Upload
keerthi-uma-mahesh
View
220
Download
0
Embed Size (px)
Citation preview
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
1/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
2/117
RFID AND GSM BASED INTELLIGENT
MAILBOX
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
3/117
INTRODUCTION
As the time moves the life style of the persons has completely
changed and there is no time for the people for micro
management of every issue personally. So, this is the right time
to provide some space to the technology into our lives for
monitoring the issues which requires our personal presence for
the things to happen. One among those issues which require our
personal presence is receiving the courier which is sent back if
we are not present at the time the courier boy comes to our
house. This may lead to the delay in receiving the data and in
some scenarios it may also lead to tough situations. So our
project aims in providing a very reliable and very user friendly
solution to overcome this kind of problem.
As we know the advancements in the Radio Frequency and
GSM technologies and making use of those existing
technologies we can design a device which is capable of
identifying the arrival of courier and forward the same to the
receiver and also send an acknowledgement to the courier office
so that they do not require the signature of the particular person
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
4/117
for whom the courier is meant for. The basic idea of the system
is to employ an RF ID tag to the courier and send the identity
number to the receivers mobile. The receiver of the courier will
have a letter box which has an RF reader and a dedicated GSM
modem in it. As soon as the courier boy drops the letter in to it
the RF reader reads the identity number of the tag and informs
the same to a micro controller and compares it with the identity
number send by the courier office and if both are one and the
same then it sends message to the receiver and also to the
courier office about the arrival of the courier.
To design the entire system we require a microcontroller which
acts as a medium of communication between the RF reader and
the GSM modem. The major advantage of this system is the
presence of the GSM modem enables the device to communicate
with the receiver no matter where ever he was present on the
globe.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
5/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
6/117
Atmels high-density nonvolatile memory technology and is
compatible with the industry-standard 80C51 instruction set and
pin out. The on-chip Flash allows the program memory to be
reprogrammed in-system or by a conventional nonvolatile
memory programmer. By combining a versatile 8-bit CPU with
in-system programmable Flash on a monolithic chip, the Atmel
AT89S52 is a powerful microcontroller, which provides a highly
flexible and cost-effective solution to many, embedded control
applications. The AT89S52 provides the following standard
features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines,
Watchdog timer, two data pointers, three 16-bit timer/counters, a
six-vector two-level interrupt architecture, a full duplex serial
port, on-chip oscillator, and clock circuitry. In addition, the
AT89S52 is designed with static logic for operation down to
zero frequency and supports two software selectable power
saving modes. The Idle Mode stops the CPU while allowing the
RAM, timer/counters, serial port, and interrupt system to
continue functioning. The Power-down mode saves the RAM
con-tents but freezes the oscillator, disabling all other chip
functions until the next interrupt.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
7/117
The hardware is driven by a set of program instructions, or
software. Once familiar with hardware and software, the user
can then apply the microcontroller to the problems easily.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
8/117
The pin diagram of
unique to microcon
The following a
microcontroller.
1.Internal ROM and
2.I/O ports with prog
3.Timers and counter
4.Serial data commun
the 8051 shows all of the in
rollers:
e some of the capabili
AM
ammable pins
ication
ut/output pins
ies of 8051
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
9/117
The 8051 architecture consists of these specific features:
16 bit PC &data pointer (DPTR)
8 bit program status word (PSW)
8 bit stack pointer (SP)
Internal ROM 4k
Internal RAM of 128 bytes.
4 register banks, each containing 8 registers
80 bits of general purpose data memory
32 input/output pins arranged as four 8 bit ports: P0-P3
Two 16 bit timer/counters: T0-T1
Two external and three internal interrupt sources Oscillator and
clock circuits.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
10/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
11/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
12/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
13/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
14/117
BLOCK DIAGRAM
POWER
SUPPLY
8
9
S
5
2
GSM
MODEMLIQUID CRYSTAL
DISPLAY
MOBILE
(USER) RFID
READER
MODULE
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
15/117
CIRCUIT DIAGRAM
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
16/117
COMPONENT LIST
Name Capacity Quantity
2 Pin Connector Screw 1
2 Pin Connector Male 1
Diode IN40007 4
Regulator 7805 1
Regulator 7812 1
Capacitor 1000f 1
Capacitor 10f 1
Ceramic Capacitor 22pf 2
Crystal 11.0592mhz 1
Push Button 1
40 Pin Base 1
8051 AT89S52 1
LED 2
LCD Base 16 Pin 1
LCD 16*2 1
Resistance 220 2
Resistance 1k 1
Resistance 10k 1
RFID READER 1
GSM MODEM 1
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
17/117
HARDWARE DESCRIPTION:
1.POWER SUPPLY:
Power supply is a reference to a source of electrical power. A
device or system that supplies electrical or other types of energy
to an output load or group of loads is called a power supply
unit or PSU. The term is most commonly applied to electrical
energy supplies, less often to mechanical ones, and rarely to
others. Here in our application we need a 5v DC power supply
for all electronics involved in the project. This requires step
down transformer, rectifier, voltage regulator, and filter circuit
for generation of 5v DC power. Here a brief description of all
the components is given as follows:
TRANSFORMER:
transformer is a device that transfers electrical energy from
one circuit to another through inductively coupled conductors
the transformer's coils or "windings". Except for air-core
transformers, the conductors are commonly wound around a
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
18/117
single iron-rich core, or around separate but magnetically-
coupled cores. A varying current in the first or "primary"
winding creates a varying magnetic field in the core (or cores) of
the transformer. This varying magnetic field induces a varying
electromotive force (EMF) or "voltage" in the "secondary"
winding. This effect is called mutual induction.
If a load is connected to the secondary circuit, electric charge
will flow in the secondary winding of the transformer and
transfer energy from the primary circuit to the load connected in
the secondary circuit.
The secondary induced voltage VS, of an ideal transformer, is
scaled from the primary VPby a factor equal to the ratio of the
number of turns of wire in their respective windings:
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
19/117
By appropriate selection of the numbers of turns, a transformer
thus allows an alternating voltage to be stepped up by making
NSmore thanNP or stepped down, by making it
BASIC PARTS OF A TRANSFORMER
In its most basic form a transformer consists of:
A primary coil or winding.
A secondary coil or winding.
A core that supports the coils or windings.
Refer to the transformer circuit in figure as you read the
following explanation: The primary winding is connected to a
60-hertz ac voltage source. The magnetic field (flux) builds up
(expands) and collapses (contracts) about the primary winding.
The expanding and contracting magnetic field around the
primary winding cuts the secondary winding and induces an
alternating voltage into the winding. This voltage causesalternating current to flow through the load. The voltage may be
stepped up or down depending on the design of the primary and
secondary windings.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
20/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
21/117
The SECONDARY WINDING, which receives energy from the
primary winding and delivers it to the load.
The ENCLOSURE, which protects the above components from
dirt, moisture, and mechanical damage.
BRIDGE RECTIFIER
A bridge rectifier makes use of four diodes in a bridge
arrangement to achieve full-wave rectification. This is a widely
used configuration, both with individual diodes wired as shown
and with single component bridges where the diode bridge is
wired internally.
Basic operation
According to the conventional model of current flow originally
established by Benjamin Franklin and still followed by most
engineers today, current is assumed to flow through electrical
conductors from the positive to the negativepole. In actuality,
free electrons in a conductor nearly always flow from the
negative to the positive pole. In the vast majority of
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
22/117
applications, howe
irrelevant. Therefor
model is retained.
In the diagrams b
corner of the diamo
right corner is neg
terminal to the righ
and returns to the l
path.
When the input con
input connected to
from the lowersup
the output, and retu
path.
er, the actual direction of
e, in the discussion below t
low, when the input connec
d is positive, and the input c
ative, current flows from th
t along the red(positive) pat
wersupply terminal via the
nected to the leftcorner is ne
the right corner is positive
ly terminal to the right along
ns to the uppersupply termi
urrent flow is
e conventional
ted to the left
nnected to the
upper supply
to the output,
lue(negative)
gative, and the
current flows
the redpath to
al via the blue
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
23/117
In each case, the u
right output negati
or DC, this circuit
input, it can also
polarity protection"
DC-powered equip
backwards, or whe
have been reversed
damage caused by r
Prior to availabilitrectifier was alwa
Since about 1950,
the four diodes con
per right output remains pos
e. Since this is true whether
ot only produces a DC outp
rovide what is sometimes
. That is, it permits normal
ment when batteries have
the leads (wires) from a D
, and protects the equipment
everse polarity.
of integrated electronics,s constructed from discret
single four-terminal compo
nected in the bridge configur
tive and lower
he input is AC
t from an AC
alled "reverse
functioning of
been installed
power source
from potential
such a bridgecomponents.
ent containing
tion became a
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
24/117
standard commerci
various voltage and
OUTPUT SMOOTHIN
For many applicati
the full-wave bridg
output, the additio
bridge alone sup
continuously varyi
above).
The function of thissmoothing capacito
the rectified AC ou
explanation of 'sm
impedance path to t
al component and is now
current ratings.
ns, especially with single p
e serves to convert an AC i
of a capacitor may be desir
lies an output of fixed
g or "pulsating" magnitude
capacitor, known as a reservr) is to lessen the variation i
tput voltage waveform from t
othing' is that the capacitor
e AC component of the outp
available with
ase AC where
put into a DC
ed because the
polarity but
(see diagram
ir capacitor (orn (or 'smooth')
he bridge. One
rovides a low
t, reducing the
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
25/117
AC voltage across, and AC current through, the resistive load. In
less technical terms, any drop in the output voltage and current
of the bridge tends to be canceled by loss of charge in the
capacitor. This charge flows out as additional current through
the load. Thus the change of load current and voltage is reduced
relative to what would occur without the capacitor. Increases of
voltage correspondingly store excess charge in the capacitor,
thus moderating the change in output voltage / current.
The simplified circuit shown has a well-deserved reputation for
being dangerous, because, in some applications, the capacitor
can retain a lethalcharge after the AC power source is removed.
If supplying a dangerous voltage, a practical circuit should
include a reliable way to safely discharge the capacitor. If the
normal load cannot be guaranteed to perform this function,
perhaps because it can be disconnected, the circuit should
include a bleeder resistor connected as close as practical across
the capacitor. This resistor should consume a current large
enough to discharge the capacitor in a reasonable time, but small
enough to minimize unnecessary power waste.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
26/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
27/117
bridge only during the time when the input voltage is greater
than the capacitor voltage. For example, if the load draws an
average current of n Amps, and the diodes conduct for 10% of
the time, the average diode current during conduction must be
10n Amps. This non-sinusoidal current leads to harmonic
distortion and a poor power factor in the AC supply.
In a practical circuit, when a capacitor is directly connected to
the output of a bridge, the bridge diodes must be sized to
withstand the current surge that occurs when the power is turned
on at the peak of the AC voltage and the capacitor is fully
discharged. Sometimes a small series resistor is included before
the capacitor to limit this current, though in most applications
the power supply transformer's resistance is already sufficient.
Output can also be smoothed using a choke and second
capacitor. The choke tends to keep the current (rather than the
voltage) more constant. Due to the relatively high cost of aneffective choke compared to a resistor and capacitor this is not
employed in modern equipment.
Some early console radios created the speaker's constant field
with the current from the high voltage ("B +") power supply,
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
28/117
which was then routed to the consuming circuits, (permanent
magnets were then too weak for good performance) to create the
speaker's constant magnetic field. The speaker field coil thus
performed 2 jobs in one: it acted as a choke, filtering the power
supply, and it produced the magnetic field to operate the
speaker.
REGULATOR IC (78XX)
It is a three pin IC used as a voltage regulator. It converts
unregulated DC current into regulated DC current.
Normally we get fixed output by connecting the voltage
regulator at the output of the filtered DC (see in above diagram).
It can also be used in circuits to get a low DC voltage from a
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
29/117
high DC voltage (for example we use 7805 to get 5V from 12V).
There are two types of voltage regulators 1. fixed voltage
regulators (78xx, 79xx) 2. variable voltage regulators(LM317)
In fixed voltage regulators there is another classification 1. +ve
voltage regulators 2. -ve voltage regulators POSITIVE
VOLTAGE REGULATORS This include 78xx voltage
regulators. The most commonly used ones are 7805 and 7812.
7805 gives fixed 5V DC voltage if input voltage is in (7.5V,
20V).
The Capacitor Filter
The simple capacitor filter is the most basic type of power
supply filter. The application of the simple capacitor filter is
very limited. It is sometimes used on extremely high-voltage,
low-current power supplies for cathode-ray and similar electron
tubes, which require very little load current from the supply. Thecapacitor filter is also used where the power-supply ripple
frequency is not critical; this frequency can be relatively high.
The capacitor (C1) shown in figure 4-15 is a simple filter
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
30/117
connected across the output of the rectifier in parallel with the
load.
Full-wave rectifier with a capacitor filter.
When this filter is used, the RC charge time of the filter
capacitor (C1) must be short and the RC discharge time must be
long to eliminate ripple action. In other words, the capacitor
must charge up fast, preferably with no discharge at all. Better
filtering also results when the input frequency is high; therefore,
the full-wave rectifier output is easier to filter than that of the
half-wave rectifier because of its higher frequency.
For you to have a better understanding of the effect that filtering
has on Eavg, a comparison of a rectifier circuit with a filter and
one without a filter is illustrated in views A and B of figure 4-
16. The output waveforms in figure 4-16 represent the unfiltered
and filtered outputs of the half-wave rectifier circuit. Current
pulses flow through the load resistance (RL) each time a diode
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
31/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
32/117
The value of the capacitor is fairly large (several microfarads),
thus it presents a relatively low reactance to the pulsating current
and it stores a substantial charge.
The rate of charge for the capacitor is limited only by the
resistance of the conducting diode, which is relatively low.
Therefore, the RC charge time of the circuit is relatively short.
As a result, when the pulsating voltage is first applied to the
circuit, the capacitor charges rapidly and almost reaches the
peak value of the rectified voltage within the first few cycles.
The capacitor attempts to charge to the peak value of the
rectified voltage anytime a diode is conducting, and tends to
retain its charge when the rectifier output falls to zero. (The
capacitor cannot discharge immediately.) The capacitor slowly
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
33/117
discharges through the load resistance (RL) during the time the
rectifier is non-conducting.
The rate of discharge of the capacitor is determined by the value
of capacitance and the value of the load resistance. If the
capacitance and load-resistance values are large, the RC
discharge time for the circuit is relatively long.
A comparison of the waveforms shown in figure 4-16 (view A
and view B) illustrates that the addition of C1 to the circuit
results in an increase in the average of the output voltage (Eavg)
and a reduction in the amplitude of the ripple component (Er)
which is normally present across the load resistance.
Now, let's consider a complete cycle of operation using a half-
wave rectifier, a capacitive filter (C1), and a load resistor (RL).
As shown in view A of figure 4-17, the capacitive filter (C1) is
assumed to be large enough to ensure a small reactance to the
pulsating rectified current. The resistance of RLis assumed to be
much greater than the reactance of C1 at the input frequency.
When the circuit is energized, the diode conducts on the positive
half cycle and current flows through the circuit, allowing C1 to
charge. C1 will charge to approximately the peak value of the
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
34/117
input voltage. (The charge is less than the peak value because of
the voltage drop across the diode (D1)). In view A of the figure,
the charge on C1 is indicated by the heavy solid line on the
waveform. As illustrated in view B, the diode cannot conduct on
the negative half cycle because the anode of D1 is negative with
respect to the cathode. During this interval, C1 discharges
through the load resistor (RL). The discharge of C1 produces the
downward slope as indicated by the solid line on the waveform
in view B. In contrast to the abrupt fall of the applied ac voltage
from peak value to zero, the voltage across C1 (and thus across
RL) during the discharge period gradually decreases until the
time of the next half cycle of rectifier operation. Keep in mind
that for good filtering, the filter capacitor should charge up as
fast as possible and discharge as little as possible.
Figure 4-17A. - Capacitor filter circuit (positive and negative
half cycles). POSITIVE HALF-CYCLE
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
35/117
Figure 4-17B. - Capacitor filter circuit (positive and negative
half cycles). NEGATIVE HALF-CYCLE
Since practical values of C1 and RL ensure a more or less
gradual decrease of the discharge voltage, a substantial charge
remains on the capacitor at the time of the next half cycle of
operation. As a result, no current can flow through the diode
until the rising ac input voltage at the anode of the diode exceeds
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
36/117
the voltage on the charge remaining on C1. The charge on C1 is
the cathode potential of the diode. When the potential on the
anode exceeds the potential on the cathode (the charge on C1),
the diode again conducts, and C1 begins to charge to
approximately the peak value of the applied voltage.
After the capacitor has charged to its peak value, the diode will
cut off and the capacitor will start to discharge. Since the fall of
the ac input voltage on the anode is considerably more rapid
than the decrease on the capacitor voltage, the cathode quickly
become more positive than the anode, and the diode ceases to
conduct.
Operation of the simple capacitor filter using a full-wave
rectifier is basically the same as that discussed for the half-wave
rectifier. Referring to figure 4-18, you should notice that
because one of the diodes is always conducting on. either
alternation, the filter capacitor charges and discharges duringeach half cycle. (Note that each diode conducts only for that
portion of time when the peak secondary voltage is greater than
the charge across the capacitor.)
Figure 4-18. - Full-wave rectifier (with capacitor filter).
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
37/117
Another thing to keep in mind is that the ripple component (E r)
of the output voltage is an ac voltage and the average output
voltage (Eavg) is the dc component of the output. Since the filter
capacitor offers a relatively low impedance to ac, the majority of
the ac component flows through the filter capacitor. The ac
component is therefore bypassed (shunted) around the load
resistance, and the entire dc component (or Eavg) flows through
the load resistance. This statement can be clarified by using the
formula for XCin a half-wave and full-wave rectifier. First, you
must establish some values for the circuit.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
38/117
As you can see fro
of the rectifier, you
one-half. This allo
the calculations, by doublin
reduce the impedance of the c
s the ac component to pass th
the frequency
apacitor by
ough the
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
39/117
capacitor more easi
much easier to filte
Remember, the sma
to the load resistanc
the largest possible
Remember, also,
consideration. If lo
increases, and the
decreases. The RCthe value of the lo
voltage discharge i
load. The greater t
of the capacitor, a
voltage. For this re
used with rectifier
load current. Usin
with a full-wave or
y. As a result, a full-wave rec
than that of a half-wave recti
ller the XCof the filter capaci
e, the better the filtering actio
capacitor will provide the bes
that the load resistance is
d resistance is made small, t
average value of output
ischarge time constant is a did resistance; therefore, the r
a direct function of the curr
e load current, the more rapi
nd the lower the average v
ason, the simple capacitive
circuits that must supply a
the simple capacitive filter
bridge rectifier provides im
ifier output is
ier.
or with respect
. Since
filtering.
an important
e load current
voltage (Eavg)
ect function ofte of capacitor
nt through the
the discharge
alue of output
ilter is seldom
elatively large
in conjunction
roved filtering
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
40/117
because the increased ripple frequency decreases the capacitive
reactance of the filter capacitor.
CIRCUIT DIAGRAM OF POWER SUPPLY
DIODE
The diode is a p-n junction device. Diode is the component
used to control the flow of the current in any one direction. The
diode widely works in forward bias.
Diode When the current flows from the P to N direction. Then it
is in forward bias. The Zener diode is used in reverse bias
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
41/117
function i.e. N to P direction. Visually the identification of the
diode`s terminal can be done by identifying he silver/black line.
The silver/black line is the negative terminal (cathode) and the
other terminal is the positive terminal (cathode).
APPLICATION
Diodes: Rectification, free-wheeling, etc
Zener diode: Voltage control, regulator etc.
Tunnel diode: Control the current flow, snobbier circuit, etc
RESISTORS
The flow of charge through any material encounters an
opposing force similar in many respects to mechanical friction
.this opposing force is called resistance of the material .in some
electric circuit resistance is deliberately introduced in form of
resistor. Resistor used fall in three categories , only two of
which are color coded which are metal film and carbon film
resistor .the third category is the wire wound type ,where value
are generally printed on the vitreous paint finish of the
component. Resistors are in ohms and are represented in Greek
letter omega, looks as an upturned horseshoe. Most electronic
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
42/117
circuit require resistors to make them work properly and it is
obliviously important to find out something about the different
types of resistors available. Resistance is measured in ohms, the
symbol for ohm is an omega ohm. 1 ohm is quite small for
electronics so resistances are often given in kohm and Mohm.
Resistors used in electronics can have resistances as low as 0.1
ohm or as high as 10 Mohm.
FUNCTION
Resistor restrict the flow of electric current, for example a
resistor is placed in series with a light-emitting diode(LED) to
limit the current passing through the LED.
TYPES OF RESISTORS
FIXED VALUE RESISTORS
It includes two types of resistors as carbon film and metal film
.These two types are explained under
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
43/117
CARBON FILM RESISTORS
During manufacture, at in film of carbon is deposited onto a
small ceramic rod. The resistive coating is spiraled away in an
automatic machine until the resistance between there two ends
of the rods is as close as possible to the correct value. Metal
leads and end caps are added, the resistors is covered with an
insulating coating and finally painted with colored bands to
indicate the resistor value
Carbon Film Resistors
Another example for a Carbon 22000 Ohms or 22 Kilo-Ohms
also known as 22K at 5% tolerance: Band 1 = Red, 1st digit
Band 2 = Red, 2nd digit Band 3 = Orange, 3rd digit, multiplywith zeros, in this case 3 zero's Band 4 = Gold, Tolerance, 5%
METAL FILM RESISTORS
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
44/117
Metal film and metal oxides resistors are made in a similar way,
but can be made more accurately to within 2% or 1% of their
nominal vale there are some difference in performance between
these resistor types, but none which affects their use in simple
circuit.
WIRE WOUND RESISTOR
A wire wound resistor is made of metal resistance wire, and
because of this, they can be manufactured to precise values.
Also, high wattage resistors can be made by using a thick wire
material. Wire wound resistors cannot be used for high
frequency circuits. Coils are used in high frequency circuit. Wire
wound resistors in a ceramic case, strengthened with special
cement. They have very high power rating, from 1 or 2 watts to
dozens of watts. These resistors can become extremely hot when
used for high power application, and this must be taken into
account when designing the circuit.
TESTING
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
45/117
Resistors are checked with an ohm meter/millimeter. For a
defective resistor the ohm-meter shows infinite high reading.
CAPACITORS
In a way, a capacitor is a little like a battery. Although they
work in completely different ways, capacitors and batteries both
store electrical energy. If you have read How Batteries Work ,
then you know that a battery has two terminals. Inside the
battery, chemical reactions produce electrons on one terminal
and absorb electrons at the other terminal.
BASIC
Like a battery, a capacitor has two terminals. Inside the
capacitor, the terminals connect to two metal plates separated by
a dielectric. The dielectric can be air, paper, plastic or anything
else that does not conduct electricity and keeps the plates from
touching each other. You can easily make a capacitor from two
pieces of aluminum foil and a piece of paper. It won't be a
particularly good capacitor in terms of its storage capacity, but it
will work.
In an electronic circuit, a capacitor is shown like this:
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
46/117
When you connect a capacitor to a battery, heres what happens:
The plate on the capacitor that attaches to the negative terminal
of the battery accepts electrons that the battery is producing.
The plate on the capacitor that attaches to the positive terminal
of the battery loses electrons to the battery.
TESTING
To test the capacitors, either analog meters or specia
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
47/117
l digital meters with the specified function are used. The non-
electrolyte capacitor can be tested by using the digital meter.
Multi meter mode : Continuity Positive probe : One end
Negative probe : Second end Display : `0`(beep sound
occur) `OL` Result : Faulty OK
LED
LED falls within the family of P-N junction devices. The light
emitting diode (LED) is a diode that will give off visible light
when it is energized. In any forward biased P-N junction there
is, with in the structure and primarily close to the junction, a
recombination of hole and electrons. This recombination
requires that the energy possessed by the unbound free electron
be transferred to another state. The process of giving off light by
applying an electrical source is called electroluminescence.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
48/117
LED is a component used for indication. All the functions being
carried out are displayed by led .The LED is diode which glows
when the current is being flown through it in forward bias
condition. The LEDs are available in the round shell and also inthe flat shells. The positive leg is longer than negative leg.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
49/117
RADIO FREQUENCY IDENTIFICATION (RFID)
INTRODUCTION
RFID is the use of an object (typically referred to as an RFID
tag) applied to or incorporated into a product, animal, or person
for the purpose of identification and tracking using radio waves.
Some tags can be read from several meters away and beyond the
line of sight of the reader.
RFIDs are easy to conceal or incorporate in other items. For
example, in 2009 researchers at Bristol University successfully
glued RFID micro transponders to live ants in order to study
their behavior. This trend towards increasingly miniaturized
RFIDs is likely to continue as technology advances. However,
the ability to read at distance is limited by the inverse-square
law.
RFID is becoming increasingly prevalent as the price of the
technology decreases. Governments use RFID applications for
traffic management, while automotive companies use various
RFID tracking solutions for product management. Many of these
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
50/117
solutions may work together in the future, though privacy
regulations prevent many initiatives from moving forward at the
same pace that technology allows.
COMPONENTS OF RFID SYSTEM
An RFID system consists of RFID tags, a means of reading or
interrogating the tags and a means of communicating the data to
a host computer or information management system. The system
will also include a facility for entering or programming data into
tags, if it is not done at the source by the manufacturer. There
may also be present antennas for communication between the
tag and the reader.
A typical RFID system is made up of three components:
1.Tags,
2.Readers
3.Host computer system.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
51/117
RFID TAGS
An RFID tag is a tiny radio device that is also referred to as a
transponder, smart tag, smart label or radio barcode. The word
transponder is derived from the words transmitter and responder.
The tag responds to a transmitted or communicated request for
the data it carries. The tag comprises a simple silicon microchip
(typically less than half a millimeter in size) attached to a small
flat aerial and mounted on a substrate.
The transponder memory may comprise of read-only (ROM),
random access (RAM), and non-volatile programmable memory
for data storage depending on the type and sophistication of thedevice. The ROM-based memory is used to accommodate
security data and the transponder operating system instructions.
The RAM-based memory is used for temporary data storage
during transponder interrogation and response. The non-volatile
programmable memory (EEPROM) used to store thetransponder data and needs to be non-volatile to ensure that the
data is retained when the device is in its quiescent or power-
saving sleep state.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
52/117
Data buffers
temporarily hold th
outgoing data for
antenna. The inter
and accommodate
purposes in pass
transponder respo
interrogating field
transponder respons
TYPES OF RFID
On the basis o
classified into
Active tags
Passive tags.
RFID Tag Data F
re further components of m
incoming data following de
odulation and interface with
ace circuitry provides the f
he interrogation field energ
ve transponders and trig
se. The transponder anten
nd serves as the means for t
e for interrogation.
TAGS
the presence of battery, tags
rmat
emory used to
odulation and
he transponder
cility to direct
for powering
ering of the
a senses the
ansmitting the
an be
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
53/117
Printed barcode labels generally conform to the Universal
Product Code standard (UPC) of product identification. RFID
tags used to identify products in the supply chain serve the same
purpose, so its often expeditious to explain RFID tags simply as
electronic barcodes. Both RFID tags and barcode labels
digitally convey information about objects. Currently, Class
1+ RFID tags are available with a digital memory of 96 bits,
each bit being either logic 1 or a logic 0. Because alphanumeric
characters (i.e., AtoZ and 09) each require 8 bits of memory,
its possible to store 12 characters in an RFID tag (which isnt
saying much). On the other hand those 96 bits represent a
possible 79,228,162,514,264,300,000,000,000,000 (thats over
79.2 trillion) unique numerical identities. Or you could split the
96 bits into fields that each represents some characteristic of the
object, creating a sort of family tree of objects.
There are two basic tag data architectures. One is to include
all information about a product (e.g., its size, date of
manufactures, the quality inspectors name) on the tag itself.
This has the advantage of decentralizing the data, but has a
drawback in that the increased memory requirements on the tag
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
54/117
increase its complexity and cost. The other way is for the tag to
serve as a license plate for the object, which can be associated
with a database of its characteristics located in a centralized
database.
In 2000, Sarma, Brock, and Ashton of MITs AutoID
Project foresaw a world where all physical objectsact as
nodes in a networked physical world.1
They propose an open
architecture system that is independent of the specific tag
technology affixed or built into the object being tracked. They
proposed a common identification standard or Electronic
Product Code (ePC) standard.
HEADER MANUFACTURER
CODE
PRODUCT
CODE
SERIAL
NUMBER
The header serves as a way of identifying the format of the
sequence of bits that follow in the EPC. This makes system
coding more flexible. That is a critical innovation because it
allows for the use of various independent standards of
identification to be understood by users of other formats.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
55/117
FREQUENCY RANGE OF RFID
There are several versions of RFID that operate at different radio
frequencies. The choice of frequency is dependent on the
business requirements and read environment it is not a
technology where one size fits all applications.
Three primary frequency bands are being used for RFID:
Low Frequency(125/134KHz) Most commonly used for
access control, animal tracking and asset tracking.
High -Frequency(13.56 MHz) Used where medium data
rate and read ranges up to about 1.5 meters are acceptable.
This frequency also has the advantage of not being
susceptible to interference from the presence of water or
metals.
Ultra High-Frequency(850 MHz to 950 MHz) offer the
longest read ranges of up to approximately 3 meters and
high reading speeds.
READERS
The reader, sometimes called an interrogator or
scanner, sends and receives RF data to and from the tag via
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
56/117
antennae. A reader may have multiple antennae that are
responsible for sending and receiving radio waves.
The readers can be fixed or mobile, can read information
stored on the tags and write information to them. This can be
achieved without direct line of sight and in environments where
traditional data collection could not operate. A major advantage
is that information can be written to the tag multiple times so
storing a history that travels with the article.
The reader/interrogators can differ considerably in
complexity depending on the type of tags being supported and
functions to be fulfilled. The overall function is to provide the
means of communicating with the tag and facilitating data
transfer. Functions performed by readers include signal
conditioning, parity error checking and correction.
Once the signal from a transponder has been correctly
received and decoded, algorithms can be applied to decide
whether the signal is a repeat transmission and may then instruct
the transponder to stop transmitting. This is known as Command
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
57/117
Response Protocol and is used to circumvent the problem of
reading multiple tags in a short span of time.
Using interrogators in this way is also referred to as Hands
Down Polling. A more secure, but slower tag polling technique
is called Hands Up Polling which involves the interrogator
looking for tags with specific identities and interrogating them,
in turn. A further approach uses multiple readers, multiplexed
into one interrogator but results in cost increase.
PRINCIPLE OF WORKING
In the RFID system, the reader sends out a radio
frequency wave to the tag and the tag broadcasts back its stored
data to the reader. The system has two antennas, one for the tag
and the other on the reader. The data collected from the tag can
either be sent directly to a host computer through standard
interfaces or it can be stored in a portable reader and later
updated to the computer for data processing. The automatic
reading and direct use of tag data is called automatic data
capture.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
58/117
When the tag which is battery free, is to be read, the reader
sends out a power pulse to the antenna lasting for about
50ms.The magnetic field generated is collected by the antenna in
the transponder that is tuned to the same frequency. This
received energy is rectified and stored on a capacitor within the
transponder.
When the power pulse has finished, the transponder
immediately transmits back its data, using the energy stored
within its capacitor as its power source. The data is picked up by
the receiving antenna and decoded by the reader unit.
Once all the data has been transmitted, the storage capacitoris discharged resetting the transponder to make it ready for the
next read cycle. The period between transmission pulses is
called sync time and lasts between 20ms and 50ms depending on
the system set up.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
59/117
TAG
Fig. 8.3.1 WORKING OF RFID SYSTEM
The scanning antennas can be permanently affixed to a surface;
handheld antennas are also available. They can take whatever
shape you need; for example, you could build them into a door
frame to accept data from persons or objects passing through.
When an RFID tag passes through the field of the scanning
antenna, it detects the activation signal from the antenna. That
"wakes up" the RFID chip, and it transmits the information on
its microchip to be picked up by the scanning antenna.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
60/117
ADVANTAGES
RFID technology permits no line of sight reading.
Robustness and reliability under difficult environmental
conditions.
These tags can be read through water, snow, concrete,
bricks, plastics, wood, and most non-metallic materials
Available in a wide variety of physical forms, shapes, sizes
and protective housings.
RFID tags can be read at very high speeds.
The tag need not be on the surface of the object (and is
therefore not subject to wear).
The read time is typically less than 100 milliseconds
Large numbers of tags can be read at once rather than item
by item.
APPLICATIONS
Principle areas of applications of RFID include:
1. Transportation
2. Manufacturing and processing.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
61/117
3. Security.
Texas Instruments Radio Frequency Identification (TI-
RFid) Systems has introduced its new RFID tag for textile rental
and dry cleaning applications. TI-RFid tags provide more
accurate identification and greater accountability as well as
improved handling through each stage of cleaning and
processing to final customer delivery.
RFID system allows booksellers to gain such information as the
range of books a shopper has browsed, the number of times a
particular title was picked up, and even the length of time spent
flipping through pages. The shelves can scan the contents of theshelves and, via computer, alert store employees when supplies
are running low or when theft is detected.[4]
RFID tags loaded with biometric information will be embedded
in passports to ensure travelers comply with security regulations.
RFID technology is also being used to improve luggage
handling in airports.
Certain specific applications of RFID include:
1. Fleet management.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
62/117
2. Inventory and asset Management
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
63/117
GLOBAL SYSTEM FOR MOBILE
COMMUNICATION (GSM)
INTRODUCTION
Definition
GSM, which stands for Global System for Mobile
communications, reigns (important) as the worlds most widely
used cell phone technology. Cell phones use a cell phone service
carriers GSM network by searching for cell phone towers in the
nearby area. Global system for mobile communication (GSM) is
a globally accepted standard for digital cellular communication.
GSM is the name of a standardization group established in 1982
to create a common European mobile telephone standard that
would formulate specifications for a pan-European mobile
cellular radio system operating at 900 MHz. It is estimated that
many countries outside of Europe will join the GSM partnership.
GSM ARCHITECTURE
A GSM network consists of several functional entities
whose functions and interfaces are defined. The GSM network
can be divided into following broad parts.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
64/117
The Mobile Station (MS)
The Base Station Subsystem (BSS)
The Network Switching Subsystem (NSS)
The Operation Support Subsystem (OSS)
Following fig shows the simple architecture diagram of GSM
Network.
The added components of the GSM architecture include the
functions of the databases and messaging systems:
Home Location Register (HLR)
Visitor Location Register (VLR)
Equipment Identity Register (EIR)
Authentication Center (AuC)
SMS Serving Center (SMS SC)
Gateway MSC (GMSC)
Chargeback Center (CBC)
Transcoder and Adaptation Unit (TRAU)
Following fig shows the diagram of GSM Network along with
added elements.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
65/117
Fig:9.2.1
The MS a
interface, also kno
communicates witacross the A interfa
GSM network are
In a GSM network,
Cell: Cell is the b
Each cell is given
uniquely identifies t
Location Area:A
the area that is pag
GSM Network along with a
d the BSS communicate
n as the air interface or radio
the Network Service Se.
s
the following areas are define
sic service area, one BTS c
Cell Global Identity (CGI),
he cell.
roup of cells form a Locatio
d when a subscriber gets an
ded elements.
cross the Um
link. The BSS
itching center
:
overs one cell.
a number that
n Area. This is
incoming call.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
66/117
Each Location Area is assigned a Location Area Identity (LAI).
Each Location Area is served by one or more BSCs.
MSC/VLR Service Area: The area covered by one MSC is
called the MSC/VLR service area.
PLMN: The area covered by one network operator is called
PLMN. A PLMN can contain one or more MSCs.
The GSM networks parts are explained as follows
1) Mobile Station
The mobile station (MS) consists of the physical
equipment, such as the radio transceiver, display and digital
signal processors, and a smart card called the Subscriber Identity
Module (SIM). The SIM provides personal mobility, so that the
user can have access to all subscribed services irrespective of
both the location of the terminal and the use of a specific
terminal. By inserting the SIM card into another GSM cellular
phone, the user is able to receive calls at that phone, make calls
from that phone, or receive other subscribed services.
The mobile equipment is uniquely identified by the
International Mobile Equipment Identity (IMEI). The SIM card
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
67/117
contains the International Mobile Subscriber Identity (IMSI),
identifying the subscriber, a secret key for authentication, and
other user information. The IMEI and the IMSI are
independent, thereby providing personal mobility. The SIM
card may be protected against unauthorized use by a password
or personal identity number.
2) Base Station Subsystem
The Base Station Subsystem is composed of two parts,
the Base Transceiver Station (BTS) and the Base Station
Controller (BSC). These communicate across the specified Abis
interface, allowing (as in the rest of the system) operationbetween components made by different suppliers.
The Base Transceiver Station houses the radio
transceivers that define a cell and handles the radio link
protocols with the Mobile Station. In a large urban area, there
will potentially be a large number of BTSs deployed. The
requirements for a BTS are ruggedness, reliability, portability,
and minimum cost.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
68/117
The Base Station Controller manages the radio
resources for one or more BTSs. It handles radio channel setup,
frequency hopping, and handovers, as described below. The
BSC is the connection between the mobile and the Mobile
service Switching Center (MSC). The BSC also translates the
13 kbps voice channel used over the radio link to the standard 64
kbps channel used by the Public Switched Telephone Network
or ISDN.
3) Network Subsystem
The central component of the Network Subsystem is
the Mobile services Switching Center (MSC). It acts like anormal switching node of the PSTN or ISDN, and in addition
provides all the functionality needed to handle a mobile
subscriber, such as registration, authentication, location
updating, handovers, and call routing to a roaming subscriber.
These services are provided in conjunction with severalfunctional entities, which together form the Network
Subsystem. The MSC provides the connection to the public
fixed network (PSTN or ISDN), and signaling between
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
69/117
functional entities uses the ITUT Signaling System Number 7
(SS7), used in ISDN and widely used in current public networks.
The Home Location Register (HLR) and Visitor
Location Register (VLR), together with the MSC, provide the
call routing and (possibly international) roaming capabilities of
GSM. The HLR contains all the administrative information of
each subscriber registered in the corresponding GSM network,
along with the current location of the mobile. The current
location of the mobile is in the form of a Mobile Station
Roaming Number (MSRN) which is a regular ISDN number
used to route a call to the MSC where the mobile is currently
located. There is logically one HLR per GSM network,
although it may be implemented as a distributed database.
The Visitor Location Register contains selected
administrative information from the HLR, necessary for call
control and provision of the subscribed services, for each mobilecurrently located in the geographical area controlled by the
VLR. Although each functional entity can be implemented as
an independent unit, most manufacturers of switching equipment
implement one VLR together with one MSC, so that the
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
70/117
geographical area controlled by the MSC corresponds to that
controlled by the VLR, simplifying the signaling required. Note
that the MSC contains no information about particular mobile
stations - this information is stored in the location registers.
The other two registers are used for authentication
and security purposes. The Equipment Identity Register (EIR) is
a database that contains a list of all valid mobile equipment on
the network, where each mobile station is identified by its
International Mobile Equipment Identity (IMEI). An IMEI is
marked as invalid if it has been reported stolen or is not type
approved. The Authentication Center is a protected database
that stores a copy of the secret key stored in each subscriber's
SIM card, which is used for authentication and ciphering of the
radio channel.
GSM - The Base Station Subsystem (BSS)
The BSS is composed of two parts:
The Base Transceiver Station (BTS)
The Base Station Controller (BSC)
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
71/117
The BTS and the BSC communicate across the
specified Abis interface, enabling operations between
components that are made by different suppliers. The radio
components of a BSS may consist of four to seven or nine cells.
A BSS may have one or more base stations. The BSS uses the
Abis interface between the BTS and the BSC. A separate high-
speed line (T1 or E1) is then connected from the BSS to the
Mobile MSC.
The Base Transceiver Station (BTS)
The BTS houses the radio transceivers that define a cell
and handles the radio link protocols with the MS. In a large
urban area, a large number of BTSs may be deployed.
Transcoding and rate adaptation
Time and frequency synchronizing
Voice through full- or half-rate services
Decoding, decrypting, and equalizing received signals
Random access detection
Timing advances
Uplink channel measurements
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
72/117
The Base Station Controller (BSC)
The BSC manages the radio resources for one or
more BTSs. It handles radio channel setup, frequency hopping,
and handovers. The BSC is the connection between the mobile
and the MSC. The BSC also translates the 13 Kbps voice
channel used over the radio link to the standard 64 Kbps channel
used by the Public Switched Telephone Network (PSDN) or
ISDN.
It assigns and releases frequencies and time slots for the MS.
The BSC also handles intercell handover. It controls the power
transmission of the BSS and MS in its area. The function of theBSC is to allocate the necessary time slots between the BTS and
the MSC. It is a switching device that handles the radio
resources. Additional functions include:
Control of frequency hopping
Performing traffic concentration to reduce the number of
lines from the MSC
Providing an interface to the Operations and Maintenance
Center for the BSS
Reallocation of frequencies among BTSs
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
73/117
Time and frequency synchronization
Power management
Time-delay measurements of received signals from the MS
The Network Switching Subsystem (NSS)
The Network switching system (NSS), the main part of
which is the Mobile Switching Center (MSC), performs theswitching of calls between the mobile and other fixed or mobile
network users, as well as the management of mobile services
such as authentication.
The switching system includes the following functional
elements.
Home Location Register (HLR)
The HLR is a database used for storage and
management of subscriptions. The HLR is considered the most
important database, as it stores permanent data about
subscribers, including a subscriber's service profile, location
information, and activity status. When an individual buys a
subscription in the form of SIM then all the information about
this subscription is registered in the HLR of that operator.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
74/117
Mobile Services Switching Center (MSC)
The central component of the Network Subsystem is
the MSC. The MSC performs the switching of calls between the
mobile and other fixed or mobile network users, as well as the
management of mobile services such as such as registration,
authentication, location updating, handovers, and call routing to
a roaming subscriber. It also performs such functions as toll
ticketing, network interfacing, common channel signaling, and
others. Every MSC is identified by a unique ID.
Visitor Location Register (VLR)
The VLR is a database that contains temporary
information about subscribers that is needed by the MSC in
order to service visiting subscribers. The VLR is always
integrated with the MSC. When a mobile station roams into a
new MSC area, the VLR connected to that MSC will request
data about the mobile station from the HLR. Later, if the mobile
station makes a call, the VLR will have the information needed
for call setup without having to interrogate the HLR each time.
Authentication Center (AUC)
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
75/117
The Authentication Center is a protected database that
stores a copy of the secret key stored in each subscriber's SIM
card, which is used for authentication and ciphering of the radio
channel. The AUC protects network operators from different
types of fraud found in today's cellular world.
Equipment Identity Register (EIR)
The Equipment Identity Register (EIR) is a database
that contains a list of all valid mobile equipment on the network,
where its International Mobile Equipment Identity (IMEI)
identifies each MS. An IMEI is marked as invalid if it has been
reported stolen or is not type approved.
THE OPERATION SUPPORT SUBSYSTEM (OSS)
The operations and maintenance center (OMC) is
connected to all equipment in the switching system and to the
BSC. The implementation of OMC is called the operation and
support system (OSS).
Here are some of the OMC functions:
Administration and commercial operation (subscription,
end terminals, charging and statistics).
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
76/117
Security Management.
Network configuration, Operation and Performance
Management.
Maintenance Tasks.
The operation and Maintenance functions are based on the
concepts of the Telecommunication Management Network
(TMN) which is standardized in the ITU-T series M.30.
The OSS is the functional entity from which the
network operator monitors and controls the system. The purpose
of OSS is to offer the customer cost-effective support for
centralized, regional and local operational and maintenanceactivities that are required for a GSM network. An important
function of OSS is to provide a network overview and support
the maintenance activities of different operation and
maintenance organizations.
THE GSM SPECIFICATIONS
Specifications for different Personal Communication
Services (PCS) systems vary among the different PCS networks.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
77/117
The GSM specification is listed below with important
characteristics.
Modulation
Modulation is a form of change process where we change
the input information into a suitable format for the transmission
medium. We also changed the information by demodulating the
signal at the receiving end.
The GSM uses Gaussian Minimum Shift Keying (GMSK)
modulation method.
Access Methods
Because radio spectrum is a limited resource shared by
all users, a method must be devised to divide up the bandwidth
among as many users as possible.
GSM chose a combination of TDMA/FDMA as its
method. The FDMA part involves the division by frequency of
the total 25 MHz bandwidth into 124 carrier frequencies of 200
kHz bandwidth.
One or more carrier frequencies are then assigned to
each BS. Each of these carrier frequencies is then divided in
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
78/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
79/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
80/117
GSM distinguishes explicitly between user and
equipment and deals with them separately. Besides phone
numbers and subscriber and equipment identifiers, several other
identifiers have been defined; they are needed for the
management of subscriber mobility and for addressing of all the
remaining network elements. The most important addresses and
identifiers are presented in the following:
International Mobile Station Equipment Identity (IMEI)
The international mobile station equipment identity (IMEI)
uniquely identifies a mobile station internationally. It is a kind
of serial number. The IMEI is allocated by the equipmentmanufacturer and registered by the network operator and
registered by the network operator who stores it in the EIR. By
means of IMEI one recognizes obsolete, stolen or nonfunctional
equipment.
International Mobile Subscriber Identity (IMSI)
Each registered user is uniquely identified by its
international mobile subscriber identity (IMSI). It is stored in the
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
81/117
subscriber identity module (SIM) a mobile station can only be
operated if a SIM with a valid IMSI is inserted into equipment
with a valid IMEI.
SECURITY AND ENCRYPTION
The security methods standardized for the GSM
System make it the most secure cellular telecommunications
standard currently available. Although the confidentiality of a
call and anonymity of the GSM subscriber is only guaranteed on
the radio channel, this is a major step in achieving end-to- end
security.
The subscriber's anonymity is ensured through the use
of temporary identification numbers. The confidentiality of the
communication itself on the radio link is performed by the
application of encryption algorithms and frequency hopping
which could only be realized using digital systems and
signaling.
Mobile Station Authentication
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
82/117
The GSM network authenticates the identity of the
subscriber through the use of a challenge-response mechanism.
A 128-bit random number (RAND) is sent to the MS. The MS
computes the 32-bit signed response (SRES) based on the
encryption of the random number (RAND) with the
authentication algorithm (A3) using the individual subscriber
authentication key (Ki). Upon receiving the signed response
(SRES) from the subscriber, the GSM network repeats the
calculation to verify the identity of the subscriber.
The individual subscriber authentication key (Ki) is
never transmitted over the radio channel. It is present in the
subscriber's SIM, as well as the AUC, HLR, and VLR databases
as previously described. If the received SRES agrees with the
calculated value, the MS has been successfully authenticated
and may continue. If the values do not match, the connection is
terminated and an authentication failure indicated to the MS.
The calculation of the signed response is processed
within the SIM. This provides enhanced security, because the
confidential subscriber information such as the IMSI or the
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
83/117
individual subscriber authentication key (Ki) is never released
from the SIM during the authentication process.
Signaling and Data Confidentiality
The SIM contains the ciphering key generating
algorithm (A8) which is used to produce the 64-bit ciphering
key (Kc). The ciphering key is computed by applying the same
random number (RAND) used in the authentication process to
the ciphering key generating algorithm (A8) with the individual
subscriber authentication key (Ki). As will be shown in later
sections, the ciphering key (Kc) is used to encrypt and decrypt
the data between the MS and BS.
An additional level of security is provided by having
the means to change the ciphering key, making the system more
resistant to eavesdropping. The ciphering key may be changed at
regular intervals as required by network design and security
considerations. In a similar manner to the authentication process,
the computation of the ciphering key (Kc) takes place internally
within the SIM. Therefore sensitive information such as the
individual subscriber authentication key (Ki) is never revealed
by the SIM.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
84/117
Encrypted voice and data communications between the
MS and the network is accomplished through use of the
ciphering algorithm A5. Encrypted communication is initiated
by a ciphering mode request command from the GSM network.
Upon receipt of this command, the mobile station begins
encryption and decryption of data using the ciphering algorithm
(A5) and the ciphering key (Kc).
Subscriber Identity Confidentiality
To ensure subscriber identity confidentiality, the
Temporary Mobile Subscriber Identity (TMSI) is used. The
TMSI is sent to the mobile station after the authentication and
encryption procedures have taken place. The mobile station
responds by confirming reception of the TMSI. The TMSI is
valid in the location area in which it was issued. For
communications outside the location area, the Location Area
Identification (LAI) is necessary in addition to the TMSI.
Telephony Service
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
85/117
These services can be charged on per call basis. Only call
initiator has to pay the charges and now a day, all the incoming
charges are free. A customer can be charged based on different
parameters like:
International call or long distance call.
Local call
Call made during peak hours.
Call made during night time
Discounted call during weekends.
Call per minute or per second.
Many more other criteria can be designed by a service
provider to charge their customers.
SMS Service
Till the time this tutorial is written, most of the service
providers are charging their customer's SMS services based on
number of text messages sent from their mobile phone. There
are other prime SMS services available where service providers
are charging more than normal SMS charge. These services are
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
86/117
being used in collaboration of Television Networks or Radio
Networks to demand SMS from the audiences
Most of time charges are paid by the SMS sender but
for some services like stocks and share prices, mobile banking
facilities and leisure booking services etc. recipient of the SMS
has to pay for the service.
GPRS Services
Using GPRS service we can browse Internet and can play
games on the Internet, we can download movies or music etc. So
a service provider will charge us based on the data uploaded as
well as data downloaded on our mobile phone. These charges
will be based on per Kilo Byte data downloaded/uploaded.
Additional parameter could be a Quality of Service
provided to us. If we want to watch a movie then a low qualitymay work because some data loss may be acceptable to us but if
we are downloading a zip file then a single byte loss will corrupt
our complete downloaded file.
Advantages of GSM
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
87/117
GSM is already used worldwide with over 450 million
subscribers.
International roaming permits subscribers to use one phone
throughout Western Europe. CDMA will work in Asia, but
not France, Germany, the U.K. and other popular European
destinations.
GSM is mature, having started in the mid-80s. This
maturity means a more stable network with robust features.
CDMA is still building its network.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
88/117
LCD PIN DESC
Fig 1. Shows the pi
The LCD used here
given below:
VCC, VSS, and V
IPTIONS
diagram of a 14 pin LCD.
has 14 pins. The functions of
E :
each pin is
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
89/117
While Vcc and Vss provide +5V and ground, respectively, VEE
is used for controlling LCD contrast.
RS, REGISTER SELECT:
There are two very important registers inside the LCD. The RS
pin is used for their selection as follows .If RS = 0 , then
instruction command code register is selected , allowing the user
to send the command such as clear display, cursor at home, etc.
If RS = 1 the data register is selected, allowing the user to send
data to be displayed on the LCD.
R/W, READ/WRITE:
R/W input allows the user to write information to the LCD or
read information from it.
R/W =1 when reading ; R/W = 0 when writing.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
90/117
E, ENABLE:
The enable pin is used by the LCD to latch information
presented to its data pins. When data is supplied to data pins, a
high to low pulse must be applied to this pin in order for the
LCD to latch in the data present at the data pins. This pulse must
be a minimum of 450 ns wide.
D0 D7:
The 8 bit data pins , D0 D7, are used to send information tothe LCD or read the contents of the LCD's internal registers.
To display letters and numbers, we send ASCII codes for the
letters A- Z, a-z, and 0-9 to these pins while making RS = 1.
There are also instruction command codes that can be send to
the LCD to clear the display or force to cursor to the home
position or blink the cursor.
We also use RS=0 to check the busy flag bit to see if the LCD is
ready to receive information. The busy flag is D7 and can be
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
91/117
read when R/W=1.RS=0, as follows: if R/W=1 and RS=0.When
D7=1 (busy flag=1), the LCD is busy taking care of internal
operations and will not accept any new information. When D7
= 0, the LCD is ready to receive new information.
PIN DESCRIPTION FOR LCD
Pi
n
Sym
bol
I/O Description
1 Vss -- Ground
2 Vcc -- +5V power supply
3 VE
E
-- Power supply to control contrast
4 RS I RS=0 for command register, RS=1 for
data register
5 R/W I R/W+0 for write, R/W+1 for read
6 E I/O Enable
7 DB0 I/O The 8-bit data bus
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
92/117
8 DB1 I/O The 8-bit data bus
9 DB2 I/O The 8-bit data bus
10 DB3 I/O The 8-bit data bus
11 DB4 I/O The 8-bit data bus
12 DB5 I/O The 8-bit data bus
13 DB6 I/O The 8-bit data bus
14 DB7 I/O The 8-bit data bus
LCD Command Codes
Code (Hex) Command to LCD Instruction
Register
1 Clear display screen
2 Return home
4 Decrement cursor(shift cursor to left)
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
93/117
6 Increment cursor(shift cursor to right)
5 Shift display left
7 Shift display left
8 Display off, cursor off
A Display off, cursor on
C Display on, cursor off
E Display on
F Display on, cursor blinking
10 Shift cursor position to left
14 Shift cursor position to right
18 Shift the entire display to the left
1C Shift the entire display to the right
80 Force cursor to beginning of first line
C0 Force cursor to beginning of second
line
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
94/117
38 2 lines and 5x7 matrix
WORKING:
The interface used by LCD is a parallel bus, allowing simple and
fast reading/writing of data to and from the LCD.
.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
95/117
This waveform will write an ASCII Byte out to the LCD's
screen. The ASCII code to be displayed is eight bits long and is
sent to the LCD either four or eight bits at a time. If four bit
mode is used, two "nibbles" of data (Sent high four bits and then
low four bits with an "Enable" Clock pulse with each nibble) are
sent to make up a full eight bit transfer. The "Enable" Clock is
used to initiate the data transfer within the LCD.
Sending parallel data as either four or eight bits are the two
primary modes of operation. While there are secondary
considerations and modes, deciding how to send the data to the
LCD is most critical decision to be made for an LCD interface
application.
Eight bit mode is best used when speed is required in an
application and at least ten I/O pins are available. Four bit mode
requires a minimum of six bits. To wire a microcontroller to an
LCD in four bit mode, just the top four bits (DB4-7) are writtento.
The "RS" bit is used to select whether data or an instruction is
being transferred between the microcontroller and the LCD. If
the Bit is set, then the byte at the current LCD "Cursor" Position
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
96/117
can be read or written. When the Bit is reset, either an
instruction is being sent to the LCD or the execution status of
the last instruction is read back (whether or not it has
completed).
Reading Data back is best used in applications which required
data to be moved back and forth on the LCD (such as in
applications which scroll data between lines).In our Project we
have permanently grounded R/W pin which means we are not
retrieving any data from LCD.
The LCD can be thought of as a "Teletype" display because in
normal operation, after a character has been sent to the LCD, theinternal "Cursor" is moved one character to the right. The "Clear
Display" and "Return Cursor and LCD to Home Position"
instructions are used to reset the Cursor's position to the top
right character on the display.
To move the Cursor, the "Move Cursor to Display" instruction is
used. For this instruction, bit 7 of the instruction byte is set with
the remaining seven bits used as the address of the character on
the LCD the cursor is to move to. These seven bits provide 128
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
97/117
addresses, which matches the maximum number of LCD
character addresses available.
Eight programmable characters are available and use codes0x000 to 0x007. They are programmed by pointing the LCD's
"Cursor" to the Character Generator RAM
The last aspect of the LCD to discuss is how to specify a
contrast voltage to the Display. I typically use a potentiometer
wired as a voltage divider. This will provide an easily variable
voltage between Ground and Vcc, which will be used to specify
the contrast (or "darkness") of the characters on the LCD screen.
You may find that different LCDs work differently with lower
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
98/117
voltages providing darker characters in some and higher
voltages do the same thing in others
CIRCUIT DIAGRAM OF LCD INTERFACING
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
99/117
VISION
The Vision IDE is, for most developers, the easiest way to
create embedded system programs. This chapter describes
commonly used Vision features and explains how to use them.
General Remarks and Concepts
Before we start to describe how to use Vision, some general
remarks, common to many screens1 and to the behavior of the
development tool, are presented. In our continuous effort todeliver best-in-class development tools, supporting you in your
daily work, Vision has been built to resemble the look-and-feel
of widespread applications. This approach decreases your
learning curve, such that
you may start to work with Vision right away.
Based on the concept of windows:
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
100/117
Vision windows can be re-arranged, tiled, and attached to
other screen areas or windows respectively It is possible to drag
and drop windows, objects, and variables
A Context Menu, invoked through the right mouse button, is
provided for most objects. You can use keyboard shortcuts and
define your own shortcuts. You can use the abundant features of
a modern editor. Menu items and Toolbar buttons are greyed out
when not available in the Current context.
Graphical symbols are used to resemble options, to mark
unsaved changes, or reveal objects not included into the project.
Status Bars display context-driven information.You can
associate Vision to third-party tools
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
101/117
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
102/117
The Project Windows area is that part of the screen in which,
by default, the Project Window, Functions Window, Books
Window, and Registers Window are displayed.
Within the Editor Windows area, you are able to change the
source code, view performance and analysis information, and
check the disassembly code.
The Output Windows area provides information related to
debugging, memory, symbols, call stack, local variables,
commands, browse information, and find in files results.
If, for any reason, you do not see a particular window and have
tried displaying/hiding it several times, please invoke the default
layout of Vision through the Window Reset Current
Layout Menu.
Positioning Windows
The Vision windows may be placed onto any area of the
screen, even outside of the Vision frame, or to another physical
screen.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
103/117
Click and hold the Title Bar1 of a window with the left mouse
button
Drag the window to the preferred area, or onto the preferred
control, and release the mouse button
Please note, source code files cannot be moved outside of the
Editor Windows2.\ Invoke the Context Menu of the windows
Title Bar to change the docking attribute of a window object. Insome cases, you must perform this action before you can drag
and drop the window.
Vision displays docking helper controls3, emphasizing the area
where the window will be attached. The new docking area is
represented by the section highlighted in blue. Snap the window
to the Multiple Document Interface (MDI) or to a Windows area
by moving the mouse over the preferred control.
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
104/117
Keil software converts the C-codes into the Intel Hex code.
A view of Keil uVision 3
A view of Keil uVision 3
8/13/2019 Www.hbeonlabs.com_rf+Gsm Reports_rfid and Gsm Based Intelligent Mailbox
105/117
8051 Burner Software
PRO51 BURNER provides you with software burning tools for
8051 based Microcontrollers in there Flash memory. The 51
BURNER tools, you can burn AT89SXXXX series of ATMEL
microcontrollers.
8/13/2019 Www.hbeonlabs.com_rf+Gs