 2.5 GHz. Wavelengths in the 2.4 GHz range are limited because they can be
absorbed by water.

5.MAX232

Introduction:
A standard serial interface for PC, RS232C, requires negative logic, i.e., logic 1 is -3V
to -12V and logic 0 is +3V to +12V. To convert TTL logic, say, TxD and RxD pins of the
microcontroller thus need a converter chip. A MAX232 chip has long been using in many
microcontrollers boards. It is a dual RS232 receiver / transmitter that meets all RS232
specifications while using only +5V power supply. It has two onboard charge pump voltage
converters which generate +10V to -10V power supplies from a single 5V supply. It has four
level translators, two of which are RS232 transmitters that convert TTL/CMOS input levels
into +9V RS232 outputs. The other two level translators are RS232 receivers that convert
RS232 input to 5V. Typical MAX232 circuit is shown below.
Features:

1. Operates With Single 5-V Power Supply


2.LinBiCMOSE Process Technology
3.Two Drivers and Two Receivers
4.±30-V Input Levels
5.Low Supply Current . 8 mA Typical
6.Meets or Exceeds TIA/EIA-232-F and ITU
Recommendation V.28
7.Designed to be Interchangeable With
Maxim MAX232
8.Applications
TIA/EIA-232-F
Battery-Powered Systems
Terminals
Modems
Computers
9.ESD Protection Exceeds 2000 V Per
MIL-STD-883, Method 3015
10.Package Options Include Plastic
Small-Outline (D, DW) Packages and
Standard Plastic (N) DIPs

Circuit connections:
A standard serial interfacing for PC, RS232C, requires negative logic, i.e., logic '1' is -3V
to -12V and logic '0' is +3V to +12V. To convert a TTL logic, say, TxD and RxD pins of the
uC chips, thus need a converter chip. A MAX232 chip has long been using in many uC
boards. It provides 2-channel RS232C port and requires external 10uF capacitors. Carefully
check the polarity of capacitor when soldering the board. A DS275 however, no need external
capacitor and smaller. Either circuit can be used without any problems.

7.Power supply
Power supply is a reference to a source of electrical power. A device or system that supplies
electrical or other types of energy to an output load or group of loads is called a power supply
unit or PSU. The term is most commonly applied to electrical energy supplies, less often to
mechanical ones, and rarely to others
This power supply section is required to convert AC signal to DC signal and also to
reduce the amplitude of the signal. The available voltage signal from the mains is 230V/50Hz
which is an AC voltage, but the required is DC voltage(no frequency) with the amplitude of
+5V and +12V for various applications.

In this section we have Transformer, Bridge rectifier, are connected serially and voltage
regulators for +5V and +12V (7805 and 7812) via a capacitor (1000µF) in parallel are
connected parallel as shown in the circuit diagram below. Each voltage regulator output is
again is connected to the capacitors of values (100µF, 10µF, 1 µF, 0.1 µF) are connected
parallel through which the corresponding output(+5V or +12V) are taken into consideration.

Circuit Explanation

1) Transformer
A transformer is a device that transfers electrical energy from one circuit to another through
inductively coupled electrical conductors. A changing current in the first circuit (the primary)
creates a changing magnetic field; in turn, this magnetic field induces a changing voltage in
the second circuit (the secondary). By adding a load to the secondary circuit, one can make
current flow in the transformer, thus transferring energy from one circuit to the other.
The secondary induced voltage VS, of an ideal transformer, is scaled from the primary VP by
a factor equal to the ratio of the number of turns of wire in their respective windings:

Basic principle
The transformer is based on two principles: firstly, that an electric current can produce a
magnetic field (electromagnetism) and secondly that a changing magnetic field within a coil
of wire induces a voltage across the ends of the coil (electromagnetic induction). By changing
the current in the primary coil, it changes the strength of its magnetic field; since the
changing magnetic field extends into the secondary coil, a voltage is induced across the
secondary.

A simplified transformer design is shown below. A current passing through the primary
coil creates a magnetic field. The primary and secondary coils are wrapped around a core of
very high magnetic permeability, such as iron; this ensures that most of the magnetic field
lines produced by the primary current are within the iron and pass through the secondary coil
as well as the primary coil.

An ideal step-down transformer showing magnetic flux in the core

Induction law
The voltage induced across the secondary coil may be calculated from Faraday's law of
induction, which states that:
Where VS is the instantaneous voltage, NS is the number of turns in the secondary coil and Φ
equals the magnetic flux through one turn of the coil. If the turns of the coil are oriented
perpendicular to the magnetic field lines, the flux is the product of the magnetic field strength
B and the area A through which it cuts. The area is constant, being equal to the cross-
sectional area of the transformer core, whereas the magnetic field varies with time according
to the excitation of the primary. Since the same magnetic flux passes through both the
primary and secondary coils in an ideal transformer, the instantaneous voltage across the
primary winding equals

Taking the ratio of the two equations for VS and VP gives the basic equation for stepping up or
stepping down the voltage

Ideal power equation


If the secondary coil is attached to a load that allows current to flow, electrical power is
transmitted from the primary circuit to the secondary circuit. Ideally, the transformer is
perfectly efficient; all the incoming energy is transformed from the primary circuit to the
magnetic field and into the secondary circuit. If this condition is met, the incoming electric
power must equal the outgoing power.

Pincoming = IPVP = Poutgoing = ISVS

giving the ideal transformer equation

Pin-coming = IPVP = Pout-going = ISVS


giving the ideal transformer equation,

If the voltage is increased (stepped up) (VS > VP), then the current is decreased (stepped
down) (IS < IP) by the same factor. Transformers are efficient so this formula is a reasonable
approximation.

If the voltage is increased (stepped up) (VS > VP), then the current is decreased (stepped
down) (IS < IP) by the same factor. Transformers are efficient so this formula is a reasonable
approximation.

The impedance in one circuit is transformed by the square of the turns ratio. For example, if
an impedance ZS is attached across the terminals of the secondary coil, it appears to the
primary circuit to have an impedance of

This relationship is reciprocal, so that the impedance ZP of the primary circuit appears to the
secondary to be

Detailed operation
The simplified description above neglects several practical factors, in particular the primary
current required to establish a magnetic field in the core, and the contribution to the field due
to current in the secondary circuit.

Models of an ideal transformer typically assume a core of negligible reluctance with two
windings of zero resistance. When a voltage is applied to the primary winding, a small
current flows, driving flux around the magnetic circuit of the core. The current required to
create the flux is termed the magnetizing current; since the ideal core has been assumed to
have near-zero reluctance, the magnetizing current is negligible, although still required to
create the magnetic field.

The changing magnetic field induces an electromotive force (EMF) across each winding.
Since the ideal windings have no impedance, they have no associated voltage drop, and so the
voltages VP and VS measured at the terminals of the transformer, are equal to the
corresponding EMFs. The primary EMF, acting as it does in opposition to the primary
voltage, is sometimes termed the "back EMF". This is due to Lenz's law which states that the
induction of EMF would always be such that it will oppose development of any such change
in magnetic field.
2) Bridge Rectifier
A diode bridge or bridge rectifier is an arrangement of four diodes in a bridge configuration
that provides the same polarity of output voltage for any polarity of input voltage. When used
in its most common application, for conversion of alternating current (AC) input into direct
current (DC) output, it is known as a bridge rectifier. A bridge rectifier provides full-wave
rectification from a two-wire AC input, resulting in lower cost and weight as compared to a
center-tapped transformer design, but has two diode drops rather than one, thus exhibiting
reduced efficiency over a center-tapped design for the same output voltage.

Basic Operation
When the input connected at the left corner of the diamond is positive with respect to the one
connected at the right hand corner, current flows to the right along the upper colored path to
the output, and returns to the input supply via the lower one.

When the right hand corner is positive relative to the left hand corner, current flows along the
upper colored path and returns to the supply via the lower colored path.

In each case, the upper right output remains positive with respect to the lower right one. Since
this is true whether the input is AC or DC, this circuit not only produces DC power when
supplied with AC power: it also can provide what is sometimes called "reverse polarity
protection". That is, it permits normal functioning when batteries are installed backwards or
DC input-power supply wiring "has its wires crossed" (and protects the circuitry it powers
against damage that might occur without this circuit in place).

Prior to availability of integrated electronics, such a bridge rectifier was always constructed
from discrete components. Since about 1950, a single four-terminal component containing
the four diodes connected in the bridge configuration became a standard commercial
component and is now available with various voltage and current ratings.

Output smoothing (Using Capacitor)


For many applications, especially with single phase AC where the full-wave bridge serves to
convert an AC input into a DC output, the addition of a capacitor may be important because
the bridge alone supplies an output voltage of fixed polarity but pulsating magnitude (see
diagram above).

The function of this capacitor, known as a reservoir capacitor (aka smoothing capacitor) is to
lessen the variation in (or 'smooth') the rectified AC output voltage waveform from the
bridge. One explanation of 'smoothing' is that the capacitor provides a low impedance path to
the AC component of the output, reducing the AC voltage across, and AC current through,
the resistive load. In less technical terms, any drop in the output voltage and current of the
bridge tends to be cancelled by loss of charge in the capacitor.

This charge flows out as additional current through the load. Thus the change of load current
and voltage is reduced relative to what would occur without the capacitor. Increases of
voltage correspondingly store excess charge in the capacitor, thus moderating the change in
output voltage / current. Also see rectifier output smoothing.

The simplified circuit shown has a well deserved reputation for being dangerous, because, in
some applications, the capacitor can retain a lethal charge after the AC power source is
removed. If supplying a dangerous voltage, a practical circuit should include a reliable way to
safely discharge the capacitor. If the normal load can not be guaranteed to perform this
function, perhaps because it can be disconnected, the circuit should include a bleeder resistor
connected as close as practical across the capacitor. This resistor should consume a current
large enough to discharge the capacitor in a reasonable time, but small enough to avoid
unnecessary power waste.

Because a bleeder sets a minimum current drain, the regulation of the circuit, defined as
percentage voltage change from minimum to maximum load, is improved. However in many
cases the improvement is of insignificant magnitude.

The capacitor and the load resistance have a typical time constant τ = RC where C and R are
the capacitance and load resistance respectively. As long as the load resistor is large enough
so that this time constant is much longer than the time of one ripple cycle, the above
configuration will produce a smoothed DC voltage across the load.

In some designs, a series resistor at the load side of the capacitor is added. The smoothing can
then be improved by adding additional stages of capacitor–resistor pairs, often done only for
sub-supplies to critical high-gain circuits that tend to be sensitive to supply voltage noise.

Output can also be smoothed using a choke and second capacitor. The choke tends to keep
the current (rather than the voltage) more constant. Due to the relatively high cost of an
effective choke compared to a resistor and capacitor this is not employed in modern
equipment.

Some early console radios created the speaker's constant field with the current from the high
voltage ("B +") power supply, which was then routed to the consuming circuits, (permanent
magnets were considered too weak for good performance) to create the speaker's constant
magnetic field. The speaker field coil thus performed 2 jobs in one: it acted as a choke,
filtering the power supply, and it produced the magnetic field to operate the speaker.

3) Voltage Regulator
A voltage regulator is an electrical regulator designed to automatically maintain a constant
voltage level.

The 78xx (also sometimes known as LM78xx) series of devices is a family of self-contained
fixed linear voltage regulator integrated circuits. The 78xx family is a very popular choice for
many electronic circuits which require a regulated power supply, due to their ease of use and
relative cheapness. When specifying individual ICs within this family, the xx is replaced with
a two-digit number, which indicates the output voltage the particular device is designed to
provide (for example, the 7805 has a 5 volt output, while the 7812 produces 12 volts). The
78xx line is positive voltage regulators, meaning that they are designed to produce a voltage
that is positive relative to a common ground. There is a related line of 79xx devices which are
complementary negative voltage regulators. 78xx and 79xx ICs can be used in combination to
provide both positive and negative supply voltages in the same circuit, if necessary.

78xx ICs have three terminals and are most commonly found in the TO220 form factor,
although smaller surface-mount and larger TrO3 packages are also available from some
manufacturers. These devices typically support an input voltage which can be anywhere from
a couple of volts over the intended output voltage, up to a maximum of 35 or 40 volts, and
can typically provide up to around 1 or 1.5 amps of current (though smaller or larger
packages may have a lower or higher current rating).

2.2.2 Software
Keil development tools for the 8051 Microcontroller Architecture support every level of
software developer from the professional applications engineer to the student just learning
about embedded software development.

The industry-standard Keil C Compilers, Macro Assemblers, Debuggers, Real-time Kernels,


Single-board Computers, and Emulators support all 8051 derivatives and help you get your
projects completed on schedule.

2.3 Principle of Operation

RFID belongs to a group of technologies referred to as Automatic Identification


and Data Capture (AIDC). AIDC methods automatically identify objects, collect data about
them, and enter those data directly into computer systems with little or no human
intervention.

RFID methods utilize radio waves to accomplish this. At a simple level, RFID
systems consist of three components: an RFID tag or smart label, an RFID
reader, and an antenna. RFID tags contain an integrated circuit and an antenna,
which are used to transmit data to the RFID reader (also called an interrogator).
The reader then converts the radio waves to a more usable form of data.
Information collected from the tags is then transferred through a
communications interface to a host computer system, where the data can be
stored in a database and analysed at a later time.
CHAPTER-3
SYSTEM DESIGN DESCRIPTION

3.1 Architecture

Power supply

16x2 LCD

RFID
Reader
MAX 232 Micro Driver
controller circuit
Gate

The figure shows the functional view of our development which includes all the software
tools and the coding process is explained in the further chapters. This is just a brief
introduction of what tools we are going to use in our project.
3.2 Application Configuration

\\ This application is used to monitor the trips of a registered RFID card that
passes through a specific toll booth over a given period of time and gives us all the
data including the amount that was deducted during the visit, the time and date at
which the transaction was made which are stored in the servers. Furthermore, the
system can also be used to refill the cards in which balance is lower than what is
sufficient without any hiccups to the users.

This application ensures the faster commute of users than the usual ways
through the tolls and plays a major role in saving time and helps in reducing the
consumption of paper by not printing the tickets.

This application at higher level also makes sure that the users not only save
time but also save fuel by reducing the need to come to a complete halt and thereby
reducing the need for breaking and accelerating in frequent intervals of time which in
turn saves a considerable amount of fuel.
CHAPTER-4

IMPLEMENTATION AND DEVELOPMENT OF


APPLICATION

4.1 Software learning


4.1.1 Installing the Keil software on a Windows PC
 Insert the CD-ROM in your computer’s CD drive
 On most computers, the CD will “auto run”, and you will see the Keil installation
menu. If the menu does not appear, manually double click on the Setup icon, in the
root directory: you will then see the Keil menu.
 On the Keil menu, please select “Install Evaluation Software”. (You will not require a
license number to install this software).
 Follow the installation instructions as they appear.

4.1.2 Loading the Projects


The example projects for this book are NOT loaded automatically when you install
the Keil compiler.
These files are stored on the CD in a directory “/Pont”. The files are arranged by
chapter: for example, the project discussed in Chapter 3 is in the directory
“/Pont/Ch03_00-Hello”.
Rather than using the projects on the CD (where changes cannot be saved), please
copy the files from CD onto an appropriate directory on your hard disk.
Note: you will need to change the file properties after copying: file transferred from
the CD will be ‘read only’

4.1.3 Configuring the Simulator


Open the Keil Vision2

Go to Project – Open Project and browse for Hello in Ch03_00 in Pont and open it.
Go to Project – Select Device for Target ‘Target1’

Select 8052(all variants) and click OK


Now we need to check the oscillator frequency:
Go to project – Options for Target ‘Target1’

Make sure that the oscillator frequency is 12MHz.


4.1.4 Building the Target

Build the target as illustrated in the figure below

Running the Simulation


Having successfully built the target, we are now ready to start the debug session and
run the simulator.
First start a debug session

The flashing LED we will view will be connected to Port 1. We therefore want to
observe the activity on this port
To ensure that the port activity is visible, we need to start the ‘periodic window
update’ flag
Go to Debug - Go

While the simulation is running, view the performance analyzer to check the delay
durations.
Go to Debug – Performance Analyzer and click on it

Double click on DELAY_LOOP_Wait in Function Symbols: and click Define button


4.2 Code
#include<LPC214x.h>
#include"lcd.h"
#include<string.h>
#include"serial.h"
#include"gpio.h"
#define obj P0_21 //p0.2
#define MTR1_ON() IO1SET=(1<<26) //Macro Functions to turn ON LED
#define MTR2_ON() IO1SET=(1<<27)
#define MTR3_ON() IO1SET=(1<<28) //MAIN ROBOT PINS
#define MTR4_ON() IO1SET=(1<<29)
#define MTR1_OFF() IO1CLR=(1<<26) //Macro Functions to turn OFF LED
#define MTR2_OFF() IO1CLR=(1<<27)
#define MTR3_OFF() IO1CLR=(1<<28)
#define MTR4_OFF() IO1CLR=(1<<29)
void pin()
{
PINSEL0=0x00050005;//SELECTING PIN OPERATION
PINSEL1=0x00000000;
PINSEL2=0x00000000;
IODIR0 =0xFFFFFFFF;// as output and 2 pins as input
IODIR1 =0xFFFFFFFF;//PORT1 AS OUTPUT
}
char inp0(unsigned long int pinNumber)
{
unsigned long int pinBlockState = IOPIN0;
int pinState = (pinBlockState & (/*1 <<*/ pinNumber)) ? 1 : 0;
return pinState;
}
int main()
{
unsigned int sc=0;
unsigned char object;
unsigned char p=0,rfid_t[12];

for(p=0;p<12;p++){rfid_t[p]=0;}
pin();
initlcd();
IODIR0&=~((1<<21)|(1<<22));
object=inp0(obj);
ser_init_0(0x61,0x00);
ser_init_1(0x61,0x00); //serial initilization 9600
clcd(0x01);delay(10);
stringlcd(0x80," RFID BASED ");
stringlcd(0xC0," TOLL TAX ");
delay(20000);
clcd(0x01);
stringlcd(0x80," COLLECTION ");
stringlcd(0xC0," SYSTEM ");
delay(20000);

while(1)
{
sc=0;
stringlcd(0x01," Swipe your card");
for(p=0;p<12;p++)
{
rfid_t[p]=receive_0();
}

//stringlcd(0x80,rfid_t);delay(2000);
clcd(0xc0);
if(!strcmp(rfid_t,"14001A8423A9"))
{
stringlcd(0x01," MEGHANA ");
stringlcd(0xC0," TS01 EG 2801 ");
delay(10000);
stringlcd(0x01," AMOUNT DEBITED");
stringlcd(0xC0," RUPEES:120/- ");
delay(10000);
stringlcd(0x01," PLEASE GO... ");
delay(10000);
MTR1_ON();MTR2_OFF();MTR3_ON();MTR4_OFF();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();

while(sc!=1)
{
object=inp0(obj);
if(object==1)
{
MTR1_OFF();MTR2_ON();MTR3_OFF();MTR4_ON();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();
sc=1;
}
}
}
if(!strcmp(rfid_t,"14001B3ADFEA"))
{
stringlcd(0x01," RAVALI ");
stringlcd(0xC0," TS01 EE 5342 ");
delay(10000);
stringlcd(0x01," AMOUNT DEBITED");
stringlcd(0xC0," RUPEES:85/- ");
delay(10000);
stringlcd(0x01," PLEASE GO... ");
delay(10000);
MTR1_ON();MTR2_OFF();MTR3_ON();MTR4_OFF();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();

while(sc!=1)
{
object=inp0(obj);
if(object==1)
{
MTR1_OFF();MTR2_ON();MTR3_OFF();MTR4_ON();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();
sc=1;
}
}
}
if(!strcmp(rfid_t,"14001AAB7DD8"))
{
stringlcd(0x01," NAGENDRA ");
stringlcd(0xC0," TS01 EA 6067 ");
delay(10000);
stringlcd(0x01," AMOUNT DEBITED");
stringlcd(0xC0," RUPEES:135/- ");
delay(10000);
stringlcd(0x01," PLEASE GO... ");
delay(10000);
MTR1_ON();MTR2_OFF();MTR3_ON();MTR4_OFF();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();

while(sc!=1)
{
object=inp0(obj);
if(object==1)
{
MTR1_OFF();MTR2_ON();MTR3_OFF();MTR4_ON();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();
sc=1;
}
}
}
if(!strcmp(rfid_t,"14001B2B0420"))
{
stringlcd(0x01," KIRAN ");
stringlcd(0xC0," TS16 EE 4885 ");
delay(10000);
stringlcd(0x01," AMOUNT DEBITED");
stringlcd(0xC0," RUPEES:135/- ");
delay(10000);
stringlcd(0x01," PLEASE GO... ");
delay(10000);
MTR1_ON();MTR2_OFF();MTR3_ON();MTR4_OFF();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();

while(sc!=1)
{
object=inp0(obj);
if(object==1)
{
MTR1_OFF();MTR2_ON();MTR3_OFF();MTR4_ON();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();
sc=1;
}
}
}
if(!strcmp(rfid_t,"14001AC3804D"))
{
stringlcd(0x01," AZEES ");
stringlcd(0xC0," TS01 EG 6662 ");
delay(10000);
stringlcd(0x01," AMOUNT DEBITED");
stringlcd(0xC0," RUPEES:120/- ");
delay(10000);
stringlcd(0x01," PLEASE GO... ");
delay(10000);
MTR1_ON();MTR2_OFF();MTR3_ON();MTR4_OFF();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();

while(sc!=1)
{
object=inp0(obj);
if(object==1)
{
MTR1_OFF();MTR2_ON();MTR3_OFF();MTR4_ON();
delay(10000);
MTR1_OFF();MTR2_OFF();MTR3_OFF();MTR4_OFF();
sc=1;
}
}
}
}
}

4.3 Result

On successful placement of the ID provided on the RFID module a


short beep will be heard indicating the card is read and then the amount is
debited from it and the barricade is then lifted for a stipulated period of time and
then the barricade shuts down returning to its idle state. This results in a faster
commute system without the issues of having improper denominations of
currency and also ensures that no faulters have any chance of fleeing. This is an
effective method which needs to be applied throughout the tollgates in India and
especially in the tolls which have high long queues.
CHAPTER-5
ADVANTAGES AND APPLICATIONS
ADVANTAGES:
Tag detection not requiring human intervention reduces employment costs and eliminates
human errors from data collection,

1. As no line-of-sight is required, tag placement is less constrained,


2. RFID tags have a longer read range than, e. g., barcodes,
3. Tags can have read/write memory capability, while barcodes do not,
4. An RFID tag can store large amounts of data additionally to a unique identifier,
5. Unique item identification is easier to implement with RFID than with barcodes,
6. Its ability to identify items individually rather than generically.
7. Tags are less sensitive to adverse conditions (dust, chemicals, physical damage etc.),
8. Many tags can be read simultaneously,
9. RFID tags can be combined with sensors,
10. Automatic reading at several places reduces time lags and inaccuracies in an
inventory,
11. Tags can locally store additional information; such distributed data storage may
increase fault tolerance of the entire system,
12. Reduces inventory control and provisioning costs,
13. Reduces warranty claim processing costs.

APPLICATION:

RFID applications in the public sector.

IT Asset Tracking

1. Institutions with large IT assets with numerous data centres.

Race Timing

1. Registering race start and end timings for individuals in a marathon type race.
2. Individuals wear a chest number containing passive tags which are read by antennae
placed alongside the track.
3. Rush error, lap count errors and accidents at start time are avoided.

E-Passport

1. Pioneer: Malaysia(1998)visual data page, travel history


2. Norway( 2005), Japan, EU, UK, Australia, US, Serbia

Transportation Payments

1. Gurgaon, Noida: Tollway


2. Mumbai: Integrated transport buses and local trains
3. United States: Chicago Transit Authority’s Card for Metro, Metra, CTA buses &
PACE buses fare payments (2002)
4. Animal tracking tags, inserted beneath the skin, can be rice sized.
5. Tags can be screw shaped to identify trees or wooden items.
6. Credit card shaped for use in access applications.
7. The antitheft hard plastic tags attached to merchandise in stores are also RFID tags.
8. Heavy-duty 120 by 100 by 50 millimetre rectangular transponders are used to track
shipping containers, or heavy machinery, trucks, and railroad cars.

Zombie RFID tag

1. A tag that can be temporarily deactivated when it leaves the store.


2. The process would work like this: you bring your purchase up to the register, the
RFID scanner reads the item, you pay for it and as you leave the store, you pass a
special device that sends a signal to the RFID tag to "die." That is, it is no longer
readable.
3. The "zombie" element comes in when you bring an item back to the store. A special
device especially made for that kind of tag "reanimates" the RFID tag, allowing the
item to re-enter the supply chain.
CHAPTER-6

CONCLUSION & FUTURE SCOPE

CONCLUSION:
The paper gave an overview of the current state and trends of RFID technology. Even though
numerous limitations and unresolved issues still hinder the widespread application of RFID.
Despite these challenges, RFID continues to make inroads into inventory control systems,
and it’s only a matter of time before the component costs fall low enough to make RFID an
attractive economic proposition. Furthermore, extensive engineering efforts are under way to
overcome current technical limitations and to build accurate and reliable tag reading systems.
We might also start to see economic pressure from the larger distributors to modify product
packaging and its associated materials to more effectively integrate RFID. Finally, at this
delicate stage, while major corporations are trialing the technology, media reaction and
outspoken privacy groups can influence the rules by which we use the technology. RFID’s
potential benefits are large, and we’re sure to see many novel applications n the future—some
of which we can’t even begin to imagine. The components that go into RFID readers and tags
are simple radio communications, but their smaller size and broad deployment enhance the
power of the technology and raise concerns about the privacy effects of RFID deployment.
These concerns are often premised on unlikely assumptions about where the technology will
go and how it will be used.

FUTURE SCOPE:

Some of the future scope for RFID based security system is listed below

1. Health Services The card can be used to store information such as administrative,
medical, biological, and pharmaceutical records. The card simplifies the
administrative process and enables doctors to have access to a more complete and
comprehensive healthcare information.
2. Education The card has the function of identifying the student and also acts as an
electronic purse and can be used purchase products from stores or tickets to public
transportation.
3. Transportation Rechargeable contact-less cards allow ticket-less and cash-less travels.
Parking and telecommunications can also be paid using the smart card. This will
simplify the passenger boarding process.
4. Welfare Card can be used to identify the holder using a series of personal keys and
fingerprint. The card holder then uses the card to access government databases and
receive the welfare payment. The security will help eliminate fraud.
REFERENCES

1. Mandeep Kaur, Manjeet Sandhu, Neeraj Mohan and Parvinder S. Sandhu RFID
Technology Principles, Advantages, Limitations & Its Applications, IJCEE, Vol.3,
No.1, February, 2011 1793-8163.
2. [2]. T. Kindberg et al., ―People, Places, and Things: Web Presence of the Real
World,‖ ACM Mobile Networks & Applications J., 2002, pp. 365–376.
3. [3]. R. Singel, ―American Passports to GetvChipped,‖ Wired News, 19 Oct.
2004;vwww.wired.com/news/privacy/0,1848,v65412,00.html.
4. [4]. Dibyendu Bikash Datta, Radio Frequency Identification Technology: An
Overview of its Components, Principles and Applications.(IJSETR), Volume 5, Issue
2, February 2016
5. [5]. Juels, A., Rivest, R. L., & Szydlo, M. (2003, October). The blocker tag: Selective
blocking of RFID tags for consumer privacy. In Proceedings of the 10th ACM
conference on Computer and communications security ( 103-111). ACM.9

Vous aimerez peut-être aussi