You are on page 1of 21

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

INTRODUCTION
1.1 EMBEDDED SYSTEM:
An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a generalpurpose computer, such as a personal computer, an embedded system performs one or a few predefined tasks, usually with very specific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. In terms of complexity embedded systems can range from very simple with a single microcontroller chip, to very complex with multiple units, peripherals and networks mounte

1.3 CHARACTERISTICS:
Embedded systems often use a (relatively) slow processor and small memory size with an intentionally simplified architecture to minimize costs. Programs on embedded systems must often run with limited resources Embedded system designers use compilers to develop an embedded system. They often have no operating system or a speciali8zed embedded operating system (often a real-time operating system ). Programs on an embedded system often must run with resources: often there is no disk drive, operating system, keyboard or screen. may replace rotating media, and a small keypad and screen may be used instead of a PC's keyboard and screen. Embedding a computer is to interact with the environment, often by monitoring and controlling external machinery. In order to do this, analog inputs and outputs must be transformed to and from digital signal levels.

1.4 APPLICATIONS OF EMBEDDED SYSTEMS:


Some widely used applications of embedded systems are listed below:

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

Cellular telephones. Computer network. Disc drives. Thermo stats. Security monitoring systems. Hand held calculations. House-hold appliances. Inertial guided systems. Flight control hardware / software. Medical equipment.

2. BLOCK DIAGRAM AND SCHEMATIC DIAGRAM


2.1BLOCK-DIAGRAM

FIG 2.1 Block diagram of vehicle monitoring and security system


2

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

2.2 BLOCK DIAGRAM EXPLANATION:

The project GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM deals with the design & development of a theft control system for automobiles which is being used to prevent / control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. An interfacing mobile is also connected to the microcontroller, which is in turn, connected to the engine. Once, the vehicle is being stolen, the information is being used by the vehicle owner for further processing. The information is passed onto the central processing insurance system, where by sitting at a remote place, a particular number is dialed by them to the interfacing mobile that is with the hardware kit which is installed in the vehicle. By reading the signals received by the mobile, one can control the ignition of the engine; say to lock it or to stop the engine immediately. Again it will come to the normal condition only after entering a secured password. The owner of the vehicle & the centre processing system will know this secured password. We can modify this concept such that the vehicle owner also can lock the vehicle from his mobile phone. The main concept in this design is introducing the mobile communications into the embedded system. With the help of SIM tracking knows the location of vehicle and informs to the local police or stops it from further movement.

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

2.3 SCHEMATIC DIAGRAM:

Fig 2.2 schematic diagram

2.4 SCHEMATIC DESCRIPTION:


The operation of this circuit mainly depends on the MEM sensor. The actual position of the MEM sensor should be 90 degrees with respect to ground. If there is any change in the actual position of the MEM a control signal will be given to the ADC. The ADC will convert the analog signal to the digital signal and it will send the digital signal to the micro controller. Micro controller will send a signal to the GSM module. As GSM receives a signal from micro controller it informs the owner as vehicle theft detected through an SMS. When the owner receives the above message he will send a message to the GSM module to lock the engine. As the GSM receives a secret code from the owner it sends a signal to the
4

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

micro controller and the micro controller will lock the engine. As this is a protocol we have shown the locking of the engine by glowing led. After locking the engine, the owner can able to find the location of the Automobile by using the signals generated by GSM. After reaching the position where vehicle was locked, the owner enters an secret code to unlock the engine. In this way we can protect the vehicles. And we can also use this as a accident sensor.

3. HARDWARE COMPONENTS
3.1 MICRO CONTROLLER (AT89S52) 3.1.1 INTRODUCTION:
A Micro controller consists of a powerful CPU tightly coupled with memory, various I/O interfaces such as serial port, parallel port timer or counter, interrupt controller, data acquisition interfaces-Analog to Digital converter, Digital to Analog converter, integrated on to a single silicon chip. If a system is developed with a microprocessor, the designer has to go for external memory such as RAM, ROM, EPROM and peripherals. But controller is provided all these facilities on a single chip. Development of a Micro controller reduces PCB size and cost of design. One of the major differences between a Microprocessor and a Micro controller is that a controller often deals with bits not bytes as in the real world application. Intel has introduced a family of Micro controllers called the MCS-51.

NECESSITY OF MICROCONTROLLERS:

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

Microprocessors brought the concept of programmable devices and made many applications of intelligent equipment. Most applications, which do not need large amount of data and program memory, tended to be: Costly: The microprocessor system had to satisfy the data and program requirements so, sufficient RAM and ROM are used to satisfy most applications .The peripheral control equipment also had to be satisfied. Therefore, almost all-peripheral chips were used in the design. Because of these additional peripherals cost will be comparatively high. An example: 8085 chip needs An Address latch for separating address from multiplex address and data.32KB RAM and 32-KB ROM to be able to satisfy most applications. As also Timer / Counter, Parallel programmable port, Serial port, Interrupt controller are needed for its efficient applications. In comparison a typical Micro controller 8052 chip has all that the 8052 board has except a reduced memory as follows. 4K bytes of ROM as compared to 32-KB, 128 Bytes of RAM as compared to 32-KB. Bulky: On comparing a board full of chips (Microprocessors) with one chip with all components in it (Micro controller) Debugging: Lots of Microprocessor circuitry and program to debug. In Micro controller there is no Microprocessor circuitry to debug. Slower Development time: As we have observed Microprocessors need a lot of debugging at board level and at program level, whereas, Micro controller do not have the excessive circuitry and the built-in peripheral chips are easier to program for operation.

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

So peripheral devices like Timer/Counter, Parallel programmable port, Serial Communication Port, Interrupt controller and so on, which were most often used were integrated with the Microprocessor to present the Micro controller .RAM and ROM also were integrated in the same chip. The ROM size was anything from 256 bytes to 32Kb or more. RAM was optimized to minimum of 64 bytes to 256 bytes or more. Typical Micro controllers have all the following features: 8/16/32 CPU Instruction set rich in I/O & bit operations. One or more I/O ports. One or more timer/counters. One or more interrupt inputs and an interrupt controller One or more serial communication ports. Analog to Digital /Digital to Analog converter One or more PWM output Network controlled interface

Why AT 89C52? : The system requirements and control specifications clearly rule out the use of 16, 32 or 64 bit micro controllers or microprocessors. Systems using these may be earlier to implement due to large number of internal features. They are also faster and more reliable but, the above application is satisfactorily served by 8-bit micro controller. Using an inexpensive 8-bit Micro controller will doom the 32-bit product failure in any competitive market place. Coming to the question of why to use AT89C52 of all the 8-bit Micro controller available in the market the main answer would be because it has 8 Kb on chip flash memory which is just sufficient for our application. The on-chip Flash ROM allows the program memory
7

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

to be reprogrammed in system or by conventional non-volatile memory Programmer. Moreover ATMEL is the leader in Flash technology in todays market place and hence using AT 89C52 is the optimal solution. 8052 micro controller architecture: The 8052 architecture consists of these specific features: Compatible with MCS-51 Products 8K Bytes of In-System Programmable (ISP) Flash 4.0V to 5.5V Operating Range Fully Static Operation: 0 Hz to 33 MHz Three-level Program Memory Lock 256 x 8-bit Internal RAM 32 Programmable I/O Lines Three 16-bit Timer/Counters Eight Interrupt Sources Full Duplex UART Serial Channel Low-power Idle and Power-down Modes Interrupt Recovery from Power-down Mode Watchdog Timer Dual Data Pointer Power-off Flag

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

Fast Programming Time Flexible ISP Programming (Byte and Page Mode)

3.1.2 PIN DIAGRAM:

Fig -3.1.2 Pin out diagram of 89C52 ic


I/O ports:
9

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

One major feature of a microcontroller is the versatility built into the input/output (I/O) circuits that connect the 8052 to the outside world. The main constraint that limits numerous functions is the number of pins available in the 8052 circuit. The DIP had 40 pins and the success of the design depends on the flexibility incorporated into use of these pins. For this reason, 24 of the pins may each used for one of the two entirely different functions which depend, first, on what is physically connected to it and, then, on what software programs are used to program the pins. Port 0 Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high-impedance inputs. Port 0 can also be configured to be the multiplexed low-order address/data bus during accesses to external program and data memory. In this mode, P0 has internal pull-ups. Port 0 also receives the code bytes during Flash programming and outputs the code bytes during program verification. External pull-ups are required during program verification. Port 1 Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the inter-nal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as shown in the follow-ing table. Port 1 also receives the low-order address bytes during Flash programming and verification. Port 2 Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the inter-nal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and dur-ing accesses to external data
10

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

memory that use 16-bit addresses (MOVX @ DPTR). In this application, Port 2 uses strong internal pull-ups when emitting 1s. During accesses to external data memory that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. Port 2 also receives the high-order address bits and some control signals during Flash program-ming and verification. Port 3 Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the inter-nal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups. Port 3 receives some control signals for Flash programming and verification. Port 3 also serves the functions of various special features of the AT89S52, as shown in the fol-lowing table

RST Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. This pin drives high for 98 oscillator periods after the Watchdog times out. The
11

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In the default state of bit DISRTO, the RESET HIGH out feature is enabled. ALE/PROG Address Latch Enable (ALE) is an output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming. In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator frequency and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped dur-ing each access to external data memory. If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.

INTERRUPTS: Interrupts are hardware signals that are used to determine conditions that exist in external and internal circuits. Any interrupt can cause the 8052 to perform a hardware call to an interrupt handling subroutine that is located at a predetermined absolute address in the program memory. Five interrupts are provided in the 8052. Three of these are generated automatically by the internal operations: Timer flag 0, Timer Flag 1, and the serial port interrupt (RI or TI) Two interrupts are triggered by external signals provided by the circuitry that is connected to the pins INTO 0 and INTO1. The interrupts maybe enable or disabled, given priority or otherwise controlled by altering the bits in the Interrupt Enabled (IE) register, Interrupt Priority (IP) register, and the Timer Control (TCON) register. . These interrupts are mask able i.e. they can be disabled. Reset is a non maskable interrupt which has the highest priority. It is generated when a high is applied to the reset pin. Upon reset, the registers are loaded with the default values. Each interrupt source causes the program to do store the address in PC onto the stack and causes a hardware call to one of the dedicated addresses in the program memory. The appropriate memory locations for each for each interrupt are as follows:

In interrupt

A Address
12

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

Rr RESET IE E0 (External interrupt 0) T F0 (Timer 0 interrupt) I E1 (External interrupt 1)

00 00 00 00

00 03 0B 13

T F1 (Timer 1 interrupt) S SERIAL

00 1B 00 23

The AT89C52 is a low-power, high-performance CMOS 8-bit microcomputer with 4K bytes of Flash programmable and erasable read only memory (PEROM). The device is manufactured using Atmels high-density nonvolatile memory technology and is compatible with the industry-standard MCS-51 instruction set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C51 is a powerful microcomputer, which provides a highly flexible and cost-effective solution to many embedded control applications.

3.4 RS 232: In telecommunications, RS-232 (Recommended Standard 232) is a standard for serial
binary data signals connecting between a DTE (Data terminal equipment) and a DCE (Data Circuit-terminating Equipment). It is commonly used in computer serial ports. Scope of the standard: The Electronic Industries Alliance (EIA) standard RS-232-C as of 1969 defines:

Electrical signal characteristics such as voltage levels, signaling rate, timing and slewrate of signals, voltage withstand level short-circuit behavior, and maximum load capacitance.

Interface mechanic characteristics, pluggable connectors and pin identification. Functions of each circuit in the interface connector.

13

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

Standard subsets of interface circuits for selected telecom applications. The standard does not define such elements as Character encoding (for example, ASCII, Baudot or EBCDIC) The framing of characters in the data stream (bits per character, start/stop bits, parity) Protocols for error detection or algorithms for data compression Bit rates for transmission, although the standard says it is intended for bit rates lower than 20,000 bits per second. Many modern devices support speeds of 115,200 bps and above

Power supply to external devices. Details of character format and transmission bit rate are controlled by the serial port hardware, often a single integrated circuit called a UART that converts data from parallel to serial form. A typical serial port includes specialized driver and receiver integrated circuits to convert between internal logic levels and RS-232 compatible signal levels. that they could connect to existing equipment. For many years, an RS-232-compatible

port was a standard feature for serial communications, such as modem connections, on many computers.

3.5 MAX 232


A standard serial interface for PC, RS232C, requires negative logic, i.e., logic 1 is 3V to -12V and logic 0 is +3V to +12V. To convert TTL logic, say, TxD and RxD pins of the microcontroller thus need a converter chip. A MAX232 chip has long been using in many microcontrollers boards. It is a dual RS232 receiver / transmitter that meets all RS232 specifications while using only +5V power supply. It has two onboard charge pump voltage converters which generate +10V to -10V power supplies from a single 5V supply. It has four level translators, two of which are RS232 transmitters that convert TTL/CMOS input levels into +9V RS232 outputs. The other two level translators are RS232 receivers that convert RS232 input to 5V. Typical MAX232 circuit is shown below.

14

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

Fig 3.5.1 Pin diagram of max232

3.6 LIQUID CRYSTAL DISPLAY


3.6.1 INTRODUCTION:
In recent years the LCD is finding widespread use replacing LED s (seven-segment LED or other multi segment LED s). This is due to the following reasons: 1. The declining prices of LCD s. 2. The ability to display numbers, characters and graphics. This is in

contract to LED s, which are limited to numbers and a few characters. 3. Incorporation of a refreshing controller into the LCD, there by relieving the CPU of the task of refreshing the LCD. In the contrast, CPU to keep displaying the data. 4. Ease of programming for characters and graphics. the LED must be refreshed by the

15

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

3.6.1 LCD pin diagram

4. GSM MODEM
4.1 GSM Fundamentals:
The Global System for Mobile Communications (GSM) is the most popular standard for mobile phones in the world. GSM phones are used by over a billion people across more than 200 countries. The ubiquity of the GSM standard makes international roaming very common between mobile phone operators, which enable phone users to access their services in many other parts of the world as well as their own country. GSM differs significantly from its predecessors in that both signaling and speech channels are digital, which means that it is seen as a second generation (2G) mobile phone system. This fact has also meant that data communication was built into the system from very early on. GSM is an open standard, which is currently developed by the 3GPP.From the point of view of the consumer, the key advantage of GSM systems has been higher digital voice quality and low cost alternatives to making calls such as text messaging. The advantage for network operators has been 8 the ability to deploy equipment from different vendors because the open standard allows easy inter-operability. Also, the standards have allowed network operators to offer roaming services, which mean the subscribers, can use their phone all over the world. GSM retained backward-compatibility with the original GSM phones as the GSM standard continued to develop, for example packet data
16

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

capabilities were added in the Release '97 version of the standard, by means of GPRS. Higher speed data transmission has also been introduced with EDGE in the Release '99 version of the standard. 4.2 ADVANTAGES & USES OF GSM: 2. Another major reason for the growth in GSM usage, particularly between 1998 to 2002, was the availability of prepaid calling from mobile phone operators. This allows people who are either unable or unwilling to enter into a contract with an operator to have mobile phones. Prepaid also enabled the rapid expansion of GSM in many developing countries where large sections of the population do not have access to banks or bank accounts and countries where there are no effective credit rating agencies. (In the USA, starting a non-prepaid contract with a cellular phone operator is almost always subject to credit verification through personal information provided by credit rating agencies). 3. The architecture of GSM allows for rapid flow of information by voice or data messaging (SMS). Users now have access to more information, whether personal, technical, economic or political, more quickly than was possible before the global presence of GSM. Even remote communities are able to integrate into networks (sometimes global) thereby making information, knowledge and culture accessible, in theory, to anyone. 4. One of the most appealing aspects of wireless communications is its mobility. Much of the success of GSM is due to its mobility management, offering users the freedom and convenience to conduct business from almost anywhere at any time. 5. GSM has been the catalyst in the tremendous shift in traffic volume from fixed networks to mobile networks. This has resulted in the emergence of a mobile paradigm, whereby the mobile phone has become the first choice of personal phone. 6. Higher digital voice quality. 7. Low cost alternatives to making calls such a text messaging. USES OF GSM:

17

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

Uses encryption to make phone calls more secure Data networking Group III facsimile services Short Message Service (SMS) for text messages and paging Call forwarding Caller ID U Call waiting. Multi-party conferencing

After a few turbulent years for the industry, we highlight some of the key factors we view as critical for the continued success of GSM. These include:

Enabling convergence with other wireless technologies Developing Mobile Centric Applications Evolving the mobile business model Mobile terminal enhancements and variety Fostering industry partnerships and co-operations Interoperability and Inter-generational roaming between various platforms.

7. APPLICATIONS
As a security System

18

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

As Accident Report System

7.1 MERITS:

Low Cost Less Complexity

Huge Scope For Research And Development

7.2 DEMERITS:
The only dis merit of this project is this can be used in the place where signal strength is high

8. CONCLUSION
The project DESIGN & DEVELOPMENT OF GSM BASED VEHICLE MONITORING AND
SECURITY SYSTEM has been successfully designed and tested.

It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit. Secondly, using highly advanced ICs and with the help of growing technology the project has been successfully implemented. Finally we conclude that DESIGN & DEVELOPMENT OF GSM BASED VEHICLE
MONITORING AND SECURITY SYSTEM is an emerging field and there is a huge scope for

research and development.

FUTURE ENHANCEMENT
19

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

We can enhance this project by using the GPRS technology using which we can able to locate the exact position of the automobile.

20

GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

Bibliography
The 8052 Micro controller and Embedded Systems -Muhammad Ali Mazidi & Janice Gillispie Mazidi The 8052 Micro controller Architecture, Programming & Applications -Kenneth J.Ayala Fundamentals Of Micro processors and Micro computers -B.Ram Micro processor Architecture, Programming & Applications -Ramesh S. Gaonkar Electronic Components -D.V. Prasad Wireless Communications - Theodore S. Rappaport Mobile Tele Communications - William C.Y. Lee
References on the Web:

www.national.com www.atmel.com www.microsoftsearch.com www.geocities.com

21

You might also like