Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID...

60
1 CHAPTER-1 INTRODUCTION Mobile phones are often used in prohibited area .In order to avoid the usage of mobile phones in such protected area we design a system within the mobile phone that makes mobile disable with its keypad and speaker to avoid attending the call and playing audio respectively. This system will be active for only mobile phone comes under the coverage of protected area with RF range. We are sending a four bit data by a RF Transmitter after ASK modulation in the microcontroller and after getting that Data microcontroller will deactivate the required component like speaker, keypad etc by the help of Relay. We cannot receive the call in that area. 1.1 BLOCK DIAGRAM: RESTRICTED AREA Fig. 1.1 POWER SUPPLY ENCODER RF TRANSMITTER

description

In Temples, Restaurants where people get irritated with the noise polluted by the Cell Phone users, where they talk loudly which creates annoyance to others and also due to the ringtones. Thus handoff mechanism came under existence which was a temporary solution. Though it eradicated those problems it is not a suitable & good solution because of its limitations, which are to be discussed later.But the main reason why it is not suitable is because of a first and foremost reason. The purpose of using cell phone is affected. Here when we enter the area the mobile phone is set under not reachable state, thus there are chances of missing some important calls. Also another issue is that, in Hospitals and the Airplanes the Electromagnetic waves radiated from the Handsets causes disturbances to those electronic equipments

Transcript of Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID...

Page 1: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

1

CHAPTER-1

INTRODUCTION

Mobile phones are often used in prohibited area .In order to avoid the usage of mobile phones in

such protected area we design a system within the mobile phone that makes mobile disable with

its keypad and speaker to avoid attending the call and playing audio respectively. This system

will be active for only mobile phone comes under the coverage of protected area with RF range.

We are sending a four bit data by a RF Transmitter after ASK modulation in the microcontroller

and after getting that Data microcontroller will deactivate the required component like speaker,

keypad etc by the help of Relay. We cannot receive the call in that area.

1.1 BLOCK DIAGRAM:

RESTRICTED AREA

Fig. 1.1

POWER SUPPLY ENCODER RF TRANSMITTER

Page 2: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

2

MOBILE SECTION:

Fig. 1.2

1.2 BLOCK DIAGRAM DESCRIPTION:

In In restricted area will have RF Transmitter to inform the mobile about the restriction.

In mobile section RF receiver will get the signal from restricted area.

Then the microcontroller will block the keypad and speaker in the phone through relay.

LCD will display the status of mobile phone

Once the user go out of the protected area means then the mobile will work in a normal mode

MCU RF RECEIVER

RELAY 1

RELAY 2

LCD

GSM

Page 3: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

3

1.3 EXISTING SYSTEM:

In restricted area Mobile jammer is planted and it kills the communication completely.

Jammer generates Noise signal .

We may miss some important incoming calls as we won‘t get the notification about it.

We may keep the mobile in silent mode but it is manually done and only if the user wishes.

1.4 PROPOSED SYSTEM:

Automatic operation.

Restricted area will have RF Transmitter to inform the mobile about the restriction.

In mobile section RF receiver will get the signal from restricted area.

Then the microcontroller will block the keypad and speaker in the phone through relay.

It doesn‘t depend on the wish of the user of the mobile but on the rules of the restricted area.

1.5 CIRCUIT DIAGRAM

Fig. 1.3

VCC

VCC

P0_0P0_1P0_2P0_3P0_4P0_5P0_6P0_7P1_7

P1_6

P1_1P1_0

P1_3P1_2

P1_5P1_4

P3_3

P3_0

P3_4

P3_7

P3_5

P3_2

P3_6

P3_1

P2_4

P2_2

P2_7

P2_1

P2_5

P2_3

P2_6

P2_0

R28K2

C2

10uF

U1

8051

9

1819

20

293031

40

12345678

2122232425262728

1011121314151617

3938373635343332

RST

XTAL2XTAL1

GND

PSENALE/PROG

EA/VPP

VCCP1.0

P1.1P1.2P1.3P1.4P1.5P1.6P1.7

P2.0/A8P2.1/A9

P2.2/A10P2.3/A11P2.4/A12P2.5/A13P2.6/A14P2.7/A15

P3.0/RXDP3.1/TXDP3.2/INTOP3.3/INT1P3.4/TOP3.5/T1P3.6/WRP3.7/RD

P0.0/AD0P0.1/AD1P0.2/AD2P0.3/AD3P0.4/AD4P0.5/AD5P0.6/AD6P0.7/AD7

X111.0592MHz

C333PF

C433PF

C1

0.1uF

RST

Page 4: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

4

CHAPTER 2

POWER SUPPLY UNIT

Fig. 2.1

VDD

VDD

C70.1 uF

JP2

220 VAC

12

- +

D1

1

4

3

2

U27805

1

3

2VIN

GN

D

VOUT

C6100 uF

C5470 uF

R4220 ohm

D2

LED

Page 5: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

5

2.1 CIRCUIT DIAGRAM OF POWER SUPPLY

Fig 2.2

2.1.1 WORKING PRINCIPLE:

The AC voltage, typically 220V rms, is connected to a

transformer, which steps that ac voltage down to the level of the desired DC

output. A diode rectifier then provides a full-wave rectified voltage that is

initially filtered by a simple capacitor filter to produce a dc voltage. This

resulting dc voltage usually has some ripple or ac voltage variation.

A regulator circuit removes the ripples and also remains the same dc value even if the input dc

voltage varies, or the load connected to the output dc voltage changes.

Page 6: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

6

2.1.2 TRANSFORMER:

The potential transformer will step down the power supply voltage (0-230V) to (0-6V) level.

Then the secondary of the potential transformer will be connected to the precision rectifier,

which is constructed with the help of op–amp. The advantages of using precision rectifier are it

will give peak voltage output as DC, rest of the circuits will give only RMS output.

2.1.3 BRIDGE RECTIFIER:

When four diodes are connected as shown in figure, the circuit is called as bridge rectifier.

The input to the circuit is applied to the diagonally opposite corners of the network, and the

output is taken from the remaining two corners.

Let us assume that the transformer is working properly and there is a positive potential, at point

A and a negative potential at point B. the positive potential at point A will forward bias D3 and

reverse bias D4.

The negative potential at point B will forward bias D1 and reverse D2. At this time D3 and

D1 are forward biased and will allow current flow to pass through them; D4 and D2 are reverse

biased and will block current flow.

The path for current flow is from point B through D1, up through RL, through D3, through

the secondary of the transformer back to point B. this path is indicated by the solid arrows.

Waveforms (1) and (2) can be observed across D1 and D3.

One-half cycle later the polarity across the secondary of the transformer reverse, forward

biasing D2 and D4 and reverse biasing D1 and D3. Current flow will now be from point A

through D4, up through RL, through D2, through the secondary of T1, and back to point A. This

path is indicated by the broken arrows. Waveforms (3) and (4) can be observed across D2 and

D4. The current flow through RL is always in the same direction.

Page 7: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

7

In flowing through RL this current develops a voltage corresponding to that shown

waveform (5). Since current flows through the load (RL) during both half cycles of the applied

voltage, this bridge rectifier is a full-wave rectifier.

This may be shown by assigning values to some of the components shown in

views A and B. assume that the same transformer is used in both circuits. The peak voltage

developed between points X and y is 1000 volts in both circuits. In the conventional full-wave

circuit shown—in view A, the peak voltage from the center tap to either X or Y is 500 volts.

The maximum voltage that appears across the load resistor is nearly-but never exceeds-

500 v0lts, as result of the small voltage drop across the diode. In the bridge rectifier shown in

view B, the maximum voltage that can be rectified is the full secondary voltage, which is 1000

volts. Therefore, the peak output voltage across the load resistor is nearly 1000 volts. With both

circuits using the same transformer, the bridge rectifier circuit produces a higher output voltage

than the conventional full-wave rectifier circuit.

2.1.4 IC VOLTAGE REGULATORS:

Voltage regulators comprise a class of widely used ICs. Regulator IC units contain the

circuitry for reference source, comparator amplifier, control device, and overload protection all

in a single IC. IC units provide regulation of either a fixed positive voltage, a fixed negative

voltage, or an adjustably set voltage. The regulators can be selected for operation with load

currents from hundreds of milli amperes to tens of amperes, corresponding to power ratings from

milli watts to tens of watts.

A fixed three-terminal voltage regulator has an unregulated dc input voltage, Vi, applied to

one input terminal, a regulated dc output voltage, Vo, from a second terminal, with the third

terminal connected to ground.

The series 78 regulators provide fixed positive regulated voltages from 5 to 24 volts.

Similarly, the series 79 regulators provide fixed negative regulated voltages from 5 to 24 volts.

Page 8: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

8

CHAPTER-3

MICROCONTROLLER

3.1 DESCRIPTION

A microcontroller is heart of the embedded system. It contains a processor core, memory,

and programmable input/output peripherals.

It contain four ports, port0 port1 port2 port3.where port 0 is an external port and other three ports

are internal ports.

heavy devices like motor, alarm devices etc.. are connected to the port0.

Port 0 does not have internal pull up resistors.

Ports 1 2 3 have internal pull up resistors.

Port 3 provides serial communication signals.

Features of Microcontroller

8 bit controller

16 bit Program Counter(PC) and Data Pointer(DPTR)

128 byte of RAM

4KB on chip of ROM

Two 16 bit timers/ counter( T0,T1)

40 pin

Page 9: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

9

32 I/O pins for four 8 bit ports

6 Interrupt sources

64K Program/ Data memory address space

The generic 8051 architecture supports Harvard architecture, which

contains two separate buses for both program and data. So, it has two distinctive memory spaces

of 64K X 8 size for both program and data. It is based on an 8 bit central processing unit with an

8 bit Accumulator and another 8 bit B register as main processing blocks. Other portions of the

architecture include few 8 bit and 16 bit registers and 8 bit memory locations.

Each 8031 device has some amount of data RAM built in the device for internal

processing. This area is used for stack operations and temporary storage of data.

This base architecture is supported with on chip peripheral functions like I/O ports,

timers/counters, versatile serial communication port. So it is clear that this 8031 architecture was

designed to cater many real time embedded needs.

Now you may be wondering about the non- mentioning of memory space meant

for the program storage, the most important part of any embedded controller. Originally this

8031 architecture was introduced with on chip, ‗one time programmable version of Program

Memory of size 4K X 8. Intel delivered all these microcontrollers (8051) with user‘s program

fused inside the device.

The memory portion was mapped at the lower end of the Program Memory area. But, after

getting devices, customers couldn‘t change anything in their program code, which was already

made available inside during device fabrication.

So, very soon Intel introduced the 8031 devices (8751) with re-programmable type of

Program Memory using built-in EPROM of size 4K X 8. Like a regular EPROM, this memory

can be re-programmed many times. Later on Intel started manufacturing these 8031 devices

without any on chip Program Memory.

The AT89S51 is a low-power, high-performance CMOS 8-bit microcontroller with 4K bytes

of In-System Programmable Flash memory. The device is manufactured using Atmel‘s high-

Page 10: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

10

density nonvolatile memory technology and is compatible with the Indus-try-standard 80C51

instruction set and pin out. The on-chip Flash allows the program memory to be reprogrammed

in-system or by a conventional nonvolatile memory pro-grammar. By combining a versatile 8-bit

CPU with In-System Programmable Flash on a monolithic chip, the Atmel AT89S51 is a

powerful microcontroller which provides a highly-flexible and cost-effective solution to many

embedded control applications. The AT89S51 provides the following standard features: 4K bytes

of Flash, 128 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, two 16-bit

timer/counters, a five-vector two-level interrupt architecture, a full duplex serial port, on-chip

oscillator, and clock circuitry.

In addition, the AT89S51 is designed with static logic for operation down to zero

frequency and supports two software selectable power saving modes. The Idle Mode stops the

CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue

functioning. The Power-down mode saves the RAM con-tents but freezes the oscillator,

disabling all other chip functions until the next external interrupt or hardware reset.

Page 11: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

11

3.2 PIN DIAGRAM

Fig. 3.1

1 2

3

4

5

6

7

8

9

10

11 12

13

14

15

40

39

38

37

36

35

34

33

32

31 30

29

28

27

26

25

24

23

22

21 P1.0

P1.1 P1.2

P1.3

P1.4

P1.5

P1.6

P1.7

RST

(RXD)P3.0 (TXD)P3.1

(T0)P3.4

(T1)P3.5

XTAL2

XTAL1

GND

(INT0)P3.2

(INT1)P3.3

(RD)P3.7

(WR)P3.6

Vcc

P0.0(AD0) P0.1(AD1) P0.2(AD2) P0.3(AD3) P0.4(AD4) P0.5(AD5)

)

P0.6(AD6) P0.7(AD7)

EA/VPP

Page 12: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

12

3.3 PIN Functions

3.3.1 I/O PORTS (P0, P1, P2, P3):

Of the 40 pins of the typical 8052, 32 of them are dedicated

to I/O lines that have a one-to-one relation with SFRs P0, P1, P2, and P3. The developer may

raise and lower these lines by writing 1s or 0s to the corresponding bits in the SFRs. Likewise;

the current state of these lines may be read by reading the corresponding bits of the SFRs. All of

the ports have internal pull-up resistors except for port 0.

3.3.2 PORT 0:

Port 0 is dual-function in that it in some designs port 0ís I/O lines are

available to the developer to access external devices while in other designs it is used to access

external memory. If the circuit requires external RAM or ROM, the microcontroller will

automatically use port 0 to clock in/out the 8-bit data word as well as the low 8 bits of the

address in response to a MOVX instruction and port 0 I/O lines may be used for other functions

as long as external RAM isn‘t being accessed at the same time. If the circuit requires external

code memory, the microcontroller will automatically use the port 0 I/O lines to access each

instruction that is to be executed. In this case, port 0 cannot be utilized for other purposes since

the state of the I/O lines are constantly being modified to access external code memory.

Note that there are no pull-up resistors on port 0, so it may be necessary to include your

own pull-up resistors depending on the characteristics of the parts you will be driving via port

0.here small decoupling capacitor is connected in this port 0.

3.3.3 PORT 1:

Port 1 consists of 8 I/O lines that you may use exclusively to interface to external parts.

Unlike port 0, typical derivatives do not use port 1 for any functions themselves. Port 1 is

commonly used to interface to external hardware such as LCDs, keypads, and other devices.

Page 13: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

13

With 8052 derivatives, two bits of port 1 are optionally used as described for extended timer 2

functions. These two lines are not assigned these special functions on 8051ís since 8051ís don‘t

have a timer 2. Further, these lines can still be used for your own purposes if you don‘t need

these features of timer 2.

P1.0 (T2): If T2CON.1 is set (C/T2), then timer 2 will be incremented whenever there is

a 1-0 transition on this line. With C/T2 set, P1.0 is the clock source for timer 2. P1.1 (T2EX): If

timer 2 is in auto-reload mode and T2CON.3 (EXEN2) is set, a 1-0 transition on this line will

cause timer 2 to be reloaded with the auto-reload value. This will also cause the T2CON.6

(EXF2) external flag to be set, which may cause an interrupt if so enabled.

3.3.4 PORT 2:

Like port 0, port 2 is dual-function. In some circuit designs it is available for accessing

devices while in others it is used to address external RAM or external code memory. When the

MOVX @DPTR instruction is used, port 2 is used to output the high byte of the memory address

that is to be accessed. In these cases, port 2 may be used to access other devices as long as the

devices are not being accessed at the same time a MOVX instruction is using port 2 to address

external RAM. If the circuit requires external code memory, the microcontroller will

automatically use the port 2 I/O lines to access each instruction that is to be executed.

In this case, port 2 cannot be utilized for other purposes since the state of the I/O lines are

constantly being modified to access external code memory.

3.3.5 PORT 3:

Port 3 consists entirely of dual-function I/O lines. While the developer may access all

these lines from their software by reading/writing to the P3 SFR, each pin has a pre-defined

function that the microcontroller handles automatically when configured to do so and/or when

necessary. P3.0 (RXD): The UART/serial port uses P3.0 as the receive line. In circuit designs

that will be using the microcontroller‘s internal serial port, this is the line into which serial data

will be clocked. Note that when interfacing an 8052 to an RS-232 port that you may not connect

Page 14: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

14

this line directly to the RS-232 pin; rather, you must pass it through a part such as the MAX232

to obtain the correct voltage levels. This pin is available for any use the developer may assign it

if the circuit has no need to receive data via the integrated serial port.

P3.1 (TXD): The UART/serial port uses P3.1 as the ‗transmit line.‘ In circuit designs that

will be using the microcontroller‘s internal serial port, this is the line that the microcontroller will

clock out all data which is written to the SBUF SFR. Note that when interfacing an 8052 to an

RS-232 port that you may not connect this line directly to the RS-232 pin; rather, you must pass

it through a part such as the MAX232 to obtain the correct voltage levels. This pin is available

for any use the developer may assign it if the circuit has no need to transmit data via the

integrated serial port.

P3.2 (-INT0): When so configured, this line is used to trigger an ‗External 0 Interrupt.‘

This may either be low-level triggered or may be triggered on a 1-0 transition. Please see the

chapter on interrupts for details. This pin is available for any use the developer may assign it if

the circuit does not need to trigger an external 0 interrupt.

P3.3 (-INT1): When so configured, this line is used to trigger an ‗External 1 Interrupt.‘

This may either be low-level triggered or may be triggered on a 1-0 transition. Please see the

chapter on interrupts for details. This pin is available for any use the developer may assign it if

the circuit does not need to trigger an external 1 interrupt.

P3.4 (T0): When so configured, this line is used as the clock source for timer 0. Timer 0

will be incremented either every instruction cycle that T0 is high or every time there is a 1-0

transition on this line, depending on how the timer is configured. Please see the chapter on timers

for details. This pin is available for any use the developer may assign it if the circuit does not to

control timer 0 externally.

P3.5 (T1): When so configured, this line is used as the clock source for timer 1. Timer 1

will be incremented either every instruction cycle that T1 is high or every time there is a 1-0

transition on this line, depending on how the timer is configured. Please see the chapter on timers

for details. This pin is available for any use the developer may assign it if the circuit does not to

control timer 1 externally.

Page 15: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

15

P3.6 (-WR): This is external memory write strobe line. This line will be asserted low by

the microcontroller whenever a MOVX instruction writes to external RAM. This line should be

connected to the RAM‘s write (-W) line. This pin is available for any use the developer may

assign it if the circuit does not write to external RAM using MOVX.

P3.7 (-RD): This is external memory write strobe line. This line will be asserted low by

the microcontroller whenever a MOVX instruction writes to external RAM. This line should be

connected to the RAM‘s write (-W) line. This pin is available for any use the developer may

assign it if the circuit does not read from external RAM using MOVX.

3.3.6 OSCILLATOR INPUTS (XTAL1, XTAL2):

The 8052 is typically driven by a crystal connected to pins 18 (XTAL2) and 19 (XTAL1).

Common crystal frequencies are 11.0592Mhz as well as 12Mhz, although many newer

derivatives are capable of accepting frequencies as high as 40Mhz.

While a crystal is the normal clock source, this isn‘t necessarily the case. A TTL clock

source may also be attached to XTAL1 and XTAL2 to provide the microcontroller‘s clock.

3.3.7 RESET LINE (RST):

Pin 9 is the master reset line for the microcontroller. When this pin is brought high for

two instruction cycles, the microcontroller is effectively reset. SFRs, including the I/O ports, are

restored to their default conditions and the program counter will be reset to 0000h. Keep in mind

that Internal RAM is not affected by a reset. The microcontroller will begin executing code at

0000h when pin 9 returns to a low state.

The reset line is often connected to a reset button/switch that the user may press to reset

the circuit. It is also common to connect the reset line to a watchdog IC or a supervisor IC (such

as MAX707).

Page 16: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

16

3.3.8 ADDRESS LATCH ENABLE (ALE):

The ALE at pin 30 is an output-only pin that is controlled entirely by the microcontroller

and allows the microcontroller to multiplex the low-byte of a memory address and the 8-bit data

itself on port 0. This is because, while the high-byte of the memory address is sent on port 2, port

0 is used both to send the low byte of the memory address and the data itself. This is

accomplished by placing the low-byte of the address on port 0, exerting ALE high to latch the

low-byte of the address into a latch IC (such as the 74HC573), and then placing the 8 data-bits

on port 0. In this way the 8052 is able to output a 16-bit address and an 8-bit data word with 16

I/O lines instead of 24.

The ALE line is used in this fashion both for accessing external RAM with MOVX

@DPTR as well as for accessing instructions in external code memory. When your program is

executed from external code memory, ALE will pulse at a rate of 1/6th that of the oscillator

frequency. Thus if the oscillator is operating at 11.0592 MHz, ALE will pulse at a rate of

1,843,200 times per second. The only exception is when the MOVX instruction is executed one

ALE pulse is missed in lieu of a pulse on WR or RD.

3.3.9 PROGRAM STORE ENABLE (PSEN):

The Program Store Enable (PSEN) line at pin 29 is exerted low automatically by the

microcontroller whenever it accesses external code memory. This line should be attached to the

Output Enable (-OE) pin of the EPROM that contains your code memory.

PSEN will not be exerted by the microcontroller and will remain in a high state if your

program is being executed from internal code memory.

3.3.10 EXTERNAL ACCESS (EA):

The External Access (EA) line at pin 31 is used to determine whether the 8052 will

execute your program from external code memory or from internal code memory.

Page 17: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

17

If EA is tied high (connected to +5V) then the microcontroller will execute the program it

finds in internal/on-chip code memory. If EA is tied low (to ground) then it will attempt to

execute the program it finds in the attached external code memory EPROM. Of course, your

EPROM must be properly connected for the microcontroller to be able to access your program in

external code memory.

3.3.11 MEMORY ORGANIZATION:

The 8051 architecture provides both on chip memory as well as off chip memory

expansion capabilities. It supports several distinctive ‗physical‘ address spaces, functionally

separated at the hardware level by different addressing mechanisms, read and write controls

signals or both:

On chip Program Memory

On chip Data Memory

Off chip Program Memory

Off chip Data Memory

On chip Special Function Registers

The Program Memory area (EPROM incase of external memory or Flash/EPROM incase

of internal one) is extremely large and never lose information when the power is removed.

Program Memory is used for information needed each time power is applied: Initialization

values, Calibration data, Keyboard lookup tables etc along with the program itself. The Program

Memory has a 16 bit address and any particular memory location is addressed using the 16 bit

Program Counter and instructions which generate a 16 bit address.

On chip Data memory is smaller and therefore quicker than Program Memory and it goes

into a random state when power is removed. On chip RAM is used for variables which are

calculated when the program is executed.

In contrast to the Program Memory, on chip Data Memory accesses need a single 8 bit

value (may be a constant or another variable) to specify a unique location. Since 8 bits are more

Page 18: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

18

than sufficient to address 128 RAM locations, the on chip RAM address generating register is

single byte wide.

Different addressing mechanisms are used to access these different memory spaces and

this greatly contributes to microcomputer‘s operating efficiency.

The 64K byte Program Memory space consists of an internal and an external memory

portion. If the EA pin is held high, the 8051 executes out of internal Program Memory unless the

address exceeds 0FFFH and locations 1000H through FFFFH are then fetched from external

Program Memory. If the EA pin is held low, the 8031 fetches all instructions from the external

Program Memory. In either case, the 16 bit Program Counter is the addressing mechanism.

Figure.3.2 - Program Memory

The Data Memory address space consists of an internal and an external memory space.

External Data Memory is accessed when a MOVX instruction is executed.

Apart from on chip Data Memory of size 128/256 bytes, total size of Data Memory can

be expanded up to 64K using external RAM devices.

Total internal Data Memory is divided into three blocks:

Lower 128 bytes.

Higher 128 bytes

Page 19: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

19

Special Function Register space.

Higher 128 bytes are available only in 8032/8052 devices.

Fig.3.3. Main Memory

Even though the upper RAM area and SFR area share same address locations, they are

accessed through different addressing modes. Direct addresses higher than 7FH access SFR

memory space and indirect addressing above 7FH access higher 128 bytes (in 8032/8052).

Fig.3.4. Internal Data Memory

Page 20: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

20

The next figure indicates the layout of lower 128 bytes. The lowest 32 bytes (from

address 00H to 1FH) are grouped into 4 banks of 8 registers. Program instructions refer these

registers as R0 through R7. Program Status Word indicates which register bank is being used at

any point of time.

The next 16 bytes above these register banks form a block of bit addressable memory

space. The instruction set of 8031 contains a wide range of single bit processing instructions and

these instructions can directly access the 128 bits of this area.

The SFR space includes port latches, timer and peripheral control registers. All the

members of 8031 family have same SFR at the same SFR locations. There are some 16 unique

locations which can be accessed as bytes and as bits.

Page 21: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

21

3.3.12 COMMON MEMORY SPACE:

The 8031‘s Data Memory may not be used for program storage. So it means you can‘t

execute instructions out of this Data Memory. But, there is a way to have a single block of off

chip memory acting as both Program and Data Memory. By gating together both memory read

controls (RD and PSEN) using an AND gate, a common memory read control signal can be

generated.

In this arrangement, both memory spaces are tied together and total accessible memory is

reduced from 128 Kbytes to 64 Kbytes.

The 8031 can read and write into this common memory block and it can be used as

Program and Data Memory.

You can use this arrangement during program development and debugging phase.

Without taking Microcontroller off the socket to program its internal ROM (EPROM/Flash

ROM), you can use this common memory for frequent program storage and code modifications.

Basically, 8031‘s assembly language instruction set consists of an operation mnemonic

and zero to three operands separated by commas. In two byte instructions the destination is

specified first, and then the source. Byte wide mnemonics like ADD or MOV use the

Accumulator as a source operand and also to receive the result.

Page 22: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

22

3.4 BLOCK DIAGRAM:

Fig.3.5. Block Diagram of the 8051 Core

3.4.1 OSCILLATOR CHARACTERISTICS:

XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier

which can be configured for use as an on chip oscillator, as shown in Figure 1. Either a quartz

crystal or ceramic resonator may be used. To drive the device from an external clock source,

XTAL2 should be left unconnected while XTAL1 is driven as shown in Figure 2.

Page 23: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

23

There are no requirements on the duty cycle of the external clock signal, since the input

to the internal clocking circuitry is through a divide-by two flip-flop, but minimum and

maximum voltage high and low time specifications must be observed.

3.4.2 8051 CLOCK:

8051 has an on-chip oscillator

It needs an external crystal

Crystal decides the operating frequency of the 8051

Fig.3.6 8051 CLOCK

3.4.3 IDLE MODE:

In idle mode, the CPU puts itself to sleep while all the on-chip peripherals remain active.

The mode is invoked by software. The content of the on-chip RAM and all the special functions

registers remain unchanged during this mode. The idle mode can be terminated by any enabled

interrupt or by a hardware reset. It should be noted that when idle is terminated by a hardware

reset, the device normally resumes program execution, from where it left off, up to two machine

cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to

internal RAM in this event, but access to the port pins is not inhibited. To eliminate the

possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction

following the one that invokes Idle should not be one that writes to a port pin or to external

memory.

Page 24: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

24

3.4.4 POWER DOWN MODE:

In the power down mode the oscillator is stopped, and the instruction that invokes power

down is the last instruction executed. The on-chip RAM and Special Function Registers retain

their values until the power down mode is terminated. The only exit from power down is a

hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset

should not be activated before VCC is restored to its normal operating level and must be held

active long enough to allow the oscillator to restart and stabilize.

3.4.5 8051 RESET:

RESET is an active High input

When RESET is set to High, 8051 goes back to the power on state

Power-On Reset

Push PB and active High on RST

Release PB, Capacitor discharges and RST goes low

RST must stay high for a min of 2 machine cycles

Fig.3.7.8051 RESET

Page 25: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

25

3.4.6 CENTRAL PROCESSING UNIT:

The CPU is the brain of the microcontrollers reading user‘s programs and executing the

expected task as per instructions stored there in. Its primary elements are an 8 bit Arithmetic

Logic Unit (ALU), Accumulator (Acc), few more 8 bit registers, B register, Stack Pointer (SP),

Program Status Word (PSW) and 16 bit registers, Program Counter (PC) and Data Pointer

Register (DPTR).

3.4.7 THE ACCUMULATOR:

If worked with any other assembly language you will be familiar with the concept of an

accumulator register. The Accumulator, as its name suggests, is used as a general register to

accumulate the results of a large number of instructions. It can hold an 8-bit (1-byte) value and is

the most versatile register the 8052 has due to the sheer number of instructions that make use of

the accumulator. More than half of the 8052ís 255 instructions manipulate or use the

Accumulator in some way.

For example, if you want to add the number 10 and 20, the resulting 30 will be stored in

the Accumulator. Once you have a value in the Accumulator you may continue processing the

value or you may store it in another register or in memory.

3.4.8 THE "R" REGISTERS:

The "R" registers are sets of eight registers that are named R0, R1, through R7. These

registers are used as auxiliary registers in many operations. To continue with the above example,

perhaps you are adding 10 and 20.

The original number 10 may be stored in the Accumulator whereas the value 20 may be

stored in, say, register R4. To process the addition you would execute the command:

Page 26: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

26

As mentioned earlier, there are four sets of ‗R‘ registers, register bank 0, 1, 2, and 3.

When the 8052 is first powered up, register bank 0 (addresses 00h through 07h) is used by

default.

In this case, for example, R4 is the same as Internal RAM address 04h. However, your

program may instruct the 8052 to use one of the alternate register banks; i.e., register banks 1, 2,

or 3. In this case, R4 will no longer be the same as Internal RAM address 04h. For example, if

your program instructs the 8052 to use register bank 1, register R4 will now be synonymous with

Internal RAM address 0Ch. If you select register bank 2, R4 is synonymous with 14h, and if you

select register bank 3 it is synonymous with address 1Ch.

The concept of register banks adds a great level of flexibility to the 8052, especially when

dealing with interrupts (we'll talk about interrupts later). However, always remember that the

register banks really reside in the first 32 bytes of Internal RAM.

3.4.9 THE "B" REGISTER:

The "B" register is very similar to the Accumulator in the sense that it may hold an 8-bit

(1-byte) value. The "B" register is only used implicitly by two 8052 instructions: MUL AB and

DIV AB. Thus, if you want to quickly and easily multiply or divide A by another number, you

may store the other number in "B" and make use of these two instructions. Aside from the MUL

and DIV an instruction, the ―B‖ register is often used as yet another temporary storage register

much like a ninth "R" register.

3.4.10 THE PROGRAM COUNTER (PC):

The Program Counter (PC) is a 2-byte address that tells the 8052 where the next

instruction to execute is found in memory. When the 8052 is initialized PC always starts at

0000h and is incremented each time an instruction is executed. It is important to note that PC

isn‘t always incremented by one. Since some instructions are 2 or 3 bytes in length the PC will

be incremented by 2 or 3 in these cases.

Page 27: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

27

The Program Counter is special in that there is no way to directly modify its value. That

is to say, you can‘t do something like PC=2430h. On the other hand, if you execute LJMP 2430h

you‘ve effectively accomplished the same thing.

It is also interesting to note that while you may change the value of PC (by executing a

jump instruction, etc.) there is no way to read the value of PC. That is to say, there is no way to

ask the 8052 "What address are you about to execute?" As it turns out, this is not completely

true: There is one trick that may be used to determine the current value of PC.

3.4.11 THE DATA POINTER (DPTR):

The Data Pointer (DPTR) is the 8052ís only user-accessible 16-bit (2-byte) register. The

Accumulator, "R" registers, and "B" register are all 1-byte values. The PC just described is a 16-

bit value but isn‘t directly user-accessible as a working register. DPTR, as the name suggests, is

used to point to data. It is used by a number of commands that allow the 8052 to access external

memory. When the 8052 accesses external memory it accesses the memory at the address

indicated by DPTR.

While DPTR is most often used to point to data in external memory or code memory,

many developers take advantage of the fact that it‘s the only true 16-bit register available. It is

often used to store 2-byte values that have nothing to do with memory locations.

3.4.12 THE STACK POINTER (SP):

The Stack Pointer, like all registers except DPTR and PC, may hold an 8-bit (1-byte)

value. The Stack Pointer is used to indicate where the next value to be removed from the stack

should be taken from. When you push a value onto the stack, the 8052 first increments the value

of SP and then stores the value at the resulting memory location. When you pop a value off the

stack, the 8052 returns the value from the memory location indicated by SP, and then decrements

the value of SP.

Page 28: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

28

This order of operation is important. When the 8052 is initialized SP will be initialized to

07h. If you immediately push a value onto the stack, the value will be stored in Internal RAM

address 08h. This makes sense taking into account what was mentioned two paragraphs above:

First the 8051 will increment the value of SP (from 07h to 08h) and then will store the pushed

value at that memory address (08h). SP is modified directly by the 8052 by six instructions:

PUSH, POP, ACALL, LCALL, RET, and RETI. It is also used intrinsically whenever an

interrupt is triggered (more on interrupts later. Don‘t worry about them for now!).

3.4.13 INPUT / OUTPUT PORTS:

The 8031‘s I/O port structure is extremely versatile and flexible. The device has 32 I/O

pins configured as four eight bit parallel ports (P0, P1, P2 and P3). Each pin can be used as an

input or as an output under the software control. These I/O pins can be accessed directly by

memory instructions during program execution to get required flexibility.

These port lines can be operated in different modes and all the pins can be made to do

many different tasks apart from their regular I/O function executions. Instructions, which access

external memory, use port P0 as a multiplexed address/data bus. At the beginning of an external

memory cycle, low order 8 bits of the address bus are output on P0. The same pins transfer data

byte at the later stage of the instruction execution.

Also, any instruction that accesses external Program Memory will output the higher order

byte on P2 during read cycle. Remaining ports, P1 and P3 are available for standard I/O

functions. But all the 8 lines of P3 support special functions: Two external interrupt lines, two

counter inputs, serial port‘s two data lines and two timing control strobe lines are designed to use

P3 port lines. When you don‘t use these special functions, you can use corresponding port lines

as a standard I/O.

Even within a single port, I/O operations may be combined in many ways. Different pins

can be configured as input or outputs independent of each other or the same pin can be used as

an input or as output at different times. You can comfortably combine I/O operations and special

operations for Port 3 lines.

Page 29: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

29

3.4.14 TIMERS / COUNTERS:

8031 has two 16 bit Timers/Counters capable of working in different modes. Each

consists of a ‗High‘ byte and a ‗Low‘ byte which can be accessed under software. There is a

mode control register and a control register to configure these timers/counters in number of

ways.

These timers can be used to measure time intervals, determine pulse widths or initiate

events with one microsecond resolution up to a maximum of 65 millisecond (corresponding to

65, 536 counts). Use software to get longer delays. Working as counter, they can accumulate

occurrences of external events (from DC to 500 KHz) with 16 bit precision.

Fig.3.8. Block Diagram of timers/counters

Page 30: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

30

3.4.15 INTERRUPTS:

The 8031 has five interrupt sources: one from the serial port when a transmission or

reception operation is executed; two from the timers when overflow occurs and two come from

the two input pins INT0, INT1.

Each interrupt may be independently enabled or disabled to allow polling on same

sources and each may be classified as high or low priority.

A high priority source can override a low priority service routine. These options are

selected by interrupt enable and priority control registers, IE and IP.

When an interrupt is activated, then the program flow completes the execution of the

current instruction and jumps to a particular program location where it finds the interrupt service

routine. After finishing the interrupt service routine, the program flows return to back to the

original place.

The Program Memory address, 0003H is allotted to the first interrupt and next seven

bytes can be used to do any task associated with that interrupt.

Interrupt Source Service routine starting address:

External 0 0003H

Timer/Counter 0 000BH

External 1 0013H

Timer/counter 1 001BH

Serial port 0023H

Page 31: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

31

3.4.16 SERIAL PORT:

Each 8031 microcomputer contains a high speed full duplex (means you can

simultaneously use the same port for both transmitting and receiving purposes) serial port which

is software configurable in 4 basic modes: 8 bit UART; 9 bit UART; Interprocessor

Communications link or as shift register I/O expander.

For the standard serial communication facility, 8031 can be programmed for UART

operations and can be connected with regular personal computers, teletype writers, modem at

data rates between 122 bauds and 31 kilo bauds.

Getting this facility is made very simple using simple routines with option to select even

or odd parity. You can also establish a kind of Interprocessor communication facility among

many microcomputers in a distributed environment with automatic recognition of address/data.

Apart from all above, you can also get superfast I/O lines using low cost simple TTL or

CMOS shift registers.

3.4.17APPLICATIONS:

Security applications

Image processing applications

Banking applications

Page 32: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

32

CHAPTER-4

SERIAL COMMUNICATION

4.1 INTRODUCTION:

Serial communication is basically the transmission or reception of data one bit at a time.

Today's computers generally address data in bytes or some multiple thereof. A byte contains 8

bits. A bit is basically either a logical 1 or zero. Every character on this page is actually

expressed internally as one byte. The serial port is used to convert each byte to a stream of ones

and zeroes as well as to convert a stream of ones and zeroes to bytes. The serial port contains a

electronic chip called a Universal Asynchronous Receiver/Transmitter (UART) that actually

does the conversion.

The serial port has many pins. We will discuss the transmit and receive pin first.

Electrically speaking, whenever the serial port sends a logical one (1) a negative voltage is

effected on the transmit pin. Whenever the serial port sends a logical zero (0) a positive voltage

is affected. When no data is being sent, the serial port's transmit pin's voltage is negative (1) and

is said to be in a MARK state. Note that the serial port can also be forced to keep the transmit pin

at a positive voltage (0) and is said to be the SPACE or BREAK state. (The terms MARK and

SPACE are also used to simply denote a negative voltage (1) or a positive voltage (0) at the

transmit pin respectively).

When transmitting a byte, the UART (serial port) first sends a START BIT which is a

positive voltage (0), followed by the data (general 8 bits, but could be 5, 6, 7, or 8 bits) followed

by one or two STOP Bits which is a negative(1) voltage. The sequence is repeated for each byte

sent. Figure 1 shows a diagram of what a byte transmission would look like.

At this point you may want to know what the duration of a bit is. In other words, how

long does the signal stay in a particular state to define a bit. The answer is simple. It is dependent

on the baud rate. The baud rate is the number of times the signal can switch states in one second.

Therefore, if the line is operating at 9600 baud, the line can switch states 9,600 times per second.

Page 33: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

33

This means each bit has the duration of 1/9600 of a second or about 100µsec.

when transmitting a character there are other characteristics other than the baud rate that

must be known or that must be setup. These characteristics define the entire interpretation of the

data stream. The first characteristic is the length of the byte that will be transmitted. This

length in general can be anywhere from 5 to 8 bits.

The second characteristic is parity. The parity characteristic can be even, odd, mark,

space, or none. If even parity, then the last data bit transmitted will be a logical 1 if the data

transmitted had an even amount of 0 bits. If odd parity, then the last data bit transmitted will be a

logical 1 if the data transmitted had an odd amount of 0 bits. If MARK parity, then the last

transmitted data bit will always be a logical 1. If SPACE parity, then the last transmitted data bit

will always be a logical 0. If no parity then there is no parity bit transmitted.

The third characteristic is the amount of stop bits. This value in general is 1 or 2. Assume

we want to send the letter 'A' over the serial port. The binary representation of the letter 'A' is

01000001. Remembering that bits are transmitted from least significant bit (LSB) to most

significant bit (MSB), the bit stream transmitted would be as follows for the line characteristics 8

bits, no parity, 1 stop bit and 9600 baud.

LSB (0 1 0 0 0 0 0 1 0 1) MSB

The above represents (Start Bit) (Data Bits) (Stop Bit). To calculate the actual byte

transfer rate simply divide the baud rate by the number of bits that must be transferred for each

byte of data. In the case of the above example, each character requires 10 bits to be transmitted

for each character. As such, at 9600 baud, up to 960 bytes can be transferred in one second.

The above discussion was concerned with the "electrical/logical" characteristics of the

data stream. We will expand the discussion to line protocol. Serial communication can be half

duplex or full duplex. Full duplex communication means that a device can receive and transmit

data at the same time. Half duplex means that the device cannot send and receive at the same

Page 34: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

34

time. It can do them both, but not at the same time. Half duplex communication is all but

outdated except for a very small focused set of applications.

Half duplex serial communication needs at a minimum two wires, signal ground and the

data line. Full duplex serial communication needs at a minimum three wires, signal ground,

transmit data line, and receive data line. The RS232 specification governs the physical and

electrical characteristics of serial communications. This specification defines several additional

signals that are asserted (set to logical 1) for information and control beyond the data signal

These signals are the Carrier Detect Signal (CD), asserted by modems to signal a

successful connection to another modem, Ring Indicator (RI), asserted by modems to signal the

phone ringing, Data Set Ready (DSR), asserted by modems to show their presence, Clear To

Send (CTS), asserted by modems if they can receive data, Data Terminal Ready (DTR), asserted

by terminals to show their presence, Request To Send (RTS), asserted by terminals if they can

receive data. The section RS232 Cabling describes these signals and how they are connected.

The above paragraph alluded to hardware flow control. Hardware flow control is a

method that two connected devices use to tell each other electronically when to send or when not

to send data. A modem in general drops (logical 0) its CTS line when it can no longer receive

characters. It re-asserts it when it can receive again. A terminal does the same thing instead with

the RTS signal. Another method of hardware flow control in practice is to perform the same

procedure in the previous paragraph except that the DSR and DTR signals.

Note that hardware flow control requires the use of additional wires. The benefit to this

however is crisp and reliable flow control. Another method of flow control used is known as

software flow control. This method requires a simple 3 wire serial communication link, transmit

data, receive data, and signal ground. If using this method, when a device can no longer receive,

it will transmit a character that the two devices agreed on. This character is known as the XOFF

character. This character is generally a hexadecimal 13. When a device can receive again it

transmits an XON character that both devices agreed to. This character is generally a

hexadecimal 11.

Page 35: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

35

4.2 NULL MODEM:

Serial communications with RS232. One of the oldest and most widely spread

communication methods in computer world. The way this type of communication can be

performed is pretty well defined in standards. I.e. with one exception. The standards show the

use of DTE/DCE communication, the way a computer should communicate with a peripheral

device like a modem. For your information, DTE means Data Terminal Equipment (computers

etc.) where DCE is the abbreviation of Data Communication Equipment (modems).

One of the main uses of serial communication today where no modem is involved—a

serial null modem configuration with DTE/DTE communication—is not so well defined,

especially when it comes to flow control. The terminology null modem for the situation where

two computers communicate directly is so often used nowadays, that most people don't realize

anymore the origin of the phrase and that a null modem connection is an exception, not the rule.

In history, practical solutions were developed to let two computers talk with each other

using a null modem serial communication line. In most situations, the original modem signal

lines are reused to perform some sort of handshaking. Handshaking can increase the maximum

allowed communication speed because it gives the computers the ability to control the flow of

information. A high amount of incoming data is allowed if the computer is capable to handle it,

but not if it is busy performing other tasks. If no flow control is implemented in the null modem

connection, communication is only possible at speeds at which it is sure the receiving side can

handle the amount information even under worst case conditions.

4.3 RS232:

When we look at the connector pin out of the RS232 port, we see two pins which are

certainly used for flow control. These two pins are RTS, request to send and CTS, clear to send.

With DTE/DCE communication (i.e. a computer communicating with a modem device) RTS is

an output on the DTE and input on the DCE. CTS are the answering signal coming from the

DCE.

Page 36: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

36

Before sending a character, the DTE asks permission by setting its RTS output. No

information will be sent until the DCE grants permission by using the CTS line.

If the DCE cannot handle new requests, the CTS signal will go low. A simple but useful

mechanism allowing flow control in one direction. The assumption is that the DTE can always

handle incoming information faster than the DCE can send it. In the past, this was true. Modem

speeds of 300 baud were common and 1200 baud was seen as a high speed connection.

For further control of the information flow, both devices have the ability to signal their

status to the other side. For this purpose, the DTR data terminal ready and DSR data set ready

signals are present. The DTE uses the DTR signal to signal that it is ready to accept information,

whereas the DCE uses the DSR signal for the same purpose. Using these signals involves not a

small protocol of requesting and answering as with the RTS/CTS handshaking. These signals are

in one direction only.

The last flow control signal present in DTE/DCE communication is the CD carrier

detect. It is not used directly for flow control, but mainly an indication of the ability of the

modem device to communicate with its counter part. This signal indicates the existence of a

communication link between two modem devices.

4.4 NULL MODEM WITHOUT HANDSHAKING:

How to use the handshaking lines in a null modem configuration? The simplest way is to

don't use them at all. In that situation, only the data lines and signal ground are cross connected

in the null modem communication cable. All other pins have no connection. An example of such

a null modem cable without handshaking can be seen in the figure below.

Page 37: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

37

Connector 1 Connector 2 Function

2 3 Rx

TX

3 2 TX

Rx

5 5 Signal ground

Fig.4.1. Simple null modem without handshaking

4.5 COMPATIBILITY ISSUES:

If you read about null modems, this three wire null modem cable is often talked about.

Yes, it is simple but can we use it in all circumstances? There is a problem, if either of the two

devices checks the DSR or CD inputs. These signals normally define the ability of the other side

to communicate. As they are not connected, their signal level will never go high. This might

cause a problem.

The same holds for the RTS/CTS handshaking sequence. If the software on both sides is

well structured, the RTS output is set high and then a waiting cycle is started until a ready signal

is received on the CTS line. This causes the software to hang because no physical connection is

Page 38: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

38

present to either CTS line to make this possible. The only type of communication which is

allowed on such a null modem line is data-only traffic on the cross connected Rx/TX lines.

This does however not mean that this null modem cable is useless. Communication links

like present in the Norton Commander program can use this null modem cable. This null modem

cable can also be used when communicating with devices which do not have modem control

signals like electronic measuring equipment etc.

As you can imagine, with this simple null modem cable no hardware flow control can be

implemented. The only way to perform flow control is with software flow control using the

XOFF and XON characters.

Page 39: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

39

CHAPTER-5

SOFTWARE TOOLS

5.1 TYPES OF TOOLS:

KEIL C

Flash Magic

ORCAD

Capture

Layout

5.2 KEIL C:

Keil software is the leading vendor for 8/16-bit development tools (ranked at first

position in the 2004 embedded market study of the embedded system and EE times magazine).

Keil software is represented worldwide in more than 40 countries, since the market

introduction in 1988; the keil C51 compiler is the de facto industry standard and supports more

than 500 current 8051 device variants. Now, keil software offers development tools for ARM.

Keil software makes C compilers, macro assemblers, real-time kernels, debuggers,

simulators, integrated environments, and evaluation boards for 8051, 251, ARM and

XC16x/C16x/ST10 microcontroller families.

The Keil C51 C Compiler for the 8051 microcontroller is the most popular 8051 C

compiler in the world. It provides more features than any other 8051 C compiler available today.

The C51 Compiler allows you to write 8051 microcontroller applications in C that, once

compiled, have the efficiency and speed of assembly language. Language extensions in the C51

Compiler give you full access to all resources of the 8051.

Page 40: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

40

The C51 Compiler translates C source files into relocatable object modules which contain

full symbolic information for debugging with the µVision Debugger or an in-circuit emulator. In

addition to the object file, the compiler generates a listing file which may optionally include

symbol table and cross reference

Nine basic data types, including 32-bit IEEE floating-point,

Flexible variable allocation with bit, data, bdata, idata, xdata, and pdata memory types, Interrupt functions may be written in C,

Full use of the 8051 register banks,

Complete symbol and type information for source-level debugging,

Use of AJMP and ACALL instructions,

Bit-addressable data objects, Built- in interface for the RTX51 real time kernels,

Support for the Philips 8xC750, 8xC751, and 8xC752 limited instruction sets, Support for the Infineon 80C517 arithmetic unit.

5.3 FLASH MAGIC:

Flash magic can control the entry into ISP mode of some microcontroller devices by

using the COM port handshaking signals to control the device. Typically the

handshaking signals are used to control such pins as Reset, PSEN and VCC. The exact pins used

depend on the specific device.

When this feature is supported, Flash Magic will automatically place the device into ISP

mode at the beginning of an ISP operation. Flash Magic will then automatically cause the device

to execute code at the end of the ISP operation.

Page 41: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

41

5.4 ORCAD:

ORCAD really consists of tools. Capture is used for design entry in schematic form. You

will probably be already familiar with looking at circuits in this form from working with other

tools in your university courses. Layout is a tool for designing the physical layout of

components and circuits on a PCB. During the design process, you will move back and forth

between these two tools. The design flow diagram is given below:

Fig.5.1. Design window of ORCAD

Page 42: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

42

5.5 DESIGN FLOW OF ORCAD:

Fig. 5.2

Page 43: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

43

CHAPTER-6

HARDWARE TOOLS

Microcontroller (AT89S51)

RF Module

Encoder/Decoder

Serial communication

6.1 GSM MODEM:

6.1.1 DEFINITION:

Global system for mobile communication (GSM) is a globally accepted standard for digital

cellular communication. GSM is the name of a standardization group established in 1982 to

create a common European mobile telephone standard that would formulate specifications for a

pan-European mobile cellular radio system operating at 900 MHz.

6.1.2 THE GSM NETWORK

GSM provides recommendations, not requirements. The GSM specifications define the

functions and interface requirements in detail but do not address the hardware. The reason for

this is to limit the designers as little as possible but still to make it possible for the operators to

buy equipment from different suppliers. The GSM network is divided into three major systems:

the switching system (SS), the base station system (BSS), and the operation and support system

(OSS). The basic GSM network elements are shown in below figure

Page 44: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

44

Fig. 6.1 GSM Network Elements

6.1.3 GSM MODEM:

A GSM modem is a wireless modem that works with a GSM wireless network. A

wireless modem behaves like a dial-up modem. The main difference between them is that a dial-

up modem sends and receives data through a fixed telephone line while a wireless modem sends

and receives data through radio waves.

A GSM modem can be an external device or a PC Card / PCMCIA Card. Typically, an

external GSM modem is connected to a computer through a serial cable or a USB cable. A GSM

modem in the form of a PC Card / PCMCIA Card is designed for use with a laptop computer. It

should be inserted into one of the PC Card / PCMCIA Card slots of a laptop computer. Like a

GSM mobile phone, a GSM modem requires a SIM card from a wireless carrier in order to

operate.

As mentioned in earlier sections of this SMS tutorial, computers use AT commands to

control modems. Both GSM modems and dial-up modems support a common set of standard

AT commands. You can use a GSM modem just like a dial-up modem.

In addition to the standard AT commands, GSM modems support an extended set of AT

commands. These extended AT commands are defined in the GSM standards. With the extended

AT commands, you can do things like:

Page 45: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

45

Reading, writing and deleting SMS messages.

Sending SMS messages.

Monitoring the signal strength.

Monitoring the charging status and charge level of the battery.

Reading, writing and searching phone book entries.

The number of SMS messages that can be processed by a GSM modem per minute is

very low -- only about six to ten SMS messages per minute.

6.1.4 GSM MODEM APPLICATIONS:

Fig. 6.2

Page 46: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

46

6.1.5 FACTS AND APPLICATIONS OF GSM/GPRS MODEM:

The GSM/GPRS Modem comes with a serial interface through which the modem can be

controlled using AT command interface. An antenna and a power adapter are provided. The

basic segregation of working of the modem is as under

• Voice calls

• SMS

• GSM Data calls

• GPRS

Voice calls:

` Voice calls are not an application area to be targeted. In future if interfaces like a

microphone and speaker are provided for some applications then this can be considered.

SMS:

SMS is an area where the modem can be used to provide features like:

• Pre-stored SMS transmission

• These SMS can be transmitted on certain trigger events in an automation system

• SMS can also be used in areas where small text information has to be sent. The

transmitter can be an automation system or machines like vending machines, collection machines

or applications like positioning systems where

The navigator keeps on sending SMS at particular time intervals. SMS can be a solution where

GSM data call or GPRS services are not available

Page 47: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

47

6.1.6 APPLICATIONS:

Access control devices:

Now access control devices can communicate with servers and security staff through

SMS messaging. Complete log of transaction is available at the head-office Server instantly

without any wiring involved and device can instantly alert security personnel on their mobile

phone in case of any problem. RaviRaj Technologies is introducing this technology in all

Fingerprint Access control and time attendance products.

Transaction terminals:

EDC machines, POS terminals can use SMS messaging to confirm transactions from

central servers. The main benefit is that central server can be anywhere in the world. Today you

need local servers in every city with multiple telephone lines. You save huge infrastructure costs

as well as per transaction cost.

Supply Chain Management:

Today SCM require huge IT infrastructure with leased lines, networking devices, data

centre, workstations and still you have large downtimes and high costs. You can do all this at a

fraction of the cost with GSM M2M technology. A central server in your head office with

GSM capability is the answer; you can receive instant transaction data from all your branch

officers, warehouses and business associates with nil downtime, Low cost

6.2 APPLICATIONS SUITABLE FOR GSM COMMUNICATION:

If your application needs one or more of the following features, GSM will be more cost-

effective then other communication systems.

Short Data Size:

Page 48: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

48

You data size per transaction should be small like 1-3 lines. e.g. banking transaction

data, sales/purchase data, consignment tracking data, updates. These small but important

transaction data can be sent through SMS messaging which cost even less then a local telephone

call or sometimes free of cost worldwide. Hence with negligible cost you are able to send critical

information to your head office located anywhere in the world from multiple points.

You can also transfer faxes, large data through GSM but this will be as or more costly

compared to landline networks.

Multiple remote data collection points:

If you have multiple data collections points situated all over your city, state, country or

worldwide you will benefit the most. The data can be sent from multiple points like your branch

offices, business associates, warehouses, and agents with devices like GSM modems connected

to PCs, GSM electronic terminals and Mobile phones. Many a times some places like

warehouses may be situated at remote location may not have landline or internet but you will

have GSM network still available easily.

High uptime:

If your business require high uptime and availability GSM is best suitable for you as

GSM mobile networks have high uptime compared to landline, internet and other

communication mediums. Also in situations where you expect that someone may sabotage your

communication systems by cutting wires or taping landlines, you can depend on GSM wireless

communication.

Large transaction volumes:

GSM SMS messaging can handle large number of transaction in a very short time. You

can receive large number SMS messages on your server like e-mails without internet

connectivity. E-mails normally get delayed a lot but SMS messages are almost instantaneous for

instant transactions. Consider situation like shop owners doing credit card transaction

Page 49: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

49

with GSM technology instead of conventional landlines. time you find local transaction servers

busy as these servers use multiple telephone lines to take care of multiple transactions, whereas

one GSM connection is enough to handle hundreds of transaction.

Mobility, Quick installation:

GSM technology allows mobility, GSM terminals, modems can be just picked and

installed at other location unlike telephone lines. Also you can be mobile with GSM terminals

and can also communicate with server using your mobile phone. You can just purchase the GSM

hardware like modems, terminals and mobile handsets, insert SIM cards, configure software and

your are ready for GSM communication.

6.3 Relay

Relay is an electrical switch that opens and closes under the control of another electrical

circuit. In the original form, the switch is operated by an electromagnet to open or close one or

many sets of contacts. It was invented by Joseph Henry in 1835. Because a relay is able to

control an output circuit of higher power than the input circuit, it can be considered to be, in a

broad sense, a form of an electrical amplifier.

A simple electromagnetic relay, such as the one taken from a car in the first picture, is an

adaptation of an electromagnet. It consists of a coil of wire surrounding a soft iron core, an iron

yoke, which provides a low reluctance path for magnetic flux, a moveable iron armature, and a

set, or sets, of contacts; two in the relay pictured. The armature is hinged to the yoke and

mechanically linked to a moving contact or contacts. It is held in place by a spring so that when

the relay is de-energized there is an air gap in the magnetic circuit. In this condition, one of the

two sets of contacts in the relay pictured is closed, and the other set is open. Other relays may

have more or fewer sets of contacts depending on their function. The relay in the picture also has

a wire connecting the armature to the yoke. This ensures continuity of the circuit between the

moving contacts on the armature, and the circuit track on the Printed Circuit Board (PCB) via the

yoke, which is soldered to the PCB.

Page 50: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

50

When an electric current is passed through the coil, the resulting magnetic field attracts

the armature and the consequent movement of the movable contact or contacts either makes or

breaks a connection with a fixed contact. If the set of contacts was closed when the relay was de-

energized, then the movement opens the contacts and breaks the connection, and vice versa if the

contacts were open. When the current to the coil is switched off, the armature is returned by a

force, approximately half as strong as the magnetic force, to its relaxed position. Usually this

force is provided by a spring, but gravity is also used commonly in industrial motor starters.

Most relays are manufactured to operate quickly. In a low voltage application, this is to reduce

noise. In a high voltage or high current application, this is to reduce arcing.

6.4 RF ENCODER AND DECODER

Fig. 6.3 Fig. 6.4

Page 51: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

51

General Encoder and Decoder Operations

The Holtek HT-12E IC encodes 12-bits of information and serially transmits this data on receipt

of a Transmit Enable, or a LOW signal on pin-14 /TE. Pin-17 the D_OUT pin of the HT-12E

serially transmits whatever data is available on pins 10,11,12 and 13, or D0,D1,D2 and D3. Data

is transmitted at a frequency selected by the external oscillator resistor. See the encoder/decoder

datasheets for details.

Note that if you use anything other than 5V on both encoder/decoder circuits (you will need to

change these oscillator resistor values). Refer to the tables in the HT12D/HT-12E datasheet.

By using the switches attached to the data pins on the HT-12E, as shown in the schematic, we

can select the information in binary format to send to the receiver. The receiver section consists

of the Ming RE-99 and the HT-12D decoder IC. The DATA_IN pin-14 of the HT-12D reads the

12-bit binary information sent by the HT-12E and then places this data on its output pins. Pins

10,11,12 and 13 are the data out pins of the HT-12D, D0,D1,D2 and D3.

The HT-12D receives the 12-bit word and interprets the first 8-bits as address and the last 4-bits

as data. Pins 1-8 of the HT-12E are the address pins. Using the address pins of the HT-12E, we

can select different addresses for up to 256 receivers. The address is determined by setting pins

1-8 on the HT-12E to ground, or just leaving them open. The address selected on the HT-12E

circuit must match the address selected on the HT-12D circuit (exactly), or the information will

be ignored by the receiving circuit.

When the received addresses from the encoder matches the decoders, the Valid Transmission

pin-17 of the HT-12D will go HIGH to indicate that a valid transmission has been received and

the 4-bits of data are latched to the data output pins, 10-13. The transistor circuit shown in the

schematic will use the VT, or valid transmission pin to light the LED. When the VT pin goes

HIGH it turns on the 2N2222 transistor which in turn delivers power to the LED providing a

visual indication of a valid transmission reception.

Page 52: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

52

6.5 Controlling the Project with a Microcontroller

Using these RF transmitter & receiver circuits with a Microcontroller would be simple. We can

simply replace the switches used for selecting data on the HT-12E with the output pins of the

microcontroller. Also we can use another output pin to select TE, or transmit enable on the HT-

12E. By taking pin-14 LOW we cause the transmitter section to transmit the data on pins 10-13.

To receive information simply hook up the HT-12D output pins to the microcontroller. The VT,

or valid transmission pin of the HT-12D could signal the microcontroller to grab the 4-bits of

data from the data output pins. If you are using a microcontroller with interrupt capabilities, use

the VT pin to cause a jump to an interrupt vector and process the received data.

The HT-12D data output pins will LATCH and remain in this state until another valid

transmission is received. NOTE: You will notice that in both schematics each of the Holtek

chips have resistors attached to pins 15 and 16. These resistors must be the exact values shown in

the schematic. These resistors set the internal oscillators of the HT-12E/HT-12D. It is

recommended that you choose a 1% resistor for each of these resistors to ensure the correct

circuit oscillation.

6.6 Range of Operation

The normal operating range using (only) the LOOP TRACE ANTENNA on the transmitter

board is about 50 feet. By connecting a quarter wave antenna using 9.36 inches of 22 gauge wire

to both circuits, you can extend this range to several hundred feet. Your actual range may vary

due to your finished circuit design and environmental conditions.

The transistors and diodes can be substituted with any common equivalent type. These will

normally depend on the types and capacities of the particular loads you want to control and

should be selected accordingly for your intended application.

Page 53: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

53

6.7 Radio Frequency Identification (RFID) Technology

RFID technology has been around since 1970, but until recently, it has been too expensive to use

on a large scale. Originally, RFID tags were used to track large items, like cows, railroad cars

and airline luggage, that were shipped over long distances. These original tags, called inductively

coupled RFID tags, were complex systems of metal coils, antennae and glass.

Inductively coupled RFID tags were powered by a magnetic field generated by the RFID reader.

Electrical current has an electrical component and a magnetic component -- it is electromagnetic.

Because of this, you can create a magnetic field with electricity, and you can create electrical

current with a magnetic field. The name "inductively coupled" comes from this process -- the

magnetic field inducts a current in the wire.

Capacitively coupled tags were created next in an attempt to lower the technology's cost. These

were meant to be disposable tags that could be applied to less expensive merchandise and made

as universal as bar codes. Capacitively coupled tags used conductive carbon ink instead of metal

coils to transmit data. The ink was printed on paper labels and scanned by readers. Motorola's

BiStatix RFID tags were the frontrunners in this technology. They used a silicon chip that was

only 3millimeters wide and stored 96 bits of information. This technology didn't catch on with

retailers, and BiStatix was shut down in 2001

Newer innovations in the RFID industry include active, semi-active and passive RFID

tags. These tags can store up to 2 kilobytes of data and are composed of a microchip, antenna

and, in the case of active and semi-passive tags, a battery. The tag's components are enclosed

within plastic, silicon or sometimes glass.

At a basic level, each tag works in the same way:

Data stored within an RFID tag's microchip waits to be read.

The tag's antenna receives electromagnetic energy from an RFID reader's antenna.

Using power from its internal battery or power harvested from the reader's electromagnetic field,

the tag sends radio waves back to the reader.

Page 54: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

54

The reader picks up the tag's radio waves and interprets the frequencies as meaningful data.RFID

tags are an improvement over bar codes because the tags have read and write capabilities. Data

stored on RFID tags can be changed, updated and locked. Some stores that have begun using

RFID tags have found that the technology offers a better way to track merchandise for stocking

and marketing purposes. Through RFID tags, stores can see how quickly the products leave the

shelves and which shoppers are buying them.

RFID tags won't entirely replace bar codes in the near future -- far too many retail outlets

currently use UPC scanners in billions of transactions every year. But as time goes on we'll

definitely see more products tagged with RFIDs and an increased focus on seamless wireless

transactions like that rosy instant checkout picture painted in the introduction. In fact, the world

is already moving toward using RFID technology in payments through special credit cards and

smart phones -- we'll get into that later.

In addition to retail merchandise, RFID tags have also been added to transportation devices like

highway toll postcards and subway passes. Because of their ability to store data so efficiently,

RFID tags can tabulate the cost of tolls and fares and deduct the cost electronically from the

amount of money that the user places on the card. Rather than waiting to pay a toll at a tollbooth

or shelling out coins at a token counter, passengers use RFID chip-embedded passes like debit

cards.

6.8 RFID Technology in our project

In our project we are sending one four bit data 01111 which after ASK modulation will

be send to the microcontroller via a frequency of 433.92 MHz . Microcontroller identify

Page 55: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

55

the Data send via that frequency and will deactivate the required component to be

deactivated by the help of Relays. Microcontroller is so programmed that it will

deactivate the component according to the Data.

RF Frequency (433.92 MHz)

0111 ASK 0111

Fig. 6.5

ALE/

PSE

P2.7(

P2.5(P2.4(A12)

P2.3(A11)

P2.2(A10)

Page 56: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

56

6.9 RF DETAILS

The TWS-434 and RWS-434 are extremely small, and are excellent for applications requiring

short-range RF remote controls. The transmitter module is only 1/3 the size of a standard

postage stamp, and can easily be placed inside a small plastic enclosure.

TWS-434: The transmitter output is up to 8mW at 433.92MHz with a range of approximately

400 foot (open area) outdoors. Indoors, the range is approximately 200 foot, and will go through

most walls.....

Modulation: ASK

Specification

Symbol Parameter Conditions Min

Typ

Max Unit

Vcc Operating supply voltage 2.0 - 12 V

Icc

Peak Current (2V) - - 1.64 mA

Icc Peak Current(12V) - - 19.4 mA

Page 57: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

57

Vin

Input High Voltage IData=100Ua (High) Vcc-0.5 - Vcc V

Vii

Input Low Voltage IData=0Ua (Low) - - 0.3 V

Fo

Absolute Frequency 433.72 433.92 434.12 MHz

417.8 418 418.2 MHz

△FO

Relative To 433.92MHz +/-150 +/-200 KHz

Po

RF Out Power Into 50Ω VCC 9V-12V - 16 - dBm

VCC 5V-6V 14

Modulation Bandwidth External Encoding 512 4.8K 200K bps

Tr

Modulation Rise Time - - 100 uS

Tf

Modulation Fall Time - - 100 uS

Notes : ( Case Temperature = +25C+/-2C Test Load Impedance = 50 Ω )

The TWS-434 transmitter accepts both linear and digital inputs, can operate from 1.5 to 12

Volts-DC, and makes building a miniature hand-held RF transmitter very easy. The TWS-434 is

approximately the size of a standard postage stamp.

TWS-434 Pin Diagram

Page 58: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

58

CHAPTER-7

CONCLUSION

Thus the concept of mobile keypad and speaker disabling in protected region is implemented for

the data 0111.

Page 59: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

59

CHAPTER-8

REFERENCES

ComLaw Management - Series- Notification that the Australian Communications and

Media Authority prohibits the operation or supply, or possession for the purpose of

operation or supply, of specified devices

Radio communication Act of Canada

Cellphone jamming technology will be placed in all NZ prisons | NATIONAL | NEWS |

tvnz.co.nz

BBC News | Jam mobile phone signals in prisons, says inspector

Communications Act of 1934: as amended by Telecom Act of 1996

FCC: Wireless Services: Cellular Services: Operations: Blocking & Jamming

http://news.cnet.com/Company-challenges-FCC-rules-on-cell-phone-jamming-gear/2100-

1036_3-6139854.htm.

How stuff works.com.

IEEE

Wikipedia

Page 60: Report EditingADVANCED COMMUNICATION DESIGN FOR MOBILE DISABLING AT RESTRICTED AREAS USING RFID TECHNOLOGY

60