Professional Documents
Culture Documents
Our connection to the Internet will be established via the GPRS protocol,
which provides good coverage and sufficient data transmission speeds. Our
prototype system will comprise of a Sony-Ericsson Cell Phone (GPRS
Device), a GARMIN eTrex GPS device, and a PIC Microcontroller,
The basic concept of this system is to be able to track a vehicle over the
Internet; this is accomplished using software and hardware that was designed
for this reason alone. The software component of this design project is fairly
substantial while all the hardware was built out of necessity to make the end
product portable.
Page 1 of 126
Final Project Report
Page 2 of 126
Final Project Report
Page 3 of 126
Final Project Report
LIST OF ABBREVIATION....................................................................................................................6
Security System
1.1 - INTRODUCTION...........................................................................................................................8
1.1.1 - PURPOSE ......................................................................................................................................8
1.1.2 - PROBLEM .....................................................................................................................................9
1.1.3 - SCOPE ..........................................................................................................................................9
1.2 – PROJECT DIAGRAM.................................................................................................................10
1.3. PROJECT OVERVIEW................................................................................................................12
GPS DEVICE (GPS RECEIVER)................................................................................................................13
MICROCONTROLLER ...............................................................................................................................13
GPRS ENABLED DEVICE (CELL PHONE)...................................................................................................14
WEB SERVER .........................................................................................................................................15
CHAPTER NO. 2...................................................................................................................................15
GLOBAL POSITIONING SYSTEM...................................................................................................16
- INTRODUCTION...............................................................................................................................16
HOW IT WORKS......................................................................................................................................17
SOME LIMITATIONS..................................................................................................................................18
THE GPS SATELLITE SYSTEM...................................................................................................................18
- APPLICATIONS OF GPS SYSTEMS.............................................................................................19
2.2.1 - TRACKING DEVICES .....................................................................................................................19
2.2.2 - NAVIGATION SYSTEMS .................................................................................................................19
- GPS TRACKING AND ITS APPLICATIONS................................................................................20
2.3.1 - GPS TRACKING ..........................................................................................................................21
2.3.2 - GPS VEHICLE TRACKING ............................................................................................................22
2.3.3 - COORDINATED TRACKING .............................................................................................................22
2.3.4 - CONSUMER GPS TRACKING [6]....................................................................................................23
2.1- TECHNICAL DESCRIPTION.....................................................................................................24
GPS SYSTEM SEGMENTS..........................................................................................................................24
Space Segment................................................................................................................................24
Control Segment.............................................................................................................................25
User Segment.................................................................................................................................25
NAVIGATION SIGNALS..............................................................................................................................26
CALCULATING POSITIONS..........................................................................................................................27
ACCURACY AND ERROR SOURCES.............................................................................................................28
Atmospheric Effects................................................................................................................................29
Multipath Effects....................................................................................................................................30
Ephemeris and Clock Errors....................................................................................................................31
Selective Availability..............................................................................................................................31
GPS Jamming..........................................................................................................................................32
Relativity................................................................................................................................................33
GPS TIME AND DATE.............................................................................................................................34
GPS TIME TRANSFER..............................................................................................................................34
2.2DIFFERENTIAL GPS......................................................................................................................36
REAL-TIME DGPS.................................................................................................................................36
SATELLITE DIFFERENTIAL SERVICES...........................................................................................................37
REPROCESSING REAL-TIME DATA..............................................................................................................38
POSTPROCESSING CORRECTION...................................................................................................................38
Public Sources................................................................................................................................39
Commercial Sources......................................................................................................................39
Web-Based Services.......................................................................................................................39
Base Station Ownership.................................................................................................................39
Page 4 of 126
Final Project Report
SUMMARY..............................................................................................................................................40
Security System
CHAPTER NO.3....................................................................................................................................43
MICROCONTROLLER.......................................................................................................................44
WHAT IS A MICROCONTROLLER?..............................................................................................................44
PIC16F877..........................................................................................................................................45
USE OF MICROCONTROLLER IN VTS.........................................................................................45
GPS INTERFACING WITH MICROCONTROLLER..............................................................................................45
DATA FLOW...........................................................................................................................................48
SCHEMATIC DIAGRAM....................................................................................................................49
ARCHITECTURE OF PIC16F87X FAMILY....................................................................................49
ARCHITECTURAL DIAGRAM OF PIC16F87X FAMILY [38]....................................................51
PIN DIAGRAM OF PIC16F87X [38]..................................................................................................52
CONTROLLER SPECIFICATIONS [38]..........................................................................................55
CHAPTER NO.4....................................................................................................................................56
GPRS MOBILE.....................................................................................................................................57
4.1 - GPRS...............................................................................................................................................57
GPRS FEATURES......................................................................................................................................58
Speed..............................................................................................................................................58
Immediacy......................................................................................................................................58
New Applications, better Applications...........................................................................................59
Service Access................................................................................................................................59
KEY NETWORK FEATURES OF GPRS........................................................................................................60
LIMITATIONS OF GPRS.............................................................................................................................62
APPLICATIONS FOR GPRS..........................................................................................................................64
OPTIMAL BEARER BY APPLICATION...........................................................................................................71
GPRS NETWORK NODES.........................................................................................................................73
4.2 - GPRS DEVICE..............................................................................................................................74
WHAT IS A GPRS MODEM?...................................................................................................................74
PUBLIC INTERNET ACCESS TO GPRS DEVICES...........................................................................................75
PRIVATE NETWORK ACCESS TO GPRS DEVICES........................................................................................75
GPRS MOBILE DEVICE...........................................................................................................................75
GPRS CLASSES OF GPRS DEVICE..........................................................................................................75
4.3 - AT COMMANDS..........................................................................................................................76
CHAPTER NO.5....................................................................................................................................82
MAP DIGITIZATION..........................................................................................................................83
5.1 - INTRODUCTION.........................................................................................................................83
5.1.2 - GPS MAPS.................................................................................................................................85
5.1.3 - DIGITIZATION OF MAPS.................................................................................................................86
5.1.4 - MAP PROJECTIONS.......................................................................................................................89
5.1.5 - DISTORTIONS...............................................................................................................................90
5.1.6 - MAP SCALE................................................................................................................................90
5.1.7 - PROBLEMS IN THE DIGITIZATION OF MAPS........................................................................................91
5.1.8 CONCLUSION: THE FUTURE OF MAP REPRODUCTION...........................................................................92
5.2 - MAP DIGITIZATION PROCESS...............................................................................................93
5.2.1 - PROCESS TO DIGITIZE THE MAP....................................................................................................94
CHAPTER NO.6..................................................................................................................................103
Page 5 of 126
Final Project Report
VEHICAL TRACKING WEBSITE DEVELOPMET.....................................................................103
Security System
OVERVIEW.........................................................................................................................................104
INTRODUCTION................................................................................................................................104
WEBSITE ARCHITECTURE...........................................................................................................105
WEBSITE MODULES........................................................................................................................105
MAPPING THE LATITUDE & LONGITUDE...............................................................................106
STRING SEPARATION (GPSSTR.ASPX)......................................................................................106
MAP (MAP.ASPX)..............................................................................................................................110
IMAGE RENDER (IMAGERENDER.ASPX)..................................................................................110
FUNCTIONS.......................................................................................................................................111
ADMINISTRATIVE FUNCTIONS...................................................................................................................112
Add Client....................................................................................................................................113
Change Password........................................................................................................................114
Edit Client....................................................................................................................................114
Change Profile Information.........................................................................................................115
Search Client................................................................................................................................115
Ownership Transfer.....................................................................................................................115
Track Client..................................................................................................................................116
CLIENT FUNCTIONS................................................................................................................................118
Real Time Tracking......................................................................................................................119
View Profile..................................................................................................................................119
Change Password........................................................................................................................120
Edit Profile...................................................................................................................................120
Static Tracking.............................................................................................................................121
Tracking by History.....................................................................................................................121
REFRENCES.......................................................................................................................................123
GLOSSARY..........................................................................................................................................124
List of Abbreviation
Description
Term
Email Electronic Mail
GPS Global Positioning System
WWW World Wide Web
WAP Wireless Application Protocol
GPRS General Packet Radio Service
XML Extensible Markup Language
ASP Active Server Pages
.NET Microsoft .Net Platform
ADO Activex Data Objects
Page 6 of 126
Final Project Report
Description
Security System
NAVSTAR
Positioning System
NGA National Geospatial-Intelligence Agency
SOPS Space Operations Squadron
USAF United States Air Force
NMEA National Marine Electronics Association
SoL Safety-Of-Life
WGS World Geodetic System
PRN Pseudo-Random Number
SA Selective Availability
RAIM Receiver Autonomous Integrity Monitoring
MCU Microcontroller
RAM Random Access Memory
ROM Read Only Memory
EPROM Erasable Programmable Read-Only Memory
EEPROM Electrically Erasable Programmable Read-Only Memory
A/D CONVERTOR Analog To Digital Converter
PWM Pulse Width Modulation
LED Light Emitting Diode
VTS Vehicle Tracking System
Universal Synchronous Asynchronous Receiver
USART
Transmitter
IC Integrated Circuit
PC Personnel Computer
COM PORTS Communication Ports
MAX232 A Type Of IC
MAXIM Company Who Made Max232
TTL Time To Live
BPS Bits Per Second
I/O Input Output
TX Transmitting Module
RX Receiving Module
RISC Reduced Instruction Set Computer
DC Direct Current
MHz Mega Hertz
mA Mega Ampere
µA Micro Ampere
V Volts
Chapter No. 1
Page 7 of 126
Final Project Report
1.1 - INTRODUCTION
1.1.1 - Purpose
The main purpose of this whole project was to create a web GPS enable
vehicle tracking system while maintaining a very high level of usability so that
the end user would not need to have any background knowledge of GPS
systems at all. The only thing the end user would have to worry about is
being able to have access to the Internet. We have assumed that this is not
Page 8 of 126
Final Project Report
a problem because almost everyone has an Internet enabled computer these
Security System
and password to gain access to the GPS data.
1.1.2 - Problem
Due to the fact that with the installation of this system, the user is capable of
tracking his/her vehicle over the Internet might be a deterrent to possible car
thieves. This system could also be used to help track down vehicles that have
been stolen and thus increase the possibility of vehicle recovery.
Currently, car rental companies do track their vehicles, but this service is
being provided by a third party, with the installation of this system into their
vehicles, these rental car companies could track their vehicles on their own.
This would definitely reduce their overhead cost and this in turn would reduce
the prices that they charge for car rentals.
1.1.3 - Scope
This project was divided up into two basic categories which consisted of
hardware and software components. The hardware component was limited to
mainly building the necessary RS-232 and power circuits that were used to
integrate with the microcontroller. The main components that were used for
this project was a GPS device, a GPRS device and a microcontroller.
Page 9 of 126
Final Project Report
Security System
software set was programmed using Vb.net/ Asp.net, which is one of the most
famous and powerful computer languages today.
C was chosen because it was the programming language that was needed to
program the microcontroller that was selected for this project. All the software
was designed to be completely modular thus making it easier to do verification
and testing.
Page 10 of 126
GPS Vehicle Tracking &
Security System
Final Project Report
Page 11 of 126
Final Project Report
We are using different types of devices and services in our project which are
explained as under
Page 12 of 126
Final Project Report
iii. GPRS Enabled Device (Cell Phone)
Security System
Also there are two types of users that will use this system according to there
rights.
These are
• Administrator
• User
As we know that the GPS is known as the Global Positioning System, this
system is basically used to track and locate the humans, Vehicles, ships,
Planes Submarines etc.
GPS devices are of many kinds and the basic functionality is to provide the
coordinates about your position and these coordinates are of the form of
Longitude and Latitude. Other functionalities include a compass that provides
you the direction that in which direction you are moving whether it is South,
East etc. It also provides us the speed of the vehicle if we are moving in a
vehicle. We can also make a track using the option of waypoints, for this we
have to mark the waypoints at different positions of the way through where we
are going so when we complete our journey then at the end of the journey
there is track showing us the way through which we have come and following
these way points we can reach where we get started.
So in our project we use the two coordinates which are Longitude and
Latitude, these coordinates are send to the Microcontroller and then the
Microcontroller do the necessary processing on to the received data
Microcontroller
Page 13 of 126
Final Project Report
timers, external and internal interrupts, all integrated into a single chip that
Security System
We will use the Microcontroller to get the data from the GPS device and send
that data to the GPRS enabled device.
The Microcontroller sends and receives the data with the help of “TX” and
“RX” Modules.
The TX Module is used to transmit the data to the GPRS enabled device
which is transmitted with the help of AT commands i.e. used to handle the
mobile device. We can do any function which we are doing on our mobile
phone; normally for this we will use serial communication where the data is
stored on to a buffer before it is sent to the GPRS enabled mobile.
With respect to RX module it is used to receive the data from the GPS device.
The GPS device automatically sends the data through the serial port after
regular intervals and the Microcontroller get that data using the RX Module. In
order to get data continuously, we will get the data from the buffer; leave it
empty in order to get the data again for the transmittion.
Basically we are using the modem of the cell phone with the help of the AT
command set because we have to communicate with the GRPS
Device(mobile) using some sorts of commands which are standard AT
commands.
Also we are using service of the GPRS which is provided by the service
provider, we are using the services of the TELENOR.
So with the help of AT commands we send our data to a web server where
the data is stored and then we used this data to point out the location on a
digital map.
Page 14 of 126
Final Project Report
We are using GPRS because it provide us high speed data rates at low price
Security System
time data transfer.
Web Server
Web server is used to host our site which contains the User modules and the
Administrator module and for this we need a static IP which is used in order to
interact our site, it also include a digital map.
So the Microcontroller gets the data from the GPS receiver and send data
with the help of AT commands through the mobile phone towards our website
where the data is stored in database, that data consists of Longitude,
Latitude, time and date, and then coordinates from the database are plotted
on the map.
Vehicle Unit
Chapter No. 2
Page 15 of 126
Final Project Report
- INTRODUCTION
Page 16 of 126
Final Project Report
The GPS is currently the only fully-functional satellite navigation system. More
Security System
GPS receivers to determine the receiver's location, speed and direction.
Since the first experimental satellite was launched in 1978, GPS has become
one of the important devices for navigation around the world and an important
tool for map-making and land surveying. GPS also provides a precise time
reference used in many applications including scientific study of earthquakes,
and synchronization of telecommunications networks.[1]
How It Works
GPS satellites revolve around the earth twice a day in a very precise orbit and
transmit signal information to earth. GPS receivers take this information and
use triangulation to calculate the user's exact location. Essentially, the GPS
receiver compares the time a signal was transmitted by a satellite with the
time it was received. The time difference tells the GPS receiver how far away
the satellite is. Now, with distance measurements from a few more satellites,
the receiver can determine the user's position and display it on the unit's
electronic map.[2]
Page 17 of 126
Final Project Report
bearing, track, trip distance, distance to destination, sunrise and sunset time
Security System
Some Limitations
The 24 satellites that make up the GPS space segment are orbiting the earth
about 12,000 miles above us. They are constantly moving, making two
complete orbits in less than 24 hours. These satellites are traveling at speeds
of roughly 7,000 miles an hour.[2]
GPS satellites are powered by solar energy. In the event of solar eclipse they
are backed by the batteries onboard. Small rocket boosters on each satellite
keep them flying in the correct path.
Here are some other interesting facts about the GPS satellites (also called
NAVSTAR2, the official U.S. Department of Defense name for GPS):
Page 18 of 126
Final Project Report
• A GPS satellite weighs approximately 2,000 pounds and is about 17
Security System
• Transmitter power is only 50 watts or less. [2]
One of the easiest applications to consider is the simple GPS tracking device;
which combines the possibility to locate itself with associated communications
technologies such as radio transmission and telephony. [6]
The tracing devices themselves come in different flavors. They will always
contain a GPS receiver, and GPS software, along with some way of
transmitting the resulting coordinates. GPS watches, for example, tend to use
radio waves to transmit their location to a tracking center, while GPS phones
use existing mobile phone technology. [6]
The tracking centre can then use that information for co-ordination or alert
services. One application in the field is to allow anxious parents to locate their
children by calling the tracking station - mainly for their peace of mind. [6]
GPS vehicle tracking is also used to locate stolen cars, or provide services to
the driver such as locating the nearest petrol station. Police can also benefit
from using GPS tracing devices to ensure that parolees do not violate curfew,
and to locate them if they do. [6]
Once we know our location, we can, of course, find out where we are on a
map, and GPS mapping and navigation is perhaps the most well-known of all
Page 19 of 126
Final Project Report
the applications of GPS. Using the GPS coordinates, appropriate software
Security System
A to B, or dynamically selecting the best route in real time. [6]
These systems need to work with map data, which does not form part of the
GPS system, but is one of the associated technologies that we spoke of in the
introduction to this article. The availability of high powered computers in small,
portable packages has lead to a variety of solutions which combines maps
with location information to enable the user to navigate. [6]
One of the first such applications was the car navigation system, which allows
drivers to receive navigation instructions without taking their eyes off the road,
via voice commands.
Then there are handheld GPS units, such as those from Garmin and Magellan
and a dozen other manufacturers, which are commonly used by those
involved in outdoor pursuits, and only provide limited information such as the
location, and possibly store GPS waypoints. A waypoint being a location that
is kept in memory so that the unit can retrace the same path at a later time.
More advanced versions include aviation GPS systems, which offer specific
features for those flying aircraft, and marine GPS systems which offer
information pertaining to marine channels, and tide times, etc. [6]
These last two require maps and mapping software which differ vastly from
traditional GPS solutions, and as such can often be augmented with other
packages designed to allow the user to import paper maps or charts. [6]
There are even GPS solutions for use on the golf course. Golf GPS systems
help the player to calculate the distance from the tee to the pin, or to know
exactly where they are with relation to features such as hidden bunkers, water
hazards or greens. Again, specific maps are needed for such applications.
Page 20 of 126
Final Project Report
Being able to pinpoint the location of a device on planet Earth raises some
Security System
was intended to be released to the consumer market as a way to aid
navigation. [6]
However, since the price of the GPS technology has fallen, many companies
have found new ways to apply it. Indeed, the price of associated technologies
has also fallen dramatically since the inception of GPS, which has led to many
innovations, amongst them “GPS tracking”.
In fact, it is this use which represents the simplest form of GPS tracking. The
user is able, using a portable GPS device, to keep a track of where they have
been, in order to be able to either retrace their steps, or follow the same path
again in the future. [6]
When combined with other technologies such as GPS phones, this also gives
the possibility for other users of GPS to follow in the footsteps of the initial
user; which can be a useful application of GPS tracking for field activities.
Where GPS tracking comes into its own, however, is when it is combined with
other broadcast technologies such as radio. GPS watches, for example, can
be fitted with a GPS receiver which is capable of calculating its position, whilst
also broadcasting that using a miniature radio transmitter. [6]
That third party could be an anxious parent, or the police. In fact there are a
variety of GPS phones and wristbands which are sold in conjunction with a
service which enables third parties to find out where their charges are at any
time of the day or night. [7]
Page 21 of 126
Final Project Report
2.3.2 - GPS Vehicle Tracking
This serves two purposes. On the one hand, it provides the driver with an
integrated GPS system, without the necessity to purchase a car navigation
system, or a PDA-based GPS system, whilst also offering the possibility to
relay that information via a radio or mobilephone transmitter. [6]
In fact, these systems have already been tried in the field, primarily as a
vehicle locator in the event that the vehicle to which the GPS vehicle tracking
system is attached is stolen. The police, once informed, can find out from the
control centre where the vehicle is, and proceed to track it physically. [6]
If, along with the GPS coordinates, the system relays telemetry information
such as the status of the engine, time since the last service, or even
information not relating to defects, the receiver of this information can make a
decision as to what kind of alert to pass on to the driver.
This also opens up the possibility to allow for coordinated vehicle tracking, in
which GPS tracking is used to share location information between several
vehicles, all pursuing the same end goal. [6]
Page 22 of 126
Final Project Report
The basic GPS functionality is the same however, and units can either share
Security System
be one of the fishing vessels, and it has on-board computer systems capable
of reconciling all the locator information along with a map, thus allowing the
different vessels to coordinate their actions.
This also has military applications, of course, where units can share, in real
time, information about their location, even when line-of-sight is no longer
possible. In the past, this was done by relaying often inaccurate map co-
ordinate estimations; now the locations can be called in with high absolute
accuracy.
Despite its’ hitech military and commercial fishing applications, as well as use
in aviation GPS, the principal application of GPS tracking will be in providing
an enabling technology to augment existing systems.
These systems will include cell phones and vehicles, usually in conjunction
with a central point of service designed to keep track of the location. The
reason for this is to keep the cost of the actual GPS unit down as much as
possible in order to supply a useful technology to consumers at an attractive
price.
Page 23 of 126
Final Project Report
Security System
GPS System Segments
The current GPS consists of three major segments. These are the space
segment (SS), a control segment (CS), and a user segment (US).
Space Segment
The space segment (SS) is composed of the orbiting GPS satellites or Space
Vehicles (SV) in GPS parlance. The GPS design includes 24 SVs to be
distributed equally among six circular orbital planes. The orbital planes are
centered on the Earth, not rotating with respect to the distant stars. The six
planes have approximately 55° inclination (tilt relative to Earth's equator) and
are separated by 60° right ascension of the ascending node (angle along the
equator from a reference point to the orbit's intersection). [1]
Page 24 of 126
Final Project Report
Control Segment
User Segment
The user's GPS receiver is the user segment (US) of the GPS system. In
general, GPS receivers are composed of an antenna, tuned to the
frequencies transmitted by the satellites, receiver-processors, and a highly-
stable clock (often a crystal oscillator). They may also include a display for
providing location and speed information to the user. A receiver is often
described by its number of channels: this signifies how many satellites it can
monitor simultaneously. Originally limited to four or five, this has progressively
increased over the years so that, as of 2006, receivers typically have between
twelve and twenty channels. [1]
GPS receivers may include an input for differential corrections, using the
RTCM SC-104 format. This is typically in the form of a RS-232 port at 4,800
bps speed. Data is actually sent at a much lower rate, which limits the
accuracy of the signal sent using RTCM. Receivers with internal DGPS
receivers can outperform those using external RTCM data. As of 2006, even
low-cost units commonly include WAAS receivers. [1]
Page 25 of 126
Final Project Report
Navigation Signals
The satellites also broadcast two forms of clock information, the Coarse /
Acquisition code, or C/A which is freely available to the public, and the
restricted Precise code, or P-code, usually reserved for military applications.
The C/A code is a 1,023 bit long pseudo-random code broadcast at 1.023
MHz, repeating every millisecond. Each satellite sends a distinct C/A code,
which allows it to be uniquely identified. The P-code is a similar code
broadcast at 10.23 MHz, but it repeats only once a week. In normal operation,
the so-called "anti-spoofing mode", the P code is first encrypted into the Y-
code, or P(Y), which can only be decrypted by units with a valid decryption
key. Frequencies used by GPS include: [1]
Page 26 of 126
Final Project Report
Calculating Positions
The receiver identifies each satellite's signal by its distinct C/A code pattern,
and then measures the time delay for each satellite. To do this, the receiver
produces an identical C/A sequence using the same seed number as the
satellite. By lining up the two sequences, the receiver can measure the delay
and calculate the distance to the satellite, called the pseudorange. [1]
The orbital position data from the Navigation Message is then used to
calculate the satellite's precise position. Knowing the position and the
distance of a satellite indicates that the receiver is located somewhere on the
surface of an imaginary sphere centered on that satellite and whose radius is
the distance to it. When four satellites are measured simultaneously, the
Page 27 of 126
Final Project Report
intersection of the four imaginary spheres reveals the location of the receiver.
Security System
using their altitude. Often, these spheres will overlap slightly instead of
meeting at one point, so the receiver will yield a mathematically most-
probable position (and often indicate the uncertainty). [1]
The position calculated by a GPS receiver requires the current time, the
position of the satellite and the measured delay of the received signal. The
position accuracy is primarily dependent on the satellite position and signal
delay. [1]
To measure the delay, the receiver compares the bit sequence received from
the satellite with an internally generated version. By comparing the rising and
trailing edges of the bit transitions, modern electronics can measure signal
offset to within about 1% of a bit time, or approximately 10 nanoseconds for
the C/A code. Since GPS signals propagate nearly at the speed of light, this
represents an error of about 3 meters. This is the minimum error possible
using only the GPS1 C/A signal. [1]
Page 28 of 126
Final Project Report
Electronics errors are one of several accuracy-degrading effects outlined in
Security System
position fixes are typically accurate to about 15 meters (50 ft). These effects
also reduce the more precise P(Y) code's accuracy. [1]
Sources of errors
Source Effect
Atmospheric Effects
Because ionospheric delay affects the speed of radio waves differently based
on frequency, a characteristic known as dispersion, both frequency bands can
be used to help reduce this error. Some military and expensive survey-grade
civilian receivers compare the different delays in the L1 and L2 frequencies to
measure atmospheric dispersion, and apply a more precise correction. This
Page 29 of 126
Final Project Report
can be done in civilian receivers without decrypting the P(Y) signal carried on
Security System
this on lower cost receivers, a new civilian code signal on L2, called L2C, was
added to the Block [IIR-M] satellites, first launched in 2005. It allows a direct
comparison of the L1 and L2 signals using the coded signal instead of the
carrier wave. [1]
Multipath Effects
GPS1 signals can also be affected by multipath issues, where the radio
signals reflect off surrounding terrain; buildings, canyon walls, hard ground,
etc. These delayed signals can cause inaccuracy. A variety of techniques,
most notably narrow correlator spacing, have been developed to mitigate
multipath errors. For long delay multipath, the receiver itself can recognize the
wayward signal and discard it. To address shorter delay multipath from the
signal reflecting off the ground, specialized antennas may be used. Short
Page 30 of 126
Final Project Report
delay reflections are harder to filter out since they are only slightly delayed,
Security System
[1]
atmospheric delay.
Multipath effects are much less severe in moving vehicles. When the GPS
antenna is moving, the false solutions using reflected signals quickly fail to
converge and only the direct signals result in stable solutions. [1]
The navigation message from a satellite is sent out only every 12.5 minutes.
In reality, the data contained in these messages tend to be "out of date" by an
even larger amount. Consider the case when a GPS satellite is boosted back
into a proper orbit; for some time following the maneuver, the receiver’s
calculation of the satellite's position will be incorrect until it receives another
ephemeris update. The onboard clocks are extremely accurate, but they do
suffer from some clock drift. This problem tends to be very small, but may add
up to 2 meters (6 ft) of inaccuracy. [1]
This class of error is more "stable" than ionospheric problems and tends to
change over days or weeks rather than minutes. This makes correction fairly
simple by sending out a more accurate almanac on a separate channel. [1]
Selective Availability
The GPS includes a feature called (SA) that introduces intentional errors
between 0 meters and up to a hundred meters (300 ft) into the publicly
available navigation signals, making it difficult to use for guiding long range
missiles to precise targets. Additional accuracy was available in the signal, but
in an encrypted form that was only available to the United States military, its
allies and a few others, mostly government users. [1]
Page 31 of 126
Final Project Report
same direction. In order to improve the usefulness of GPS for civilian
Security System
greatly improve accuracy. [1]
In the 1990s, the (FAA) started pressuring the military to turn off SA
permanently. This would save the FAA millions of dollars every year in
maintenance of their own radio navigation systems. The military resisted for
most of the 1990s, but SA was eventually "discontinued"; the amount of error
added was "set to zero" in 2000 following an announcement by U.S. President
Bill Clinton, allowing users access to an undegraded L1 signal. Per the
directive, the induced error of SA was changed to add no error to the public
signals (C/A code). Selective Availability is still a system capability of GPS,
and error could be in theory reintroduced at any time. In practice, in view of
the hazards and costs this would induce for US and foreign shipping, it is
unlikely to be reintroduced, and various government agencies, including the
FAA have stated that it is not intended to be reintroduced. [1]
The US military has developed the ability to locally deny GPS (and other
navigation services) to hostile forces in a specific area of crisis without
affecting the rest of the world or its own military systems. [1]
GPS Jamming
Page 32 of 126
Final Project Report
jamming or another problem is detected. GPS signals can also be interfered
Security System
Relativity
For GPS satellites, General Relativity predicts that the atomic clocks at GPS
orbital altitudes will tick faster by about 45,900 ns/day because they are in a
weaker gravitational field than atomic clocks on Earth's surface. Special
Relativity (SR) predicts that atomic clocks moving at GPS orbital speeds will
tick slower by about 7,200 ns/day than stationary ground clocks. Rather than
have clocks with such large rate differences, the satellite clocks are reset in
rate before launch to compensate for these predicted effects. [1]
Page 33 of 126
Final Project Report
GPS Time and Date
The GPS navigation message includes the difference between GPS time and
UTC, which is 14 seconds as of 2006. Receivers subtract this offset from GPS
time to calculate UTC and 'local' time. New GPS units may not show the
correct UTC time until after receiving the UTC offset message. The GPS-UTC
offset field can accommodate 255 leap seconds (eight bits) which, at the
current rate of change of the earth's rotation, is sufficient to last until the year
2330. [1]
GPS is at the present time the most competent system for time transfer, the
distribution of Precise Time and Time Interval (PTTI). The system uses time of
arrival (TOA) measurements for the determination of user position. A precisely
timed clock is not essential for the user because time is obtained in addition to
position by the measurement of TOA of FOUR satellites simultaneously in
Page 34 of 126
Final Project Report
view. If altitude is known (i.e. for a surface user), then THREE satellites are
Security System
coverage), then TWO satellites in view are sufficient for a fix at known
altitude. If the user is, in addition, stationary or has a known speed then, in
principle, the position can be obtained by the observation of a complete pass
of a SINGLE satellite. This could be called the "transit" mode, because the old
TRANSIT system uses this method. In the case of GPS, however, the
apparent motion of the satellite is much slower, requiring much more stability
of the user clock.[4]
Page 35 of 126
Final Project Report
Security System
Differential correction techniques are used to enhance the quality of location
data gathered using global positioning system (GPS) receivers. Differential
correction can be applied in real-time directly in the field or when
postprocessing data in the office. Although both methods are based on the
same underlying principles, each accesses different data sources and
achieves different levels of accuracy. Combining both methods provides
flexibility during data collection and improves data integrity. [4]
[4])
Picture 2.1 Real-Time Differential GPS (Source
The differential GPS (DGPS) requires that a GPS receiver, which is known as
the base station, should be set up on a precisely known location. The base
station receiver calculates its position based on satellite signals and compares
this location to the known location. The difference is then applied to the GPS
data recorded by the roving GPS receiver.
Real-Time DGPS
Real-time DGPS occurs when the base station calculates and broadcasts
corrections for each satellite as it receives the data. The correction is received
by the roving receiver via a radio signal if the source is land based or via a
satellite signal if it is satellite based and applied to the position it is calculating.
Page 36 of 126
Final Project Report
As a result, the position displayed and logged to the data file of the roving
Security System
A nonprofit scientific and educational organization, Radio Technical
Commission for Maritime Services (RTCM), that serves all aspects of radio
communications, radio navigation, and related technologies, defined the
differential data protocol for relaying GPS correction messages from a base
station to a field user. Its Special Committee 104 (RTCM SC-104) format
recommendations define the correction message format. Each correction
message includes data about the station position and health, satellite
constellation health, and the correction to be applied.
Another method for obtaining real-time differential correction data in the field
is by using geostationary satellites. This system obtains corrections from more
than one reference station. Reference stations collect the base station GPS
data and relay this data in RTCM SC-104 format to a Network Control Center,
which sends the information to a geostationary satellite for verification. The
verified information is sent to the roving GPS receiver to ensure it obtains
GPS positions in real time. [4]
Page 37 of 126
Final Project Report
DGPS radio beacon systems operate in many parts of the world. These
Security System
and, more recently, inland agricultural areas—are used for marine navigation.
However, these beacons have a range of a few hundred kilometers inland and
can provide free real-time differential accuracy in the one-meter range,
depending on the GPS receiver and the distance from the radio beacon. [4]
Some GPS manufacturers provide software that can correct GPS data that
was collected in real time. This is important for GIS data integrity. When
collecting real-time data, the line of sight to the satellites can be blocked or a
satellite can be so low on the horizon that it provides only a weak signal,
which causes spikes in the data. Reprocessing real-time data removes these
spikes and allows real-time data that has been used in the field for navigation
or viewing purposes to be made more reliable before it is added to a GIS [5]
Postprocessing Correction
There are many permanent GPS base stations currently operating throughout
the world that provide the data necessary for differentially correcting GPS.
Depending on the technology preferred by the base station owner, this data
can be downloaded from the Internet or via a bulletin board system (BBS).
Because base station data is consistent and very reliable because base
stations usually run 24 hours, seven days a week, it is ideal for many GIS and
mapping applications. Sources of base station data for postprocessing fall into
four categories—public sources, commercial sources, Web-based services,
and base station ownership. Before purchasing a GPS receiver, it is best to
identify the source of base station data. [5]
Page 38 of 126
Final Project Report
Commercial Sources
Some consulting firms and universities collect base data. Generally, this
data is purchased at per hour or daily rates. By browsing the Internet, by
calling local base station distributors, or by talking to a local GPS sales
representative the information on these services can be obtained. This can
often be the most cost-effective way to obtain data.
Web-Based Services
In this the GPS data is given to a service with some processing criteria.
The GPS data is processed and then returned back. This is an easy and
economical way to process GPS data. This approach is very helpful when
there is no time to train GPS users that how to processes data. So instead
training the users this approach is being used.
This is the most flexible way to obtain base data for post processing but it
has additional setup costs because two GPS receivers must be purchased
and managed. If large amounts of data will be collected, the investment is
often worthwhile.
Page 39 of 126
Final Project Report
Page 40 of 126
Final Project Report
Text-out Interface I/O format is used to get the required data from the GPS
device. So when the GPS receiver attach to the serial port of PC, the data
seen on HyperTerminal is in the following format.
But we will retrieve the selected area of the out put as coordinates for our use.
This whole string will further divide in to two parts N and E which are our
latitude and longitude.
Page 41 of 126
Final Project Report
Each item is of fixed length making parsing by just counting the number of
Security System
example, to just read the first 30 characters and report the time and position.
FIELD
WIDTH: NOTES:
DESCRIPTION:
Sentence start 1 Always '@'
Year 2 Last two digits of UTC year
Month 2 UTC month, "01".."12"
T
I Day 2 UTC day of month, "01".."31"
M Hour 2 UTC hour, "00".."23"
E
Minute 2 UTC minute, "00".."59"
Second 2 UTC second, "00".."59"
Latitude
1 'N' or 'S'
hemisphere
WGS84 ddmmmmm, with an implied decimal
Latitude position 7
P after the 4th digit
O Longitude
1 'E' or 'W'
S hemishpere
I WGS84 dddmmmmm with an implied decimal
T Longitude position 8 after the 5th digit
I
O 'd' if current 2D differential GPS position
N 'D' if current 3D differential GPS position
'g' if current 2D GPS position
Position status 1
'G' if current 3D GPS position
'S' if simulated position
'_' if invalid position
Page 42 of 126
Final Project Report
MICROCONTROLLER
Page 43 of 126
Final Project Report
What Is A Microcontroller?
• Central processing unit - ranging from small and simple 4-bit processors to
sophisticated 32- or 64-bit processors
• Input/output interfaces such as serial ports
• Peripherals such as timers and watchdog and signal conversion circuits
• RAM for data storage
• ROM, EPROM, EEPROM or Flash memory for program storage
• Clock generator - often an oscillator for a quartz timing crystal, resonator
or RC circuit
Page 44 of 126
Final Project Report
MCU as we are quite familiar with the syntax and it’s easy as compared to
Security System
PIC16F877
PIC16F877 is a 40 pin MCU. The device contain a serial port,32 I/O lines,
interrupt capability up to 14 sources, two timers,8k* 14 words of flash
memory, 368*8 bytes of data memory, 256*8 bytes of EEPROM data
memory, dedicates pins for 12C protocols following devices, 10 A/D built in
converters and built in PWM pins for analogue outputs. There are many
reasons to choosing the PIC16F877, including the compatibility with the family
and the ease of erasing and reprogramming the device. [38]
All the necessary support components are included, together with a Power
and Programming LED for easy status indication. Plus a reset switch for
program execution and a RS232 connection for data transfer to and from a
standard RS232 port, available on most computers. [38]
The PIC16F877 Controller is the ideal solution for use as a standard controller
in many applications. The small compact size combined with easy program
updates and modifications makes it ideal for use in machinery and control
systems, such as alarms, card readers, real-time monitoring applications and
much more. Save time and money, by simply building your ancillary boards
and monitoring circuits around this inexpensive & easy to use controller. [38]
The GPS receiver has an output serial port at its hack. The output of digital
data from the serial port is of RS232 nature. So it can be directly connected to
the serial port of PC. Due to excellent input output capabilities of USART of
Page 45 of 126
Final Project Report
PIC MCU, RS232 standard serial data can be easily received by MCU with
Security System
One of the most popular forms of communication between electronic devices
is serial communication. There are two major types of serial communication
asynchronous and synchronous. The RSIN, RSOUT, SERIN and SEROUT
commands are used to send and receive asynchronous serial data. While the
SHIN and SHOUT commands are for use with synchronous communications.
The term asynchronous means to ‘no clock’. ‘More specifically, asynchronous
serial communication’ means data is transmitted and received without the use
of separate ‘clock’ line. Data can be sent using as few as two wires, one for
data and one for ground. The PC’s serial ports (also call COM ports or RS232
ports) use asynchronous serial communication.
Most circuits that work with RS232 use a line driver/receiver (transceiver).
This component does two things.
By far, the most common line driver device is the MAX232 from MAXIM.
Page 46 of 126
Final Project Report
Security System
MAX232, the serial mode (polarity) is inverted in the process of converting the
signal levels, however, if using the direct connection, the mode is untouched.
This is the single most common cause of errors when connecting serial
devices.
For example, if it is sending the 7-bit value: %0011010 it sets the parity bit to
1 to make an even numbers of 1s (four).
The receiver also counts the data bits to calculate what the parity bit should
be. If it matches the parity bit received, the serial receiver assumes that the
data was received correctly. Of course, this is not necessarily true, since two
incorrectly received bits could make parity seem correct when the data was
wrong, or the parity bit itself could be bad when the rest of the data was
incorrect. Parity errors are not detected on the receiver side.
Because of its complexity, the serial communication can rather difficult to work
with at times.
Page 47 of 126
Final Project Report
We will use the MCU to get the data from the GPS device and send that
data to the GPRS enabled device.
The MCU sends and receives the data with the help of “TX” and “RX”
Modules.
With respect to RX module it is used to receive the data from the GPS
device. The GPS device automatically sends the data through the serial
port after regular intervals and the MCU get that data using the RX
Module. In order to get data continuously, we will get the data from the
buffer; leave it empty in order to get the data again for the transmittion.
Page 48 of 126
Final Project Report
The data memory in the PIC can be divides into general purpose RAM and
special functional REGISTERS. [38]
There are three memory blocks in each of the PIC16f87X MCU’S. The
Program memory and Data memory have separate buses so that concurrent
access can occur. The PIC16F87X devices have a 13-bit program counter
Page 49 of 126
Final Project Report
capable of addressing an 8k x 14 program memory space. The PIC16F877/76
Security System
physically implemented address that will cause a wraparound. [38]
Page 50 of 126
Final Project Report
Page 51 of 126
Final Project Report
Page 52 of 126
Final Project Report
Page 53 of 126
Final Project Report
Page 54 of 126
Final Project Report
Page 55 of 126
Final Project Report
Page 56 of 126
Final Project Report
GPRS MOBILE
The General Packet Radio Service (GPRS) network is an "always on", private
network for data. It uses the existing GSM network to transmit and receive
TCP/IP based data to and from GPRS mobile devices. Private IP addresses
are typically dynamically assigned within the network to mobile devices.
However, Access Point Names (APN's) provide a gateway route to other
networks such as the Internet, WAP services or private corporate networks.
Firewalls typically reside at the APN to isolate the public and private networks.
Page 57 of 126
Final Project Report
IP addresses allocated to mobile GPRS devices are therefore not
Security System
specialized services or infrastructure. [9]
Gprs Features
The General Packet Radio Service (GPRS) is a new non-voice value added
service that allows information to be sent and received across a mobile
telephone network. It supplements today's Circuit Switched Data and Short
Message Service (SMS).GPRS is not related to GPS (the Global Positioning
System), a similar acronym that is often used in mobile contexts. GPRS has
several unique features which can be summarized as: [8]
Speed
Immediacy
Page 58 of 126
Final Project Report
critical applications such as remote credit card authorization where it would be
Security System
New Applications, better Applications
GPRS facilitates many new applications that have not previously been
available over GSM limitations in speed of Circuit Switched Data (9.6 kbps)
and message length of the SMS (Characters). GPRS will fully enable the
Internet applications you are used to on your desktop from web browsing to
chat over the mobile network. Other applications for GPRS, profiled later, file
transfer and home automation the ability to remotely access and control in-
home appliances & machine. . [8]
Service Access
Page 59 of 126
Final Project Report
GPRS users can access any web page or other Internet applications-
Security System
Key Network Features Of GPRS
GPRS involves a packet based air interface on the existing circuit switched
GSM network. This gives the user an option to use a packet-based data
service. To supplement circuit switched network architecture with packet
switching is quite a major upgrade. However lately the GPRS standard is
delivered in a very elegant manner- with network operators needing only to
add a couple of new infrastructure and upgrade software to some existing
network elements with GPRS. [8]
Spectrum efficiency
Packet switching means that GPRS radio resources are used only when
users are actually sending or receiving data. Rather than dedicating a radio
channel to a mobile data user for a fixed period of time, the available radio
resource can be concurrently shared between several users. This efficient use
of scarce radio resources means that large numbers of GPRS users can
potentially share the same bandwidth and be served from a single cell. The
actual number of users supported depends on the application being used and
how much data is being transferred. Because of the spectrum efficiency of
GPRS, there is less need to build in idle capacity that is only used in peak
hours. GPRS therefore lets network operators maximize the use of their
network resources in a dynamic and flexible way, along with user access to
resources and revenues. [8]
GPRS should improve the peak time capacity of a GSM network since it
simultaneously: [8]
Page 60 of 126
Final Project Report
Allocates scarce radio resources more efficiently by supporting virtual
Security System
Immigrates traffic that was previously sent using Circuit Switched Data
to GPRS instead, and reduces SMS Center and signaling channel
loading by migrating some traffic that previously was sent using SMS to
GPRS instead using the GPRS/ SMS interconnect that is supported by
the GPRS standards.
Internet Aware
For the first time, GPRS fully enables Mobile Internet functionality by allowing
inter-working between the existing Internet and the new GPRS network. Any
service that is used over the fixed Internet today- File Transfer Protocol (FTP),
web browsing, chat, email, telnet- will be as available over the mobile network
because of GPRS. In fact, many network operators are considering the
opportunity to use GPRS to help become wireless Internet Service Providers
in their own right. [8]
Because it uses the same protocols, the GPRS network can be viewed as a
sub-network of the Internet with GPRS capable mobile phones being viewed
as mobile hosts. This means that each GPRS terminal can potentially have its
own IP address and will be addressable as such. [8]
Page 61 of 126
Final Project Report
Security System
service designed to be deployed on mobile networks that are based on the
GSM digital mobile phone standard. The IS-136 Time Division Multiple
Access (TDMA) standard, popular in North and South America, will also
support GPRS. This follows an agreement to follow the same evolution path
towards third generation mobile phone networks concluded in early 1999 by
the industry associations that support these two network types. [8]
Limitations Of Gprs
GPRS does impact a network's existing cell capacity. There are only limited
radio resources that can be used for different uses- use for one purpose
precludes simultaneous use for another. For example, voice and GPRS calls
both use the same network resources. The extent of the impact depends upon
the number of timeslots, if any, that are reserved for exclusive use of GPRS.
However, GPRS does dynamically manage channel allocation and allow a
reduction in peak time signaling channel loading by sending short messages
over GPRS channels instead. [9]
Page 62 of 126
Final Project Report
timeslots. . The reality is that mobile networks are always likely to have lower
Security System
Relatively high mobile data speeds may not be available to individual mobile
users until Enhanced Data rates for GSM Evolution (EDGE) or Universal
Mobile Telephone System (3GSM) are introduced. [9]
At the time of writing, there has been no confirmation from any handset
vendors that mobile terminated GPRS calls (i.e. receipt of GPRS calls on the
mobile phone) will be supported by the initial GPRS terminals. Availability or
not of GPRS MT is a central question with critical impact on the GPRS
business case such as application migration from other non-voice bearers.
By originating the GPRS session, users confirm their agreement to pay for the
delivery of content from that service. This origination may well be performed
using a Wireless Application Protocol (WAP) session using the WAP micro
browser that will be built into GPRS terminals. However, mobile terminated IP
traffic might allow unsolicited information to reach the terminal. Internet
sources originating such unsolicited content may not be chargeable. A
possible worse case scenario would be that mobile users would have to pay
for receiving unsolicited junk content. This is a potential reason for a mobile
vendor NOT to support GPRS Mobile Terminate in their GPRS terminals.
Page 63 of 126
Final Project Report
operators will need to incorporate it at some stage to make the transition to
Security System
v. Transit Delays
GPRS packets are sent in all different directions to reach the same
destination. This opens up the potential for one or some of those packets to
be lost or corrupted during the data transmission over the radio link. The
GPRS standards recognize this inherent feature of wireless packet
technologies and incorporate data integrity and retransmission strategies.
However, the result is that potential transit delays can occur. [9]
Whereas the Store and Forward Engine in the Short Message Service is the
heart of the SMS Center and key feature of the SMS service, there is no
storage mechanism incorporated into the GPRS standard, apart from the
incorporation of interconnection links between SMS and GPRS. [9]
vii. Chat
Page 64 of 126
Final Project Report
Internet site for information services. The "information intensity"- the amount
Security System
people are more likely to state opinions than factual data. In the same way as
Internet chat groups have proven a very popular application of the Internet,
groups of likeminded people- so called communities of interest- have begun to
use non-voice mobile services as a means to chat and communicate and
discuss. [9]
Because of its synergy with the Internet, GPRS would allow mobile users to
participate fully in existing Internet chat groups rather than needing to set up
their own groups that are dedicated to mobile users. Since the number of
participants is an important factor determining the value of participation in the
newsgroup, the use of GPRS here would be advantageous. GPRS will not
however support point to multipoint services in its first phase, hindering the
distribution of a single message to a group of people. As such, given the
installed base of SMS capable devices, we would expect SMS to remain the
primary bearer for chat applications in the foreseeable future, [9]
A wide range of content can be delivered to mobile phone users ranging from
share prices, sports scores, weather, flight information, news headlines,
prayer reminders, lottery results, jokes, horoscopes, traffic and location
sensitive services and so on. This information need not necessarily be textual-
it may be maps or graphs or other types of visual information. [9]
Page 65 of 126
Final Project Report
using SMS, in order to limit people to brevity and reduce the incidence of
Security System
on Internet chat groups. [9]
x. Moving Images
Over time, the nature and form of mobile communication is getting less textual
and more visual. The wireless industry is moving from text messages to icons
and picture messages to photographs and blueprints to video messages and
movie previews being downloaded and on to full blown movie watching via
data streaming on a mobile device. [9]
Using Circuit Switched Data for web browsing has never been an enduring
application for mobile users. Because of the slow speed of Circuit Switched
Page 66 of 126
Final Project Report
Data, it takes a long time for data to arrive from the Internet server to the
Security System
the web, and end up with difficult to read text layouts on screens that are
difficult to read from. As such, mobile Internet browsing is better suited to
GPRS. [9]
xiii. Audio
Non-voice mobile services can be used to assign and communicate new jobs
from office-based staff to mobile field staff. Customers typically telephone a
Page 67 of 126
Final Project Report
call center whose staffs take the call and categorize it. Those calls requiring a
Security System
mobile workers. Job dispatch applications can optionally be combined with
vehicle positioning applications- such that the nearest available suitable
personnel can be deployed to serve a customer. GSM non-voice services can
be used not only to send the job out, but also as a means for the service
engineer or sales person can keep the office informed of progress towards
meeting the customer’s requirement. The remote worker can send in a status
message such as "Job 12complete, on my way to 11”. [9]
The 160 characters of a short message are sufficient for communicating most
delivery addresses such as those needed for a sale, service or some other job
dispatch application such as mobile pizza delivery and courier package
delivery. However, 160 characters do require manipulation of the customer
data such as the use of abbreviations such as "St" instead of "Street". Neither
does 160 characters leave much space for giving the field representative any
information about the problem that has been reported or the customer profile.
The field representative is able to arrive at the customer premises but is not
very well briefed beyond that. This is where GPRS will come in to allow more
information to be sent and received more easily. With GPRS, a photograph of
the customer and their premises could, for example, be sent to the field
representative to assist in finding and identifying the customer. As such, we
expect job dispatch applications will be an early adopter of GPRS-based
communications. [9]
With up to half of employees typically away from their desks at any one time,
it is important for them to keep in touch with the office by extending the use of
corporate email systems beyond an employee's office PC. Corporate email
systems run on Local Area computer Networks (LAN) and include Microsoft
Mail, Outlook, Outlook Express, Microsoft Exchange, Lotus Notes and Lotus
cc:Mail. [9]
Page 68 of 126
Final Project Report
Since GPRS capable devices will be more widespread in corporations than
Security System
more corporate email applications using GPRS than Internet email ones
whose target market is more general. [9]
Internet email services come in the form of a gateway service where the
messages are not stored, or mailbox services in which messages are stored.
In the case of gateway services, the wireless email platform simply translates
the message from SMTP, the Internet email protocol, into SMS and sends to
the SMS Center. In the case of mailbox email services, the emails are actually
stored and the user gets a notification on their mobile phone and can then
retrieve the full email by dialing in to collect it, forward it and so on.
Upon receiving a new email, most Internet email users do not currently get
notified of this fact on their mobile phone. When they are out of the office, they
have to dial in speculatively and periodically to check their mailbox contents.
However, by linking Internet email with an alert mechanism such as SMS or
GPRS, users can be notified when a new email is received. [9]
This application integrates satellite positioning systems that tell people where
they are with non-voice mobile services that let people tell others where they
are. The Global Positioning System (GPS) is a free-to-use global network of
24 satellites run by the US Department of Defense. Anyone with a GPS
receiver can receive their satellite position and thereby find out where they
are. Vehicle positioning applications can be used to deliver several services
including remote vehicle diagnostics, ad-hoc stolen vehicle tracking and new
rental car fleet tariffs. [9]
Page 69 of 126
Final Project Report
The Short Message Service is ideal for sending Global Positioning System
Security System
GPS coordinates are typically about 60 characters in length. GPRS could
alternatively be used. [9]
When mobile workers are away from their desks, they clearly need to connect
to the Local Area Network in their office. Remote LAN applications
encompasses access to any applications that an employee would use when
sitting at their desk, such as access to the intranet, their corporate email
services such as Microsoft Exchange or Lotus Notes and to database
applications running on Oracle or Sybase or whatever. The mobile terminal
such as handheld or laptop computer has the same software programs as the
desktop on it, or cut down client versions of the applications accessible
through the corporate LAN. This application area is therefore likely to be a
conglomeration of remote access to several different information types- email,
intranet, and databases. This information may all be accessible through web
browsing tools, or require proprietary software applications on the mobile
device. The ideal bearer for Remote LAN Access depends on the amount of
data being transmitted, but the speed and latency of GPRS make it ideal. [9]
As this generic term suggests, file transfer applications encompass any form
of downloading sizeable data across the mobile network. This data could be a
presentation document for a traveling salesperson, an appliance manual for a
service engineer or a software application such as Adobe Acrobat Reader to
read documents. The source of this information could be one of the Internet
communication methods such as FTP (File Transfer Protocol), telnet, http or
Java- or from a proprietary database or legacy platform. Irrespective of source
and type of file being transferred, this kind of application tends to be
Page 70 of 126
Final Project Report
bandwidth intensive. It therefore requires a high speed mobile data service
Security System
Optimal Bearer By Application
Currently, corporate applications that use the Short Message Service are few
and far between. The reasons are the relatively older age of corporate mobile
phone users and their lower price sensitivity, particularly since the employer
usually pays mobile phones bills. Corporate users are less willing to learn how
to and make the effort to send a short message- they tend to use voice as
their primary communications method. Instead, the vast majority of SMS
usage is accounted for by consumer applications. It is not uncommon to find
90% of the total SMS traffic accounted for by the consumer applications that
have been described. Until GPRS terminals are consumer oriented, SMS will
continue to be bearer for most consumer applications. However, since GPRS
will be incorporated into high end mobile phones initially, it will be used more
for corporate applications. [9]
Page 71 of 126
Final Project Report
internal employee information. As such, all work will be carried out through the
Security System
Often, by designing applications to minimize the effects of the limitations of
existing mobile services- such as the length of a short message or the speed
of a Circuit Switched Data call- existing non-voice mobile services can be
successfully used for mobile working. However, many non-voice applications
are graphics intensive and the new faster data services will allow BETTER
VERSIONS of today's existing non-voice applications. For example, instead of
occasional information messages with SMS, information services via GPRS or
3GSM will be more akin to the "push" Internet channels we see on Active PC
Desktops today. Instead of the slow transmission of small video images, real-
time broadcast quality images will be transmittable. Instead of using SMS to
notify Internet users of new email, the whole email will be sent, and full-blown
Internet access will be possible. The same applications will be more
immediate and convenient for users. [9]
The use of SMS has prepared customers for nonvoice applications using
GPRS and other nonvoice services and most of the applications envisaged for
GPRS already exist in some form today. It is therefore an important question
to consider what the preferred bearer for each application will be- GPRS,
Circuit Switched Data or SMS. [9]
With any new service, it is an important part of the business case to estimate
what the applications for that technology will be. We believe that the business
case for any network operator for GPRS is compelling- it confers a huge
increase in capability for a relatively small investment. The more popular
applications using GPRS are expected to be: [9]
Page 72 of 126
Final Project Report
4 Job Dispatch GPRS
Security System
6 File Transfer GPRS
7 Web browsing GPRS
8 Still Images
9 Moving Images GPRS / HSCSD
10 Chat GPRS/ SMS
11 Home Automation GPRS
12 Document Sharing/Collaborative Working GPRS
13 Audio GPRS
The first of the applications listed will be popular partly because they are
widespread over fixed telephone networks but have previously not been
readily or fully available over GSM networks. The Internet and email are
already in place today- GPRS will allow them to be made fully wire free and
available everywhere. The applications ranked further down the list lack
current popularity in the fixed communications world and lack widespread
availability of specific software solutions. [9]
Whilst these applications are technically feasible or high speed mobile data
services such as GPRS, the volume of usage is dependent upon commercial
factors such as pricing. It is expected that GPRS will incorporate volume-
based charging such that only the data sent will be charged for, paving the
way for widespread usage amongst customers with GPRS capable devices.
Enabling GPRS on a GSM network requires the addition of two core modules,
the Gateway GPRS Service Node (GGSN) and the Serving GPRS Service
Node (SGSN). As the word Gateway in its name suggests, the GGSN acts as
a gateway between the GPRS network and Public Data Networks such as IP
and X.25. GGSN also connect to other GPRS networks to facilitate GPRS
roaming. The Serving GPRS Support Node (SGSN) provides packet routing
to and from the SGSN service area for all users in that service area. [9]
Page 73 of 126
Final Project Report
In addition to adding multiple GPRS nodes and a GPRS backbone, some
Security System
implement a GPRS service. These include the addition of Packet Control
Units; often hosted in the Base Station Subsystems, mobility management to
locate the GPRS Mobile Station, a new air interface for packet traffic, new
security features such as ciphering and new GPRS specific signaling. [9]
GPRS can be used as the bearer of SMS. If SMS over GPRS is used, an
SMS transmission speed of about 30 SMS messages per minute may be
achieved. This is much faster than using the ordinary SMS over GSM, whose
SMS transmission speed is about 6 to 10 SMS messages per minute. A
GPRS modem is needed to send and receive SMS over GPRS. Note that
some wireless carriers do not support the sending and receiving of SMS over
GPRS. [10]
Page 74 of 126
Final Project Report
Public Internet Access To GPRS Devices
Although client GPRS devices can communicate with ease over Public and
Private networks, GPRS server devices require a static IP address. Network
Operators offer private APN's to corporate networks over Leased Lines or
VPN's, where IP address assignment is managed by the customer's corporate
Network e.g. using a radius server. Alternatively, Wireless Operators in some
countries offer private APN's with static IP address support thereby creating
customers their own private network within the GPRS network. These are
supported by the GPRS modem or GPRS routers "Always on" mode of
operation. [10]
There are a number of GPRS devices, each of which can offer GSM services
too, such as voice calls and SMS. [10]
There are 3 classes of GPRS device being developed, of which only class B
is currently available: - [10]
Page 75 of 126
Final Project Report
• Class A - Operates in GSM and GPRS modes at the same time, and
Security System
• Class B - Operates in GSM and GPRS modes at the same time, and
but cannot hold simultaneous calls.
• Class C - Can be active in either GSM or GPRS mode, but not at the
same time.
4.3 - AT COMMANDS
A series of machine instructions used to activate features on an intelligent
modem. Developed by Hayes Microcomputer Products and officially known as
the Hayes Standard AT Command Set, it is used entirely or partially by most
every modem manufacturer. AT is a mnemonic code for ATtention, which is
the prefix that initiates each command to the modem
Page 76 of 126
Final Project Report
HyperTerminal. In AT commands jargon that is called Terminal Adapter (TA).
Security System
connected to the serial port of the computer. Hyper Terminal can be
configured to send data to the special at different baud rates e. g 110, 300,
1200, 2400, 4800, 9600, 19200, 38400, 57600, 115200, 230400, 460800,
921600 Bits per Second. Some AT commands are not supported by our
mobile phone. Giving a command, which is not supported by the mobile, gives
error response.
GPRS Commands
Syntax
Parameters:
<app>:
Page 77 of 126
Final Project Report
Specifies the PDP context parameter values for a PDP context. This
command is used in conjunction with the +CGDATA command.
Syntax:
+CGDCONT=<cid>,<PDP_type>,<APN>,<PDP_addr>,<d_comp>,<h_c
omp>, <pd1>[,…[,<pdN>]]
Defined values:
<cid>: (PDP Context Identifier) a numeric parameter (1-4) which specifies
a particular PDPcontext definition. The parameter is local to the TE-MT
interface and is used in other PDP context-related commands.
Page 78 of 126
Final Project Report
Security System
space applicable to the PDP. If the value is null or omitted, then a value
may be provided by the TE during the PDP startup procedure or, failing
that, a dynamic address will be requested.
Example
AT +CGDCONT=1, "IP", "internet"; +GCDCONT=2, "IP", "abc.com"
OK
Syntax:
+CGQREQ=<cid>,<precedence>,<delay>,<reliability>,<peak>,<mean>
Defined values:
<cid>: a numeric parameter which specifies a particular PDP context
definition.
<precedence>: a numeric parameter which specifies the precedence
class.
Page 79 of 126
Final Project Report
<delay>: a numeric parameter which specifies the delay class.
Security System
<peak>: a numeric parameter which specifies the peak throughput class.
<mean>: a numeric parameter which specifies the mean throughput class.
Example:
AT +CGQREQ=1,1,4,5,2,14
OK
Syntax:
+CGQMIN=<cid>,<precedence>,<delay>,<reliability>,<peak>,<mean>
Defined values:
<cid>: a numeric parameter which specifies a particular PDP context .
<precedence>: a numeric parameter which specifies the precedence
class.
<delay>: a numeric parameter which specifies the delay class.
<reliability>: a numeric parameter which specifies the reliability class.
<peak>: a numeric parameter which specifies the peak throughput class.
<mean>: a numeric parameter which specifies the mean throughput class.
Example:
AT +CGQMIN=1,1,4,5,2,31
OK
Page 80 of 126
Final Project Report
5. AT+CGATT GPRS Attach or Detach
Syntax:
+CGATT= [<state>]
Defined values:
• <state>: indicates the state of GPRS attachment
• 0 – detached
• 1 – attached
• Other values are reserved and will result in an ERROR
response to the execution command.
Example:
AT +CGATT=1
OK
Page 81 of 126
Final Project Report
Page 82 of 126
Final Project Report
MAP DIGITIZATION
Digitization is used where the dimensions are not present or where it is not
having importance. Digitization is also used in the mapping field as on of the
first step to get the base map. [11]
The drawing has to be scanned with more accuracy as to minimize the error
factor. It might require a cleaning process if it is blue print, sepia or in the old
drawings where there are lot of stains. [11]
Page 83 of 126
Final Project Report
In order for a map to be recognizable from a computer, it has to be transformed from
Security System
be performed in two formats: vector and raster.
In a vector format the map is divided in parts, which are appointed to vectors. These
vectors are defined by an x,y coordinate system, according to which every point of the
analogical map is assigned to one of the digital format. In a raster format the map is a
raster/table consisting of pixels1. In this way every pixel of the map is described by its
location and the intensity of radiation of light . With this method, we are able to know
about thematic information, like names, symbols, colors etc. [11]
Digitizer
Scanner
Page 84 of 126
Final Project Report
Security System
according to the device, the digitizer allows the selective digitizing of specific parts of
the map, for instance roads, unlike the scanner, which scans the entire surface placed
on it but has the advantage of colors’ Recognition and speed of scanner. [11]
GPS systems do not work by magic, even if it might seem so at times. In fact,
each one contains special GPS maps controlled by mapping software which
allows it to match the global position of the unit, in real time, against a map of
the vicinity in which it finds itself. As you might expect, there are a few
sources if you need GPS maps or mapping software for the purpose of
navigation, not all of them free, and not all of them reliable. Therefore it pays
[6]
to be careful in making the right choices when it comes to navigation.
The first source is your old map cupboard. With the right software, you can
create GPS maps from a real one. This will involve scanning the mapping
software into your computer, and using an appropriate software package to
convert the picture into a series of co-ordinates, heights and other information
needed to build a digital version for navigation. [6]
If you do not have a scanner, or a suitable map, then you will have to
purchase GPS maps for navigation with your particular brand of GPS
receiver. Prices will vary according to the base map used, and the amount of
information or mapping software that the supplier has put on the digital map. [6]
For example, GPS maps designed for use with urban and highway navigation
systems, including cities, roads, and other features will be comparatively
expensive when put alongside those which have only the key geographic
features – heights, rivers and lakes. So it all depends on the content in the
mapping software. [6]
Page 85 of 126
Final Project Report
This may be enough for the hiker or climber, after all they will not need GPS
Security System
available, or cheaper variety. Usually this is not an option available to owners
of vehicle based GPS systems, such as aviation, maritime or highway
vehicles, who will need to buy the mapping software from their GPS
manufacturer. [6]
Digital imaging technology is a relatively new process, with its widespread use
coming only in the 1990s with improvements in high resolution scanning;
lower costs for the scanning and storage of images; the spread of high-speed,
high-bandwidth networks; and, the emergence of the World Wide Web. The
basic tools needed to digitize a document are a computer, scanner, and
software to control the scanner and manipulate the images once they are
scanned. If the image is going to be put online for wider access, additional
software may be required. [16]
The importance of getting a good scan from a document on the initial scan
cannot be emphasized strongly enough. In some cases, an item may only be
available for one scan, or, the document may be so fragile that it cannot afford
to be scanned multiple times. Additionally, a quality scan saved in an archival
quality format helps justify future migration costs. From a high-quality scanned
image, information can then be transferred to other formats as desired. [16]
1) Resolution
Page 86 of 126
Final Project Report
2) Bit Depth/Dynamic Range
4) Compression
5) Metadata
Resolution:
The number of pixels used to represent an image; often measured as dots per
square inch (dpi). In grayscale and color scanning both resolution and bit
depth combine to play significant roles in image quality. Resolution is a
measurement of clarity, or detail, and can refer either to an image file, or, the
device, such as a monitor, used to display an image. Central to image quality
is not the capturing of a document at the highest resolution possible, but
rather, to scan at a level that ensures adequate capture of the information
content of the original document and the creation of a moderately sized file. [16]
Bit depth is the number of colors or shades of gray (grayscale) that can be
represented in a digital image. Dynamic range is a measurement of the
number of bits used to represent each pixel in an image and is used to
express the full range of tonal variations between the lightest and darkest
areas of a document. A scanner's capability to capture a complete range of
tones is dependent upon its bit depth and dynamic range. The greater the bit
depth, the greater number of grayscale or color tones that can be
represented. Black and white images are usually scanned using eight or
sixteen bits, while twenty-four bits and higher are used for color images. [11]
Image enhancement:
Page 87 of 126
Final Project Report
contrast; and stitch together Tagged Image File Format (TIFF) images for
Security System
enhancement features is necessary to provide a suitable image, too much
dependence on image altering software raises questions concerning the
authenticity and fidelity of an image. [11]
Compression:
The reduction of file size in order to save storage space. Digital images
captured at high resolutions produce large files. To counter this, several steps
are commonly followed to help reduce file size. First is the scanning of an
image at the highest feasible resolution and then saving the scanned image to
a lossless compression mechanism file, such as TIFF, to create an archival
image. Then, from the archival image, a lossy compression mechanism, such
as Joint Photographic Experts Group (JPEG) can be used to reduce the size
needed for a file's processing, storage, and transmission. A determining factor
in defining an appropriate level of compression is the balancing of file size and
resulting storage requirements with quality needs and the limits of the display
hardware and network speeds. The greater the image quality, the more
storage space it will occupy; the scanning process will be costlier and longer;
and, more memory will be required to display the image. [11]
The level of compression used may affect the quality of the image. An image
decompressed and viewed after lossless compression will be identical to its
original compression. Lossy compression results in some loss of data, and
therefore image quality are reduced. Images do not respond to compression
in an identical way. As an image is compressed, particular kinds of visual
characteristics, such as subtle tonal variations, or unintended visual effects
may appear. In other instances, no noticeable change results from the use of
lossy compression. A point to consider when determining resolution and
compression ratios is that the monitor a user views the image with will not be
Page 88 of 126
Final Project Report
calibrated the same as the monitor used when the image is digitized; thus,
Security System
Metadata:
Data that describes an information resource and which assists in the locating
and accessing of information about the resource. Metadata includes a number
of elements, such as title, author, and date and place of creation. [11]
Once a reference datum has been determined the elevation of any point can
be accurately determined, and it will correlate to the elevation of any point on
the earth's surface that has the same elevation and is using the same datum.
But…how do we accurately represent the X and Y coordinates of that point?
This question leads to one of the fundamental problems of mapmaking…how
do we represent all or part of an ellipsoid object on a flat piece of paper? The
answer to this question is a bit complicated, but understanding it is
fundamental to understanding what maps actually represent [14]
In order to represent the surface of the earth on a flat piece of paper, the map
area is projected onto the paper. There are many different types of
projections, each with its own strengths and weaknesses. [14]
Page 89 of 126
Final Project Report
5.1.5 - Distortions
There are four basic characteristics of a map that are distorted to some
degree, depending on the projection used. These characteristics include
distance, direction, shape, and area. The only place on a map where there
is no distortion is along the trace of the line that marks the intersection of our
‘paper’ with the surface of the earth. [15]
Any place on the map that does not lie along this line will suffer some
distortion. Fortunately, depending on the type of projection used, at least one
of the four characteristics can generally be preserved. [15]
A map of this size is referred to as a ‘two degree sheet’. One, two degree
sheet can be divided into four smaller quadrangles, each covering one degree
of longitude and 1/2 degree of latitude (‘one degree sheet’). [12]
Each one degree sheet is subdivided into eight ‘fifteen minute quadrangles’,
measuring fifteen minutes of latitude and longitude.
Page 90 of 126
Final Project Report
We can determine what type of quadrangle we are looking at by subtracting
Security System
the longitude printed in the upper (or lower) right corner of the map. This can
also be done using latitude values, just remember that a two degree sheet
only covers one degree of latitude and and one degree sheet only covers
thirty minutes of latitude. This information is also commonly printed in the
upper right hand corner of a map, under the title of the map. [12]
Maps are considered one of the most difficult items to scan. It is suggested
that beginning a scanning project not "begin with oversize maps, as the
combination of large dimensions and fine detail will challenge the best of
scanning systems and will defy effective presentation on the highest
resolution monitors available today." Many maps are too large to capture with
one scan and it is often difficult to scan a map in sections and then paste it
together. Regarding the fine detail of maps, contour lines and text are
sometimes as small as 1mm, meaning little contrast between the print and the
background. Another major difficulty is that maps usually lose their scale
when digitized and, as a result, the viewer is left without a firm understanding
of the distance between points on the map. [17]
It cannot be denied that the potential for the digital imaging of maps is great.
However, the technology is still relatively new and in the experimental phase,
and there exist a number of drawbacks that curb its use as a means of
preservation. Among some of the primary downsides with digital imaging are:
the lack of standards, and, a quickly changing technological base that
necessitates a migration policy and a financial commitment for future transfer
of files Despite the problems, there are currently an amazing array of digital
maps available via the Web and digital imaging holds great potential for
capturing maps in the future. What follows below is an overview of the
imaging systems used to digitize maps. [17]
Page 91 of 126
Final Project Report
5.1.8 Conclusion: The Future of Map Reproduction
Despite their impressive traits, digital images cannot yet be considered the
clear choice for digitizing maps. Shortcomings still exist with cost, resolution,
and the always troubling question of permanence. However, headway is being
made with the above problems. The cost of memory is decreasing; methods
of compression are improving; and advances are continuously being made
with scanning and resolution. In the future it could very well be possible to use
digital cameras to image maps. [17]
With the increase in the digital imaging of library and archival collections has
come the lament that money is being diverted from a proven preservation
media (microforms) and rerouted to less-stable digital technologies. While the
microfilming of maps offers considerable advantages as a means of
preservation, is it that much of an advantage when it is an image that is
missing essential detail such as color? Digital imaging captures color and via
the Web raises awareness of the existence of older maps, which, as a result,
could increase the chances that heightened efforts will be made to preserve
the original map. Maps that would never be microfilmed, or, made the focus of
preservation efforts, are being digitized and, at least for the present, their
images are being saved. Despite shortcomings with digitization, the
technology will continue to be the choice for capturing the intricate detail
found on maps. [17]
Page 92 of 126
Final Project Report
For Digitizing the Map we have get a Map from Google Earth Which is of very
high Resolution and that is Required for the Map Digitization Because when
any Point is Plotted on to the Map only that area is highlighted that tell us that
where we are now for this we have to get a Map With high resolution other
wise the Position will be Blur and it will be problematic for the viewers of the
map to see where are they Now at the Moment We have taken the resolution
of 4800* 4026 from the premium version of the Google Earth.
The other way to get a high resolution image is not very difficult Process. For
this you have to get a very large Map and then cutting that Map into Small
Pieces that can be scanned and after scanning joining of the images with
each other as they are cut off from each other
Page 93 of 126
Final Project Report
We will start digitizing the Map with the help of software which is called GPS
Tools SDK
Step 1
In the step one we will load a BITMAP image because it gives support to the
BITMAP images only
Step 2
When the Map is loaded then there is the step to give name to your Map and
this Name will be used in our application in which the Map handling is done
Page 94 of 126
Final Project Report
In this step you need to specify which coordinate system your raster map is
using (for map projection).
Page 95 of 126
Final Project Report
In this step you must enter the geographic position which represents the X, Y
position on the raster map.
Page 96 of 126
Final Project Report
Step 5
Now you have to enter the scaling coordinate 2 of 3.As it is told earlier that for
best results the points should be in opposite Direction for good Results
Page 97 of 126
Final Project Report
Step 6
Page 98 of 126
Final Project Report
Step 7
Page 99 of 126
Final Project Report
When you are done with the above procedure, ‘Scanning Completed’
Security System
Step 8
Security System
known Position of the Map for Confirmation
Step 9
Security System
‘Save Map as MPlib’ and your map will be saved.
DEFINITION
A website (alternatively, Web site or web site) is a collection of Web pages,
images, videos and other digital assets that is hosted on a Web server,
usually accessible via the Internet or a LAN.
Security System
accessible via HTTP, a protocol that transfers information from the Web
server to display in the user's Web browser.
The pages of websites can usually be accessed from a common root URL
called the homepage, and usually reside on the same physical server. The
URLs of the pages organize them into a hierarchy, although the hyperlinks
between them control how the reader perceives the overall structure and how
the traffic flows between the different parts of the sites. [37]
OVERVIEW
Websites are written in, or dynamically converted to, HTML (Hyper Text
Markup Language) and are accessed using a software program called a Web
browser, also known as an HTTP client. Web pages can be viewed or
otherwise accessed from a range of computer based and Internet enabled
devices of various sizes, including desktop computers, laptop computers,
PDAs and cell phones. [37]
INTRODUCTION
The WWW becoming the primary communications interface- people access
the Internet for entertainment and information collection, the intranet for
Security System
the World Wide Web aimed at connecting different communities of interest.
There is a trend away from storing information locally in specific software
packages on PCs to remotely on the Internet. When you want to check your
schedule or contacts, instead of using something like "Act!", you go onto the
Internet site such as a portal.
You should always remember that a web site is designed for visitors NOT for
yourself or your boss. And why do people come to your web site? They come
in search of information. Hence it is very important that you structure your site
in such a manner that visitors are able to locate information quickly. Put
yourself in the visitors' shoes.
WEBSITE ARCHITECTURE
For our system web server is used to host our site which contains the User
modules and the Administrator module and for this we need a static IP which
is used in order to interact our site, it also include a digital map.
So the Microcontroller gets the data from the GPS receiver and send data
with the help of AT commands through the mobile phone towards our website
where the data is stored in database, that data consists of Longitude,
Latitude, time and date, and then coordinates from the database are plotted
on the map.
WEBSITE MODULES
Security System
In Administrative Module we basically handle the data base and the users.
Other then that, different functionalities are provided in this module which will
only be performed by the administrator and user will have no right or access
to those functionalities.
In User Module user can only see the location where it is and where it was, it
did not have access to the user management module and to the data base.
Other then that some limited functionalities are provided to the user to make
the website more user friendly.
The data which is sent from the microcontroller consist of longitude, latitude,
date and time. After receiving the data at web server the data is being
separated. The date and time are separated from the received data.
Longitude and latitude are then plotted on the digital map which is placed on
the web server. That plotted longitude and latitude will show the current
position of the vehicle.
There are three main pages along with the dlls provided by SDK that make
tracking possible on the digital map according to our requirement.
Security System
All the process is done through following code:
The string which is send by the micro controller may also contain the dirty
data. Usually in start the data received contains the garbage data. To remove
that dirtiness or garbage data we perform some checks to ensure the validity
of the data.
“Index of “is basically used to check the occurrence of any specific character
i.e. at what position that character lies in the string.
len = gpsData.Length
Dim at As String
at = gpsData.IndexOf("@", 0)
Dim n As String
n = gpsData.IndexOf("N", 0)
Dim ee As String
ee = gpsData.IndexOf("E", 0)
Dim g As String
g = gpsData.IndexOf("G", 0)
Dim gg As String
gg = gpsData.IndexOf("g", 0)
Here the “If” condition ID applied to check the validity of the string. If the string
which is stored in the “gpsData” variable is valid then the further processing is
Security System
controller. As the string fulfills the “if” condition the further processing is done
on it.
If (len = 30 And at = -1 And n > 0 And ee > 0 And (g > 0 Or gg > 0))
Then
Dim da As String
da = String.Concat(d2, slash, d3)
Here we are combing the date and time because we have to use both in our
sql query to get the latest gps data of the vehicle.
Security System
converting the longitude to the “toDecimal” function in order to make our data
in a readable format by our digitized map.
• GpsToolsNet.dll
• GpsViewNet.dll
Image render basically show the small area of map around the marked point
in the image box instead of showing the whole map. To upload full map huge
amount of time is required so image render only show the small portion of the
map. This page use all the code provided by the SDK.
On the main page of the website their will be the login form. You can login as
an administrator or as a client by selecting any one of the choice. The access
to the next page will be granted on right login and password.
• Add Client
• Change Password
• Edit Client
• Search Client
• Ownership Transfer
• Track Client
Security System
Add Client
In add client form the administrator will first check the NIC. If the NIC number
is found in the database its mean that client already exist in the database. But
if NIC does not found then the administrator will proceed.
Edit Client
The administrator can first search the client by vehicle no or by name. After
the searched result the administrator can edit the client information.
Search Client
The administrator can search the client by vehicle no or by name. After the
searched result the administrator can edit the client information.
Ownership Transfer
Security System
wants to change the ownership then the client will send the request to the
administrator and administrator on client request will change the ownership
and save the changes.
Track Client
Security System
up to the administrator that through which mean he/she wants to track the
client.
Security System
client can even zoom or can rotate the map within the given range according
to his/her own desire.
View Profile
The form will show the user profile which includes the user information and
the vehicle information. On this form the user can change the password and
can edit the user or vehicle information.
Security System
can change the old password and can setup a new password.
Edit Profile
The client has the option to make changes in his/her profile. Through this form
the client can make changes in his/her profile and update them in the
database.
Security System
is given on the form through which the user can select the desired date.
Tracking by History
In this all the tracking record of the specific user will be shown along with date
and time. And the user can track any of the record.
BTS Base Transceiver Station. It handles the radio signals received from
mobile stations.
Security System
activity status.
IP Internet Protocol: One of the two main parts of the TCP/IP protocol
suite. IP delivers TCP and UDP packets across a network.
Security System
SGSN Serving GPRS Service Node. It provides authentication and
security for GPRS network. It also handles packet data
passing from PCU.
VLR Visitor Location Register. It stores information of mobile users that are
currently located in the geographical service area.