50
1 CHAPTER 1 INTRODUCTION Public transportation is provided by the Government as a public service, and its service quality directly impacts on the travel convenience of the public. As a result, punctual arrival stations of the buses and accurate reporting stations name are important tasks. At present,  punctuality of buses can be guaranteed because some employee monitor the states of buses operating and adjust the departure time of buses rationally at the bus start station and bus terminal. But it is difficult to monitor the punctuality of buses via the intermediate stations . The purpose of the project is to develop an Intelligent Bus management system. Punctual arrival stations of the buses and accurate reporting stations name are important tasks. To solve the question mentioned above, we should obtain the arrival time of buses at intermediate stations in time. However, these bus stations are distributed in whole city, vehicles are moving from one place to another ceaselessly, the buses arrival time at intermediate stations are stochastic. Consequently, the wireless technology should be applied in the intelligent public transport management system in order to monitoring the buses operation states. Recently, a method is to use GPS system to monitor the movement of buses, and then use SMS to send the vehicle location information to the monitoring center. However, it is difficult to apply the technology in large scale because of the higher the cost of GPS systems. In fact, we need not to care about the movement process of buses, but concentrate on the buses arrival time or the departure time at stations. In addition, the bus driver report station name by pressing a button at present that may misguide passengers when a mistake occurred. Most bus station follows fixed schedules, and don’t uses intelligent systems for vehicle tracking and control. Many supervisors are deployed at the station to control the entrance and the exit of buses and prepare the trip sheets containing the schedules manually which is time consuming and inaccurate. Moreover, transport departments have no visibility over utilization of its fleet on real-time, which results in underutilization of resources. So, all these naturally results in avoidable stress, costly errors and sub cost optimal fleet utilization and finally dissatisfaction and inconvenience to millions of commuters. The provision of timely and accurate transit travel time information is so important.

New Report - Copy

Embed Size (px)

DESCRIPTION

report

Citation preview

  • 1

    CHAPTER 1

    INTRODUCTION

    Public transportation is provided by the Government as a public service, and its service

    quality directly impacts on the travel convenience of the public. As a result, punctual arrival

    stations of the buses and accurate reporting stations name are important tasks. At present,

    punctuality of buses can be guaranteed because some employee monitor the states of buses

    operating and adjust the departure time of buses rationally at the bus start station and bus

    terminal. But it is difficult to monitor the punctuality of buses via the intermediate stations.

    The purpose of the project is to develop an Intelligent Bus management system. Punctual

    arrival stations of the buses and accurate reporting stations name are important tasks. To

    solve the question mentioned above, we should obtain the arrival time of buses at

    intermediate stations in time. However, these bus stations are distributed in whole city,

    vehicles are moving from one place to another ceaselessly, the buses arrival time at

    intermediate stations are stochastic. Consequently, the wireless technology should be applied

    in the intelligent public transport management system in order to monitoring the buses

    operation states. Recently, a method is to use GPS system to monitor the movement of buses,

    and then use SMS to send the vehicle location information to the monitoring center.

    However, it is difficult to apply the technology in large scale because of the higher the cost of

    GPS systems. In fact, we need not to care about the movement process of buses, but

    concentrate on the buses arrival time or the departure time at stations. In addition, the bus

    driver report station name by pressing a button at present that may misguide passengers when

    a mistake occurred.

    Most bus station follows fixed schedules, and dont uses intelligent systems for vehicle

    tracking and control. Many supervisors are deployed at the station to control the entrance and

    the exit of buses and prepare the trip sheets containing the schedules manually which is time

    consuming and inaccurate. Moreover, transport departments have no visibility over utilization

    of its fleet on real-time, which results in underutilization of resources. So, all these naturally

    results in avoidable stress, costly errors and sub cost optimal fleet utilization and finally

    dissatisfaction and inconvenience to millions of commuters. The provision of timely and

    accurate transit travel time information is so important.

  • 2

    New technology provide a smart solution managing the bus schedule in the bus stations

    and offering helpful information to passengers. The problems such as underutilization of

    buses fleet and long waiting time at the bus station will be reduced. So, both passenger and

    bus station administrators will benefit from the system as real time information are provided

    1.1 Objectives Of The System

    The objectives of the thesis are:

    1. To study the various wireless technologies that can be used for bus management

    2. Design a best system for intelligent bus management that overcomes the

    disadvantages of existing systems.

    3. Study and implementation of zigbee technology

    4. Implementation of Intelligent public transport management system using zigbee and

    GSM/GPRS

    1.2 Organization Of The Chapters

    The thesis has been organized as follows: Chapter 2 describes about the existing technologies

    for bus management and its drawbacks. Chapter 3 describes the research method employed.

    The structure of the bus management system and the block diagram explanation of the

    subsystems and operation of the system are presented in Chapter 4. The hardware section is

    presented in chapter 5. Chapter 6 deals with the protocol stack and architecture of zigbee.

    chapter 7 presents the software section with flowcharts of the relevant subsystems. The

    simulations results are in chapter 8. Chapter 9 concludes the thesis. More details about GSM

    modem,features of ARM and its peripherals,MCB development board,details of developing

    tool and details of zigbee are presented in appendix.

  • 3

    CHAPTER 2

    BACKGROUND INFORMATIN AND LITERATURE SURVEY

    Existing wireless identification technologies used for Intelligent Public Transport

    Management include Global Positioning System (GPS) and RFID based bus management system

    2.1 GPS (Global Positioning System)

    Global Positioning System (GPS) has three components namely

    1. The space segment: consisting of 24 satellites orbiting the Earth at an altitude of

    11000 nautical miles.

    2. The user segment: consisting of a receiver, which is mounted on the unit whose

    location has to be determined.

    3. The control segment: consists of various ground stations controlling the satellites.

    The system have permitted civilian use of the satellite signals. Each satellite generates

    radio signals that allow a receiver to estimate the distance between the satellite and the

    receiver. The receiver then uses these measurements to calculate its own location with

    reference to Earth in terms of coordinates expressed in latitude and longitude. Thus the

    receiver continuously records its coordinates at given time intervals. This data, which is

    continuously recorded, can be stored in a memory module along with the receiver, or it can

    also be transmitted instantaneously to the central facility. The former would be an off-line

    system and the latter an on-line system.

    Fig (2.1) Twenty Four Satellites of GPS

  • 4

    2.1.1Accuracy Of GPS

    GPS has two positioning services:

    1. Precise Positioning Service (PPS)

    2. Standard Positioning Service (SPS).

    PPS is used by authorized users such as U.S. and Allied military while SPS is used by

    civilian users worldwide. The accuracy of PPS was within 22 meters, and the accuracy of

    SPS was within 100 meters. To improve the accuracy of SPS, an additional correction

    (differential) signal was added, and is called Differential GPS (DGPS). The accuracy of

    DGPS was better than 10 meters. The SPS accuracy was dramatically improved when the US

    military removed the intentional degradation to the signal. Currently the accuracy of PPS and

    SPS are the same. The current accuracy of GPS is between 10 and 20 meters, and that of

    DGPS is between 3 and 5 meters.

    2.1.2 Limitations Of GPS System

    i. Higher the cost of GPS system

    ii. Sometimes the GPS may fail due to certain reasons and in that case we need to carry a

    backup map and directions.

    iii. Requires external power supply in case of battery failure

    iv. Sometimes the GPS signals are not accurate due to some obstacles to the signals such as

    buildings, trees and sometimes by extreme atmospheric conditions such as geomagnetic

    storms.

    v. The bus driver report station name by pressing a button at present that may misguide

    passengers when a mistake occurred.

    2.2 RFID

    Radio-frequency identification (RFID) is the use of a wireless non-contact system that

    uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object,

    for the purposes of automatic identification and tracking.

    Traditional RFID system consists of three main components

  • 5

    Fig(2.2) general RFID architecture

    1.RFID Reader: sends an electromagnetic wave which carries a signal to identify objects.

    Then, the reader receives the information returned back by these objects.

    2.RFID tag: attached to these objects, reacts to receiving the signal sent by the reader in

    order to forwarding to it the requested information.

    3. A computer/database: stores and processes information collected by the reader.

    Traditional RFID readers are imitated in their mobility and their potential applications they

    are usually connected to the host application via a serial port or via Ethernet.

    Some tags require no battery and are powered by the electromagnetic fields used to read

    them. Others use a local power source and emit radio waves (electromagnetic radiation at

    radio frequencies). The tag contains electronically stored information which can be read from

    up to several meters (yards) away. Unlike a bar code, the tag does not need to be within line

    of sight of the reader and may be embedded in the tracked object.

    A radio-frequency identification system uses tags, or labels attached to the objects to be

    identified. Two-way radio transmitter-receivers called interrogators or readers send a signal

    to the tag and read its response. The readers generally transmit their observations to a

    computer system running RFID software or RFID middleware.

    The tag's information is stored electronically in a non-volatile memory. The RFID tag

    includes a small RF transmitter and receiver. An RFID reader transmits an encoded radio

    signal to interrogate the tag. The tag receives the message and responds with its identification

    information. This may be only a unique tag serial number, or may be product-related

    information such as a stock number, lot or batch number, production date, or other specific

    information.

  • 6

    RFID tags can be either passive, active or battery assisted passive. An active tag has an

    on-board battery and periodically transmits its ID signal. A battery assisted passive (BAP)

    has a small battery on board and is activated when in the presence of a RFID reader. A

    passive tag is cheaper and smaller because it has no battery. Instead, the tag uses the radio

    energy transmitted by the reader as its energy source. The interrogator must be close for RF

    field to be strong enough to transfer sufficient power to the tag. Since tags have individual

    serial numbers, the RFID system design can discriminate several tags that might be within the

    range of the RFID reader and read them simultaneously.

    Figure(2.3) Schematic Representation of RFID Technology

    Tags may either be read-only, having a factory-assigned serial number that is used as a

    key into a database, or may be read/write, where object-specific data can be written into the

    tag by the system user. Field programmable tags may be write-once, read-multiple; "blank"

    tags may be written with an electronic product code by the user. RFID tags contain at least

    two parts: an integrated circuit for storing and processing information, modulating and

    demodulating a radio-frequency (RF) signal, collecting DC power from the incident reader

    signal, and other specialized functions; and an antenna for receiving and transmitting the

    signal. Fixed readers are set up to create a specific interrogation zone which can be tightly

    controlled. This allows a highly defined reading area for when tags go in and out of the

    interrogation zone. Mobile readers may be hand-held or mounted on carts or vehicles.

  • 7

    2.2.1Disadvantages Of RFID System

    (i) Though it is very beneficial, it quite is expensive to install.

    (ii) It is difficult for an RFID reader to read the information in case of RFID tags installed in

    liquids and metal products. The problem is that the liquid and metal surfaces tend to reflect

    the radio waves, which makes the tags unreadable.

    (iii) Interference has been observed if devices such as forklifts and walkies-talkies are in the

    vicinity of the distribution centres. The presence of mobile phone towers has been found to

    interfere with RFID radio waves.

    Thereby we develop an Intelligent Traffic Management System based on Zigbee and

    GSM/GPRS in order to solve these disadvantages of GPS and RFID systems.

  • 8

    CHAPTER 3

    RESEARCH METHOD

    The main idea of our research is to integrate Zigbee technology and GSM to build an

    intelligent bus tracking system. Two scenarios of integration have been implemented. In the

    first one, we have extended the read range of the Zigbee system by adding wireless facility to

    Zigbee readers. Each Zigbee reader is equipped with a wireless module which can transmit

    data to and from the reader. Zigbee reader acts as sensor node: it reads the identification of an

    object and sends it to the host application via an ad-hoc network. The second scenario of

    integration provides Zigbee readers with sensing ability. Several motion sensors are installed

    near each reader to detect the presence of a tagged object and to command the reader activity.

    This approach is tested through an application which can track buses traffic in the bus

    station. Here we interface Zigbee with the GSM module. When designing this system, the

    following constraints have been considered:

    Modularity and expandability constraints: the system must be modular in design. Both

    hardware and software should be divided into small components or modules to ensure

    easy scalability for further feature expansions. Modules must be produced independently

    from each other, so that changes or the crash of one module cannot affect the other ones.

    Economic constraint: We should take into account performance to cost ratio so as to

    design a cost-effective solution.

    Environmental constraint: In our design and implementation, we should keep in mind the

    Impact on environment. Low power consumption devices should be used to keep

    the power of the system very low. Energy optimization should be involved in all the

    designs steps.

  • 9

    CHAPTER 4

    SYSTEM STRUCTURE

    The system we designed comprises of the electronic

    boards at stations,

    the wireless identifier installed in buses

    the monitoring software operated in PC.

    Fig(4) structure of bus management system

    The electronic modules used in the project is,

    XBee/XBee PRO RF Modules

    XBee End device

    XBee Cordinator

    ARM Microcontroller ARM 7 Microcontroller board

    GSM/GPRS Modem

    And finally the server with database.

  • 10

    Block Diagrams

    The two main subsystems are wireless identifier & station monitor. The block diagrams

    are shown below:

    4.1 Block Diagram Of Wireless Identifier

    Fig(4.1) block diagram of wireless identifier

    The function of the zigee end device installed in bus is to communicate with the zigbee

    coordinator of the station monitor. The end device has a unique ID and it respond to the RF

    signals from the zigbee coordinator.

    Zigbee device and LCD is interfaced through the ARM microcontroller.

    LCD display helps the passengers by displaying the bus route and by displaying the

    station name automatically when the bus enters the station.

    4.2 Block Diagram Of Station Monitor

    Fig(4.2) block diagram of station monitor

    Zigbee coordinator communicate with the zigbee end device. It tracks the bus and sends

    the corresponding information to the bus server.

    The controller used in the station is the ARM7TDMI family32 bit microcontroller.it is

    serially interfaced with the zigbee coordinator.

    GSM module is used for the messaging purpose.the relevant informations such as bus ID,

    arrival time and leaving time of bus from the station are send to the main server.

    Zigbee end device ARM

    microcontroller

    LCD display

    Zigbee

    coordinator

    ARM

    microcontroller

    GSM/GPRS

    module

    LCD display

  • 11

    LCD display of the station monitor displays the bus ID,route and bus arrival time and

    leaving time.

    4.3 Operation Of The System

    To monitor the runing of buses and improving the punctuality of buses at intermediate

    stations, we shoud obtain the accurate arrival time, and send this information to the

    company's monitoring center. So, we need not to use the expensive GPS sytem to positioning

    their locations. Here, we combine the technology of ZigBee with GSM/GPRS to monitor the

    arrival or departure time of buses at stations and report bus stations automatically.

    The electronic board of each bus station consists of a station monitor, GSM

    communication module and the LCD display. Here, the station monitor is a ZigBee

    coordinator which can accept the request from other ZigBee devices to join the network, and

    can identify every device configured with ID.

    At the same time, we install the wireless identifier device in every bus. When the system

    is operating, the station monitor transmit beacon frame continuously. The wireless identifier

    in buses can receive the beacon frame which include relevant information about this bus

    station, when buses approach the station. Then the bus can report the station name

    automatically. Meanwhile, it send itself information to the station monitor, and the monitor

    obtain the information about bus ID , arrival time and the license plate number of bus. Those

    information can be transmitted back the company's monitoring center by GSM/GPRS system.

    After the bus depart from the station, the station monitor also transmit the message-----"XX

    bus has left the station" to the center. At the same time, the center send this message to next

    station's electronic board and display "XX bus has left YY station, arriving this station at ZZ

    time" on the LCD. That can provide convenience for passengers waiting. The monitoring

    centre can be in control of the operation of each bus accurately to guarantee its punctuality.

    ZigBee's effective operating range is only tens of meters, and it can estimate the distance

    between the vehicle and the platform according to the signal strength. As a result, the monitor

    can be aware of the bus arrival only when the bus reaches near the station. In addition, the

    system can also operate smoothly when many buses approach the same station, because

    ZigBee coordinator allow ZigBee devices to connect with it. The whole system's cost is very

    low because it has a few of station monitors and low cost wireless identifiers.

  • 12

    CHAPTER 5

    THE HARDWARE DESIGN

    Hardware design of the station monitor.

    1. The STATION MONITOR consist of,

    i. Microcontroller unit (ARM7 )

    ii. XBee Coordinator Module

    iii. GSM/GPRS module

    Same modules are used for each station

    The wireless identifier and station monitor comprises of XBee module. Of the XBee

    module, one is XBee coordinator and other is XBee end device which is located in bus

    (Wireless Identifier)

    The XBee coordinator is interfaced to the microcontroller through serial interface, the

    XBee information is extracted in the microcontroller, it is manipulated there in accordance

    with the format and the corresponding data ie, the bus information and the station information

    is sent to the main server through GSM/GPRS module.

    Similarly, information from the server about the bus arrival is also send to corresponding

    bus station and the arrival time is also displayed on the LCD panel for information of bus

    travellers.

    5.1 Microcontroller

    ARM Microcontroller used in the station is ARM7TDMI family 32-bit microcontroller

    LPC2388 which offers high performance and very low power consumption. The ARM

    architecture is based on Reduced Instruction Set Computer (RISC) principle and results in a

    high instruction throughput and impressive real-time interrupt response from a small and cost

    effective processor core. Pipeline techniques are employed so that all parts of the processing

    and memory systems can operate continuously. Typically, while one instruction is being

    executed, its successor is being decoded and a third instruction is being fetched from

    memory. In this project ARM microcontroller is serially interfaced with zigbee module and

    GSM module.

  • 13

    5.2)Xbee Coordinator Module

    The coordinator is the most capable device that maintains the overall network knowledge.

    It forms the root of the network tree and might bridge to other networks. It is the coordinator

    which tracks the bus and send the corresponding information to the bus server. Physical layer

    provide the information of link quality which can determine the distance between a receiver

    and a sender. The communication distance is usally about tens of meters.

    At present, many manufacturers developed the design platform for ZigBee technology. In

    this project we are using the Zigbee solution provided by Maxstream XBee/XBee PRO

    OEM RF Modules 802.15.4.The XBee and XBee-PRO OEM RF Modules were engineered

    to meet IEEE 802.15.4 standards and support the unique needs of low-cost, low-power

    wireless sensor networks. The modules require minimal power and provide reliable delivery

    of data between devices. The modules operate within the ISM 2.4 GHz frequency band and

    are pin-for-pin compatible with each other.

    It utilizes direct-sequence spread spectrum modulation and operates on a fixed channel. A

    total of 27 channels numbered 0 to 26 are available per channel page. As a result, the

    flexibility of ZigBee application can be improved greatly because several different ZigBee

    networks in the same area can coexist with each other by selecting different channels.

    Comparing with other network technology, the protocol stack of ZigBee network is more

    simple and only 32KB flash memory consumption

    UART Data Flow

    Zigbee module is connected to the microcontroller by the serial interface.Serial Data

    Devices that have a UART interface can connect directly to the pins of the RF module as

    shown in the figure below.

  • 14

    Fig(5.1). System Data Flow Diagram in a UARTinterfaced environment (Lowasserted signals distinguished

    with horizontal line over signal name.)

    Data enters the module UART through the DI pin as an asynchronous serial signal. The

    signal should idle high when no data is being transmitted. Each data byte consists of a start

    bit (low), 8 data bits (least significant bit first) and a stop bit (high).

    5.3)Gsm Modem

    GSM stands for Global System for Mobile Communication and is an open, digital cellular

    technology used for transmitting mobile voice and data services.The GSM Modem is the part

    responsible for communication ie, here messaging purpose. GSM is a digital wireless

    network standard. It provides a common set of compatible services and capabilities to all

    GSM mobile users. The services and security features to subscribers are subscriber identity

    confidentiality, subscriber identity authentication, user data confidentiality on physical

    connections, connectionless user data confidentiality and signalling information element

    confidentiality.

    A GSM modem is a specialized type of modem which accepts a SIM card, and operates

    over a subscription to a mobile operator, just like a mobile phone. From the mobile operator

    perspective, a GSM modem looks just like a mobile phone. When a GSM modem is

    connected to a computer, this allows the computer to use the GSM modem to communicate

    over the mobile network. While these GSM modems are most frequently used to provide

    mobile internet connectivity, many of them can also be used for sending and receiving SMS

    and MMS messages. A GSM modem can be a dedicated modem device with a serial, USB or

  • 15

    Bluetooth connection, or it can be a mobile phone that provides GSM modem capabilities.

    The GSM is a circuit-switched system that divides each 200kHz channel into eight 25kHz

    time-slots. GSM operates in the 900MHz and 1.8GHz bands in Europe and the 1.9GHz and

    850MHz bands in the US. The GSM makes use of narrowband Time Division Multiple

    Access (TDMA) technique for transmitting signals.

    Fig(5.2)GSM Modem

    Advantages Of Gsm

    Improved spectrum efficiency

    International roaming

    Low-cost mobile sets and base stations (BSs)

    High-quality speech

    Compatibility with Integrated Services Digital Network (ISDN) and other telephone

    company services

    Support for new services

    5.4 Wireless Identifier

    This unit as stated above is powered from the bus and carries limited functionality for

    lowering the cost and complexity of the system. The device has just enough functionality to

    talk to its parent node ie, the coordinator. There is no problem for power supply because the

    monitor installated in station. However, in case of power supply failed, we should take the

    capacity of rechargeable battery into account carefully, since GSM/GPRS module would

    consume energy a lot. In addition, we should solve the problem of the RF interference

  • 16

    between GPRS module and ZigBee device in the hardware. The structure of wireless

    identifier circuit equipped in bus is really simple.

    Figure(5.3) Wireless Identifier in bus

    5.5 Server

    This part is entirely software which can be developed using JAVA technology. This

    requires a database connection which can be ORACLE. The server also requires a

    GSM/GPRS connection through which data send by the station monitor is extracted and

    corresponding checking of information is done using the database. Then the next location of

    corresponding bus is obtained and information is sent to next location

  • 17

    CHAPTER 6

    ZIGBEE

    ZigBee is a specification for a suite of high level communication protocols using small,

    low-power digital radios based on an IEEE 802 standard for personal area networks. ZigBee

    devices are often used in mesh network form to transmit data over longer distances, passing

    data through intermediate devices to reach more distant ones. This allows ZigBee networks to

    be formed ad-hoc, with no centralized control or high-power transmitter/receiver able to

    reach all of the devices. Any ZigBee device can be tasked with running the network.

    Fig (6.1)zigbee module

    ZigBee is targeted at applications that require a low data rate, long battery life, and secure

    networking. ZigBee has a defined rate of 250 kbit/s, best suited for periodic or intermittent

    data or a single signal transmission from a sensor or input device. Applications include

    wireless light switches, electrical meters with in-home-displays, traffic management systems,

    and other consumer and industrial equipment that requires short-range wireless transfer of

    data at relatively low rates. The technology defined by the ZigBee specification is intended to

    be simpler and less expensive than other WPANs, such as Bluetooth.

    A coordinator in ZigBee network can be used to initiate, terminate, or route

    communication around the network. The coordinator is the primary controller of the network.

    ZigBee devices can also apply to join or leave the network. Physical layer provide the

  • 18

    information of link quality which can determine the distance between a receiver and a sender.

    The communication distance is usually about tens of meters. To monitoring the running of

    buses and improving the punctuality of buses at intermediate stations, we should obtain the

    accurate arrival time, and send this information to the company's monitoring centre. Note

    that, our concern here is the time of the bus arriving the stations; we are not interesting in

    their position and their travel time between stations. So, we need not to use the expensive

    GPS system to positioning their locations. Here, we combine the technology of ZigBee with

    GSM/GPRS to monitor the arrival or departure time of buses at stations and report bus

    stations automatically.

    6.1 Protocols

    The protocols build on recent algorithmic research (Ad-hoc On-demand Distance Vector,

    neuRFon) to automatically construct a low-speed ad-hoc network of nodes. In most large

    network instances, the network will be a cluster of clusters. It can also form a mesh or a

    single cluster. The current ZigBee protocols support beacon and non-beacon enabled

    networks.

    Fig(6.2)zigbee protocol stack

    In non-beacon-enabled networks, an unslotted CSMA/CA channel access mechanism is

    used. In this type of network, ZigBee Routers typically have their receivers continuously

    active, requiring a more robust power supply. However, this allows for heterogeneous

  • 19

    networks in which some devices receive continuously, while others only transmit when an

    external stimulus is detected. The typical example of a heterogeneous network is a wireless

    light switch: The ZigBee node at the lamp may receive constantly, since it is connected to the

    mains supply, while a battery-powered light switch would remain asleep until the switch is

    thrown. The switch then wakes up, sends a command to the lamp, receives an

    acknowledgment, and returns to sleep. In such a network the lamp node will be at least a

    ZigBee Router, if not the ZigBee Coordinator; the switch node is typically a ZigBee End

    Device.In beacon-enabled networks, the special network nodes called ZigBee Routers

    transmit periodic beacons to confirm their presence to other network nodes. Nodes may sleep

    between beacons, thus lowering their duty cycle and extending their battery 15 life. Beacon

    intervals depend on data rate; they may range from 15.36 milliseconds to 251.65824 seconds

    at 250 kbit/s, from 24 milliseconds to 393.216 seconds at 40 kbit/s and from 48

    millisecondsto 786.432 seconds at 20 kbit/s. However, low duty cycle operation with long

    beacon intervals requires precise timing, which can conflict with the need for low product

    cost.

    In general, the ZigBee protocols minimize the time the radio is on, so as to reduce power

    use. In beaconing networks, nodes only need to be active while a beacon is being transmitted.

    In non-beacon-enabled networks, power consumption is decidedly asymmetrical: some

    devices are always active, while others spend most of their time sleeping .

    6.2 ZIGBEE/IEEE 802.15.4 General Characteristics

    1) Dual PHY (2.4GHz and 868/915 MHz) , Data rates of 250 kbps (@2.4 GHz), 40 kbps

    (@ 915 MHz), and 20 kbps (@868 MHz) , Optimized for low duty-cycle applications

    (

  • 20

    6.3 Zigbee Network And Architecture

    The Co-ordinator is responsible for starting a ZigBee network. Network initialization

    involves the following steps:

    1. Search for a Radio Channel-The Co-ordinator first searches for a suitable radio

    channel (usually the one which has least activity). This search can be limited to those

    channels that are known to be usable - for example, by avoiding frequencies in which

    it is known that a wireless LAN is operating.

    2. Assign PAN ID- The Co-ordinator starts the network, assigning a PAN ID (Personal

    Area Network identifier) to the network. The PAN ID can be pre-determined, or can

    be obtained dynamically by detecting other networks operating in the same frequency

    channel and choosing a PAN ID that does not conflict with theirs.At this stage, the

    Co-ordinator also assigns a network (short) address to itself. Usually, this is the

    address 0x0000.

    3. Start the Network- The Co-ordinator then finishes configuring itself and starts itself in

    Co-ordinator mode. It is then ready to respond to queries from other devices that wish

    to join the network.

    Fig(6.3) Layered Architecture of Zigbee

  • 21

    6.4 Forming A Zigbee Security Architecture

    ZigBee uses 128-bit keys to implement its security mechanisms. A key can be associated

    either to a network, being usable by both ZigBee layers and the MAC sub layer, or to a link,

    acquired through pre-installation, agreement or transport. Establishment of link keys is based

    on a master key which controls link key correspondence. Ultimately, at least the initial

    masterkey must be obtained through a secure medium (transport or pre-installation), as the

    security of the whole network depends on it. Link and master keys are only visible to the

    application layer. Different services use different one way variations of the link key in order

    to avoid leaks and security risks.

    Key distribution is one of the most important security functions of the network. A secure

    network will designate one special device which other devices trust for the distribution of

    security keys: the trust center. Ideally, devices will have the trust center address and initial

    master key preloaded; if a momentary vulnerability is allowed, it will be

    sent as described above. Typical applications without special security needs will use a

    network key provided by the trust center (through the initially insecure channel) to

    communicate.

    Thus, the trust center maintains both the network key and provides point-to-point

    security. Devices will only accept communications originating from a key provided by the

    trust center, except for the initial master key. The security architecture is distributed among

    the network layers as follows:

    1) The MAC sub layer is capable of single-hop reliable communications. As a rule, the

    security level it is to use is specified by the upper layers.

    2) The network layer manages routing, processing received messages and being capable

    of broadcasting requests. Outgoing frames will use the adequate link key according to

    the routing, if it is available; otherwise, the network key will be used to protect the

    payload from external devices.

    3) The application layer offers key establishment and transport services to both ZDO and

    applications. It is also responsible for the propagation across the network of change

    in devices within it, which may originate in the devices themselves (for instance, a

  • 22

    simple status change) or in the trust manager (which may inform the network that a

    certain device is to be eliminated from it). It also routes requests from devices to the

    trust center and network key renewals from the trust center to all devices. Besides

    this, the ZDO maintains the security policies of the device. The security levels

    infrastructure is based on CCM*, which adds encryption- and integrity-only features

    to CCM.

  • 23

    CHAPTER 7

    SOFTWARE DESIGN

    The system software includes the application software and the ZigBee protocol

    software. Two development methods are provided by TI corporation. One is only a simple

    application which takes advantage of MAC layer operation supported by IEEE802.15.4

    hardware. Another is a complete ZigBee implementation which includes the function of

    network layer and application layer. The API functions of physical layer and MAC layer are

    provided by those schemes. We only call those functions when implement the ZigBee

    protocol stack. TI corporation offer some design examples in datasheet which can help to

    implement our application design.

    The software that can run on a simple multi-tasking operating systems, various tasks are

    scheduled by the operating system to complete the specific application. Each task has two C

    language function, one is the initialization function, another is the event handle fuction. Most

    applications can be extended by modifying source code of these examples. There are two

    modification methods,adding a new task or increasing an event in the existing task. In order

    to avoiding the collision between an existing event and a new event, we should think before

    doing that carefully. In addition, this operating system is non-preemptive but order

    scheduling, so the time of handling an event should not be taken up too much. We implement

    our design by increasing a new event in a task.

    The station monitor itself is a ZigBee network coordinator which configured with a

    GSM module. When we tum on the device power supply, the GSM/GPRS module and

    ZigBee protocol stack would be initialized by MCV. Then the station monitor can use a

    channel scan to measure the energy on the channel. Before starting a new network, the results

    of a channel scan can be used to select an appropriate logical channel and channel page, as

    well as the network identifier that is not being used by any other network in the area. The

    superframe is bounded by network beacons sent by the ZigBee coordinator and then waiting

    for the connection requestes from ZigBee devices. The coordinator should first confirm their

    validity when it receives the connection requestes from ZigBee devices to join the network,

    and then send the connection permission command. Once the connection established, the

    station monitor can obtain the device identifier and register it in the list. At the same time, the

    monitor send the message "XX bus YY clock arrive ZZ station" to monitoring center. Of

  • 24

    course, the station monitor allow a lot of devices to connect with it at one time and register

    them in the list. When monitor receives the disconnection request from a bus, itdelete the bus

    information from the list, and then send the message "XX bus leave YY station". The flow

    chart of station monitor is as follows:

    Fig(7.1) flowchart of station monitor

    The wireless identifier installed in the bus is a ZigBee device too. When power supply is

    on, the ZigBee protocol stack is initialized, then the wireless idetifier begin to scan channel

    GSM init

    Zigbee init

    Init PAN

    Connect

    request?

    Valid

    request

    Register the bus

    connect

    Send msg with GSM/GPRS

    Disconn

    ect

    request?

    Disconnect

    Delete registered bus

    Begin

    Begin

  • 25

    and look for a ZigBee coordinator. After detecting the superframe which is transmitted by the

    coordinator, the identifier requestes to communicate with the coordinator. The Flow chart of

    wireless idetifier is as follows:

    no

    yes

    no

    yes

    Fig(7.2) Flowchart Of Wireless Identifier

    When the connection is established, it would obtain theinformation about the station

    monitor. Meanwhile, it can report the name of the bus station automatically. Once the bus

    depart from the station, the signal strength is low than a certain level, the bus send the

    disconnection request to the station monitor

    Begin

    Zigbee init

    Found a

    cooperat

    or?

    Request connect

    Report station

    RSSI

    value is low?

    Disconnect

  • 26

    CHAPTER 8

    SIMULATION RESULTS

    Step I: The code is opened in Keil Microvision IDE and the following operations are done:

    Translate Current File

    Built Target

    Start/Stop Debug Session

    Run

    fig(8.1)simulation result 1

  • 27

    Step II: the zigbee coordinator sending beacon frames containing the information about

    station that is displayed in the bus when the zigbee end device is detected.

    In the figure below EKLM is the station name transmitted.

    Fig 8.2: Simulation ResultII

  • 28

    Step III: When any Zigbee end device comes in the range of the beacon frame transmitted by the

    zigbee coordinator, it receives the frame and send request to the station or the zigbee coordinator

    to establish connection. Here the beacon frame EKLM is given as input into the UART#1windo

    of ARM microcontroller associated with the bus.

    Fig( 8.3): Simulation ResultIII

  • 29

    Step IV: 10-bit ID of the wireless bus identifier stored in the program is given as input to

    UART #2 window in the format CTRL +Enter, 10-bit unique ID, Enter

    Fig (8.4): Simulation ResultIV

    Current station name, 3-bit bus ID and route of the bus is displayed in the LCD of Keil

    software and 3-bit bus ID, current station name and bus entering time is displayed in the UART

    #1 window.

  • 30

    Step V: Bus leaving is programmed in the code as an Interrupt. So pin 2.10 of General Purpose Input/Output

    (GPIO 2) Interrupts is activated.

    Fig( 8.5): Simulation ResultV

    3-bit bus ID, current station name and bus leaving time is displayed in the UART #1 window.

  • 31

    CHAPTER 9

    CONCLUSIONS

    In accordance with the situation of the public transportmanagement system at present, we

    design a new intelligent bus monitor and management system by using ZigBeetechnology

    and GSM/GPRS technology. It can improve the quality of the public transport service

    effectively. Its low cost is easy to accept by many public transport Corporation.

    ZigBee's effective operating range is only tens of meters, and it can estimate the distance

    between the vehicle and the platform according to the signal strength. As a result, the monitor

    can be aware of the bus arrival only when the bus near the station. In addition, the system can

    also operate smoothly when many buses approach the same station, because a ZigBee

    coordinator allow ZigBee devices to connect with it. The whole system's cost is very low

    because it has a few of station monitors and low cost wireless identifiers.

  • 32

    APPENDIX

    GSM MODEM

    GSM Modem Product, provides full functional capability to Serial devices to send SMS

    and Data over GSM Network. The product is available as Board Level or enclosed in Metal

    Box. The Board Level product can be integrated in to Various Serial devices in providing

    them SMS and Data capability and the unit housed in a Metal Enclosure can be kept outside

    to provide serial port connection. The GSM Modem supports popular "AT" command set so

    that users can develop applications quickly. The product has SIM Card holder to which

    activated SIM card is inserted for normal use. The power to this unit can be given from UPS

    to provide uninterrupted operation. This product provides great feasibility for Devices in

    remote location to stay connected which otherwise would not have been possible where

    telephone lines do not exist.

    TO TEST GSM MODEM CONNECTIVITY USING HYPER TERMINAL

    Select a suitable GSM Modem. Here Pulraj GSM is selected.

    Understand the AT Command set required to communicate with the modem.

  • 33

    Connect the modem to the computer according to the setup guide specified in the

    manual provided with the GSM modem.

    Put a valid SIM card into the mobile phone or GSM/GPRS modem.

    Connect the mobile phone or GSM/GPRS modem to a computer, and set up the

    corresponding wireless modem driver.

    Run the MS HyperTerminal by selecting Start -> Programs -> Accessories ->

    Communications -> HyperTerminal.

    In the Connection Description dialog box, enter a name and choose an icon for the

    connection. Then click the OK button.

    In the Connect To dialog box, choose the COM port that mobile phone or

    GSM/GPRS modem is connecting to in the Connect using combo box. For example,

    choose COM1 if the mobile phone or GSM/GPRS modem is connecting to the COM1

    port. Then click the OK button.

    The Properties dialog box comes out. Enter the correct port settings for the mobile

    phone or GSM/GPRS modem. Then click the OK button.

    Type "AT" in the main window. A response "OK" should be returned from the mobile

    phone or GSM/GPRS modem.

    If OK returns, it means your mobile phone or GSM/GPRS modem is connected

    successfully.

    AT COMMANDS

    AT commands are instructions used to control a modem. AT is the abbreviation of

    ATtention. Every command line starts with "AT" or "at". That's why modem commands are

    called AT commands. There are two types of AT commands:

    (i) Basic commands are AT commands that do not start with a "+". For example,

    D (Dial), A (Answer), H (Hook control), and O (Return to online data state) are

    the basic commands.

    (ii) Extended commands are AT commands that start with a "+". All GSM AT

    commands are extended commands. For example, +CMGS (Send SMS message),

    +CMGL (List SMS messages), and +CMGR (Read SMS messages) are extended

    commands.

  • 34

    For sending SMS in text Mode:

    AT+CMGF=1 press enter

    AT+CMGS=mobile number press enter

    Once The AT commands is given > prompt will be displayed on the screen. Type the

    message to sent via SMS. After this, press ctrl+Z to send the SMS. If the SMS sending is

    successful, ok will be displayed along with the message number.

    For reading SMS in the text mode:

    AT+CMGF=1 Press enter

    AT+CMGR= no.

    Number (no.) is the message index number stored in the sim card. For new SMS, URC

    will be received on the screen as +CMTI: SM no. Use this number in the AT+CMGR

    number to read the message.

    Application areas

    Mobile Transport vehicles.

    LAN based SMS server

    Alarm notification of critical events including Servers

    Network Monitoring and SMS reporting

    Data Transfer applications from remote locations

    Monitor and control of Serial services through GSM Network

    Dispatch notification through SMS.

    AMR- Automatic Meter Reading

    GSM

    Global System for Mobile Communications, originally Groupe Spcial Mobile, is a

    standard set developed by the European Telecommunications Standards Institute (ETSI) to

    describe protocols for second generation (2G) digital cellular networks used by mobile

    phones.

  • 35

    Network structure

    The structure of a GSM network

    The network is structured into a number of discrete sections:

    The Base Station Subsystem (the base stations and their controllers).

    The Network and Switching Subsystem (the part of the network most similar to a

    fixed network). This is sometimes also just called the core network.

    The GPRS Core Network (the optional part which allows packet based Internet

    connections).

    The Operations support system (OSS) for maintenance of the network.

    GSM carrier frequencies

    GSM networks operate in a number of different carrier frequency ranges (separated into

    GSM frequency ranges for 2G and UMTS frequency bands for 3G), with most 2G GSM

    networks operating in the 900 MHz or 1800 MHz bands. In rare cases the 400 and 450 MHz

    frequency bands are assigned in some countries because they were previously used for first-

    generation systems. Most 3G networks in Europe operate in the 2100 MHz frequency band.

    Regardless of the frequency selected by an operator, it is divided into time slots for

    individual phones to use. This allows eight full-rate or sixteen half-rate speech channels per

    radio frequency. These eight radio timeslots (or eight burst periods) are grouped into a

    TDMA frame. Half rate channels use alternate frames in the same timeslot. The channel data

    rate for all 8 channels is 270.833 kbit/s, and the frame duration is 4.615 ms.The transmission

    power in the handset is limited to a maximum of 2 watts in GSM 850/900 and 1 watt in GSM

    1800/1900.

    ADVANTAGES

    Improved spectrum efficiency

    International roaming

    Low-cost mobile sets and base stations (BSs)

    High-quality speech

    Compatibility with Integrated Services Digital Network (ISDN) and other telephone

    company services

  • 36

    ZIGBEE TECHNOLOGY

    ZigBee is a specification for a suite of high level communication protocols using small,

    low-power digital radios based on an IEEE 802 standard for personal area networks. ZigBee

    devices are often used in mesh network form to transmit data over longer distances, passing

    data through intermediate devices to reach more distant ones. This allows ZigBee networks to

    be formed ad-hoc, with no centralized control or high-power transmitter/receiver able to

    reach all of the devices. Any ZigBee device can be tasked with running the network.

    Device Types

    Zigbee devices are of three types:

    ZigBee coordinator (ZC): The most capable device, the coordinator forms the root of

    the network tree and might bridge to other networks. There is exactly one ZigBee

    coordinator in each network since it is the device that started the network originally. It

    stores information about the network, including acting as the Trust Center &

    repository for security keys.

    ZigBee Router (ZR): As well as running an application function, a router can act as an

    intermediate router, passing on data from other devices.

    ZigBee End Device (ZED): Contains just enough functionality to talk to the parent

    node (either the coordinator or a router); it cannot relay data from other devices. This

    relationship allows the node to be asleep a significant amount of the time thereby

    giving long battery life. A ZED requires the least amount of memory .

  • 37

    Communication and device discovery

    In order for applications to communicate, their comprising devices must use a common

    application protocol (types of messages, formats and so on); these sets of conventions are

    grouped in profiles. Furthermore, binding is decided upon by matching input and output

    cluster identifiers, unique within the context of a given profile and associated to an incoming

    or outgoing data flow in a device. Binding tables contain source and destination pairs.

    Depending on the available information, device discovery may follow different methods.

    When the network address is known, the IEEE address can be requested using unicast

    communication. When it is not, petitions are broadcast (the IEEE address being part of the

    response payload). End devices will simply respond with the requested address, while a

    network coordinator or a router will also send the addresses of all the devices associated with

    it.

    This extended discovery protocol permits external devices to find out about devices in a

    network and the services that they offer, which endpoints can report when queried by the

    discovering device (which has previously obtained their addresses). Matching services can

    also be used. The use of cluster identifiers enforces the binding of complementary entities by

    means of the binding tables, which are maintained by ZigBee coordinators, as the table must

    be always available within a network and coordinators are most likely to have a permanent

    power supply. Backups, managed by higher-level layers, may be needed by some

    applications. Binding requires an established communication link; after it exists, whether to

    add a new node to the network is decided, according to the application and security policies.

    Communication can happen right after the association. Direct addressing uses both radio

    address and endpoint identifier, whereas indirect addressing uses every relevant field

    (address, endpoint, cluster and attribute) and requires that they be sent to 16 the network

    coordinator, which maintains associations and translates requests for communication. Indirect

    addressing is particularly useful to keep some devices very simple and minimize their need

    for storage. Besides these two methods, broadcast to all endpoints in a device is available,

    and group addressing is used to communicate with groups of endpoints belonging to a set of

    devices.

  • 38

    Advantages Of Zigbee

    Zigbee is poised to become the global control/sensor network standard. It has been

    designed to provide the following features:

    (1)Low power consumption, simply implemented.

    (1) Users expect batteries to last many months to years.Consider that a typical single

    family house has about 6 smoke/CO detectors. If the batteries for each one only

    lasted six months, the home owner would be replacing batteries every month.

    (2) Bluetooth has many different modes and states depending upon your latency and

    power requirements such as sniff, park, hold, active, etc.; ZigBee/IEEE 802.15.4 has

    active (transmit/receive) or sleep. Application software needs to focus on the

    application, not on which power mode is optimum for each aspect of operation.

    (3) Low cost (device, installation, maintenance)

    (4) Low cost to the users means low device cost, low installation cost and low

    maintenance. ZigBee devices allow batteries to last up to years using primary cells

    (low cost) without any chargers (low cost and easy installation). ZigBees simplicity

    allows for inherent configuration and redundancy of network devices provides low

    maintenance.

    (5) High density of nodes per network ZigBees use of the IEEE 802.15.4 PHY and MAC

    allows networks to handle any number of devices. This attribute is critical for

    massive sensor arrays and control networks.

    (6) Simple protocol, global implementation

    (7) ZigBees protocol code stack is estimated to be about 1/4th of Bluetooths or 802.11s.

    (8) Simplicity is essential to cost, interoperability, and maintenance. The IEEE 802.15.4

    PHY adopted by ZigBee has been designed for the 868 MHz band in Europe, the 915

    MHz band in N America, Australia, etc; and the 2.4 GHz band is now recognized to

    be a global band accepted in almost all countries.

  • 39

    ARM

    The ARM7TDMI core is a member of the ARM family of general-purpose 32-bit

    microprocessors. The ARM family offers high performance for very low power consumption,

    and small size. The ARM architecture is based on Reduced Instruction Set Computer (RISC)

    principles. The RISC(software) instruction set and related decode mechanism are much

    simpler than those of Complex Instruction Set Computer (CISC) designs. This simplicity

    gives:

    a high instruction throughput

    an excellent real-time interrupt response

    a small, cost-effective, processor macro cell

    LPC2364/6/8/78 is an ARM-based microcontroller for applications requiring serial

    communications for a variety of purposes. These microcontrollers incorporate a 10/100

    Ethernet MAC, USB 2.0 Full Speed interface, four UARTs, two CAN channels, an SPI

    interface, two Synchronous Serial Ports (SSP), three I2C interfaces

    Features

    ARM7TDMI-S processor, running at up to 72 MHz.

    Up to 512 kB on-chip Flash Program Memory

    Up to 32 kB of SRAM on the ARM local bus for high performance CPU access.

    16 kB Static RAM for Ethernet interface. Can also be used as general purpose SRAM.

    8 kB Static RAM for USB interface. Can also be used as general purpose SRAM.

    Dual AHB system that provides for simultaneous Ethernet DMA, USB DMA, and

    program execution from on-chip Flash with no contention between those

    functions.

    External memory controller that supports static devices such as Flash and SRAM. An

    8-bit data/16-bit address parallel bus is available in LPC2378 only.

    Advanced Vectored Interrupt Controller, supporting up to 32 vectored interrupts.

    Serial Interfaces

    Ethernet MAC with associated DMA controller. These functions reside on an

    independent AHB bus.

    USB 2.0 Device with on-chip PHY and associated DMA controller.

    Four UARTs with fractional baud rate generation, one with modem control I/O, one

  • 40

    with IrDA support, all with FIFO. These reside on the APB bus.

    Two CAN channels with Acceptance Filter/FullCAN mode, Three I2C, SPI controller

    are reside on the APB bus.

    Secure Digital (SD) / MultiMediaCard (MMC) memory card interface.

    Up to 70 (LPC2364/6/8) or 104 (LPC2378) general purpose I/O pins.

    10 bit A/D converter with input multiplexing among 6 pins (LPC2364/66/68) or 8

    pins LPC2378).

    10 bit D/A converter.

    Four general purpose Timers with two capture inputs each and up to four compare

    output pins each. Each Timer block has an external count input.

    Real Time Clock with separate power pin, clock source can be the RTC oscillator or

    the APB clock.

    2 kB Static RAM powered from the RTC power pin, allowing data to be stored when

    the rest of the chip is powered off.

    Watchdog Timer. The watchdog timer can be clocked from the internal RC oscillator,

    the RTC oscillator, or the APB clock.

    Standard ARM Test/Debug interface for compatibility with existing tools.

    Emulation Trace Module

    Single 3.3 V power supply (3.0 V to 3.6 V).

    Four reduced power modes: Idle, Sleep, Power Down, and Deep Power down.

    Four external interrupt inputs. .

    On-chip Power On Reset.

    On-chip crystal oscillator with an operating range of 1 MHz to 24 MHz.

    MCB 2300

    The connectors on the evaluation board provide easy access to many of the on-chip

    peripherals.

    Block Diagram

    The hardware block diagram displays input, configuration, power system, and User I/O

    on the board. This visual presentation helps you to understand the MCB2300 board

    components.

  • 41

    MCB 2300 Development board

  • 42

    (1) USB 2.0 Full Speed Interface

    Standard USB connectors for USB Device, USB Host and UART via USB on the MCB2300

    board for applications requiring USB communications.

    (2) LCD Display

    A 2-line by 16-character, 8-bit LCD display. You may use this text display device to show

    real-time debug and program status messages

    (1) SD Card

    (2) Power LED

    (5) JTAG Download and Debug

    A JTAG interface is on the MCB2300 board and, coupled with the ULINK USB-JTAG

    adapter, allows flash programming. The on-chip debug interface can perform real-time in-

    circuit emulation of the LPC2300 device. For fast PC communication, use your PC's USB

    port.

    (6) & (7) Dual Serial Ports

    Standard DB9 connectors are on the MCB2300 for both of the LPC2300's serial ports

    COM1 & COM2

    (8) Potentiometer

    An adjustable analog voltage source is on the MCB2300 board for testing the Analog to

    Digital output feature of the LPC2300. A configuration jumper enables and disables this

    feature

    (9) Reset: To reset the processor

    (10) INT0:To enable external interrupt

    (11) Configuration Jumpers: To enable or disable certain features

    (12) Processor: LPC 2388

    (13) Prototyping area

    (14) LF Amplifier

    An LF Amplifier on the MCB2300 connects the D/A output of the LPC2300 device to a

    speaker & use this LF Amplifier to generate sound.

  • 43

    (15) configuration jumper for LF amplifier

    (16) & (17) Dual CAN Ports

    Standard DB9 connectors are on the MCB2300 board for applications requiring CAN

    communications .Application may use either or both of these ports, or they may be disabled

    with a configuration jumper.

    (18) configuration jumper for USB

    (19) Host USB

    (21) Power USB

    Applications

    Industrial control

    Medical systems

    User Peripherals

    (1)General Purpose I/O

    The LPC23xx has up to five General purpose IO ports which each contain 32 IO lines

    giving a maximum of 160 pins..PORT0 and PORT2 can generate an interrupt when there is a

    rising or falling edge on an individual pin.

    Fast IO Registers

    To maintain compatibility with the earlier LPC21xx devices PORT0 and PORT1 have

    aset of control registers on the APB bus. But controlling these two ports by these registers is

    quite slow. The LPC23xx family has a second set of GPIO control registers located on the

    local bus called the Fast GPIO control registers. On reset the pin connect block configures all

    the peripheral pins to be general purpose I/O (GPIO) input pins. The GPIO pins are

    controlled by four registers, as shown below

  • 44

    Each GPIO pin is controlled by a bit in each of the four GPIO registers. These bits data direction, set,clear and pin status .The FIODIR pin allows each pin to be individually

    configured as an input (0) or an output (1). If the pin is an output the FIOSET and FIOCLR

    registers allow you to control the state of the pin. Writing a 1 to these registers will set or clear the corresponding pin. The state of the GPIO pin can be read at any time by reading the

    contents of the FIOPIN register The FIOMASK register is used to mask individual bits of the

    FIOSET,FIOCLR and FIOPIN register. If a bit in the FIOMASK register is set to 0 the corresponding bit in the FIOSET,FIOCLR and FIOPIN will be updated. This masking helps speed up low level IO bit manipulation.

    PORT0 and PORT1 can be accessed as general purpose as well as fast ports, but

    P2,P3&P4 can be accessed only as fast ports.

    (2)UART

    The LPC23xx devices currently have four on-chip UARTS. They are all identical to use ,

    but UART1 has additional modem support and UART3 which has IrDA support. All the

    UARTs have a built-in Baud rate generator with autobaud capability and 16 byte transmit

    and receive FIFOs

    First the pinselect block must be programmed to switch the processor pins from GPIO to the

    UART functions.Then LCR configures the format of transmitted data. Usually the character

    format is set to 8 bits, no parity and one stop bit. In the LCR, there is an additional bit called

    DLAB which is the divisor latch access bit. In order to be able to program the Baud rate

    generator, this bit must be set. The Baud rate generator is a sixteen bit prescaler which

    divides down Pclk to generate the UART clock which must run at 16 times the Baud rate.

    This is formula used to calculate the UART Baud rate

    Divisor = Pclk/16 * BAUD

    Consider Pclk= 30MHz,

    Divisor = 30,000,000/16 x 9600 = 194 or 0xC2

    Often it is not possible to get an exact Baud rate for the UARTs, they will work with up to

    around a 5% error in the bit timing. The divisor value is held in two registers: Divisor latch

  • 45

    MSB (DLM) and Divisor latch LSB (DLL). The first eight bits of both registers holds each

    half of the divisor as shown below. Finally, the DLAB bit in the LCR register must be set

    back to zero to protect the contents of the divisor registers.

    Data Transfer

    Once the UART is initialised, characters can be transmitted by writing to the Transmit

    Holding Register.Similarly, characters may be received by reading from the Receive Buffer

    Register. Both these registers occupy the same memory location. Writing a character places

    the character in the transmit FIFO and reading from this location loads a character from the

    Receive FIFO. The putchar() and getchar functions are used to read/write a single character

    to the UART. These low level drivers are called by the Keil STDIO functions such as printf()

    and scanf(). So, if you want to re direct the standard I/O from the UART to say an LCD

    display and a keypad, rewrite these functions to support sending and receiving a single

    character to your desired I/O devices. Both the putchar() and getchar() functions read the

    Link Status Register (LSR) to check on UART error conditions and to check the status of the

    receive and transmit FIFOS

    (3)ADC(Analog to Digital Converter)

    The A/D converter present on LPC2300 variants is a 10-bit successive approximation

    converter with a conversion time of 2.44 uSec. The A/D converter has either 6 or 8

    multiplexed inputs depending on the variant. The converter is available with 4 or 8 channels

    of 10-bit resolution.

    The A/D control register establishes the configuration of the converter and controls the start

    of conversion. The first step in configuring the converter is to set up the peripheral clock. The

    A/D clock is also derived from the PCLK. This PCLK must be divided down to equal

    4.5MHz. This is a maximum value and if PCLK cannot be divided down to equal 4.5MHz

    then the nearest value below 4.5MHz which can be achieved should be selected AD Control

    register: The control register PCLK is divided by the value stored in the CLKDIV field plus

    one. Hence the e quation for the A/D clock is as follows:

    CLKDIV = (PCLK/Adclk) - 1

    Unlike other peripherals the A/D converter can make measurements of the external pins

    when they are configured as GPIO pins. The A/D has a maximum resolution of 10 bits but

    can be programmed to give any resolution do wn to 3 bits. The conversion resolution is equal

  • 46

    to the number of clock cycles per conversion minus one. Hence for a 10-bit result the A/D

    requires 11 ADCLK cycles and four for a 3-bit result. Once you have configured the A/D

    resolution, a conversion can be made. The A/D has two conversion modes, hardware and

    software. The hardware mode allows you to select a number of channels and then set the A/D

    running. In this mode a conversion is made for each channel in turn until the converter is

    stopped. At the end of each conversion the result is available in the A/D Global data register

    and in a dedicated results register for each channel, ADDR0 ADDR7.

    At the end of a conversion the Done bit is set and an interrupt may also be generated if

    the global enable and channel interrupt enable bits are set in the AtoD Interrupt enable

    register. The conversion result is stored in the V/Vdd a field as a ratio of the voltage on the

    analog channel, divided by the voltage on the analog power supply pin. The number of the

    channel for which the conversion was made is also stored alongside the result. This value is

    stored in the CHN field. Finall y, if the result of a conversion is not read before the next result

    is due, it will be overwritten by the fresh result and the OVERUN bit is set to on e. If you are

    using multiple A/D channels the A/D status register provides global access to the DONE and

    Overrun bits for each channel

    (4)Digital To Analog Converter

    The LPC23xx variants have a 10-bit Digital to analog converter. This is an easy-to-use

    peripheral as it only has a single register. The DAC is enabled by wr iting to bits 20 and 21 of

    PINSEL1 and converting pin 0.26 from GPIO to the AOUT function. It should also be noted

    that a channel of the analog to digital converter also shares this pin. The DAC is controlled by

    a single register. The value to be converted is written here along with the bias value. Once

    enabled a conversion can be started b y writing to the VALUE bits in the control register.

    The conversion time is dependant on the value of the BIAS bit. If it is set to one the

    conversion time is 2.5uSec but it can drive 700 uA. If it is zero, the conversion time is 1 uSec

    but it is only able to deliver 350 uA. However, the total settling time is also dependent on the

    external impedance and the data setsheet values are valid for a 100pFcapacitance

    (5)Real Time Clock

    The LPC23xx Real Time Clock (RTC) is a clock calendar accurate up to the year 2099.

    The RTC has the option to run from and external 32KHz watch crystal or from the internal

    PCLK. The RTC also has an associated 2K of Low power SRAM called the battery RAM.

  • 47

    The RTC and batter y SRAM have a separate p ower domain so by supplying 3.3V to the

    Vbat pin, the RTC can be kept running and the contents of the battery ram may be preserved

    when the LPC2 3xx is powered down. Both the RTC and the battery ram are designed to

    consume minimum power and can be run from a battery. This arrangement means that the

    RTC may be used to provide a perpetual clock calendar, if this is not re quired, the RTC can

    be used to provide a time reference and periodic interrupts without the need for an additi ona

    l external oscillator

    (6)Timer

    The LPC23xx has four general purpose timers. All of the general purpose timers are

    identical in structure and use. The timers are based around a 32-bit timer-counter with a 32-

    bit prescaler. The default clock source for all of the timers is the APB peripheral clock Pclk.

    The tick rate of timer is controlled by the value stored in the prescaler register. The prescaler

    register will increment on each tick of Pclk until it reaches the value stored in prescaler

    register. When it reaches the prescale value, the timer-counter is incremented by one and the

    prescale counter resets to zero, and starts counting again.

    Capture Mode : Each timer has upto four capture channels. The capture channels allows

    to capture the value of the timer-counter when an input signal makes a transition.

    Counter Mode : The count control register allows to select between each timer as a

    counter or a pure timer.

    Match Mode : Each timer has upto four match channels. Each match channel has a match

    register which stores a 32-bit number. The current value of timer-counter is compared against

    the match register. When the values match, an event is triggered.

  • 48

    DEVELOPING TOOL

    Vision3 Overview

    The Vision3 IDE is a Windows-based software development platform that combines a

    robust editor, project manager, and make facility. Vision3 integrates all tools including the

    C compiler, macro assembler, linker/locator, and HEX file generator. Vision3 helps

    expedite the development process of your embedded applications by providing the following:

    Full-featured source code editor,

    Device database for configuring the development tool setting,

    Project manager for creating and maintaining your projects,

    Integrated make facility for assembling, compiling, and linking your embedded

    applications,

    Dialogs for all development tool settings,

    True integrated source-level Debugger with high-speed CPU and peripheral simulator,

    Advanced GDI interface for software debugging in the target hardware and for

    connection to Keil ULINK,

    Flash programming utility for downloading the application program into Flash ROM,

    Links to development tools manuals, device datasheets & user's guides.

    The Vision3 IDE offers numerous features and advantages that help you quickly and

    successfully develop embedded applications. They are easy to use and are guaranteed to help

    you achieve your design goals.

    The Vision3 IDE and Debugger is the central part of the Keil development toolchain.

    Vision3 offers a Build Mode and a Debug Mode.

    In the Vision3 Build Mode you maintain the project files and generate the application.In the

    Vision3 Debug Mode you verify your program either with a powerful CPU and peripheral

    simulator or with the Keil ULINK USB-JTAG Adapter (or other AGDI drivers) that connect

  • 49

    the debugger to the target system. The ULINK allows you also to download your application

    into Flash ROM of your target system

  • 50

    REFERENCES

    [1] A Bus Management System Based on ZigBee 978-1-4244-7237-6/10/$26.00 2010

    IEEE

    [2] Qing-Jie Kong, Yikai Chen, and Yuncai Liu,(2009) "A fusion-based system for road-

    network traffic state surveillance: a case study of shanghai," IEEE Intelligent Transportation

    Systems Magazine, vol. 1, no. 1, pp. 37-42

    [3]Sheng, Q.Z., Li, X. and Zeadally, S. (2008) Enabling Next-Generation RFID

    Applications: Solutions and Challenges, IEEE Computer, Vol 41 No 9, pp 21-28

    [4] Bus Management System Using RFID In WSN

    [5] ZigBee.org ZigBee-Specification 2006

    [6] ChipCon Corp CC2430Datasheet.pdf2005

    [7] Texas Instruments Inc. Z-Statck Sample Application for CC2430DB