Blue Tooth Based Security Enabled Powered Devices Control System

Embed Size (px)

Citation preview

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    1/79

    BlueStooth based security enabled powered devices control system

    CHAPTER 1: INTRODUCTION

    1.1 Introduction:

    The project mainly aims in designing completely automated powered devices

    control with the help of Bluetooth technology and a graphical LCD to display the status of the

    devices and also provides a user friendly environment to operate the devices effectively. It majorly

    aims in providing a reliable system for illiterates and old people who finds difficulty in operating

    few high end devices like C! water heaters etc.

    utomation is the most fre"uently spelled term in the field of electronics. The

    hunger for automation brought many revolutions in the e#isting technologies. These had greater

    importance than any other technologies due to its user$friendly nature. These can be used as areplacement of the e#isting switches in home which produces sparks and also results in fire

    accidents in few situations. Considering the advantages of Bluetooth an advanced automation

    system was developed to control the devices.

    The device consists of a microcontroller! which is interfaced with the input and

    output modules! the controller acts as an intermediate medium between both of them. %o the

    controller can be termed as a control unit. The input module is nothing but a Bluetooth module!

    which takes the input from the user&s mobile phone with Bluetooth features and provides the same

    to the microcontroller. The output module is graphical LCD and the devices to be controlled. 'ere

    the microcontroller receives the input from the Bluetooth and switches the device with respect to

    the input. The controller also takes the responsibility to display the status of the individual devices

    on the graphical LCD. The (icrocontroller is programmed using )mbedded C language.

    Features:

    *. Bluetooth based user$friendly operation.+. Low power consumption.

    ,. Controls high and low voltage devices.

    -. Long life.

    . 'ighly sensitive.

    1.2 Project Overvie:

    n embedded system is a combination of software and hardware to perform a

    dedicated task. %ome of the main devices used in embedded products are (icroprocessors and

    (icrocontrollers.

    Department of E.C.E 1 S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    2/79

    BlueStooth based security enabled powered devices control system

    (icroprocessors are commonly referred to as general purpose processors as they

    simply accept the inputs! process it and give the output. In contrast! a microcontroller not only

    accepts the data as inputs but also manipulates it! interfaces the data with various devices! controls

    the data and thus finally gives the result.

    The /!"uetoot# $ased securit% ena$"ed &oered devices contro" s%ste'0 using

    1IC*234, microcontroller is an e#clusive project which is designed such that home appliances can

    be controlled by using a touch screen sensor.

    5e can use this project to control the home appliances like lights! fans etc..! by

    using touch screen sensor i.e. manual switching mechanism is eliminated and we can switch any

    home appliance just by a gentle touch on touch screen sensor.

    1.( T#esis:

    The thesis e#plains the implementation of /!"uetoot# $ased securit% ena$"ed

    &oered devices contro" s%ste') using 1IC*234, microcontroller. The organi6ation of

    the thesis is e#plained here with7

    C#a&ter 1 1resents introduction to the overall thesis and the overview of the project. In the

    project overview a brief introduction of Bluetooth! 8elay and Triac and its applications are

    discussed.

    C#a&ter 2 1resents the topic embedded systems. It e#plains the about what is embedded systems!

    need for embedded systems! e#planation of it along with its applications.

    C#a&ter ( 1resents the hardware description. It deals with the block diagram of the project and

    e#plains the purpose of each block. In the same chapter the e#planation of microcontrollers!

    Bluetooth module! power supplies! 8elay and Triac are considered.

    C#a&ter *1resents the software description. It e#plains the implementation of the project using

    1IC C Compiler software.

    C#a&ter + 1resents the project description along with Bluetooth module! relay and Triac

    interfacing to microcontroller.

    C#a&ter , 1resents the advantages! disadvantages and applications of the project.

    C#a&ter - 1resents the results! conclusion and future scope of the project.

    Department of E.C.E ! S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    3/79

    BlueStooth based security enabled powered devices control system

    Advantaes:

    *. This system eliminates electrical shocks when manual switching mechanism is used.

    +. The electrical appliances can be switched 9:;933 wirelessly through Bluetooth.

    ,. )fficient and low cost design.

    -. Low power consumption.

    . 3ast response.

    2. 'igh voltage devices can also be operated.

    Disadvantaes:

    *. 8ange of Bluetooth is limited.

    +. Interfacing Bluetooth module to (icrocontroller is sensitive.

    A&&"ications:

    This system is an efficient solution for operating many electrical appliances through

    Bluetooth which can be used in real time.

    Department of E.C.E " S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    4/79

    BlueStooth based security enabled powered devices control system

    CHAPTER 2: E/!EDDED 00TE/0

    2.1 E'$edded 0%ste's:

    n embedded system is a computer system designed to perform one or a few

    dedicated functions often with real$time computing constraints. It is embedded as part of a

    complete device often including hardware and mechanical parts. By contrast! a general$purpose

    computer! such as a personal computer

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    5/79

    BlueStooth based security enabled powered devices control system>designed to perform one or a few dedicated functions>! and is thus appropriate to call

    >embedded>. modern e#ample of embedded system is shown in fig7 +.*.

    Fi 2.1:A 'odern ea'&"e o3 e'$edded s%ste'

    Labeled parts include microprocessor

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    6/79

    BlueStooth based security enabled powered devices control systemproject?s inception! the pollo guidance computer was considered the riskiest item in the pollo

    project as it employed the then newly developed monolithic integrated circuits to reduce the si6e

    and weight. n early mass$produced embedded system was the utonetics D$*4 guidance

    computer for

    the (inute man missile! released in *@2*. It was built fromtransistorlogicand had a hard diskfor

    main memory. 5hen the (inuteman II went into production in *@22! the D$*4 was replaced with

    a new computer that was the first high$volume use of integrated circuits.

    2.1.2 Too"s:

    )mbedded development makes up a small fraction of total programming. There?s

    also a large number of embedded architectures! unlike the 1C world where * instruction set rules!

    and the :IE world where there?s only , or - major ones. This means that the tools are more

    e#pensive. It also means that they?re lowering featured! and less developed. 9n a major embedded

    project! at some point you will almost always find a compiler bug of some sort.

    Debugging tools are another issue. %ince you can?t always run general programs on

    your embedded processor! you can?t always run a debugger on it. This makes fi#ing your program

    difficult. %pecial hardware such as FT ports can overcome this issue in part. 'owever! if you

    stop on a breakpoint when your system is controlling real world hardware

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    7/79

    BlueStooth based security enabled powered devices control systemgenerally use deterministic memory techni"ues and avoid the default >new> and >malloc>

    functions! so that leaks

    can be found and eliminated more easily. 9ther resources programmers e#pect may not even e#ist.

    3or e#ample! most embedded processors do not have hardware 31s writing your own software> becomes a very trivial task indeed. 3rom

    an implementation viewpoint! there is a major difference between a computer and an embedded

    system. )mbedded systems are often re"uired to provide 8eal$Time response. The main elements

    that make embedded systems uni"ue are its reliability and ease in debugging.

    2.2.1 De$uin:

    )mbedded debugging may be performed at different levels! depending on the

    facilities available. 3rom simplest to most sophisticate they can be roughly grouped into the

    following areas7

    Interactive resident debugging! using the simple shell provided by the embedded operating

    system

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    8/79

    BlueStooth based security enabled powered devices control system

    n in$circuit debugger Limp modes> are less tolerable.

    9ften backups are selected by an operator. )#amples include aircraft navigation! reactor

    controlsystems! safety$critical chemical factory controls! train signals! engines on single$

    engine aircraft.

    Department of E.C.E ' S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    9/79

    BlueStooth based security enabled powered devices control system

    The system will lose large amounts of money when shut down7 Telephone switches!

    factory controls! bridge and elevator controls! funds transfer and market making!

    automated sales and service.

    variety of techni"ues are used! sometimes in combination! to recover from errors

    Gboth software bugs such as memory leaks! and also soft errors in the hardware7

    5atchdog timer that resets the computer unless the software periodically notifies the

    watchdog

    %ubsystems with redundant spares that can be switched over to

    software >limp modes> that provide partial function

    Designing with a Trusted Computing Base

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    10/79

    BlueStooth based security enabled powered devices control systemsually these kinds of systems run a simple task in a main loop also! but this task is

    not very sensitive to une#pected delays. %ometimes the interrupt handler will add longer tasks to a

    "ueue structure. Later! after the interrupt handler has finished! these tasks are e#ecuted by the main

    loop. This method brings the system close to a multitasking kernel with discrete processes.

    Cooperative (ultitasking7

    non$preemptive multitasking system is very similar to the simple control loop

    scheme! e#cept that the loop is hidden in an 1I. The programmer defines a series of tasks! and

    each task gets its own environment to /run0 in. 5hen a task is idle! it calls an idle routine! usually

    called /pause0! /wait0! /yield0! /nop0

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    11/79

    BlueStooth based security enabled powered devices control system

    (icrokernels nd )#okernels7

    microkernel is a logical step up from a real$time 9%. The usual arrangement is

    that the operating system kernel allocates memory and switches the C1 to different threads of

    e#ecution. ser mode processes implement major functions such as file systems! network

    interfaces! etc.

    In general! microkernels succeed when the task switching and intertask

    communication is fast! and fail when they are slow. )#okernels communicate efficiently by

    normal subroutine calls. The hardware and all the software in the system are available to! and

    e#tensible by application programmers. Based on performance! functionality! re"uirement the

    embedded systems are divided into three categories7

    2.(.2 0tand A"one E'$edded 0%ste':

    These systems takes the input in the form of electrical signals from transducers or

    commands from human beings such as pressing of a button etc..! process them and produces

    desired output. This entire process of taking input! processing it and giving output is done in

    standalone mode. %uch embedded systems comes under stand alone embedded systems

    )g7 microwave oven! air conditioner etc.

    2.(.( Rea"4ti'e e'$edded s%ste's:

    )mbedded systems which are used to perform a specific task or operation in a

    specific time period those systems are called as real$time embedded systems. There are two typesof real$time embedded systems.

    'ard 8eal$time embedded systems7

    These embedded systems follow an absolute dead line time period i.e..! if the

    tasking is not done in a particular time period then there is a cause of damage to the entire

    e"uipment.

    Department of E.C.E 11 S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    12/79

    BlueStooth based security enabled powered devices control system)g7 consider a system in which we have to open a valve within ,A milliseconds. If this

    valve is not opened in ,A ms this may cause damage to the entire e"uipment. %o in such cases we

    use embedded systems for doing automatic operations.

    %oft 8eal Time embedded systems7

    These embedded systems follow a relative dead line time period i.e..! if the task is

    not done in a particular time that will not cause damage to the e"uipment.

    )g7 Consider a T remote control system! if the remote control takes a few milliseconds

    delay it will not cause damage either to the T or to the remote control. These systems which will

    not cause damage when they are not operated at considerable time period those systems comes

    under soft real$time embedded systems.

    2.(.* Netor5 co''unication e'$edded s%ste's:

    wide range network interfacing communication is provided by using embedded

    systems.

    )g7

    Consider a web camera that is connected to the computer with internet can be used to

    spread communication like sending pictures! images! videos etc..! to another computer

    with internet connection throughout anywhere in the world.

    Consider a web camera that is connected at the door lock.

    5henever a person comes near the door! it captures the image of a person andsends to the desktop of your computer which is connected to internet. This gives an alerting

    message with image on to the desktop of your computer! and then you can open the door lock just

    by clicking the mouse. 3ig7 +.+ show the network communications in embedded systems.

    Department of E.C.E 1! S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    13/79

    BlueStooth based security enabled powered devices control system

    Fi 2.2: Netor5 co''unication e'$edded s%ste's

    2.(.+ Di33erent t%&es o3 &rocessin units:

    The central processing unit

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    14/79

    BlueStooth based security enabled powered devices control systemt home we use a number of embedded systems which include microwave oven! remote

    control! CD players! DD players! camera etcM.

    Fi2.(: Auto'atic co33ee 'a5es e7ui&'ent

    2.*.2 O33ice auto'ation:

    5e use systems like fa# machine! modem! printer etcM

    Fi2.*: Fa 'ac#ine Fi2.+: Printin 'ac#ine

    2.*.(. Industria" auto'ation:

    Today a lot of industries are using embedded systems for process control. In

    industries we design the embedded systems to perform a specific operation like monitoring

    temperature! pressure! humidity !voltage! current etc..! and basing on these monitored levels we do

    control other devices! we can send information to a centrali6ed monitoring station.

    Department of E.C.E 1# S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    15/79

    BlueStooth based security enabled powered devices control system

    Fi2.,: Ro$ot

    In critical industries where human presence is avoided there we can use robots

    which are programmed to do a specific operation.

    2.*.+ Co'&uter netor5in:

    )mbedded systems are used as bridges routers etc..

    Fi2.-: Co'&uter netor5in

    2.*., Te"e co''unications:

    Cell phones! web cameras etc.

    Department of E.C.E 1$ S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    16/79

    BlueStooth based security enabled powered devices control system

    Fi2.8: Ce"" P#one Fi2.9: e$ ca'era

    CHAPTER (: HARDARE DE0CRIPTION

    (.1 Introduction7

    Department of E.C.E 1% S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    17/79

    BlueStooth based security enabled powered devices control systemIn this chapter the block diagram of the project and design aspect of independent

    modules are considered. Block diagram is shown in fig7 ,.*7

    FI; (.1: !"oc5 diara' o3 !"uetoot# $ased securit% ena$"ed &oered devices contro"

    s%ste'.

    The main blocks of this project are7

    *. (icro controller

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    18/79

    BlueStooth based security enabled powered devices control system

    (.2 /icro contro""er:

    Fi: (.2 /icrocontro""ers

    (.2.1 Introduction to /icrocontro""ers:

    Circumstances that we find ourselves in today in the field of microcontrollers had

    their beginnings in the development of technology of integrated circuits. This development has

    made it possible to store hundreds of thousands of transistors into one chip. That was a

    prere"uisite for production of microprocessors! and the first computers were made by adding

    e#ternal peripherals such as memory! input$output lines! timers and other. 3urther increasing of the

    volume of the package resulted in creation of integrated circuits. These integrated circuits

    contained both processor and peripherals. That is how the first chip containing a microcomputer!

    or what would later be known as a microcontroller came about.

    (icroprocessors and microcontrollers are widely used in embedded systems products.

    (icrocontroller is a programmable device. microcontroller has a C1 in addition to a fi#ed

    amount of 8(! 89(! I;9 ports and a timer embedded all on a single chip. The fi#ed amount of

    on$chip 89(! 8( and number of I;9 ports in microcontrollers makes them ideal for many

    applications in which cost and space are critical.

    The microcontroller used in this project is 1IC*234+. The 1IC families of microcontrollers

    are developed by (icrochip Technology Inc. Currently they are some of the most popular

    microcontrollers! selling over *+A million devices each year. There are basically four families of

    1IC microcontrollers7

    1IC*+CEEE *+;*-$bit program word

    1IC *2CE *+$bit program word

    Department of E.C.E 1' S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    19/79

    BlueStooth based security enabled powered devices control system1IC*2CEEE and 1IC*23EEE *-$bit program word

    1IC*4CEEE and 1IC*NCEEE *2$bit program word

    The features! pin description of the microcontroller used are discussed in the following sections.

    (.2.2 Descri&tion:

    Introduction:

    The 1IC*234, C(9% 3L%'$based N$bit microcontroller is upward compatible with the

    1IC*2C4,B;4-B;42;44!1IC*23N4,;N4-;N42;N44devices. It features +AA ns instruction e#ecution!

    self programming! an ICD! + Comparators! N channels of N$bit nalog$to$Digital

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    20/79

    BlueStooth based security enabled powered devices control system

    O 1rocessor read access to program memory

    0&ecia" /icrocontro""er Features:

    O 1ower$up Timer

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    21/79

    BlueStooth based security enabled powered devices control system

    Ana"o Co'&arator 'odu"e

    + analog comparators

    1rogrammable on$chip voltage reference module

    1rogrammable input multiple#ing from device inputs and internal 8)3

    Comparator outputs are e#ternally accessible

    3ollowing are the major blocks of 1IC (icrocontroller.

    Prora' 'e'or%

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    22/79

    BlueStooth based security enabled powered devices control system

    Fi(.2.2: Harvard =s =on Neu'ann !"oc5 Arc#itectures

    Cr%sta" osci""ator:

    The crystal oscillator speed that can be connected to the 1IC microcontroller range from

    DC to +A(h6. sing the CC% C compiler normally +A(h6 oscillator will be used and the price is

    very cheap. The +A ('6 crystal oscillator should be connected with about ++p3 capacitor. 1lease

    refer to my circuit schematic.

    There are input;output ports on 1IC microcontroller namely port ! port B! port C! port D

    and port ). )ach port has different function. (ost of them can be used as I;9 port.

    A&&"ications:

    1IC*234, perfectly fits many uses! from automotive industries and controlling home

    appliances to industrial instruments! remote sensors! electrical door locks and safety devices. It is

    also ideal for smart cards as well as for battery supplied devices because of its low consumption.

    ))189( memory makes it easier to apply microcontrollers to devices where permanent

    storage of various parameters is needed

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    23/79

    BlueStooth based security enabled powered devices control system

    Pin descri&tion:

    1IC*234, has a total of +N pins. It is most fre"uently found in a DI1+N type of case but can

    also be found in %(D case which is smaller from a DI1. DI1 is an abbreviation for Dual In

    1ackage. %(D is an abbreviation for %urface (ount Devices suggesting that holes for pins to go

    through when mounting aren?t necessary in soldering this type of a component.

    Fi (.(: Pin Diara' o3 PIC1,F-(

    1ins on 1IC*234, microcontroller have the following meaning7

    There are +N pins on 1IC*234,. (ost of them can be used as an I9 pin. 9thers are already for

    specific functions. These are the pin functions.

    *. (CL8 to reset the 1IC

    +. 8A port pin A

    ,. 8* port pin *

    -. 8+ port pin +

    . 8, port pin ,

    Department of E.C.E !" S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    24/79

    BlueStooth based security enabled powered devices control system2. 8- port pin -

    4. 8 port pin

    N. %% ground

    @. 9%C* connect to oscillator

    *A. 9%C+ connect to oscillator

    **. 8CA port C pin A DD power supply

    *+. 8C* port C pin *

    *,. 8C+ port C pin +

    *-. 8C, port C pin ,

    *. 8C- $ port C pin -

    *2. 8C $ port C pin

    *4. 8C2 $ port C pin 2

    *N. 8C4 $ port C pin 4

    *@. %% $ ground

    +A. DD power supply

    +*. 8BA $ port B pin A

    ++. 8B* $ port B pin *

    +,. 8B+ $ port B pin +

    +-. 8B, $ port B pin ,

    +. 8B- $ port B pin -

    +2. 8B $ port B pin

    +4. 8B2 $ port B pin 2

    +N. 8B4 $ port B pin 4

    By utili6ing all of this pin so many application can be done such as7

    *. LCD connect to 1ort B pin.

    +. L)D connect to any pin declared as output.

    ,. 8elay and (otor $ connect to any pin declared as output.

    -. )#ternal ))189( connect to I+C interface pin 8C, and 8C-

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    25/79

    BlueStooth based security enabled powered devices control system

    Ports

    Term >port> refers to a group of pins on a microcontroller which can be accessed

    simultaneously! or on which we can set the desired combination of 6eros and ones! or read from

    them an e#isting status. 1hysically! port is a register inside a microcontroller which is connected

    by wires to the pins of a microcontroller. 1orts represent physical connection of Central 1rocessing

    nit with an outside world. (icrocontroller uses them in order to monitor or control other

    components or devices. Due to functionality! some pins have twofold roles like 1-;T9CPI for

    instance! which is in the same time the fourth bit of port and an e#ternal input for free$run

    counter. %election of one of these two pin functions is done in one of the configuration registers.

    n illustration of this is the fifth bit TAC% in 91TI9: register. By selecting one of the functions

    the other one is disabled.

    ll port pins can be designated as input or output! according to the needs of a device

    that?s being developed. In order to define a pin as input or output pin! the right combination of6eros and ones must be written in T8I% register. If the appropriate bit of T8I% register contains

    logical >*>! then that pin is an input pin! and if the opposite is true! it?s an output pin. )very port

    has its proper T8I% register. Thus! port has T8I%! and port B has T8I%B. 1in direction can be

    changed during the course of work which is particularly fitting for one$line communication where

    data flow constantly changes direction. 198T and 198TB state registers are located in bank A!

    while T8I% and T8I%B pin direction registers are located in bank*.

    PORT! and TRI0!:

    198TB has adjoined N pins. The appropriate register for data direction is T8I%B.

    %etting a bit in T8I%B register defines the corresponding port pin as input! and resetting a bit in

    T8I%B register defines the corresponding port pin as output.

    Department of E.C.E !$ S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    26/79

    BlueStooth based security enabled powered devices control system

    )ach 198TB pin has a weak internal pull$up resistor

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    27/79

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    28/79

    BlueStooth based security enabled powered devices control systemdevices. Low voltage! low power DC power supply units are commonly integrated with the

    devices they supply! such ascomputersand household electronics.

    Batteries.

    Chemicalfuel cells and other forms ofenergy storagesystems.

    %olar power.

    enerators oralternators.

    (.(.2 !"oc5 Diara':

    Fi (.(.2 Reu"ated Poer 0u&&"%

    The basic circuit diagram of a regulated power supply

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    29/79

    BlueStooth based security enabled powered devices control system

    C1CIT98

    9LT) 8)LT98

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    30/79

    BlueStooth based security enabled powered devices control system

    Fi (.(.*: 0te&4Don Trans3or'er

    The voltage induced in the secondary is determined by the T8:% 8TI9.

    %ome transformers have an electrostatic screen between primary and secondary.

    This is to prevent some types of interference being fed from the e"uipment down into the mains

    supply! or in the other direction. Transformers are sometimes used for I(1)D:C)

    (TC'I:.

    5e can use the transformers as step up or step down.

    0te& U& trans3or'er:

    In case of step up transformer! primary windings are every less compared to

    secondary winding.

    Because of having more turns secondary winding accepts more energy! and it

    releases more voltage at the output side.

    0te& don trans3or'er:

    Incase of step down transformer! 1rimary winding induces more flu# than the

    secondary winding! and secondary winding is having less number of turns because of that it

    accepts less number of flu#! and releases less amount of voltage.

    Department of E.C.E ") S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    31/79

    BlueStooth based security enabled powered devices control system

    !atter% &oer su&&"%:

    batteryis a type of linear power supply that offers benefits that traditional line$

    operated power supplies lack7 mobility! portability and reliability. battery consists of multiple

    electrochemical cells connected to provide the voltage desired. 3ig7 ,.,. shows 'i$5att @

    battery

    Fi (.(.+: Hi4att 9= !atter%

    The most commonly used dry$cellbattery is thecarbon$6incdry cell battery. Dry$

    cell batteries are made by stacking a carbon plate! a layer of electrolyte paste! and a 6inc plate

    alternately until the desired total voltage is achieved. The most common dry$cell batteries have

    one of the following voltages7 *.! ,! 2! @! ++.! -! and @A. During the discharge of a carbon$6inc

    battery! the 6inc metal is converted to a 6inc salt in the electrolyte! and magnesium dio#ide isreduced at the carbon electrode. These actions establish a voltage of appro#imately *. .

    Recti3ication:

    The process of converting an alternating current to a pulsating direct current is

    called as rectification. 3or rectification purpose we use rectifiers.

    Recti3iers: rectifier is an electrical device that converts alternating current

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    32/79

    BlueStooth based security enabled powered devices control systemone of usage! i.e.! the term rectifier describes a diode that is being used to convert C to DC.

    lmost all rectifiers comprise a number of diodes in a specific arrangement for more efficiently

    converting C to DC than is possible with only one diode. Before the development of silicon

    semiconductor rectifiers! vacuum tube diodes and copper

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    33/79

    BlueStooth based security enabled powered devices control system

    D!1>-:

    :ow $a $days Bridge rectifier is available in IC with a number of DB*A4. In our

    project we are using an IC in place of bridge rectifier. The picture of DB *A4 is shown in fig7 ,.,.N.

    Features:

    ood for automation insertion

    %urge overload rating $ ,A amperes peak

    Ideal for printed circuit board

    8eliable low cost construction utili6ing molded

    lass passivated device

    1olarity symbols molded on body

    (ounting position7 ny

    5eight7 *.A gram

    Fi (.(.,: D!1>-

    Fi"tration:

    Department of E.C.E "" S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    34/79

    BlueStooth based security enabled powered devices control systemThe process of converting a pulsating direct current to a pure direct current using

    filters is called as filtration.

    Fi"ters:

    )lectronic filters are electronic circuits! which perform signal$processing functions!

    specifically to remove unwanted fre"uency components from the signal! to enhance wanted ones.

    Introduction to Ca&acitors:

    The Capacitor or sometimes referred to as a Condenser is a passive device! and one

    which stores energy in the form of an electrostatic field which produces a potential

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    35/79

    BlueStooth based security enabled powered devices control system

    Fi (.(.8:E"ectro"%tic Ca&aticor

    Units o3 Ca&acitance:

    (icrofarad

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    36/79

    BlueStooth based security enabled powered devices control system

    Fi (.(.9: =o"tae Reu"ator

    Resistors:

    resistor is a two$terminal electronic component that produces a voltage across its

    terminals that is proportional to the electric current passing through it in accordance with 9hm?s

    law7

    VSIR

    8esistors are elements of electrical networks and electronic circuits and are ubi"uitous in

    most electronic e"uipment. 1ractical resistors can be made of various compounds and films! as

    well as resistance wire

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    37/79

    BlueStooth based security enabled powered devices control systemThe behavior of an ideal resistor is dictated by the relationship specified in 9hm?s

    law7

    S I8

    9hm?s law states that the voltage

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    38/79

    BlueStooth based security enabled powered devices control systemare available across the visible! ultraviolet and infrared wavelengths! with very high brightness.

    The internal structure and parts of a led are shown in figures ,.-.* and ,.-.+ respectively.

    Fi (.*.1: Inside a 6ED Fi (.*.2: Parts o3 a 6ED

    or5in:

    The structure of the L)D light is completely different than that of the light bulb.

    ma6ingly! the L)D has a simple and strong structure. The light$emitting semiconductor material

    is what determines the L)D?s color. The L)D is based on the semiconductor diode.

    5hen a diode is forward biased

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    39/79

    BlueStooth based security enabled powered devices control systemadvanced communications technology. The electrical symbol and polarities of led are shown in fig7

    ,.-.,.

    Fi (.*.(: E"ectrica" 0%'$o" @ Po"arities o3 6ED

    L)D lights have a variety of advantages over other light sources7

    'igh$levels of brightness and intensity

    'igh$efficiency

    Low$voltage and current re"uirements

    Low radiated heat

    'igh reliability

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    40/79

    BlueStooth based security enabled powered devices control system enerate light for measuring and interacting with processes that do not involve the human

    visual system.

    (.+: !"uetoot#

    Introduction:

    The Bluetooth technology is a wireless communication that operates as radio waves!

    using a band set at +.-'6. This fre"uency is available at no charge. The Bluetooth technology

    allows two devices to connect wirelessly with each other! and incorporates the use of >Centrino>

    chips. These chips are available easily in most standard electronic devices such as laptops! cellular

    phones! computers! headsets! etc.

    Bluetooth is another developing a competing specification for a low$cost! short range

    radio link between mobile computers! cameras! and other portable in$home devices. The Bluetooth

    technology is the result of a co$operation between leaders in the telecommunication and computer

    industries. It enables home networking users to connect a wide range of computing and

    telecommunications devices easily and simply eliminating the need to purchase proprietary or

    additional cabling to connect individual devices.

    It delivers opportunities for the special purpose or concerned with one specific purposeconnections! and the possibility of automatic connections between devices.

    Because Bluetooth can be used for a variety of purposes! it will also potentially replace

    multiple cable connections via a single radio link.

    !"uetoot# Tec#no"o% Overvie:

    The technology is an open specification for wireless communication of data and voice. It

    is based on a low$cost! short$range radio link built into a @ # @mm microchipK facilitating protected

    ad hoc

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    41/79

    BlueStooth based security enabled powered devices control systemreplace the cumbersome cables used today to connect a laptop to a cellular telephone. 1rinters!

    1Ds! desktops! fa# machines! keyboards! joysticks! and virtually any other digital device can be

    part of the Bluetooth system.

    Fi (.+.1: !"uetoot# 'odu"e

    Bluetooth radio technology provides a universal bridge to e#isting data networks! a

    peripheral interface! and a mechanism to form small private ad hoc groupings of connected

    devices away from fi#ed network infrastructures. Designed to operate in a noisy radio fre"uency

    environment such as a home! the Bluetooth radio uses a fast acknowledgement and fre"uency$

    hopping scheme to make the link robust.

    Bluetooth radio modules avoid interference from other signals by hopping to a new

    fre"uency after transmitting or receiving a packet. Compared with other systems operating in the

    same fre"uency band! the Bluetooth radio typically hops faster and uses shorter packets. This

    makes the Bluetooth radio more robust than other systems. %imilar to 'ome 83! Bluetooth radios

    also operate in the unlicensed I%( band at +.- '6.

    5hile the I%( band is freely available for anyone to use! there are rules for devices

    designed to operate in it. Bluetooth has a ma#imum data capacity of only * (bps! which translates

    to a throughput of only 4NA Pbps once the protocol overhead is taken into account. 3rom a

    security perspective! Bluetooth provides user protection and information privacy mechanisms at

    the lower layers of its protocol stack. uthentication is based on a challenge response algorithm.

    uthentication is a key component of any Bluetooth home networking system! allowing us to

    develop a domain of trust between personal Bluetooth devices! such as allowing only our personal

    notebook to communicate through our cellular telephone.

    Department of E.C.E #1 S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    42/79

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    43/79

    BlueStooth based security enabled powered devices control systemknown as fre"uency hopping. They also use three different but complimentary error correction

    schemes. Built$in encryption and verification is provided.

    (oreover! Bluetooth devices won?t drain precious battery life. The Bluetooth

    specification targets power consumption of the device from a >hold> mode consuming ,A micro

    amps to the active transmitting range of N,A milliamps

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    44/79

    BlueStooth based security enabled powered devices control systemBluetooth radio transmissions will conform to the safety standards re"uired by the countries where

    the technology will be used with respect to the affects of radio transmissions on the human body.

    )missions from Bluetooth enabled devices will be no greater than emissions from industry$

    standard cordless phones. The Bluetooth module will not interfere or cause harm to public or

    private telecommunications network.

    The Bluetooth base band protocol is a combination of circuit and packet switching.

    %lots can be reserved for synchronous packets. )ach packet is transmitted in a different hop

    fre"uency. packet nominally covers a single slot! but can be e#tended to cover up to five slots.

    Bluetooth can support an asynchronous data channel! up to three simultaneous synchronous voice

    channels! or a channel! which simultaneously supports asynchronous data and synchronous voice.

    It is thus possible to transfer the date asynchronously whilst at the same time talking

    synchronously at the same time. )ach voice channel supports 2- kb;s synchronous 2.1+ Protoco")

    /odes o3 o&eration:

    n interesting aspect of the technology is the instant formation of networks once

    the Bluetooth devices come in range to each other. piconet is a collection of devices connected

    via Bluetooth technology in an ad hoc fashion. 1iconet can be a simple connection between two

    devices or more than two devices. (ultiple independent and non$synchroni6ed piconets can form

    a scatternet. ny of the devices in a piconet can also be a member of another by means of time

    multiple#ing. I.e. a device can be a part of more than one piconet by suitably sharing the time. The

    Bluetooth system supports both point$to$point and point$to$multi$point connections. 5hen a

    device is connected to another device it is a point to point connection. If it is connected to more

    that one

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    45/79

    BlueStooth based security enabled powered devices control systemll Bluetooth devices are peer units and have identical implementations.

    'owever! when establishing a piconet! one unit will act as a master and the other

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    46/79

    BlueStooth based security enabled powered devices control system

    Persona" Area Netor5s:

    Bluetooth was originally conceived to replace the myriad of cables that are

    synonymous with a 1C$based home network. 'owever! as the Bluetooth evolved it became clear

    that it would also enable a totally new networking paradigm! 1ersonal rea :etworks

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    47/79

    BlueStooth based security enabled powered devices control system

    Fiure (.+.2:A !"uetoot# 0catter net

    (., Re"a%:

    re"a%is an electrically operated switch. (any relays use an electromagnet to operate a

    switching mechanism! but other operating principles are also used. 8elays find applications where

    it is necessary to control a circuit by a low$power signal! or where several circuits must be

    controlled by one signal. The first relays were used in long distance telegraph circuits! repeating

    the signal coming in from one circuit and re$transmitting it to another. 8elays found e#tensive use

    in telephone e#changes and early computers to perform logical operations. type of relay that can

    handle the high power re"uired to directly drive an electric motor is called a contactor. %olid$state

    relays control power circuits with no moving parts! instead using a semiconductor device triggered

    by light to perform switching. 8elays with calibrated operating characteristics and sometimes

    multiple operating coils are used to protect electrical circuits from overload or faultsK in modern

    electric power systems these functions are performed by digital instruments still called >protection

    relays>.

    Department of E.C.E #& S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    48/79

    BlueStooth based security enabled powered devices control system

    T%&es o3 re"a%s:

    1. 0i'&"e e"ectro'ec#anica" re"a%:

    simple electromagnetic relay! such as the one taken from a car in the first picture! is an

    adaptation of an electromagnet. It consists of a coil of wire surrounding a soft iron core! an iron

    yoke! which provides a low reluctance path for magnetic flu#! a movable iron armature! and a set!

    or sets! of contactsK two in the relay pictured. The armature is hinged to the yoke and mechanically

    linked to a moving contact or contacts. It is held in place by a spring so that when the relay is de$

    energi6ed there is an air gap in the magnetic circuit. In this condition! one of the two sets of

    contacts in the relay pictured is closed! and the other set is open. 9ther relays may have more or

    fewer sets of contacts depending on their function. The relay in the picture also has a wire

    connecting the armature to the yoke. This ensures continuity of the circuit between the moving

    contacts on the armature! and the circuit track on the printed circuit board

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    49/79

    BlueStooth based security enabled powered devices control system

    !asic desin and o&eration:

    5hen an electric current is passed through the coil! the resulting magnetic field

    attracts the armature and the conse"uent movement of the movable contact or contacts either

    makes or breaks a connection with a fi#ed contact. If the set of contacts was closed when the relay

    was De$energi6ed! then the movement opens the contacts and breaks the connection! and vice

    versa if the contacts were open. 5hen the current to the coil is switched off! the armature is

    returned by a force! appro#imately half as strong as the magnetic force! to its rela#ed position.

    sually this force is provided by a spring! but gravity is also used commonly in industrial motor

    starters. (ost relays are manufactured to operate "uickly. In a low voltage application! this is to

    reduce noise. In a high voltage or high current application! this is to reduce arcing.

    If the coil is energi6ed with DC! a diode is fre"uently installed across the coil! to

    dissipate the energy from the collapsing magnetic field at deactivation! which would otherwise

    generate a voltage spike dangerous to circuit components. %ome automotive relays already includea diode inside the relay case. lternatively a contact protection network! consisting of a capacitor

    and resistor in series! may absorb the surge. If the coil is designed to be energi6ed with C! a small

    copper ring can be crimped to the end of the solenoid. This >shading ring> creates a small out$of$

    phase current! which increases the minimum pull on the armature during the C cycle.

    By analogy with the functions of the original electromagnetic device! a solid$state

    relay is made with a thyristor or other solid$state switching device. To achieve electrical isolation

    an opt coupler can be used which is a light$emitting diode

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    50/79

    BlueStooth based security enabled powered devices control system

    (. 6atc#in re"a%:

    Latching relay! dust cover removed! showing pawl and ratchet mechanism. The

    ratchet operates a cam! which raises and lowers the moving contact arm! seen edge$on just below

    it. The moving and fi#ed contacts are visible at the left side of the image.

    "atc#in re"a%has two rela#ed states impulse>!

    >keep>! or >stay> relays. 5hen the current is switched off! the relay remains in its last state. This is

    achieved with a solenoid operating a ratchet and cam mechanism! or by having two opposing coils

    with an over$center spring or permanent magnet to hold the armature and contacts in position

    while the coil is rela#ed! or with a remnant core. In the ratchet and cam e#ample! the first pulse to

    the coil turns the relay on and the second pulse turns it off. In the two coil e#ample! a pulse to one

    coil turns the relay on and a pulse to the opposite coil turns the relay off. This type of relay has the

    advantage that it consumes power only for an instant! while it is being switched! and it retains its

    last setting across a power outage. remnant core latching relay re"uires a current pulse of

    opposite polarity to make it change state.

    (. Reed re"a%

    reed re"a% has a set of contacts inside a vacuum or inert gas filled glass tube!

    which protects the contacts against atmospheric corrosion. The contacts are closed by a magnetic

    field generated when current passes through a coil around the glass tube. 8eed relays are capable

    of faster switching speeds than larger types of relays! but have low switch current and voltage

    ratings.

    Department of E.C.E $) S.K.DEngineering College, ooty.

    http://en.wikipedia.org/wiki/File:Reedrelay.jpg
  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    51/79

    BlueStooth based security enabled powered devices control system

    *. /ercur%4etted re"a%

    'ercur%4etted reed re"a% is a form of reed relay in which the contacts are

    wetted with mercury. %uch relays are used to switch low$voltage signals

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    52/79

    BlueStooth based security enabled powered devices control systemare often used for motor starters. motor starter is a contactor with overload protection devices

    attached. The overload sensing devices are a form of heat operated relay where a coil heats a bi$

    metal strip! or where a solder pot melts! releasing a spring to operate au#iliary contacts. These

    au#iliary contacts are in series with the coil. If the overload senses e#cess current in the load! the

    coil is de$energi6ed. Contactor relays can be e#tremely loud to operate! making them unfit for use

    where noise is a chief concern.

    8. 0o"id4state re"a%

    %olid state relay! which has no moving parts

    + or -A solid state contactors

    so"id state re"a%

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    53/79

    BlueStooth based security enabled powered devices control system

    1>. !uc##o" re"a%

    !uc##o" re"a%is a safety device sensing the accumulation of gas in large oil$

    filled transformers! which will alarm on slow accumulation of gas or shut down the transformer if

    gas is produced rapidly in the transformer oil.

    11. Forced4uided contacts re"a%

    3orced4uided contacts re"a%has relay contacts that are mechanically linked

    together! so that when the relay coil is energi6ed or de$energi6ed! all of the linked contacts move

    together. If one set of contacts in the relay becomes immobili6ed! no other contact of the same

    relay will be able to move. The function of forced$guided contacts is to enable the safety circuit to

    check the status of the relay. 3orced$guided contacts are also known as >positive$guided contacts>!

    >captive contacts>! >locked contacts>! or >safety relays>.

    12. Over"oad &rotection re"a%

    )lectric motors need over current protection to prevent damage from over$loading

    the motor! or to protect against short circuits in connecting cables or internal faults in the motor

    windings. 9ne type of electric motor overload protection relay is operated by a heating element in

    series with the electric motor. The heat generated by the motor current heats a bimetallic strip or

    melts solder! releasing a spring to operate contacts. 5here the overload relay is e#posed to the

    same environment as the motor! a useful though crude compensation for motor ambient

    temperature is provided.

    Department of E.C.E $" S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    54/79

    BlueStooth based security enabled powered devices control system

    1(. Po"e and t#ro:

    Circuit symbols of relays. >C> denotes the common terminal in %1DT and D1DT types.

    The diagram on the package of a D1DT C coil relay

    %ince relays are switches! the terminology applied to switches is also applied to relays.

    relay will switch one or more poles! each of whose contacts can be thrown by energi6ing the

    coil in one of three ways7

    :ormally$open break>

    contact.

    Change$over

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    55/79

    BlueStooth based security enabled powered devices control systemThe following designations are commonly encountered7

    0P0T %ingle 1ole %ingle Throw. These have two terminals which can be connected or

    disconnected. Including two for the coil! such a relay has four terminals in total. It is

    ambiguous whether the pole is normally open or normally closed. The terminology

    >%1:9> and >%1:C> is sometimes used to resolve the ambiguity.

    0PDT %ingle 1ole Double Throw. common terminal connects to either of two others.

    Including two for the coil! such a relay has five terminals in total.

    DP0T Double 1ole %ingle Throw. These have two pairs of terminals. )"uivalent to two

    %1%T switches or relays actuated by a single coil. Including two for the coil! such a relay

    has si# terminals in total. The poles may be 3orm or 3orm B

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    56/79

    BlueStooth based security enabled powered devices control system Isolate the controlling circuit from the controlled circuit when the two are at different

    potentials! for e#ample when controlling a mains$powered device from a low$voltage

    switch. The latter is often applied to control office lighting as the low voltage wires are

    easily installed in partitions! which may be often moved as needs change. They may also

    be controlled by room occupancy detectors in an effort to conserve energy!

    Logic functions. 3or e#ample! the Boolean :D function is reali6ed by connecting

    normally open relay contacts in series! the 98 function by connecting normally open

    contacts in parallel. The change$over or 3orm C contacts perform the E98

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    57/79

    BlueStooth based security enabled powered devices control system

    Disadvantaes o3 re"a%s:

    8elays are $u"5ierthan transistors for switching small currents.

    8elays cannot sitc# ra&id"%

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    58/79

    BlueStooth based security enabled powered devices control systemdoesn?t have any polarity. It can be triggered by either a positive or a negative voltage being

    applied to its gate electrode

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    59/79

    BlueStooth based security enabled powered devices control system

    Fi(.-.2: 0%nc#roniation across t#e TRIAC 4 ave3or's

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    60/79

    BlueStooth based security enabled powered devices control system

    Fiure (.-.(: 0%nc#roniation across t#e TRIAC 4 ave3or's

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    61/79

    BlueStooth based security enabled powered devices control system bsence of a separate power supply

    Little power dissipated in 1 and 8t

    Disadvantae:

    1. Because of its principle! this circuit cannot be used for highly inductive loads with a

    narrow conduction angle because it can result in unacceptable asymmetrical operation.

    This very simple triggering circuit should be reserved for low$cost applications with the

    following characteristics7

    2. 8esistive or slightly inductive loads

    (. :o stringent re"uirements concerning the accuracy of regulation

    *. highly inductive loads where the power varies between N and *AAV of the ma#imum

    power

    A&&"ications o3 TRIAC:

    O Industrial controls O %olenoid;valve controls

    O Traffic lights O %tatic C power switch

    O ending machines O Incandescent lamp dimmers

    O %olid state relay O (otor control

    O Lamp ballasts

    CHAPTER *: 0OFTARE DE0CRIPTION

    This project is implemented using following software&s7

    )#press 1CB for designing circuit

    1IC C compiler $ for compilation part

    1roteus 4

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    62/79

    BlueStooth based security enabled powered devices control systemBreadboards are great for prototyping e"uipment as it allows great fle#ibility to

    modify a design when neededK however the final product of a project! ideally should have a neat

    1CB! few cables! and survive a shake test. :ot only is a proper 1CB neater but it is also more

    durable as there are no cables which can yank loose.

    )#press 1CB is a software tool to design 1CBs specifically for manufacture by the

    company )#press 1CB

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    63/79

    BlueStooth based security enabled powered devices control system5hen a project is first started you will be greeted with a yellow outline. This

    yellow outline is the dimension of the 1CB. Typically after positioning of parts and traces! move

    them to their final position and then crop the 1CB to the correct si6e. 'owever! in designing a

    board with a certain si6e constraint! crop the 1CB to the correct si6e before starting.

    3ig7 -.* show the toolbar in which the each button has the following functions7

    Fi *.1.2: Too" $ar necessar% 3or t#e inter3ace

    The select tool7 It is fairly obvious what this does. It allows you to move and manipulate

    parts. 5hen this tool is selected the top toolbar will show buttons to move traces to the

    top ; bottom copper layer! and rotate buttons.

    The 6oom to selection tool7 does just that.

    The place pad7 button allows you to place small soldier pads which are useful for board

    connections or if a part is not in the part library but the part dimensions are available.

    5hen this tool is selected the top toolbar will give you a large selection of round holes!

    s"uare holes and surface mount pads.

    The place component7 tool allows you to select a component from the top toolbar and then

    by clicking in the workspace places that component in the orientation chosen using the

    buttons ne#t to the component list. The components can always be rotated afterwards with

    the select tool if the orientation is wrong.

    The place trace7 tool allows you to place a solid trace on the board of varying thicknesses.

    The top toolbar allows you to select the top or bottom layer to place the trace on.

    The Insert Corner in trace7 button does e#actly what it says. 5hen this tool is selected!

    clicking on a trace will insert a corner which can be moved to route around components

    and other traces.

    The remove a trace button is not very important since the delete key will achieve the same

    result.

    Department of E.C.E %" S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    64/79

    BlueStooth based security enabled powered devices control system

    *.1.( Desin Considerations:

    Before starting a project there are several ways to design a 1CB and one must be

    chosen to suit the project&s needs.

    %ingle sided! or double sided

    5hen making a 1CB you have the option of making a single sided board! or a

    double sided board. %ingle sided boards are cheaper to produce and easier to etch! but much

    harder to design for large projects. If a lot of parts are being used in a small space it may be

    difficult to make a single sided board without jumper over traces with a cable. 5hile there&s

    technically nothing wrong with this! it should be avoided if the signal travelling over the traces is

    sensitive

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    65/79

    BlueStooth based security enabled powered devices control system1IC compiler is software used where the machine language code is written and

    compiled. fter compilation! the machine source code is converted into he# code which is to be

    dumped into the microcontroller for further processing. 1IC compiler also supports C language

    code.

    It&s important that you know C language for microcontroller which is commonly

    known as )mbedded C. s we are going to use 1IC Compiler! hence we also call it 1IC C. The

    1CB! 1C(! and 1C' are separate compilers. 1CB is for *+$bit opcodes! 1C( is for *-$

    bitopcodes! and 1C' is for *2$bit opcode 1IC microcontrollers. Due to many similarities! all three

    compilers are covered in this reference manual. 3eatures and limitations that apply to only specific

    microcontrollers are indicated within. These compilers are specifically designed to meet the

    uni"ue needs of the 1IC microcontroller. This allows developers to "uickly design applications

    software in a more readable! high$level language. 5hen compared to a more traditional C

    compiler! 1CB! 1C(! and 1C' have some limitations. s an e#ample of the limitations! function

    recursion is not allowed.

    This is due to the fact that the 1IC has no stack to push variables onto! and also

    because of the way the compilers optimi6e the code. The compilers can efficiently implement

    normal C constructs! input;output operations! and bit twiddling operations. ll normal C data types

    are supported along with pointers to constant arrays! fi#ed point decimal! and arrays of bits.

    1IC C is not much different from a normal C program. If you know assembly!writing a C program is not a crisis. In 1IC! we will have a main function! in which all your

    application specific work will be defined. In case of embedded C! you do not have any operating

    system running in there. %o you have to make sure that your program or main file should never

    e#it. This can be done with the help of simple while

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    66/79

    BlueStooth based security enabled powered devices control systemone which is to be programmed. This microcontroller has a program in it written in such a way

    that it accepts the he# file from the pic compiler and dumps this he# file into the microcontroller

    which is to be programmed. s the 1roteus programmer re"uires power supply to be operated! this

    power supply is given from the power supply circuit designed and connected to the

    microcontroller in proteus. The program which is to be dumped in to the microcontroller is edited

    in proteus and is compiled and e#ecuted to check any errors and hence after the successful

    compilation of the program the program is dumped in to the microcontroller using a dumper.

    *.*Procedura" ste&s 3or co'&i"ation si'u"ation and du'&in7

    *.*.1 Co'&i"ation and si'u"ation ste&s:

    3or 1IC microcontroller! 1IC C compiler is used for compilation. The compilation

    steps are as follows7

    9pen 1IC C compiler.

    Qou will be prompted to choose a name for the new project! so create a separate folder

    where all the files of your project will be stored! choose a name and click save.

    Fi *.(.1: Picture o3 o&enin a ne 3i"e usin PIC C co'&i"er

    Click 1roject :ew! and something the bo# named ?Te#t*? is where your code should be

    written later.

    Department of E.C.E %% S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    67/79

    BlueStooth based security enabled powered devices control system

    :ow you have to click ?3ile! %ave as? and choose a file name for your source code ending

    with the letter ?.c?. Qou can name as ?project.c? for e#ample and click save. Then you have

    to add this file to your project work.

    Fi *.(.2: Picture o3 co'&i"in a ne 3i"e usin PIC C co'&i"er

    Fi *.(.(: Picture o3 co'&i"in a &roject.c 3i"e usin PIC C co'&i"er

    Qou can then start to write the source code in the window titled ?project.c? then before

    testing your source codeK you have to compile your source code! and correct eventualsynta# errors.

    Department of E.C.E %& S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    68/79

    BlueStooth based security enabled powered devices control system

    Fi *.(.*: Picture o3 c#ec5in errors and arnins usin PIC C co'&i"er

    By clicking on compile option .he# file is generated automatically.

    This is how we compile a program for checking errors and hence the compiled program is

    saved in the file where we initiated the program.

    Fi *.(.+: Picture o3 .#e 3i"e eistin usin PIC C co'&i"er

    fter compilation! ne#t step is simulation. 'ere first circuit is designed in )#press

    1CB using 1roteus 4 software and then simulation takes place followed by dumping. The

    simulation steps are as follows7

    Department of E.C.E %' S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    69/79

    BlueStooth based security enabled powered devices control system

    9pen 1roteus 4 and click on I%*%2.

    :ow it displays 1CB where circuit is designed using microcontroller. To design circuit

    components are re"uired. %o click on component option.

    *A. :ow click on letter &p&! then under that select 1IC*234, !other components related to theproject and click 9P. The 1IC *234, will be called your /'Target device,which is the final

    destination of your source code.

    *.*.2 Du'&in ste&s:

    The steps involved in dumping the program edited in proteus 4 to microcontroller

    are shown below7

    *. Initially before connecting the program dumper to the microcontroller kit the window isappeared as shown below.

    Fi *.(.,: Picture o3 &rora' du'&er indo

    Department of E.C.E %( S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    70/79

    BlueStooth based security enabled powered devices control system

    +. %elect Tools option and click on Check Communication for establishing a connection as

    shown in below window

    Fi *.(.-: Picture o3 c#ec5in co''unications $e3ore du'&in &rora' into 'icrocontro""er

    ,. fter connecting the dumper properly to the microcontroller kit the window is appeared as

    shown below.

    Fi *.(.8: Picture a3ter connectin t#e du'&er to 'icrocontro""er

    Department of E.C.E &) S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    71/79

    BlueStooth based security enabled powered devices control system

    -. gain by selecting the Tools option and clicking on Check Communication the

    microcontroller gets recogni6ed by the dumper and hence the window is as shown below.

    Fi *.(.9: Picture o3 du'&er reconition to 'icrocontro""er

    . Import the program which is .he#& file from the saved location by selecting 3ile option and

    clicking on Import 'e#& as shown in below window.

    Fi *.(.1>: Picture o3 &rora' i'&ortin into t#e 'icrocontro""er

    Department of E.C.E &1 S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    72/79

    BlueStooth based security enabled powered devices control system

    2. fter clicking on Import 'e#& option we need to browse the location of our program and click

    the prog.he#& and click on open& for dumping the program into the microcontroller.

    Fi *.(.11: Picture o3 &rora' $rosin #ic# is to $e du'&ed

    4. fter the successful dumping of program the window is as shown below.

    Department of E.C.E &! S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    73/79

    BlueStooth based security enabled powered devices control systemFi *.(.12: Picture a3ter &rora' du'&ed into t#e 'icrocontro""er

    CHAPTER +: PROECT DE0CRIPTION

    In this chapter! schematic diagram and interfacing of 1IC*234, microcontroller with each

    module is considered.

    Fi+.1: 0c#e'atic diara' o3 B!"uetoot# $ased securit% ena$"ed &oered devices contro"

    s%ste')

    The above schematic diagram of !"uetoot# $ased securit% ena$"ed &oered devices

    contro" s%ste'e#plains the interfacing section of each component with micro controller and

    Bluetooth module. Crystal oscillator connected to @th and *Ath pins of micro controller and

    regulated power supply is also connected to micro controller and L)D&s also connected to micro

    controller through resistors.

    Thedetailed e#planation of each module interfacing with microcontroller is as follows7

    Department of E.C.E &" S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    74/79

    BlueStooth based security enabled powered devices control system

    CHAPTER ,: RE0U6T0

    ,.1 Resu"t:

    The project /!"uetoot# $ased securit% ena$"ed &oered devices contro" s%ste'0

    was designed such that controlling operation of the home appliances can be done using Bluetooth

    technology.

    ,.2 Conc"usion:

    Integrating features of all the hardware components used have been developed in it.

    1resence of every module has been reasoned out and placed carefully! thus contributing to the best

    working of the unit. %econdly! using highly advanced IC&s with the help of growing technology!

    the project has been successfully implemented. Thus the project has been successfully designed

    and tested.

    ,.( Future 0co&e:

    9ur project /!"uetoot# $ased securit% ena$"ed &oered devices contro" s%ste'0

    is mainly intended to control the 9:;933 operations of electrical appliances like fans! lights by

    using Bluetooth module. The input is given by the user using 1C to which Bluetooth is connected.

    Bluetooth module interfaced to micro controller receives the input and in turn operates switches

    like 8elay and Triac accordingly to which the electrical appliances are connected. The input value

    to the micro controller will be checked and respective operation of that key will be performed like

    switching 9:;933 a light.

    The main disadvantage of this project is that the range of Bluetooth is limited.

    This drawback can be eliminated by introducing a %( module! through which the devices can be

    operated from anywhere in the world and it is also possible to get the status of the devices.

    This system can be e#tended by using wireless Wigbee technology to operate the

    devices from longer distances.

    Department of E.C.E S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    75/79

    BlueStooth based security enabled powered devices control system

    CHAPTER -: EPERI/ENTA6 RE0U6T0

    Fi -.1: EPERI/ENTA6 GIT ITH OUT OPERATION

    Department of E.C.E &$ S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    76/79

    BlueStooth based security enabled powered devices control system3ig 4.+7 )E1)8I():TL PIT 5IT' 9:) BLB 9:

    3ig 4.,7 )E1)8I():TL PIT 91)8T)D BQ BL)T99T' (9BIL)

    Department of E.C.E &% S.K.DEngineering College, ooty.

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    77/79

    BlueStooth based security enabled powered devices control system

    REFERENCE0:

    The sites which were used while doing this project7

    *. www.wikipedia.com

    +. www.allaboutcircuits.com

    ,. www.microchip.com

    -. www.howstuffworks.com

    . 5ww. Bluetooth.com

    !oo5s Re3erred:

    *. 8aj kamal (icrocontrollers rchitecture! 1rogramming! Interfacing and %ystem Design.

    +. (a6idi and (a6idi )mbedded %ystems.

    ,. 1CB Design Tutorial David.L.Fones.

    -. 1IC (icrocontroller (anual (icrochip.

    . )mbedded C (ichael.F.1ont.

    Department of E.C.E && S.K.DEngineering College, ooty.

    http://www.wikipedia.com/http://www.allaboutcircuits.com/http://www.microchip.com/http://www.howstuffworks.com/http://www.wikipedia.com/http://www.allaboutcircuits.com/http://www.microchip.com/http://www.howstuffworks.com/
  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    78/79

    BlueStooth based security enabled powered devices control system

    APPENDI

    Prora' Code:

    The program code which is dumped in the microcontroller of our project is

    shown below.

    include *234,.hX ;;microcontroller used

    use delay

  • 8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System

    79/79

    BlueStooth based security enabled powered devices control systembreakK

    case ?+?7

    outputlow