You are on page 1of 16

PRESENTED BY :

NIHAR RANJAN SENAPATI 0901223259 ENTC BRANCH

INTRODUCTION

3G NETWORKS THE STRUCTURE AND WORK PRINCIPLE OF THE SYSTEM SYSTEM HARDWARE DESIGN ARM MASTER MODULE VIDEO PROCESSING MODULE ALARM INPUT AND OUTPUT CIRCUITS SYSTEM SOFTWARE DESIGN

APPLICATIONS
CONLUSION

With the continuous improvement of people's living standard, people pay more attention on their own personal safety and property security; Contemporary, The rapid development of the economy along with the city's population sharp increasing, add a new problem to the city social order, to protect the security of personal property and prevent thieving incident happened, every family must have its own security system. In their traditional family system anti-theft alarm, fire alarm, and gas leak alarm subsystems function are single , false alarm rate is higher, it can only achieve local alarm, can not achieve remote alarm in real time to reduce losses, but also record evidence of a crime for later inspection. To resolve these shortcomings and scarcity, and meet people's needs for intelligent home, therefore, adopting image processing technology and 3G communication technology the paper studies and designs smart home security system based

on ARM9 and 3G.

3G

is the abbreviation of the 3rd Generation, which refers to the third generation mobile communication technology.

Relative to the first generation analogue phones (1G) and the second generation
GSM, TDMA digital mobile phones (2G), in generally speaking, the 3G mobile phones refers to a new mobile communication system which combine the wireless communication with the multimedia communication such as the international internet.

It can process the images, music, video stream and other forms of media, which
can also provides many kinds of information services, such as web page browsing, conference call and e- commerce.

The three mainstream wireless interface standards of 3G communication


determined by International Telecommunication Union (ITU) is respectively W-CDMA (Wideband Code Division Multiple Access), CDMA2000 (code division multiple access 2000), and TDS-CDMA (Time Division-Synchronous CDMA).

THE STRUCTURE AND WORK PRINCIPLES OF THE SYSTEM


The system is mainly composed of alarm input, control unit, video processing. When the system works, the control unit detected circulate door magnetic sensor installed above the door, infrared, smoke, gas sensor, once there is illegal personnel have intruded, gas leak or firing, etc., it will immediately issue a warning signal to the CPU . CPU will determine which and where the alarm is, the scene immediately sends a sound and light alarm and takes emergency treatment, by controlling the camera to capture video images, and then put collected video image data into buffer, and then run the image display program which is transplanted to Embedded target platform, for processing and displaying the buffer zone of the image data. Further, which can be saved into a data file format and labeled UDP packets, through the 3G network send images to the remote user mobile phone.

SYSTEM HARDWARE DESIGN(Contd.)


MODULES PRESENT IN THE DESIGN: ARM MASTER MODULE

VIDEO PROCESSING MODULE


ALARM INPUT AND OUTPUT CIRCUITS

ARM main control module is composed of the ARM controller, FLASH,

SDRAM and related peripheral circuits. The ARM controller's main functions are operating alarm input and output I / O port and other parts , at the same time, achieving the acceptance and transmission of video data, GPRS network communication and other functions. Therefore, the system need to choose more general-purpose I/O port and rich external resources for being easy to build chips of peripheral circuits.

For video processing ,Linux is achieved through Video4Linux,which widely uses bus standard and provides a wide range of interface functions for the application of video equipment which includes the popular TV cards, video capture card and USB camera and so on. For USB camera itself, drive program need to provide basic I / O interface functions. The functions including the achievement of open, read, write, close, The interruption of processing, memory mapping function, as well as the control interface of the ioctl function to achieve for I / O channel and so on.

All the detectors and alarm devices used by the system are connected to

controller through the GPIO to complete alarm input and output functions. These input and output signals have a very strong current, which has lager effect(interference) on the system. So the system use respectively photoelectric isolation chip TLP521 and relays for alarm input and output signals to minimize impact which an external signal produces on the system.

System software mainly includes boot loader, operating system, file system and user applications.
Boot loader using VIVI, mainly used to initialize the processor and hardware equipment, download system image and initialize the operating to be ready to implement.

Operating System use Linux 2.4 core with powerful network and excellent transplant and a powerful process, interrupt, memory, and equipment penny rationale to support a variety of file system.
File system using EXT3 file system, the system all the files and directory tree structure to the formation of the overall directory hierarchy in order to facilitate system management of documents and equipment. User applications to be completed by a series of a function of the corresponding functional components, including alarm monitoring procedures, image acquisition compression procedures,etc.

Figure . The system main program flow chart

USED IN BANKS
USED IN MANUFACTURING INDUSTRIES

USED IN HOME.

ARM-based embedded, video processing technology and 3G wireless networks Smart Home Security System, full use of embedded in the image processing, network communication. The existing 3G network resources, not only achieve a rapid security alarm, record evidence and features such as remote monitoring, and high reliability, low False Alarm, cost-effective and less loss of advantage. At present, the system can also be hardware and software upgrades and integration of new functional modules to meet the intelligent home security on the future development needs. Tested showed that the stable operation of the system to achieve the design requirement. The system also can be used in banks, libraries and museums, such as required security and remote monitoring of the place.

You might also like