GSM b vmss lit.rv

download GSM b vmss lit.rv

of 21

Transcript of GSM b vmss lit.rv

  • 8/22/2019 GSM b vmss lit.rv

    1/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    1

    INTRODUCTION

    1.1 EMBEDDED SYSTEM:

    An embedded system is a special-purpose system in which the computer is

    completely encapsulated by or dedicated to the device or system it controls. Unlike a general-

    purpose computer, such as a personal computer, an embedded system performs one or a few

    predefined tasks, usually with very specific requirements. Since the system is dedicated to

    specific tasks, design engineers can optimize it, reducing the size and cost of the product.

    Embedded systems are often mass-produced, benefiting from economies of scale.

    In terms of complexity embedded systems can range from very simple with a single

    microcontroller chip, to very complex with multiple units, peripherals and networks mounte

    1.3 CHARACTERISTICS:

    Embedded systems often use a (relatively) slow processor and small memory size with anintentionally simplified architecture to minimize costs.

    Programs on embedded systems must often run with limited resources Embedded system designers use compilers to develop an embedded system. They often have no operating system or a speciali8zed embedded operating system

    (often a real-time operating system ).

    Programs on an embedded system often must run with resources: often there is no diskdrive, operating system, keyboard or screen. may replace rotating media, and a small

    keypad and screen may be used instead of a PC's keyboard and screen.

    Embedding a computer is to interact with the environment, often by monitoring andcontrolling external machinery. In order to do this, analog inputs and outputs must be

    transformed to and from digital signal levels.

    1.4 APPLICATIONS OF EMBEDDED SYSTEMS:

    Some widely used applications of embedded systems are listed below:

  • 8/22/2019 GSM b vmss lit.rv

    2/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    2

    Cellular telephones. Computer network. Disc drives. Thermo stats. Security monitoring systems. Hand held calculations. House-hold appliances. Inertial guided systems. Flight control hardware / software. Medical equipment.

    2. BLOCK DIAGRAM AND SCHEMATIC DIAGRAM

    2.1BLOCK-DIAGRAM

    FIG 2.1 Block diagram of vehicle monitoring and security system

  • 8/22/2019 GSM b vmss lit.rv

    3/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    3

    2.2 BLOCK DIAGRAM EXPLANATION:

    The project GSM BASED VEHICLE MONITORING AND SECURITY

    SYSTEM deals with the design & development of a theft control system for automobiles which

    is being used to prevent / control the theft of a vehicle. The developed system makes use of an

    embedded system based on GSM technology. An interfacing mobile is also connected to the

    microcontroller, which is in turn, connected to the engine.

    Once, the vehicle is being stolen, the information is being used by the vehicle ownerfor further processing. The information is passed onto the central processing insurance system,

    where by sitting at a remote place, a particular number is dialed by them to the interfacing

    mobile that is with the hardware kit which is installed in the vehicle. By reading the signals

    received by the mobile, one can control the ignition of the engine; say to lock it or to stop the

    engine immediately. Again it will come to the normal condition only after entering a secured

    password. The owner of the vehicle & the centre processing system will know this secured

    password. We can modify this concept such that the vehicle owner also can lock the vehicle from

    his mobile phone.

    The main concept in this design is introducing the mobile communications into the

    embedded system. With the help of SIM tracking knows the location of vehicle and informs to

    the local police or stops it from further movement.

  • 8/22/2019 GSM b vmss lit.rv

    4/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    4

    2.3 SCHEMATIC DIAGRAM:

    Fig 2.2 schematic diagram

    2.4SCHEMATIC DESCRIPTION:

    The operation of this circuit mainly depends on the MEM sensor. The actual position

    of the MEM sensor should be 90 degrees with respect to ground. If there is any change in the

    actual position of the MEM a control signal will be given to the ADC. The ADC will convert

    the analog signal to the digital signal and it will send the digital signal to the micro controller.

    Micro controller will send a signal to the GSM module. As GSM receives a signal

    from micro controller it informs the owner as vehicle theft detected through an SMS.

    When the owner receives the above message he will send a message to the GSM module to

    lock the engine. As the GSM receives a secret code from the owner it sends a signal to the

  • 8/22/2019 GSM b vmss lit.rv

    5/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    5

    micro controller and the micro controller will lock the engine. As this is a protocol we have

    shown the locking of the engine by glowing led.

    After locking the engine, the owner can able to find the location of the Automobile

    by using the signals generated by GSM. After reaching the position where vehicle was

    locked, the owner enters an secret code to unlock the engine. In this way we can protect the

    vehicles. And we can also use this as a accident sensor.

    3. HARDWARE COMPONENTS

    3.1 MICRO CONTROLLER (AT89S52)

    3.1.1 INTRODUCTION:

    A Micro controller consists of a powerful CPU tightly coupled with memory, various

    I/O interfaces such as serial port, parallel port timer or counter, interrupt controller, data

    acquisition interfaces-Analog to Digital converter, Digital to Analog converter, integrated on to a

    single silicon chip.

    If a system is developed with a microprocessor, the designer has to go for external

    memory such as RAM, ROM, EPROM and peripherals. But controller is provided all these

    facilities on a single chip. Development of a Micro controller reduces PCB size and cost of

    design.

    One of the major differences between a Microprocessor and a Micro controller is that

    a controller often deals with bits not bytes as in the real world application.

    Intel has introduced a family of Micro controllers called the MCS-51.

    NECESSITY OF MICROCONTROLLERS:

  • 8/22/2019 GSM b vmss lit.rv

    6/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    6

    Microprocessors brought the concept of programmable devices and made many

    applications of intelligent equipment. Most applications, which do not need large amount of data

    and program memory, tended to be:

    Costly:

    The microprocessor system had to satisfy the data and program requirements so,

    sufficient RAM and ROM are used to satisfy most applications .The peripheral control

    equipment also had to be satisfied. Therefore, almost all-peripheral chips were used in the

    design. Because of these additional peripherals cost will be comparatively high.

    An example:

    8085 chip needs An Address latch for separating address from multiplex address and data.32-

    KB RAM and 32-KB ROM to be able to satisfy most applications. As also Timer / Counter,

    Parallel programmable port, Serial port, Interrupt controller are needed for its efficient

    applications.

    In comparison a typical Micro controller 8052 chip has all that the 8052 board has

    except a reduced memory as follows. 4K bytes of ROM as compared to 32-KB, 128 Bytes of

    RAM as compared to 32-KB.

    Bulky:

    On comparing a board full of chips (Microprocessors) with one chip with all

    components in it (Micro controller)

    Debugging:

    Lots of Microprocessor circuitry and program to debug. In Micro controller there is

    no Microprocessor circuitry to debug. Slower Development time: As we have observed

    Microprocessors need a lot of debugging at board level and at program level, whereas, Micro

    controller do not have the excessive circuitry and the built-in peripheral chips are easier to

    program for operation.

  • 8/22/2019 GSM b vmss lit.rv

    7/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    7

    So peripheral devices like Timer/Counter, Parallel programmable port, Serial

    Communication Port, Interrupt controller and so on, which were most often used were integrated

    with the Microprocessor to present the Micro controller .RAM and ROM also were integrated in

    the same chip. The ROM size was anything from 256 bytes to 32Kb or more. RAM was

    optimized to minimum of 64 bytes to 256 bytes or more.

    Typical Micro controllers have all the following features:

    8/16/32 CPU Instruction set rich in I/O & bit operations.

    One or more I/O ports.

    One or more timer/counters. One or more interrupt inputs and an interrupt controller One or more serial communication ports. Analog to Digital /Digital to Analog converter One or more PWM output Network controlled interface

    Why AT 89C52? :

    The system requirements and control specifications clearly rule out the use of 16, 32

    or 64 bit micro controllers or microprocessors. Systems using these may be earlier to implement

    due to large number of internal features. They are also faster and more reliable but, the above

    application is satisfactorily served by 8-bit micro controller. Using an inexpensive 8-bit Micro

    controller will doom the 32-bit product failure in any competitive market place.

    Coming to the question of why to use AT89C52 of all the 8-bit Micro controller

    available in the market the main answer would be because it has 8 Kb on chip flash memory

    which is just sufficient for our application. The on-chip Flash ROM allows the program memory

  • 8/22/2019 GSM b vmss lit.rv

    8/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    8

    to be reprogrammed in system or by conventional non-volatile memory Programmer. Moreover

    ATMEL is the leader in

    Flash technology in todays market place and hence using AT 89C52 is the optimal

    solution.

    8052 micro controller architecture:

    The 8052 architecture consists of these specific features:

    Compatible with MCS-51 Products 8K Bytes of In-System Programmable (ISP) Flash 4.0V to 5.5V Operating Range Fully Static Operation: 0 Hz to 33 MHz Three-level Program Memory Lock 256 x 8-bit Internal RAM 32 Programmable I/O Lines Three 16-bit Timer/Counters Eight Interrupt Sources Full Duplex UART Serial Channel Low-power Idle and Power-down Modes Interrupt Recovery from Power-down Mode Watchdog Timer Dual Data Pointer Power-off Flag

  • 8/22/2019 GSM b vmss lit.rv

    9/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    9

    Fast Programming Time Flexible ISP Programming (Byte and Page Mode)

    3.1.2 PIN DIAGRAM:

    Fig -3.1.2 Pin out diagram of 89C52 ic

    I/O ports:

  • 8/22/2019 GSM b vmss lit.rv

    10/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    10

    One major feature of a microcontroller is the versatility built into the input/output

    (I/O) circuits that connect the 8052 to the outside world. The main constraint that limits

    numerous functions is the number of pins available in the 8052 circuit. The DIP had 40 pins and

    the success of the design depends on the flexibility incorporated into use of these pins. For this

    reason, 24 of the pins may each used for one of the two entirely different functions which

    depend, first, on what is physically connected to it and, then, on what software programs are used

    to program the pins.

    Port 0

    Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can sink

    eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high-impedance

    inputs. Port 0 can also be configured to be the multiplexed low-order address/data bus during

    accesses to external program and data memory. In this mode, P0 has internal pull-ups. Port 0 also

    receives the code bytes during Flash programming and outputs the code bytes during program

    verification. External pull-ups are required during program verification.

    Port 1

    Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers

    can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by theinter-nal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being

    pulled low will source current (IIL) because of the internal pull-ups. In addition, P1.0 and P1.1

    can be configured to be the timer/counter 2 external count input (P1.0/T2) and the timer/counter

    2 trigger input (P1.1/T2EX), respectively, as shown in the follow-ing table. Port 1 also receives

    the low-order address bytes during Flash programming and verification.

    Port 2

    Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output buffers

    can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the

    inter-nal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being

    pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order

    address byte during fetches from external program memory and dur-ing accesses to external data

  • 8/22/2019 GSM b vmss lit.rv

    11/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    11

    memory that use 16-bit addresses (MOVX @ DPTR). In this application, Port 2 uses strong

    internal pull-ups when emitting 1s. During accesses to external data memory that use 8-bit

    addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. Port 2

    also receives the high-order address bits and some control signals during Flash program-ming

    and verification.

    Port 3

    Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers

    can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the

    inter-nal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being

    pulled low will source current (IIL) because of the pull-ups. Port 3 receives some control signalsfor Flash programming and verification. Port 3 also serves the functions of various special

    features of the

    AT89S52, as shown in the fol-lowing table

    RST

    Reset input. A high on this pin for two machine cycles while the oscillator is running

    resets the device. This pin drives high for 98 oscillator periods after the Watchdog times out. The

  • 8/22/2019 GSM b vmss lit.rv

    12/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    12

    DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In the default state

    of bit DISRTO, the RESET HIGH out feature is enabled.

    ALE/PROG

    Address Latch Enable (ALE) is an output pulse for latching the low byte of the address

    during accesses to external memory. This pin is also the program pulse input (PROG) during

    Flash programming. In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator

    frequency and may be used for external timing or clocking purposes. Note, however, that one

    ALE pulse is skipped dur-ing each access to external data memory. If desired, ALE operation can

    be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a

    MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disablebit has no effect if the microcontroller is in external execution mode.

    INTERRUPTS:

    Interrupts are hardware signals that are used to determine conditions that exist in external

    and internal circuits. Any interrupt can cause the 8052 to perform a hardware call to an interrupt

    handling subroutine that is located at a predetermined absolute address in the program memory.

    Five interrupts are provided in the 8052. Three of these are generated automaticallyby the internal operations: Timer flag 0, Timer Flag 1, and the serial port interrupt (RI or TI)

    Two interrupts are triggered by external signals provided by the circuitry that is connected to the

    pins INTO 0 and INTO1. The interrupts maybe enable or disabled, given priority or otherwise

    controlled by altering the bits in the Interrupt Enabled (IE) register, Interrupt Priority (IP)

    register, and the Timer Control (TCON) register. . These interrupts are mask able i.e. they can be

    disabled. Reset is a non maskable interrupt which has the highest priority. It is generated when a

    high is applied to the reset pin. Upon reset, the registers are loaded with the default values.

    Each interrupt source causes the program to do store the address in PC onto the stack and

    causes a hardware call to one of the dedicated addresses in the program memory. The appropriate

    memory locations for each for each interrupt are as follows:

    interrupt Address

  • 8/22/2019 GSM b vmss lit.rv

    13/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    13

    RESET 00

    E0 (External interrupt 0) 03

    F0 (Timer 0 interrupt) 0B

    E1 (External interrupt 1) 13

    F1 (Timer 1 interrupt) 1B

    SERIAL 23

    The AT89C52 is a low-power, high-performance CMOS 8-bit microcomputer with

    4K bytes of Flash programmable and erasable read only memory (PEROM). The device is

    manufactured using Atmels high-density nonvolatile memory technology and is compatible with

    the industry-standard MCS-51 instruction set and pin out. The on-chip Flash allows the program

    memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer.

    By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C51 is a

    powerful microcomputer, which provides a highly flexible and cost-effective solution to many

    embedded control applications.

    3.4 RS 232:

    In telecommunications, RS-232 (Recommended Standard 232) is a standard forserial

    binary data signals connecting between a DTE (Data terminal equipment) and a DCE (Data

    Circuit-terminating Equipment). It is commonly used in computerserial ports.

    Scope of the standard:

    The Electronic Industries Alliance (EIA) standard RS-232-C as of 1969 defines:

    Electrical signal characteristics such as voltage levels, signaling rate, timing and slew-rate of signals, voltage withstand level short-circuit behavior, and maximum load

    capacitance.

    Interface mechanic characteristics, pluggable connectors and pin identification. Functions of each circuit in the interface connector.

    http://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Serial_communicationshttp://en.wikipedia.org/wiki/Data_terminal_equipmenthttp://en.wikipedia.org/wiki/Data_circuit-terminating_equipmenthttp://en.wikipedia.org/wiki/Data_circuit-terminating_equipmenthttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Serial_porthttp://en.wikipedia.org/wiki/Electronic_Industries_Alliancehttp://en.wikipedia.org/wiki/Slew_ratehttp://en.wikipedia.org/wiki/Slew_ratehttp://en.wikipedia.org/wiki/Short_circuithttp://en.wikipedia.org/wiki/Capacitancehttp://en.wikipedia.org/wiki/Capacitancehttp://en.wikipedia.org/wiki/Short_circuithttp://en.wikipedia.org/wiki/Slew_ratehttp://en.wikipedia.org/wiki/Slew_ratehttp://en.wikipedia.org/wiki/Electronic_Industries_Alliancehttp://en.wikipedia.org/wiki/Serial_porthttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Data_circuit-terminating_equipmenthttp://en.wikipedia.org/wiki/Data_circuit-terminating_equipmenthttp://en.wikipedia.org/wiki/Data_terminal_equipmenthttp://en.wikipedia.org/wiki/Serial_communicationshttp://en.wikipedia.org/wiki/Telecommunications
  • 8/22/2019 GSM b vmss lit.rv

    14/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    14

    Standard subsets of interface circuits for selected telecom applications. The standard does not define such elements as Character encoding (for example, ASCII, Baudot orEBCDIC) The framing of characters in the data stream (bits per character, start/stop bits, parity) Protocols for error detection or algorithms for data compression Bit rates for transmission, although the standard says it is intended forbit rates lower than

    20,000 bits per second. Many modern devices support speeds of 115,200 bps and above

    Power supply to external devices. Details of character format and transmission bit rate are controlled by the serial port

    hardware, often a single integrated circuit called a UART that converts data from parallel

    to serial form. A typical serial port includes specialized driver and receiver integrated

    circuits to convert between internal logic levels and RS-232 compatible signal levels.

    that they could connect to existing equipment. For many years, an RS-232-compatible

    port was a standard feature for serial communications, such as modem connections, on many

    computers.

    3.5MAX 232A standard serial interface for PC, RS232C, requires negative logic, i.e., logic 1 is -

    3V to -12V and logic 0 is +3V to +12V. To convert TTL logic, say, TxD and RxD pins of the

    microcontroller thus need a converter chip. A MAX232 chip has long been using in many

    microcontrollers boards. It is a dual RS232 receiver / transmitter that meets all RS232

    specifications while using only +5V power supply. It has two onboard charge pump voltage

    converters which generate +10V to -10V power supplies from a single 5V supply. It has four

    level translators, two of which are RS232 transmitters that convert TTL/CMOS input levels into+9V RS232 outputs. The other two level translators are RS232 receivers that convert RS232

    input to 5V. Typical MAX232 circuit is shown below.

    http://en.wikipedia.org/wiki/Character_encodinghttp://en.wikipedia.org/wiki/ASCIIhttp://en.wikipedia.org/wiki/Baudothttp://en.wikipedia.org/wiki/EBCDIChttp://en.wikipedia.org/wiki/Parity_%28telecommunication%29http://en.wikipedia.org/wiki/Bit_ratehttp://en.wikipedia.org/wiki/Serial_porthttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/UARThttp://en.wikipedia.org/wiki/Serial_porthttp://en.wikipedia.org/wiki/Serial_communicationshttp://en.wikipedia.org/wiki/Serial_communicationshttp://en.wikipedia.org/wiki/Serial_porthttp://en.wikipedia.org/wiki/UARThttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Serial_porthttp://en.wikipedia.org/wiki/Bit_ratehttp://en.wikipedia.org/wiki/Parity_%28telecommunication%29http://en.wikipedia.org/wiki/EBCDIChttp://en.wikipedia.org/wiki/Baudothttp://en.wikipedia.org/wiki/ASCIIhttp://en.wikipedia.org/wiki/Character_encoding
  • 8/22/2019 GSM b vmss lit.rv

    15/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    15

    Fig 3.5.1 Pin diagram of max232

    3.6 LIQUID CRYSTAL DISPLAY

    3.6.1 INTRODUCTION:

    In recent years the LCD is finding widespread use replacing LED s (seven-segment

    LED or other multi segment LED s).

    This is due to the following reasons:

    1. The declining prices of LCD s.2. The ability to display numbers, characters and graphics. This is in

    contract to LED s, which are limited to numbers and a few characters.

    3. Incorporation of a refreshing controller into the LCD, there by relieving the CPU ofthe task of refreshing the LCD. In the contrast, the LED must be refreshed by the

    CPU to keep displaying the data.

    4. Ease of programming for characters and graphics.

  • 8/22/2019 GSM b vmss lit.rv

    16/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    16

    3.6.1 LCD pin diagram

    4. GSM MODEM

    4.1 GSM Fundamentals:

    The Global System for Mobile Communications (GSM) is the most popular standard

    for mobile phones in the world. GSM phones are used by over a billion people across more than

    200 countries. The ubiquity of the GSM standard makes international roaming very commonbetween mobile phone operators, which enable phone users to access their services in many

    other parts of the world as well as their own country. GSM differs significantly from its

    predecessors in that both signaling and speech channels are digital, which means that it is seen as

    a second generation (2G) mobile phone system. This fact has also meant that data

    communication was built into the system from very early on. GSM is an open standard, which is

    currently developed by the 3GPP.From the point of view of the consumer, the key advantage of

    GSM systems has been higher digital voice quality and low cost alternatives to making calls such

    as text messaging. The advantage for network operators has been 8 the ability to deploy

    equipment from different vendors because the open standard allows easy inter-operability. Also,

    the standards have allowed network operators to offer roaming services, which mean the

    subscribers, can use their phone all over the world. GSM retained backward-compatibility with

    the original GSM phones as the GSM standard continued to develop, for example packet data

  • 8/22/2019 GSM b vmss lit.rv

    17/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    17

    capabilities were added in the Release '97 version of the standard, by means of GPRS. Higher

    speed data transmission has also been introduced with EDGE in the Release '99 version of the

    standard.

    4.2 ADVANTAGES & USES OF GSM:

    2. Another major reason for the growth in GSM usage, particularly between 1998 to 2002, was

    the availability of prepaid calling from mobile phone operators. This allows people who are

    either unable or unwilling to enter into a contract with an operator to have mobile phones.

    Prepaid also enabled the rapid expansion of GSM in many developing countries where large

    sections of the population do not have access to banks or bank accounts and countries where

    there are no effective credit rating agencies. (In the USA, starting a non-prepaid contract with a

    cellular phone operator is almost always subject to credit verification through personal

    information provided by credit rating agencies).

    3. The architecture of GSM allows for rapid flow of information by voice or data messaging

    (SMS). Users now have access to more information, whether personal, technical, economic or

    political, more quickly than was possible before the global presence of GSM. Even remote

    communities are able to integrate into networks (sometimes global) thereby making information,

    knowledge and culture accessible, in theory, to anyone.

    4. One of the most appealing aspects of wireless communications is its mobility. Much of the

    success of GSM is due to its mobility management, offering users the freedom and convenience

    to conduct business from almost anywhere at any time.

    5. GSM has been the catalyst in the tremendous shift in traffic volume from fixed networks to

    mobile networks. This has resulted in the emergence of a mobile paradigm, whereby the mobile

    phone has become the first choice of personal phone.

    6. Higher digital voice quality.

    7. Low cost alternatives to making calls such a text messaging.

    USES OF GSM:

  • 8/22/2019 GSM b vmss lit.rv

    18/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    18

    Uses encryption to make phone calls more secure

    Data networking Group III facsimile services Short Message Service (SMS) for text messages and paging Call forwarding Caller ID U Call waiting. Multi-party conferencingAfter a few turbulent years for the industry, we highlight some of the key factors we view as

    critical for the continued success of GSM. These include:

    Enabling convergence with other wireless technologies Developing Mobile Centric Applications Evolving the mobile business model Mobile terminal enhancements and variety Fostering industry partnerships and co-operations Interoperability and Inter-generational roaming between various platforms.

    7. APPLICATIONS

    As a security System

  • 8/22/2019 GSM b vmss lit.rv

    19/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    19

    As Accident Report System

    7.1 MERITS:

    Low Cost Less ComplexityHuge Scope For Research And Development

    7.2 DEMERITS:

    The only dis merit of this project is this can be used in the place where signal strengthis high

    8. CONCLUSION

    The project DESIGN & DEVELOPMENT OF GSM BASED VEHICLE MONITORING AND

    SECURITY SYSTEM has been successfully designed and tested.

    It has been developed by integrating features of all the hardware components used. Presence

    of every module has been reasoned out and placed carefully thus contributing to the best working

    of the unit.

    Secondly, using highly advanced ICs and with the help of growing technology the

    project has been successfully implemented.

    Finally we conclude that DESIGN & DEVELOPMENT OF GSM BASED VEHICLE

    MONITORING AND SECURITY SYSTEM is an emerging field and there is a huge scope for

    research and development.

    FUTURE ENHANCEMENT

  • 8/22/2019 GSM b vmss lit.rv

    20/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    20

    We can enhance this project by using the GPRS technology using which we can able to locate

    the exact position of the automobile.

  • 8/22/2019 GSM b vmss lit.rv

    21/21

    GSM BASED VEHICLE MONITORING AND SECURITY SYSTEM

    21

    Bibliography

    The 8052 Micro controller and Embedded Systems

    -Muhammad Ali Mazidi &

    Janice Gillispie Mazidi

    The 8052 Micro controller Architecture, Programming & Applications

    -Kenneth J.Ayala

    Fundamentals Of Micro processors and Micro computers

    -B.Ram

    Micro processor Architecture, Programming & Applications

    -Ramesh S. Gaonkar

    Electronic Components

    -D.V. Prasad

    Wireless Communications

    - Theodore S. Rappaport

    Mobile Tele Communications

    - William C.Y. Lee

    References on the Web:

    www.national.com

    www.atmel.com

    www.microsoftsearch.com

    www.geocities.com

    http://www.national.com/http://www.national.com/http://www.atmel.com/http://www.atmel.com/http://www.microsoftsearch.com/http://www.microsoftsearch.com/http://www.geocities.com/http://www.geocities.com/http://www.geocities.com/http://www.microsoftsearch.com/http://www.atmel.com/http://www.national.com/