Documente Academic
Documente Profesional
Documente Cultură
BACHELOR OF TECHNOLOGY
In
107B1A0435
P. Vijay Kumar.
107B1A0437
P. Anil Reddy.
107B1A0449
B. Abhishek.
107B1A0468
(2010-2014)
Certificate
This is to certify that this dissertation work entitled Vehicle Tracking System using GSM
and GPS is a bonafide work carried out by CH. Bharath (107B1A0435), P. Vijay Kumar
(107B1A0437), P. Anil Reddy (107B1A0449) and B. Abhishek (107B1A0468) in partial
fulfillment of the requirements for the award of the degree of Bachelor of Technology in
Electronics and Communication Engineering, from Sagar Institute of Technology, during the
period 2013 under the guidance and supervision.
Internal Guide
Mr. B. SRINIVAS
M. Tech, (Ph.D.)
Professor & HOD of ECE.
External Examiner
DECLARATION
We hereby declare that the project Vehicle Tracking System using GSM and GPS
submitted in the partial fulfilment of that requirements for the award of the degree of
bachelor of technology in electronics and communication engineering from Sagar
Institute Of Engineering and Technology, Chevella, affiliated to JNTU, Hyderabad is an
authentic work and has not been submitted to any other university/institute for award of
degree.
ACKNOWLEDGEMENT
With great pleasure we want to take this opportunity to express our heartfelt gratitude
to all the people who helped in making this Major Project work a grand success.
We are grateful to Prof.V.Bhagya Raju, Professor & Head of Electronics and
Communication Engineering department, Mr. B. Srinivas, Asst. Prof. Dept of ECE and P.
Tejaswi Project Assistant at ECIL for their valuable suggestions and guidance during the
execution of this project and also for giving us moral support throughout the period of our
study in SITECH.
We are also highly indebted to our principal Dr. V.V. Satyanarayana, for giving
us the permission to carry out this Major Project.
We would like to thank the teaching and non-teaching staff of ECE Department for sharing
their knowledge with us.
Last but not the least we express our sincere thanks to Dr.W.R.Reddy and all the
founders of Sagar Institute of Technology for their continuous care towards our
achievements.
ii
Index
Declaration
Acknowledgement
ii
Index
iii
List of Figures
viii
List of Tables
ix
Abbreviations
1.1 Introduction
10
10
12
13
iii
13
2.2.1.2 Triangulation
14
2.2.1.3 Augmentation
14
2.2.2 GSM
15
16
16
17
18
19
2.2.3.5 Connectors
21
2.2.3.6 Cables
24
2.2.3.7 Conventions
24
25
26
26
27
27
2.2.4 MAX232 IC
28
29
30
31
2.2.5 Relay
31
32
33
iv
34
35
2.2.6 LCD
35
36
37
37
37
38
3.3.1 Power
38
38
38
40
4.1 Features
40
41
42
43
43
44
46
46
47
48
50
51
v
52
53
54
54
55
55
56
57
5.13 Handover
57
59
59
60
61
61
63
63
64
65
67
67
66
67
67
69
vi
70
Chapter 8: Applications
8.1 Applications
71
8.2 Limitations
72
73
75
References
76
vii
List of Figures
Figure 1.1
Figure 2.1
Block diagram
12
Figure 2.2
16
Figure 2.3
19
Figure 2.4
20
oscilloscope
Figure 2.5
MAX232 chip
28
Figure 2.6
30
Figure 2.7
32
Figure 2.8
32
Figure 2.9
34
Figure 2.10
35
characters.
Figure 3.1
37
Figure 5.1
49
Figure 5.2
50
Figure 5.3
Siemens BSC
51
Figure 5.4
Siemens TRAU
52
Figure 5.5
53
Figure 5.6
57
Figure 5.7
61
Figure 6.1
65
Figure 9.1
73
Figure 9.2
74
viii
List of Tables
Table 2.1
22
Table 2.2
Pin assignments
23
Table 2.3
29
Table 2.4
30
Table 2.5
30
ix
Abbreviations
VTS
GSM
GPS
RI
Ring Indicator
Tx
Transmitter
Rx
Receiver
SFR
LCD
RAM
ROM
RS-232
Recommended Standard
TTL
CMOS
UART
RST
Reset
ALE
PSEN
WDT
Chapter 1
Introduction to VTS
1.1 Introduction
Vehicle Tracking System (VTS) is the technology used to determine the location
of a vehicle using different methods like GPS and other radio navigation systems
operating through satellites and ground based stations. By following triangulation or
trilateration methods the tracking system enables to calculate easy and accurate location
of the vehicle. Vehicle information like location details, speed, distance traveled etc. can
be viewed on a digital mapping with the help of a software via Internet. Even data can be
stored and downloaded to a computer from the GPS unit at a base station and that can
later be used for analysis. This system is an important tool for tracking each vehicle at a
given period of time and now it is becoming increasingly popular for people having
expensive cars and hence as a theft prevention and retrieval device.
i.
The system consists of modern hardware and software components enabling one
to track their vehicle online or offline. Any vehicle tracking system consists of
mainly three parts mobile vehicle unit, fixed based station and, database and
software system.
ii.
Vehicle Unit: It is the hardware component attached to the vehicle having either a
GPS/GSM modem. The unit is configured around a primary modem that functions
with the tracking software by receiving signals from GPS satellites or radio station
points with the help of antenna. The controller modem converts the data and sends
the vehicle location data to the server.
iii.
Fixed Based Station: Consists of a wireless network to receive and forward the
data to the data center. Base stations are equipped with tracking software and
geographic map useful for determining the vehicle location. Maps of every city
and landmarks are available in the based station that has an in-built Web Server.
iv.
The vehicle tracking hardware is fitted on to the vehicle. It is fitted in such a manner
that it is not visible to anyone who is outside the vehicle. Thus it operates as a covert unit
which continuously sends the location data to the monitoring unit.
When the vehicle is stolen, the location data sent by tracking unit can be used to
find the location and coordinates can be sent to police for further action. Some Vehicle
tracking System can even detect unauthorized movements of the vehicle and then alert the
owner. This gives an edge over other pieces of technology for the same purpose
Monitoring center Software helps the vehicle owner with a view of the location at
which the vehicle stands. Browsing is easy and the owners can make use of any
browser and connect to the monitoring center software, to find and track his vehicle. This
in turn saves a lot of effort to find the vehicle's position by replacing the manual call to
the driver.
As we have seen the vehicle tracking system is an exciting piece of technology for
vehicle security. It enables the owner to virtually keep an eye on his vehicle any time and
from anywhere in the world.
A vehicle tracking system combines the installation of an electronic device in a
vehicle, or fleet of vehicles, with purpose-designed computer software at least at one
operational base to enable the owner or a third party to track the vehicle's location,
collecting data in the process from the field and deliver it to the base of operation.
Modern vehicle tracking systems commonly use GPS or GLONASS technology for
locating the vehicle, but other types of automatic vehicle location technology can also be
used. Vehicle information can be viewed on electronic maps via the Internet or
specialized software. Urban public transit authorities are an increasingly common user of
vehicle tracking systems, particularly in large cities.
Vehicle tracking systems are commonly used by fleet operators for fleet
management functions such as fleet tracking, routing, dispatch, on-board information and
security. Along with commercial fleet operators, urban transit agencies use the
technology for a number of purposes, including monitoring schedule adherence of buses
in service, triggering changes of buses' destination sign displays at the end of the line (or
other set location along a bus route), and triggering pre-recorded announcements for
passengers. The American Public Transportation Association estimated that, at the
beginning of 2009, around half of all transit buses in the United States were already using
a GPS-based vehicle tracking system to trigger automated stop announcements. This can
refer to external announcements (triggered by the opening of the bus's door) at a bus stop,
announcing the vehicle's route number and destination, primarily for the benefit
of visually impaired customers, or to internal announcements (to passengers already on
board) identifying the next stop, as the bus (or tram) approaches a stop, or both. Data
collected as a transit vehicle follows its route is often continuously fed into a computer
program which compares the vehicle's actual location and time with its schedule, and in
turn produces a frequently updating display for the driver, telling him/her how early or
late he/she is at any given time, potentially making it easier to adhere more closely to the
published schedule. Such programs are also used to provide customers with real-time
information as to the waiting time until arrival of the next bus or tram/streetcar at a given
stop, based on the nearest vehicles' actual progress at the time, rather than merely giving
3
information as to the scheduled time of the next arrival. Transit systems providing this
kind of information assign a unique number to each stop, and waiting passengers can
obtain information by entering the stop number into an automated telephone system or an
application on the transit system's website. Some transit agencies provide a virtual map
on their website, with icons depicting the current locations of buses in service on each
route, for customers' information, while others provide such information only to
dispatchers or other employees.
Other applications include monitoring driving behavior, such as an employer of an
employee, or a parent with a teen driver.
Vehicle tracking systems are also popular in consumer vehicles as a theft prevention
and retrieval device. Police can simply follow the signal emitted by the tracking system
and locate the stolen vehicle. When used as a security system, a Vehicle Tracking System
may serve as either an addition to or replacement for a traditional car alarm. Some vehicle
tracking systems make it possible to control vehicle remotely, including block doors or
engine in case of emergency. The existence of vehicle tracking device then can be used to
reduce the insurance cost, because the loss-risk of the vehicle drops significantly.
Vehicle tracking systems are an integrated part of the "layered approach" to vehicle
protection, recommended by the National Insurance Crime Bureau (NICB) to
prevent motor vehicle theft. This approach recommends four layers of security based on
the risk factors pertaining to a specific vehicle. Vehicle Tracking Systems are one such
layer, and are described by the NICB as very effective in helping police recover stolen
vehicles.
Some vehicle tracking systems integrate several security systems, for example by
sending an automatic alert to a phone or email if an alarm is triggered or the vehicle is
moved without authorization, or when it leaves or enters a geofence.
data in real-time via cellular or satellite networks to a computer or data center for
evaluation.
Many modern vehicle tracking devices combine both active and passive tracking
abilities: when a cellular network is available and a tracking device is connected it
transmits data to a server; when a network is not available the device stores data in
internal memory and will transmit stored data to the server later when the network
becomes available again.
Historically vehicle tracking has been accomplished by installing a box into the
vehicle, either self-powered with a battery or wired into the vehicle's power system. For
detailed vehicle locating and tracking this is still the predominant method; however, many
companies are increasingly interested in the emerging cell phone technologies that
provide tracking of multiple entities, such as both a salesperson and their vehicle. These
systems also offer tracking of calls, texts, and Web use and generally provide a wider
range of options.
i)
options. With a mobile phone-based tracking average price is about $ 500. A cellbased monitoring system sends information about when a vehicle is every five minutes
during a rural network. The average monthly cost is about thirty-five dollars for airtime.
ii)
that when the system was introduced, there will be other costs associated with it. But
setting the scheme is a bit 'expensive. The average is about $ 700 for hardware and $ 800
for software and databases. With this type of system, most say that the disadvantage is
that information about where the vehicle is not only can exist when the vehicle is returned
to the base business. This is a great disadvantage, particularly for companies that are
looking for a monitoring system that tells them where their vehicle will be in case of theft
or an accident. However, many systems are now introducing wireless modems into their
5
devices so that tracking information can be without memory of the vehicle to be seen.
With a wireless modem that is wireless passive tracking systems are also able to gather
information on how fast the vehicle was traveling, stopping, and made other detailed
information. With this new addition, many companies believe that this system is perfect,
because there is no monthly bill.
iii)
level, making it a good choice for shipping and trucking companies. Spending on
construction of the system on average about $ 700. The monthly fees for this system vary
from five dollars for a hundred dollars, depending on how the implementation of a
reporting entity would be.
Technology
Over the next few years, GPS tracking will be able to provide businesses with a
number of other benefits. Some companies have already introduced a way for a customer
has signed the credit card and managed at local level through the device. Others are
creating ways for dispatcher to send the information re-routing, the GPS device directly to
a manager. Not a new requirement for GPS systems is that they will have access to the
Internet and store information about the vehicle as a driver or mechanic GPS device to
see the diagrams used to assist with the vehicle you want to leave. Beyond that all the
information be saved and stored in its database.
i.
status,
cumulative
idling,
computed odometer,
engine
RPM, throttle position, and a lot more. Capability of these devices actually
decides the final capability of the whole tracking system.
6
ii.
iii.
User interface
The UI determines how one will be able to access information, view vehicle data,
and elicit important details from it.
control of your company. It is clear that the tracking devices offer many benefits to
companies, since you can build automated expense reports anytime.
GPS units do more than just allow companies to create reports. These devices also
help to put an end to thieves. According to recent reports, crime is at a high, which means
that car theft is increasing. If you have the right GPS unit, you can put an end to car thefts
because you can lock and unlock your car anytime you choose.
GPS are small tracking devices that are installed in your car and it will supply you
with feedback data from tracking software that loads from a satellite. This gives you more
control over your vehicles.
The chief reason for companies to install tracking devices is to monitor their mobile
workforce. A preventive measure device allows companies to monitor their employees
activities. Company workers can no longer take your vehicles to unassigned locations.
They will not be able to get away with unauthorized activities at any time because you
can monitor their every action on a digital screen.
The phantom pixel is another thing some webmasters do to get better rankings.
Unfortunately it will backfire on you since the search engines do not want this to occur.
You see, the phantom pixel is when you might have a 1 pixel image or an image so small
it cannot be seen by the regular eye. They use the pixel to stuff it with keywords. The
search engine can view it in the code, which is how they know it is there and can give you
better rank for the keywords in theory. Of course since the search engines dont like this
phantom pixel you are instead not getting anything for the extra keywords except sent to
the bottomless pit.
became electronic. Computers proved a great help in managing a large fleet of vehicle.
This also made the information authentic. As this technology was available at affordable
cost all whether small or big fleet could take benefit of this technology
Because of the cheap accessibility of the device computer tracking facilities has
come to stay and associated with enhanced management. Today each vehicle carries
tracking unit which is monitored from the base station. Base station receives the data
from the unit.
All these facilities require a heavy investment of capital for the installation of the
infrastructure of tracking system for monitoring and dispatching
Data capture: Data capturing is the first step in tacking your vehicle. Data in a
vehicle tracking system is captured through a unit called automated vehicle unit.
The automated vehicle unit uses the Global Positioning System (GPS) to
determine the location of the vehicle. This unit is installed in the vehicle and
contains interfaces to various data sources. This paper considers the location data
capture along with data from various sensors like fuel, vehicle diagnostic sensors
etc.
ii.
Data storage: Captured data is stored in the memory of the automated vehicle
unit.
iii.
Data transfer: Stored data are transferred to the computer server using the mobile
network or by connecting the vehicle mount unit to the computer.
iv.
10
But with better awareness and promotion the market will increase. Lets have a look at its
current application in India using vehicle tracking though in less volume.
a) Freight forwarding
Logistic service providers are now increasingly adopting vehicle-tracking system
for better fleet management and timely service. The system can continuously monitor
shipment location and so can direct the drivers directly in case of any change of plan.
Fleet managers can keep an eye on all activities of workers, vehicle over speed, route
deviation etc. The driver in turn can access emergency service in case of sickness,
accident or vehicle breakdown. All in turn supports money and time management,
resulting better customer service.
b) Call centers
In commercial vehicle segments the taxi operators of various call centers are now
using vehicle tracking system for better information access. However, its application is in
its infant stage in India and if adequate steps are taken in bringing the cost of hardware
and software low then it can be used for tracking personal vehicle, farming (tractor),
tourist buses, security and emergency vehicle etc. Again Government needs to cut down
the restriction imposed upon the availability of digital maps for commercial use and this
will encourage software industry in developing cost-effective tracking solutions. Though,
sales of both commercial and passenger vehicles are growing but price of tracking service
is very high and this is the key issue in Indian market. Hence, its important for market
participants to reduce prices of GPS chips and other products in order to attract more and
more users.
As far as Indian vehicle tracking and navigation market is concerned the recent
association of India with Russian Global Navigation Satellite System (GLONASS) will
act as a catalyst in the improvement of vehicle tracking system. This will give an
advantage in managing traffic, roadways and ports and also as an important tool for
police and security agency to track stolen vehicles. Hence, in near future there is large
prospect for the utility of vehicle tracking system in India, which can revolutionize the
way we are communicating.
11
Chapter 2
Block Diagram of VTS
2.1 Block Diagram of Vehicle Tracing Using GSM and GPS Modem
levels to RS-232 voltage levels. When the request by user is sent to the number at the
modem, the system automatically sends a return reply to that mobile indicating the
position of the vehicle in terms of latitude and longitude.
As the Micro Controller, GPS and GSM take a sight of in depth knowledge, they are
explained in the next chapters.
2.2.1 GPS
GPS, in full Global Positioning System, space-based radio-navigation system that
broadcasts highly accurate navigation pulses to users on or near the Earth. In the United
States Navstar GPS, 24 main satellites in 6 orbits circle the Earth every 12 hours. In
addition, Russia maintains a constellation called GLONASS (Global Navigation Satellite
System).
benefit from GPS positioning, which also serves farm tractors, ocean liners, hikers, and
even golfers. Many GPS receivers are no larger than a pocket calculator and are powered
by disposable batteries, while GPS computer chips the size of a babys fingernail have
been installed in wristwatches, cellular telephones, and personal digital assistants.
2.2.1.2 Triangulation
The principle behind the unprecedented navigational capabilities of GPS is
triangulation. To triangulate, a GPS receiver precisely measures the time it takes for a
satellite signal to make its brief journey to Earthless than a tenth of a second. Then it
multiplies that time by the speed of a radio wave300,000 km (186,000 miles) per
secondto obtain the corresponding distance between it and the satellite. This puts the
receiver somewhere on the surface of an imaginary sphere with a radius equal to its
distance from the satellite. When signals from three other satellites are similarly
processed, the receivers built-in computer calculates the point at which all four spheres
intersect, effectively determining the users current longitude, latitude, and altitude. (In
theory, three satellites would normally provide an unambiguous three-dimensional fix,
but in practice at least four are used to offset inaccuracy in the receivers clock.) In
addition, the receiver calculates current velocity (speed and direction) by measuring the
instantaneous Doppler effect shifts created by the combined motion of the same four
satellites.
2.2.1.3 Augmentation
Although the travel time of a satellite signal to Earth is only a fraction of a second,
much can happen to it in that interval. For example, electrically charged particles in the
ionosphere and density variations in the troposphere may act to slow and distort satellite
signals. These influences can translate into positional errors for GPS usersa problem
that can be compounded by timing errors in GPS receiver clocks. Further errors may be
introduced by relativistic time dilations, a phenomenon in which a satellites clock and a
receivers clock, located in different gravitational fields and traveling at different
velocities, tick at different rates. Finally, the single greatest source of error to users of the
Navstar system is the lower accuracy of the civilian C/A-code pulse. However, various
augmentation methods exist for improving the accuracy of both the military and the
civilian systems.
14
When positional information is required with pinpoint precision, users can take
advantage of differential GPS techniques. Differential navigation employs a stationary
base station that sits at a known position on the ground and continuously monitors the
signals being broadcast by GPS satellites in its view. It then computes and broadcasts
real-time navigation corrections to nearby roving receivers. Each roving receiver, in
effect, subtracts its position solution from the base stations solution, thus eliminating any
statistical errors common to the two. The U.S. Coast Guard maintains a network of such
base stations and transmits corrections over radio beacons covering most of the United
States. Other differential corrections are encoded within the normal broadcasts of
commercial radio stations. Farmers receiving these broadcasts have been able to direct
their field equipment with great accuracy, making precision farming a common term in
agriculture.
Another GPS augmentation technique uses the carrier waves that convey the
satellites navigation pulses to Earth. Because the length of the carrier wave is more than
1,000 times shorter than the basic navigation pulses, this carrier-aided approach, under
the right circumstances, can reduce navigation errors to less than 1 cm (0.4 inch). The
dramatically improved accuracy stems primarily from the shorter length and much greater
numbers of carrier waves impinging on the receivers antenna each second.
Yet another augmentation technique is known as geosynchronous overlays.
Geosynchronous overlays employ GPS payloads piggybacked aboard commercial
communication satellites that are placed in geostationary orbit some 35,000 km (22,000
miles) above the Earth. These relatively small payloads broadcast civilian C/A-code pulse
trains to ground-based users. The U.S. government is enlarging the Navstar constellation
with geosynchronous overlays to achieve improved coverage, accuracy, and survivability.
Both the European Union and Japan are installing their own geosynchronous overlays.
2.2.2 GSM
GSM (or Global System for Mobile Communications) was developed in 1990. The
first GSM operator has subscribers in 1991, the beginning of 1994 the network based on
the standard, already had 1.3 million subscribers, and the end of 1995 their number had
increased to 10 million!
There were first generation mobile phones in the 70's, there are 2nd generation
mobile phones in the 80's and 90's, and now there are 3rd gen phones which are about to
15
The standard does not define such elements as the character encoding or the framing
of characters, or error detection protocols. The standard does not define bit rates for
transmission, except that it says it is intended for bit rates lower than 20,000 bits per
second. Many modern devices support speeds of 115,200 bit/s and above. RS 232 makes
no provision for power to peripheral devices.
Details of character format and transmission bit rate are controlled by the serial
port hardware, often a single integrated circuit called a UART that converts data from
parallel to asynchronous start-stop serial form. Details of voltage levels, slew rate, and
short-circuit behavior are typically controlled by a line driver that converts from the
UART's logic levels to RS-232 compatible signal levels, and a receiver that converts from
RS-232 compatible signal levels to the UART's logic levels.
was
first
introduced
in
1962.
The
original
DTEs
were
many computers. It remained in widespread use into the late 1990s. In personal computer
peripherals, it has largely been supplanted by other interface standards, such as USB. RS232 is still used to connect older designs of peripherals, industrial equipment (such
as PLCs), console ports, and special purpose equipment, such as a cash drawer for a cash
register.
The standard has been renamed several times during its history as the sponsoring
organization changed its name, and has been variously known as EIA RS-232, EIA 232,
and most recently as TIA 232. The standard continued to be revised and updated by
the Electronic Industries Alliance and since 1988 by the Telecommunications Industry
Association (TIA).[3] Revision C was issued in a document dated August 1969. Revision
D was issued in 1986. The current revision is TIA-232-F Interface between Data
Terminal Equipment and Data Circuit-Terminating Equipment Employing Serial Binary
Data Interchange, issued in 1997. Changes since Revision C have been in timing and
details intended to improve harmonization with the CCITT standard V.24, but equipment
built to the current standard will interoperate with older versions.
Related ITU-T standards
identification)
The handshaking and control lines of the interface are intended for the setup and
takedown of a dial-up communication circuit; in particular, the use of handshake
lines for flow control is not reliably implemented in many devices.
No method is specified for sending power to a device. While a small amount of
current can be extracted from the DTR and RTS lines, this is only suitable for low
power devices such as mice.
The 25-way connector recommended in the standard is large compared to current
practice.
Figure 2.3 Diagrammatic oscilloscope trace of voltage levels for an uppercase ASCII "K" character (0x4b)
19
Figure 2.4 Upper Picture: RS232 signaling as seen when probed by an actual oscilloscope (Tektronix
MSO4104B) for an uppercase ASCII "K" character (0x4b) with 1 start bit (always), 8 data bits, 1 stop bit
and no parity bits (8N1)
separate power systems, the local ground connections at either end of the cable will have
differing voltages; this difference will reduce the noise margin of the signals. Balanced,
differential, serial connections such as USB, RS-422 and RS-485 can tolerate larger
ground voltage differences because of the differential signaling.
Unused interface signals terminated to ground will have an undefined logic state.
Where it is necessary to permanently set a control signal to a defined state, it must be
connected to a voltage source that asserts the logic 1 or logic 0 level. Some devices
provide test voltages on their interface connectors for this purpose.
2.2.3.5 Connectors
RS-232 devices may be classified as Data Terminal Equipment (DTE) or Data
Communication Equipment (DCE); this defines at each device which wires will be
sending and receiving each signal. The standard recommended but did not make
mandatory the D-subminiature 25 pin connector. In general and according to the standard,
terminals and computers have male connectors with DTE pin functions, and modems
have female connectors with DCE pin functions. Other devices may have any
combination of connector gender and pin definitions. Many terminals were manufactured
with female terminals but were sold with a cable with male connectors at each end; the
terminal with its cable satisfied the recommendations in the standard.
Presence of a 25 pin D-sub connector does not necessarily indicate an RS-232-C
compliant interface. For example, on the original IBM PC, a male D-sub was an RS-232C DTE port (with a non-standard current loop interface on reserved pins), but the female
D-sub connector was used for a parallel Centronics printer port. Some personal
computers put non-standard voltages or signals on some pins of their serial ports.The
standard specifies 20 different signal connections. Since most devices use only a few
signals, smaller connectors can often be used.
The following table lists commonly used RS-232 signals and pin assignments.
The signals are named from the standpoint of the DTE. The ground signal is a
common return for the other connections. The DB-25 connector includes a second
"protective ground" on pin 1.
Data can be sent over a secondary channel (when implemented by the DTE and
DCE devices), which is equivalent to the primary channel. Pin assignments are described
in shown in Table 2.2:
21
Signal
Origin
DB-25 pin
Name
Data
Typical purpose
Abbreviation
Indicates presence of
DTR
DTE
DCE
20
DCD
DSR
RI
22
Request To
Send
Clear To Send
Data
DCE.
TxD
RxD
DTE.
Common
Ground
Protective
Ground
22
CTS
accept data.
Transmitted
Received Data
RTS
GND
common
PG
common
Signal
Pin
Common Ground
7 (same as primary)
14
16
19
13
12
Ring Indicator' (RI), is a signal sent from the modem to the terminal device. It
indicates to the terminal device that the phone line is ringing. In many computer serial
ports, a hardware interrupt is generated when the RI signal changes state. Having support
for this hardware interrupt means that a program or operating system can be informed of a
change in state of the RI pin, without requiring the software to constantly "poll" the state
of the pin. RI is a one-way signal from the modem to the terminal (or more generally, the
DCE to the DTE) that does not correspond to another signal that carries similar
information the opposite way.
On an external modem the status of the Ring Indicator pin is often coupled to the
"AA" (auto answer) light, which flashes if the RI signal has detected a ring. The asserted
RI signal follows the ringing pattern closely, which can permit software to
detect distinctive ring patterns.
The Ring Indicator signal is used by some older uninterruptible power
supplies (UPS's) to signal a power failure state to the computer.
Certain personal computers can be configured for wake-on-ring, allowing a
computer that is suspended to answer a phone call.
2.2.3.6 Cables
The standard does not define a maximum cable length but instead defines the
maximum capacitance that a compliant drive circuit must tolerate. A widely used rule of
thumb indicates that cables more than 50 feet (15 m) long will have too much
capacitance, unless special cables are used. By using low-capacitance cables, full speed
23
with
multiple
devices).
Poor-quality
cables
can
cause
false
signals
by crosstalk between data and control lines (such as Ring Indicator). If a given cable will
not allow a data connection, especially if a Gender changer is in use, a Null modem may
be necessary.
2.2.3.7 Conventions
For functional communication through a serial port interface, conventions of bit
rate, character framing, communications protocol, character encoding, data compression,
and error detection, not defined in RS 232, must be agreed to by both sending and
receiving equipment. For example, consider the serial ports of the original IBM PC. This
implementation used an 8250 UART using asynchronous start-stop character formatting
with 7 or 8 data bits per frame, usually ASCII character coding, and data rates
programmable between 75 bits per second and 115,200 bits per second. Data rates above
20,000 bits per second are out of the scope of the standard, although higher data rates are
sometimes used by commercially manufactured equipment. Since most RS-232 devices
do not have automatic baud rate detection, users must manually set the baud rate (and all
other parameters) at both ends of the RS-232 connection.
In the particular case of the IBM PC, as with most UART chips including the 8250
UART used by the IBM PC, baud rates were programmable with arbitrary values. This
allowed a PC to be connected to devices not using the rates typically used with modems.
24
Not all baud rates can be programmed, due to the clock frequency of the 8250 UART in
the PC, and the granularity of the baud rate setting. This includes the baud rate of MIDI,
31,250 bits per second, which is generally not achievable by a standard IBM PC serial
port. MIDI-to-RS-232 interfaces designed for the IBM PC include baud rate translation
hardware to adjust the baud rate of the MIDI data to something that the IBM PC can
support, for example 19,200 or 38,400 bits per second.
25
b) Loopback testing
Many DCE devices have a loopback capability used for testing. When enabled,
signals are echoed back to the sender rather than being sent on to the receiver. If
supported, the DTE can signal the local DCE (the one it is connected to) to enter
loopback mode by setting pin 18 to ON, or the remote DCE (the one the local DCE is
connected to) to enter loopback mode by setting pin 21 to ON. The latter tests the
communications link as well as both DCE's. When the DCE is in test mode it signals the
DTE by setting pin 25 to ON.
A commonly used version of loopback testing does not involve any special
capability of either end. A hardware loopback is simply a wire connecting complementary
pins together in the same connector
Loopback testing is often performed with a specialized DTE called a bit error rate
tester (or BERT).
26
RS-449 (a functional and mechanical interface that used RS-422 and RS-423
signals - it never caught on like RS-232 and was withdrawn by the EIA)
MIL-STD-188 (a system like RS-232 but with better impedance and rise time
control)
EIA/TIA-562 Electrical Characteristics for an Unbalanced Digital Interface (lowvoltage version of EIA/TIA-232)
TIA-574 (standardizes the 9-pin D-subminiature connector pinout for use with
EIA-232 electrical signaling, as originated on the IBM PC/AT)
2.2.4 MAX232 IC
The MAX232 is an integrated circuit that converts signals from an RS-232 serial
port to signals suitable for use in TTL compatible digital logic circuits. The MAX232 is a
dual driver/receiver and typically converts the RX, TX, CTS and RTS signals.
The drivers provide RS-232 voltage level outputs (approx. 7.5 V) from a single
+ 5 V supply via on-chip charge pumps and external capacitors. This makes it useful for
implementing RS-232 in devices that otherwise do not need any voltages outside the 0 V
to + 5 V range, as power supply design does not need to be made more complicated just
for driving the RS-232 in this case.
The receivers reduce RS-232 inputs (which may be as high as 25 V), to standard
5 V TTL levels. These receivers have a typical threshold of 1.3 V, and a
typical hysteresis of 0.5 V.
The later MAX232A is backwards compatible with the original MAX232 but may
operate at higher baud rates and can use smaller external capacitors 0.1 F in place of
the 1.0 F capacitors used with the original device.[1]
The newer MAX3232 is also backwards compatible, but operates at a broader
voltage range, from 3 to 5.5 V.
Pin to pin compatible: ICL232, ST232, ADM232, and HIN232.
28
TTL Voltage
RS232 Line Type & Logic Level
+3 V to +15 V
0V
-3 V to -15 V
5V
-3 V to -15 V
5V
+3 V to +15 V
0V
Control Signals
(RTS/CTS/DTR/DSR) Logic 0
Control Signals
(RTS/CTS/DTR/DSR) Logic 1
The MAX232 IC is used to convert the TTL/CMOS logic levels to RS232 logic
levels during serial communication of microcontrollers with PC. The controller operates
at TTL logic level (0-5V) whereas the serial communication in PC works on RS232
standards (-25 V to + 25V). This makes it difficult to establish a direct link between them
to communicate with each other.
The intermediate link is provided through MAX232. It is a dual driver/receiver that
includes a capacitive voltage generator to supply RS232 voltage levels from a single 5V
supply. Each receiver converts RS232 inputs to 5V TTL/CMOS levels. These receivers
(R 1 & R 2 ) can accept 30V inputs. The drivers (T 1 & T 2 ), also called transmitters,
convert the TTL/CMOS input level into RS232 level.
The transmitters take input from controllers serial transmission pin and send the
output to RS232s receiver. The receivers, on the other hand, take input from transmission
pin of RS232 serial port and give serial output to microcontrollers receiver pin. MAX232
needs four external capacitors whose value ranges from 1F to 22F.
29
Microcontroller
MAX232
RS232
Tx
T 1/2 In
T 1/2 Out
Rx
Rx
R 1/2 Out
R 1/2 In
Tx
Pin
Function
No
Name
Capacitor 1 +
Capacitor 3 +
Capacitor 2 +
Capacitor 2 -
Capacitor 4 -
30
T 2 Out
R 2 In
R 2 Out
T 2 In
11
T 1 In
12
R 1 Out
R 1 In
T 1 Out
Ground (0V)
Ground
16
Vcc
2.2.5 Relay
A relay is an electrically operated switch. Many relays use an electromagnet to
operate a switching mechanism mechanically, but other operating principles are also
used. Relays are used where it is necessary to control a circuit by a low-power signal
(with complete electrical isolation between control and controlled circuits), or where
several circuits must be controlled by one signal. The first relays were used in long
distance telegraph circuits, repeating the signal coming in from one circuit and retransmitting it to another. Relays were used extensively in telephone exchanges and early
computers to perform logical operations.
A type of relay that can handle the high power required to directly control an
electric motor or other loads is called a contactor. Solid-state relays control power circuits
with no moving parts, instead using a semiconductor device to perform switching. Relays
with calibrated operating characteristics and sometimes multiple operating coils are used
to protect electrical circuits from overload or faults; in modern electric power systems
these functions are performed by digital instruments still called "protective relays".
When an electric current is passed through the coil it generates a magnetic field that
activates the armature and the consequent movement of the movable contact either makes
or breaks (depending upon construction) a connection with a fixed contact. If the set of
contacts was closed when the relay was de-energized, then the movement opens the
contacts and breaks the connection, and vice versa if the contacts were open. When the
current to the coil is switched off, the armature is returned by a force, approximately half
as strong as the magnetic force, to its relaxed position. Usually this force is provided by a
spring, but gravity is also used commonly in industrial motor starters. Most relays are
manufactured to operate quickly. In a low-voltage application this reduces noise; in a high
voltage or current application it reduces arcing.
When the coil is energized with direct current, a diode is often placed across the coil
to dissipate the energy from the collapsing magnetic field at deactivation, which would
otherwise generate a voltage spike dangerous to semiconductor circuit components. Some
automotive relays include a diode inside the relay case. Alternatively, a contact protection
network consisting of a capacitor and resistor in series (snubber circuit) may absorb the
surge. If the coil is designed to be energized with alternating current (AC), a small copper
"shading ring" can be crimped to the end of the solenoid, creating a small out-of-phase
current which increases the minimum pull on the armature during the AC cycle.[1]
A solid-state relay uses a thyristor or other solid-state switching device, activated by
the
control
signal,
to
switch the
controlled
load,
instead
of
solenoid.
which means that the contacts will stay closed until the button or switch is fully
disengaged.
Change-over (CO): or double-throw (DT), contacts control two circuits: one
normally-open contact and one normally-closed contact with a common terminal. It is
also called a Form C contact or "transfer" contact ("break before make"). If this type
of contact utilizes a "make before break" functionality, then it is called a Form
D contact.
The following designations are commonly encountered:
SPST Single Pole Single Throw. These have two terminals which can be connected
or disconnected. Including two for the coil, such a relay has four terminals in total. It
is ambiguous whether the pole is normally open or normally closed. The terminology
"SPNO" and "SPNC" is sometimes used to resolve the ambiguity.
SPDT Single Pole Double Throw. A common terminal connects to either of two
others. Including two for the coil, such a relay has five terminals in total.
DPST Double Pole Single Throw. These have two pairs of terminals. Equivalent to
two SPST switches or relays actuated by a single coil. Including two for the coil, such
a relay has six terminals in total. The poles may be Form A or Form B (or one of
each).
DPDT Double Pole Double Throw. These have two rows of change-over terminals.
Equivalent to two SPDT switches or relays actuated by a single coil. Such a relay has
eight terminals, including the coil.
The "S" or "D" may be replaced with a number, indicating multiple switches
connected to a single actuator. For example 4PDT indicates a four pole double throw
relay (with 14 terminals).
EN 50005 are among applicable standards for relay terminal numbering; a typical EN
50005-compliant SPDT relay's terminals would be numbered 11, 12, 14, A1 and A2
for the C, NC, NO, and coil connections, respectively.
Figure 2.9 Circuit symbols of relays. (C denotes the common terminal in SPDT and DPDT types.)
34
high-current circuit
with
low-current
signal,
as
in
2.2.6 LCD
A liquid crystal display (LCD) is a flat panel display, electronic visual display,
or video display that uses the light modulating properties of liquid crystals (LCs). LCs do
not emit light directly.
LCDs
are
used
in
wide
range
of
applications,
including computer
monitors, television, instrument panels, aircraft cockpit displays, signage, etc. They are
common in consumer devices such as video players, gaming devices, clocks, watches,
calculators, and telephones. LCDs have replaced cathode ray tube (CRT) displays in most
applications. They are available in a wider range of screen sizes than CRT and plasma
displays, and since they do not use phosphors, they cannot suffer image burn-in. LCDs
are, however, susceptible to image persistence.
LCDs are more energy efficient and offer safer disposal than CRTs. Its low
electrical
power
consumption
enables
it
to
be
used
in battery-
Figure 2.10 A general purpose alphanumeric LCD, with two lines of 16 characters.
35
Advantages
No geometric distortion.
Disadvantages
Smearing and ghosting artifacts caused by slow response times (>8 ms) and
"sample and hold" operation.
Fixed bit depth, many cheaper LCDs are only able to display 262,000 colors.
8-bit S-IPS panels can display 16 million colors and have significantly better
black level, but are expensive and have slower response time.
Input lag
Chapter 3
Working of VTS
3.1 Schematic Diagram of VTS
Figure 3.1 Schematic diagram of vehicle tracing using GSM and GPS
37
3.3.1 Power
The power is supplied to components like GSM, GPS and Micro control circuitry
using a 12V/3.2A battery .GSM requires 12v,GPS and microcontroller requires 5v .with
the help of regulators we regulate the power between three components.
b) Normal Operation
i.
Switch on the kit and wait until you see the Latitude and longitude on the display.
ii.
iii.
The kit will send the location and UTC time to the number stored in its memory.
38
iv.
For emergency the user can press the Button to send the Location to the number
stored.
v.
39
Chapter 4
Microcontroller AT 89S52
Why we use AT 89S52?
AT89S52 microcontroller is a great family compatible with Intel MCS-51 . Atmel
AT89S52 is created by, indicated by the initials "AT". This microcontroller has a low
consumption, but 8-bit CMOS gives high performance with an internal flash memory of
8K bytes. This is done using flash memory technology and high density belonging to
Atmel and is compatible with standard 80C51. Flash memory chip allows internal or
scheduled to be reprogrammed by a non-volatile memory. By combining an 8-bit CPU
with Flash memory programmable monolithic core, Atmel AT89S52 is very powerful
microcontroller has high flexibility and is the perfect solution for many embedded
applications.
A microcontroller is an electronic structure of small size, usually containing a
processor, memory and peripheral input / output programmable. Applications that use
microcontrollers are automatic control, in areas such as car production, medical devices,
remote control and more of the same gender. In 1976, Intel created the first
microcontroller family called MCS. MCS 48 MCS 51 standard appearing in
1980. Currently, Intel does not make such microcontrollers, but major manufacturers such
as Atmel and Infineon continued creating these devices.
4.1 Features
The main features of the microcontroller are:
Compatibility with the MCS 51 family;
8-bit CPU frequency up to 33MHz;
RAM: 256 Bytes;
Flash memory: 8K bytes;
32 lines of programming input / output general nature;
8 sources of interruptions organized on two levels of priority;
3 timers / counters of 16 bits;
Watchdog Timer;
two data pointers;
1 serial port (full duplex UART);
ISP programming interface of 8K bytes;
40
RST (9): acts as a reset RST entry. A high value on this pin between two machine
cycles while the oscillator work, reset the device. This pin acts high for 98 oscillator
periods after the watchdog stops. To disable this feature using DISRTO bit of special
function registers at exactly the 8EH. The default state of bit DISRTO, feature RESET is
active HIGH.
ALE / PROG # (30): THE acronym comes from the Address Latch Enable, and this
is what command buffer that stores the least significant address. During Flash memory
programming this pin serves as input pulse programming: # PROG (Program Pulse
Input). For normal operation, ALE issued at a time constant equal to 1/6 of oscillator
frequency and can be used as a timer or external clock. By request, executes the function
that OF can be disabled by setting bit special register at 8EH with logic value 0. With this
bit set, ALE is active only for the instructions MOVX and MOVC. Disabling OF bit has
no effect if the microcontroller is in external execution mode.
PSEN (29): Acronym PSEN Program Store Enable is the control signal and means
for external program memory. When AT89S52 code running external program memory,
PSEN # is activated 2 times for each machine cycle, except the activation signal PSEN #
is omitted during external data memory access.
EA / VPP (31): EA acronym stands External Access Enable. # It must be connected
to GRD to enable the device to extract the code from external program memory from
address 0000H to address internal program executions FFFFH. Pentru # EA must be
connected to Vcc.
XTAL1 (19): XTAL1 is used as input to the inverting oscillator amplified the input
clock operating circuit.
XTAL2 (18): XTAL2 oscillator inverter output is amplified.
indefinitely. Programmers should avoid writing in these locations, because these locations
can be used in future for new features. In this case the reset or inactivation of these new
bits will always be 0. Timer Registers: Control and status bits are contained in registers
T2CON and T2MOD for timer 2. The pair of registers (RCAP2H, RCAP2L) are registers
purchase or reload timer 2 for 16-bit mode and 16-bit acquisition mode auto
reload. Registers of interruptions: Individual interrupt enable bits are in register IE. For
the six types of interrupt sources can be set two levels of priority in the IP register.
a) Program memory
If EA is pin # connected the GRD program calls are directed to external memory. If
EA # is connected to Vcc, calls the program at address 0000H to 1FFFH are directly to
internal memory, while those at 2000H up to FFFFH are directed to external memory.
b) Data memory
AT89S52 has a RAM of 256 bytes. The 128 Bytes additional to the 128 basic
families occupies an address space parallel to the Registrar of Special Functions, and that
these additional bytes of special function registers are accessible addresses, but physically
they are in different spaces. When an instruction accesses an internal location in 7fh
address, addressing mode used in the instruction specifies that the CPU accesses the
upper 128 bytes of RAM or the RFS. It uses direct addressing to access the RFS space,
and indirect addressing the senior access bytes RAM.
43
a) Switches
AT89S52 is a vector of six stops: two external interrupts (INT0 # and #, INT2),
three timers interrupts (Timer 0, 1 and 2) and serial port interrupt. Each of these interrupt
sources can be individually enabled and disabled by setting or deleting a bit of special
function registers IE. IE also contains a global disable bit, EA, which disables all
interrupts at the same time. Bit position 6 is not implemented. But the programmer should
not use this bit; it can be used in future AT89 products family. Interruption of Timer 2 is
generated by "or logic" between bits TF2 and EXF2 you register T2CON.None of these
indicators is not deleted when routine hardware orders indicate that area. In fact, routine
order to determine which of the two bits TF2 or EXF2 generated interrupts, and that bit
will be set in software.
b) The idle
In Idle mode, CPU is put into hibernation, while all peripherals remain active. The
mode is invoked by software. Content on chip RAM and all special function registers
remain unchanged while this mode is set. Idle mode can be enabled over any break or
44
hardware reset. When idle mode is terminated by a hardware reset, the device normally
resumes program execution from where it was interrupted by two machine cycles before
the internal reset algorithm to take control. The hardware on the same plate to prevent
access to internal RAM during this event, but access to ports is blocked. To eliminate the
possibility of unexpected writings of a port pin when idle mode is terminated by reset, the
instruction as it is one that invokes idle mode should not write to a port pin or external
memory.
c) The power-down
Power-down mode, the oscillator is set and instructions for calling Power-down
mode is the last instruction executed. Track RAM on chip and special function registers
retain their values until the Power-down mode ends. Exit Power-down can be initiated
both by activating a hardware reset or external interrupt. Reset registry values change
with special but not modify RAM on chip. Reset can be activated before VCC to return to
its operating level and must remain active long enough to allow the oscillator resetting
and stabilization.
45
Chapter 5
GSM Module
5.1 GSM History
The acronym for GSM is Global System for Mobile Communications. During the
early 1980s, analog cellular telephone systems were experiencing rapid growth in Europe,
particularly in Scandinavia and the United Kingdom, but also in France and Germany.
Each country developed its own system, which was incompatible with everyone else's in
equipment and operation. This was an undesirable situation, because not only was the
mobile equipment limited to operation within national boundaries, which in a unified
Europe were increasingly unimportant, but there was also a very limited market for each
type of equipment, so economies of scale and the subsequent savings could not be
realized.
The Europeans realized this early on, and in 1982 the Conference of European
Posts and Telegraphs (CEPT) formed a study group called the Groupe Special Mobile
(GSM) to study and develop a pan-European public land mobile system. The proposed
system had to meet certain criteria:
Spectral efficiency
ISDN compatibility
never envisioned, indeed, the highest rate a normal GSM network can achieve is 9.6kbs.
Europe saw cellular service introduced in 1981, when the Nordic Mobile Telephone
System or NMT450 began operating in Denmark, Sweden, Finland, and Norway in the
450 MHz range. It was the first multinational cellular system. In 1985 Great Britain
started using the Total Access Communications System or TACS at 900 MHz. Later, the
West German C-Netz, the French Radio COM 2000, and the Italian RTMI/RTMS helped
make up Europe's nine analog incompatible radio telephone systems. Plans were afoot
during the early 1980s, however, to create a single European wide digital mobile service
with advanced features and easy roaming. While North American groups concentrated on
46
building out their robust but increasingly fraud plagued and featureless analog network,
Europe planned for a digital future.
In 1989, GSM responsibility was transferred to the European Telecommunication
Standards Institute (ETSI), and phase I of the GSM specifications were published in
1990. Commercial service was started in mid-1991, and by 1993 there were 36 GSM
networks in 22 countries. Although standardized in Europe, GSM is not only a European
standard. Over 200 GSM networks (including DCS1800 and PCS1900) are operational in
110 countries around the world. In the beginning of 1994, there were 1.3 million
subscribers worldwide, which had grown to more than 55 million by October 1997. With
North America making a delayed entry into the GSM field with a derivative of GSM
called PCS1900, GSM systems exist on every continent, and the acronym GSM now
aptly stands for Global System for Mobile communications.
The developers of GSM chose an unproven (at the time) digital system, as opposed
to the then-standard analog cellular systems like AMPS in the United States and TACS in
the United Kingdom. They had faith that advancements in compression algorithms and
digital signal processors would allow the fulfillment of the original criteria and the
continual improvement of the system in terms of quality and cost. The over 8000 pages of
GSM recommendations try to allow flexibility and competitive innovation among
suppliers, but provide enough standardization to guarantee proper networking between
the components of the system. This is done by providing functional and interface
descriptions for each of the functional entities defined in the system.
Bearer services: Typically data transmission instead of voice. Fax and SMS are
examples.
47
Supplementary services: Call forwarding, caller ID, call waiting and the like.
A variety of data services is offered. GSM users can send and receive data, at rates
up to 9600 bps, to users on POTS (Plain Old Telephone Service), ISDN, Packet Switched
Public Data Networks, and Circuit Switched Public Data Networks using a variety of
access methods and protocols, such as X.25 or X.32. Since GSM is a digital network, a
modem is not required between the user and GSM network, although an audio modem is
required inside the GSM network to interwork with POTS.
Other data services include Group 3 facsimile, as described in ITU-T
recommendation T.30, which is supported by use of an appropriate fax adaptor. A unique
feature of GSM, not found in older analog systems, is the Short Message Service (SMS).
SMS is a bidirectional service for short alphanumeric (up to 160 bytes) messages.
Messages are transported in a store-and-forward fashion. For point-to-point SMS, a
message can be sent to another subscriber to the service, and an acknowledgement of
receipt is provided to the sender. SMS can also be used in a cell-broadcast mode, for
sending messages such as traffic updates or news updates. Messages can also be stored in
the SIM card for later retrieval.
Supplementary services are provided on top of teleservices or bearer services. In the
current (Phase I) specifications, they include several forms of call forward (such as call
forwarding when the mobile subscriber is unreachable by the network), and call barring
of outgoing or incoming calls, for example when roaming in another country. Many
additional supplementary services will be provided in the Phase 2 specifications, such as
caller identification, call waiting, multi-party conversations.
mobility. The SIM card may be protected against unauthorized use by a password or
personal identity number.
GSM phones use SIM cards, or Subscriber information or identity modules. They're
the biggest difference a user sees between a GSM phone or handset and a conventional
cellular telephone. With the SIM card and its memory the GSM handset is a smart phone,
doing many things a conventional cellular telephone cannot. Like keeping a built in phone
book or allowing different ring tones to be downloaded and then stored. Conventional
cellular telephones either lack the features GSM phones have built in, or they must rely
on resources from the cellular system itself to provide them. Let me make another,
important point.
With a SIM card your account can be shared from mobile to mobile, at least in
theory. Want to try out your neighbor's brand new mobile? You should be able to put
your SIM card into that GSM handset and have it work. The GSM network cares only
that a valid account exists, not that you are using a different device. You get billed, not
the neighbor who loaned you the phone.
This flexibility is completely different than AMPS technology, which enables one
device per account. No switching around. Conventional cellular telephones have their
electronic serial number burned into a chipset which is permanently attached to the
phone. No way to change out that chipset or trade with another phone. SIM card
technology, by comparison, is meant to make sharing phones and other GSM devices
quick and easy.
49
On the left above: Front of a Pacific Bell GSM phone. In the middle above: Same
phone, showing the back. The SIM card is the white plastic square. It fits into the grey
colored holder next to it.
On the right above: A new and different idea, a holder for two SIM cards, allowing
one phone to access either of two wireless carriers. Provided you have an account with
both. The SIM card is to the left of the body.
The BTS or Base Transceiver Station is also called an RBS or Remote Base station.
Whatever the name, this is the radio gear that passes all calls coming in and going out of a
cell site. The base station is under direction of a base station controller so traffic gets sent
there first. The base station controller, described below, gathers the calls from many base
stations and passes them on to a mobile telephone switch. From that switch come and go
the calls from the regular telephone network. Some base stations are quite small; the one
50
pictured here is a large outdoor unit. The large number of base stations and their attendant
controllers are a big difference between GSM and IS-136.
Many GSM descriptions picture equipment called a TRAU, which stands for
Transcoding Rate and Adaptation Unit. Of course also known as a Trans-Coding Unit or
TCU, the TRAU is a compressor and converter. It first compresses traffic coming from
the mobiles through the base station controllers. That's quite an achievement because
voice and data have already been compressed by the voice coders in the handset.
Anyway, it crunches that data down even further. It then puts the traffic into a format the
51
Mobile Switch can understand. This is the Trans-Coding part of its name, where code in
one format is converted to another. The TRAU is not required but apparently it saves
quite a bit of money to install one.
Here's how Nortel Networks sells their unit: Reduce transmission resources and
realize up to 75% transmission cost savings with the TCU."
"The Trans-Coding Unit (TCU), inserted between the BSC and MSC, enables
speech compression and data rate adaptation within the radio cellular network. The TCU
is designed to reduce transmission costs by minimizing transmission resources between
the BSC and MSC. This is achieved by reducing the number of PCM links going to the
BSC, since four traffic channels (data or speech) can be handled by one PCM time slot.
Additionally, the modular architecture of the TCU supports all three GSM vocoders (Full
Rate, Enhanced Full Rate, and Half Rate) in the same cabinet, providing you with a
complete range of deployment options."
Voice coders or vocoders are built into the handsets a cellular carrier distributes.
They're the circuitry that turns speech into digital. The carrier specifies which rate they
want traffic compressed, either a great deal or just a little. The cellular system is designed
this way, with handset vocoders working in league with the equipment of the base station
subsystem.
network can be divided into three broad parts. The Mobile Station is carried by the
subscriber. The Base Station Subsystem controls the radio link with the Mobile Station.
The Network Subsystem, the main part of which is the Mobile services Switching Center
(MSC), performs the switching of calls between the mobile users, and between mobile
and fixed network users. The MSC also handles the mobility management operations. Not
shown is the Operations and Maintenance Center, which oversees the proper operation
and setup of the network. The Mobile Station and the Base Station Subsystem
communicate across the Um interface, also known as the air interface or radio link. The
Base Station Subsystem communicates with the Mobile services Switching Center across
the A interface.
As John states, he presents a generic GSM architecture. Lucent, Ericsson, Nokia,
and others feature their own vision in their own diagrams.
Lucent GSM architecture/ Ericsson GSM architecture / Nokia GSM architecture /
Siemenss GSM architecture
i)
Traffic channels
A traffic channel (TCH) is used to carry speech and data traffic. Traffic channels are
defined using a 26-frame multi-frame, or group of 26 TDMA frames. The length of a 26frame multi-frame is 120 ms, which is how the length of a burst period is defined (120 ms
divided by 26 frames divided by 8 burst periods per frame). Out of the 26 frames, 24 are
used for traffic, 1 is used for the Slow Associated Control Channel (SACCH) and 1 is
currently unused (see Figure 2). TCHs for the uplink and downlink are separated in time
by 3 burst periods, so that the mobile station does not have to transmit and receive
simultaneously, thus simplifying the electronics.
ii)
Control channels
Common channels can be accessed both by idle mode and dedicated mode mobiles.
The common channels are used by idle mode mobiles to exchange the signaling
information required to change to dedicated mode. Mobiles already in dedicated mode
monitor the surrounding base stations for handover and other information. Dedicated
mode means a mobile is in use.
Two points: The first is that the base station can reach out to the mobile and turn
down the transmitting power the handset is using, Very cool. The second point is that a
digital signal will drop a call much more quickly than an analog signal. With an analog
radio you can hear through static and fading. But with a digital radio the connection will
be dropped, just like your landline modem, when too many 0s and 1s go missing. You
need more base stations, consequently, to provide the same coverage as analog.
Controls the setup, maintenance, and termination of radio and fixed channels,
Including handovers.
Mobility Management
Manages the location updating and registration procedures, as well as security and
authentication.
Connection Management
56
5.13 Handover
In a cellular network, the radio and fixed links required are not permanently
allocated for the duration of a call. Handover, or handoff as it is called in North America,
is the switching of an on-going call to a different channel or cell. The execution and
measurements required for handover form one of basic functions of the RR layer.
There are four different types of handover in the GSM system, which involve
transferring a call between:
Channels (time slots) in the same cell
57
Cells (Base Transceiver Stations) under the control of the same Base Station
Controller (BSC),
Cells under the control of different BSCs, but belonging to the same Mobile
services Switching Center (MSC), and
Cells under the control of different MSCs.
The first two types of handover, called internal handovers, involve only one Base
Station Controller (BSC). To save signaling bandwidth, they are managed by the BSC
without involving the Mobile services Switching Center (MSC), except to notify it at the
completion of the handover. The last two types of handover, called external handovers,
are handled by the MSCs involved. An important aspect of GSM is that the original MSC,
the anchor MSC, remains responsible for most call-related functions, with the exception
of subsequent inter-BSC handovers under the control of the new MSC, called the relay
MSC.
Handovers can be initiated by either the mobile or the MSC (as a means of traffic
load balancing). During its idle time slots, the mobile scans the Broadcast Control
Channel of up to 16 neighboring cells, and forms a list of the six best candidates for
possible handover, based on the received signal strength. This information is passed to the
BSC and MSC, at least once per second, and is used by the handover algorithm.
The algorithm, for when a hand over decision should be taken is not specified in the
GSM recommendations. There are two basic algorithms used, both closely tied in with
power control. This is because the BSC usually does not know whether the poor signal
quality is due to multipath fading or to the mobile having moved to another cell. This is
especially true in small urban cells.
The 'minimum acceptable performance' algorithm gives precedence to power
control over handover, so that when the signal degrades beyond a certain point, the power
level of the mobile is increased. If further power increases do not improve the signal, then
a handover is considered. This is the simpler and more common method, but it creates
'smeared' cell boundaries when a mobile transmitting at peak power goes some distance
beyond its original cell boundaries into another cell.
The 'power budget' method uses handover to try to maintain or improve a certain
level of signal quality at the same or lower power level. It thus gives precedence to
handover over power control. It avoids the 'smeared' cell boundary problem and reduces
co-channel interference, but it is quite complicated.
58
Current cell
Encryption keys
The location updating procedures, and subsequent call routing, use the MSC and
two location registers: the Home Location Register (HLR) and the Visitor Location
Register (VLR). When a mobile station is switched on in a new location area, or it moves
to a new location area or different operator's PLMN, it must register with the network to
indicate its current location. In the normal case, a location update message is sent to the
new MSC/VLR, which records the location area information, and then sends the location
59
information to the subscriber's HLR. The information sent to the HLR is normally the
SS7 address of the new VLR, although it may be a routing number. The reason a routing
number is not normally assigned, even though it would reduce signaling, is that there is
only a limited number of routing numbers available in the new MSC/VLR and they are
allocated on demand for incoming calls. If the subscriber is entitled to service, the HLR
sends a subset of the subscriber information, needed for call control, to the new
MSC/VLR, and sends a message to the old MSC/VLR to cancel the old registration.
A procedure related to location updating is the IMSI (International Mobile
Subscriber Identity) attach and detach. A detach lets the network know that the mobile
station is unreachable, and avoids having to needlessly allocate channels and send paging
messages. an attach is similar to a location update, and informs the system that the mobile
is reachable again. The activation of IMSI attach/detach is up to the operator on an
individual cell basis.
International Mobile Equipment Identity (IMEI) number. A list of IMEIs in the network
is stored in the Equipment Identity Register (EIR).
The status returned in response to an IMEI query to the EIR is one of the following:
White-listed: The terminal is allowed to connect to the network.
Grey-listed: The terminal is under observation from the network for possible problems.
Black-listed: The terminal has either been reported stolen, or is not type approved (the
correct type of terminal for a GSM network). The terminal is not allowed to connect to
the network.
Code which identifies the subscriber's operator. The first few digits of the remaining
subscriber number may identify the subscriber's HLR within the home PLMN.
An incoming mobile terminating call is directed to the Gateway MSC (GMSC)
function. The GMSC is basically a switch which is able to interrogate the subscriber's
HLR to obtain routing information, and thus contains a table linking MSISDNs to their
corresponding HLR. A simplification is to have a GSMC handle one specific PLMN. It
should be noted that the GMSC function is distinct from the MSC function, but is usually
implemented in an MSC.
PLMN: Public land mobile network. In this context a cellular telephone network.
PLMN is chiefly a European usage.
The routing information that is returned to the GMSC is the Mobile Station
Roaming Number (MSRN), which is also defined by the E.164 numbering plan. MSRNs
are related to the geographical numbering plan, and not assigned to subscribers, nor are
they visible to subscribers.
The most general routing procedure begins with the GMSC querying the called
subscriber's HLR for an MSRN. The HLR typically stores only the SS7 address of the
subscriber's current VLR, and does not have the MSRN (see the location updating
section). The HLR must therefore query the subscriber's current VLR, which will
temporarily allocate an MSRN from its pool for the call. This MSRN is returned to the
HLR and back to the GMSC, which can then route the call to the new MSC. At the new
MSC, the IMSI corresponding to the MSRN is looked up, and the mobile is paged in its
current location area.
62
Chapter 6
GPS Receiver
6.1 GPS History
The Global Positioning System (GPS) is a Global Navigation Satellite System
(GNSS) developed by the United States Department of Defense. It is the only fully
functional GNSS in the world. It uses a constellation of between 24 and 32 Medium Earth
Orbit satellites that transmit precise microwave signals, which enable GPS receivers to
determine their current location, the time, and their velocity. Its official name is
NAVSTAR GPS. Although NAVSTAR is not an acronym, a few acronyms have been
created for it. The GPS satellite constellation is managed by the United States Air Force
50th Space Wing. GPS is often used by civilians as a navigation system.
After Korean Air Lines Flight 007 was shot down in 1983 after straying into the
USSR's prohibited airspace, President Ronald Reagan issued a directive making GPS
freely available for civilian use as a common good. As suggested by physicist D. Fanelli.
A few years before, Since then, GPS has become a widely used aid to navigation
worldwide, and a useful tool for map-making, land surveying, commerce, scientific uses,
and hobbies such as geo-caching. Also, the precise time reference is used in many
applications including the scientific study of earthquakes. GPS is also a required key
synchronization resource of cellular networks, such as the Qualcomm CDMA air
interface used by many wireless carriers in a multitude of countries.
The first satellite navigation system, Transit, used by the United States Navy, was
first successfully tested in 1960. Using a constellation of five satellites, it could provide a
navigational fix approximately once per hour. In 1967, the U.S. Navy developed the
Imation satellite which proved the ability to place accurate clocks in space, a technology
that GPS relies upon. In the 1970s, the ground-based Omega Navigation System, based
on signal phase comparison, became the first worldwide radio navigation system.
The design of GPS is based partly on similar ground-based radio navigation
systems, such as LORAN and the Decca Navigator developed in the early 1940s, and
used during World War II. Additional inspiration for the GPS came when the Soviet
Union launched the first Sputnik in 1957. A team of U.S. scientists led by Dr. Richard B.
Kershner were monitoring Sputnik's radio transmissions. They discovered that, because
of the Doppler Effect, the frequency of the signal being transmitted by Sputnik was
higher as the satellite approached, and lower as it continued away from them. They
63
realized that since they knew their exact location on the globe, they could pinpoint where
the satellite was along its orbit by measuring the Doppler distortion.
64
Figure 6.1 G.P.S receiver communicating with the satellite and sending information through the
wireless mobile phone
65
Chapter 7
KEIL Software
7.1 Introduction
Many companies provide the 8051 assembler, some of them provide shareware
version of their product on the Web, Kiel is one of them. We can download them from
their Websites. However, the size of code for these shareware versions is limited and we
have to consider which assembler is suitable for our application.
A project manager.
A make facility.
Tool configuration.
Editor.
A powerful debugger.
66
67
Then after saving the file, compile the program. For compilation go to project
window select source group and right click on that and go to Add files to Group.
Step-10:
Here it will ask which file has to Add. For an example here you can add test.c as
you saved before.
Step-11:
After adding the file, again go to Project Window and right click on your c file
then select Build target for compilation. If there is any Errors or Warnings in your
program you can check in Output Window that is shown bottom of the Keil window.
Step-12:
Here in this step you can observe the output window for errors and warnings.
Step-13:
If you make any mistake in your program you can check in this slide for which error
and where the error is by clicking on that error.
Step-14:
After compilation then next go to Debug Session. In Tool Bar menu go to Debug
tab and select Start/Stop Debug Session.
Step-15:
Here a simple program for LEDs Blinking. LEDS are connected to PORT-1. you
can observe the output in that port.
Step-16:
To see the Ports and other Peripheral Features go to main toolbar menu and select
peripherals.
Step-17:
In this slide see the selected port i.e, PORT-1.
Step-18:
Start to trace the program in sequence manner i.e., step by step execution and
observe the output in port window.
Step-19: After completion of Debug Session Create an Hex file for Burning the
Processor. Here to create an Hex file go to project window and right click on Target next
select Option for Target.
Step-20:
68
It appears one window; here in target tab modify the crystal frequency as you
connected to your microcontroller.
Step-21:
Next go to Output tab. In that Output tab click on Create HEX File and then
click OK.
Step-22:
Finally Once again compile your program. The Created Hex File will appear in your
path folder.
Use the Step toolbar buttons to single-step through your program. You may enter G,
main in the Output Window to execute to the main C function.
Open the Serial Window using the Serial #1 button on the toolbar.
Debug your program using standard options like Step, Go, Break, and so on.
ii)
Peripheral Simulation:
The uvision2 debugger provides complete simulation for the CPU and on chip
69
Chapter 8
Applications
When some technology comes to be used at practical level it happens to cherish
both plus as well as minus points of its own. But sometimes technology may be positive
in itself but its application can be misused. Before we go ahead to give space to any
technology in our house or work place we should have pre-estimates of its fall outs.
The positive aspects of the tracking system can be summarized as follows:
i. Core benefit of tracking vehicle is that one can monitor ones vehicle from a
distance whether on individual or commercial level. It helps busy parents to
keep a watch on the children even from their office and control their roaming
here and there. Thus can put a check on their rash driving. This gives immense
relief to business owners as it gives them information about the misuse of
company vehicle or delay in delivering services or drivers violation of speed
code, if any. All this keeps a check on wastage of fuel, time and ensures the
better services. With the use of this technology one need not enquire the location
of the vehicle by phone again and again. One can get all the required details just
by a click on the internet. Map on the screen displays the position of vehicle at a
particular time.
ii. In view of long journeys and night journeys by car the technology can provide a
safety network to the person in condition of emergency. It can cut time of
journey short by providing the information regarding location, speed, distance
from the destination leading to best route planning.
iii. Best feature of the technology is that it is easy to use. just an automated unit is
needed to be installed in the vehicle and connected to the centre which may be
provided by some company. This instrument is monitored by the GPS tracking
company which keeps all the records or its customers locations. All details of
location etc are communicated to the user by cell phone or internet connection.
Increasing productivity of your mobile workers.
iv. It helps monitoring employee driving habits and activities.
v. Helps you locate your employees are on-the-road.
vi. Helps you verify the employee time sheet.
vii. Helps you in monitoring all your vehicles.
70
8.1 Applications
Commercial fleet operators are by far the largest users of vehicle tracking systems.
These systems are used for operational functions such as routing, security, dispatch and
collecting on-board information.
These systems are also used in consumer vehicles as devices for preventing theft
and retrieving stolen/lost vehicles. The signal sent out by the installed device help the
police to track the vehicle. These tracking systems can be used as an alternative for
traditional car alarms or in combination with it. Installing tracking systems can thus bring
down the insurance costs for your vehicle by reducing the risk factor.
Vehicle Tracking systems often have several alternatives, like sending automatic
alerts to a phone or email if the vehicle is moved without due authorization. They can also
work as one layer of several combined security measures.
Apart from security concerns, the tracking systems can also help users such as taxi
services to improve their customer service. The systems enable the operators to identify
the empty taxis and direct the nearest one to pick up the customer.
Vehicle tracking systems can also be applied for monitoring driving behavior for
both commercial and individual situations. Parents for instance can use tracking devices
to keep an eye on their teenage sons driving.
The applications for this project are in military, navigation, automobiles, aircrafts,
fleet management, remote monitoring, remote control, security systems, teleservices, etc.
71
Fleet monitoring
Vehicle scheduling
Route monitoring
Driver monitoring
Accident analysis
Geo-fencing geo-coding
8.2 Limitations
This program is highly sensitive to the camera position and the environment, so
a considerable amount of tuning has to be done each time a new video is taken
or camera position is changed and even more so if the video is of an entirely
new environment.
The other limitation is the traffic problem, the program will not able to detect
which vehicle to track if it finds some vehicle in the -6*step_y and +6*step_y
of the current guess. If the nearby vehicle is same as the one in the model. As in
our data images if we bring maruti-800 near the car than the probability of error
increases manifolds.
If there is noise in the edge detected image, we can't really track the vehicle.
What is meant by noise is that if some humans are coming near to the car then
the edge detected image will have the edges of that human or animal or tree,
then the program will try to match those edges with the car model. The
program might treat this match as a success but really it will be off the track.
We could not model the curves in the maruti-800, like in some images the
driver and the steering can be seen, but we could not find a solution for that.
Also the body of the Maruti can be best modeled as combination of curves and
the lines.
Also if distance between the vehicle positions in the two consecutive frames is
too much then this tracking program can't detect the vehicle in the second
frame and will try to track it in the subsequent frame.
The main limitation of the software is the real time implementation, this cant
be implemented with this much time efficiency in any of the real
time applications. This limitation is mainly due to the processing time.
72
Chapter 9
Result Analysis
We a team of 4 members have successfully completed our Project on Tracking Down
Vehicle and Locking it remotely using GPS and GSM technologies.
We first tried to understand the working of our project through the schematic and
then we proceeded to build the circuit as per the schematic. Initially we faced few
problems with the GPS modem, as it wont work efficiently inside buildings. And also the
GSM modem suffered problems with the coverage area of the Mobile Service Provider.
So, we used Airtel as it has maximum coverage area. In order to solve this problem we
can use dedicated servers and purchasing satellite space so that we can track down the
vehicle anytime and anywhere.
The overall developed circuit looks as in the following figure:
The above circuit works mainly by receiving messages from a mobile phone. There
are three messages/commands by which we can track and control the vehicle. They are,
i) TRACK
ii) LOCKD
iii) NLOCK
73
i) TRACK: Initiates the GPS modem and receives the Latitude and Longitude position
and this information will be sent to the mobile from which it received the message.
ii) LOCKD: When this message is sent, then the Microcontroller initiates the motor
which is located in between the passage of fuel to stop and which in turn stops the
vehicle.
iii) NLOCK: This command makes the motor to start again so that the vehicle starts
running.
This project can further be crafted by restricting the usage of limited mobile numbers
to get access to the device. This can be made by altering the program.
The message which is sent to the mobile will be as shown in the following figure.
74
Chapter 10
Conclusion and Future Scope
The project titled tracing down the vehicle using GSM and satellite
communication is a model for vehicle tracking unit with the help of gps receivers and
GSM modem. Vehicle Tracking System resulted in improving overall productivity with
better fleet management that in turn offers better return on your investments. Better
scheduling or route planning can enable you handle larger jobs loads within a particular
time. Vehicle tracking both in case of personal as well as business purpose improves
safety and security, communication medium, performance monitoring and increases
productivity. So in the coming year, it is going to play a major role in our day-to-day
living.
We have completed the project as per the requirements of our project. Finally the aim of
the project i.e. to trace the vehicle is successfully achieved.
Future Scope
We can use the EEPROM to store the previous Navigating positions up to 256
locations and we can navigate up to N number of locations by increasing its
memory.
We can reduce the size of the kit by using GPS+GSM on the same module.
We can increase the accuracy up to 3m by increasing the cost of the GPS receivers.
We can use our kit for detection of bomb by connecting to the bomb detector.
With the help of high sensitivity vibration sensors we can detect the accident.
Whenever vehicle unexpectedly had an accident on the road with help of vibration
sensor we can detect the accident and we can send the location to the owner,
hospital and police.
We can use our kit to assist the traffic. By keeping the kits in the entire vehicles and
by knowing the locations of all the vehicles.
If anybody steals our car we can easily find our car around the globe. By keeping
vehicle positioning vehicle on the vehicle.
75
References
[1]. Chen, H., Chiang, Y. Chang, F., H. Wang, H. (2010). Toward Real-Time Precise
Point Positioning: Differential GPS Based on IGS Ultra Rapid Product,SICE Annual
Conference, The Grand Hotel, Taipei, Taiwan August 18-21.
[2]. Asaad M. J. Al-Hindawi, Ibraheem Talib, Experimentally Evaluation of GPS/GSM
Based System Design, Journal of Electronic Systems Volume 2 Number 2 June 2012
[3]. Chen Peijiang, Jiang Xuehua, Design and Implementation of Remote monitoring
system based on GSM, vol.42, pp.167-175. 2008.
[4]. V.Ramya, B. Palaniappan, K. Karthick, Embedded Controller for Vehicle In-Front
Obstacle Detection and Cabin Safety Alert System, International Journal of
Computer Science & Information Technology (IJCSIT) Vol 4, No 2, April 2012.
[5]. www.8051projects.com
[6]. www.wikipedia.org.com
[7]. www.atmel.com
[8]. www.tatateleservices.com
[9]. www.roseindia.net
[10]. www.electronicsforyou.com
76