Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
167 views

IOT Based Smart System Using ARM Controller

Using of ARM controller to design a smart world

Uploaded by

suneetha gadde
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
167 views

IOT Based Smart System Using ARM Controller

Using of ARM controller to design a smart world

Uploaded by

suneetha gadde
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 79

A Project report on

IOT based smart and secure Traffic management system


using ARM microcontroller
Submitted in partial fulfillment of the requirements for the award of the degree of

MASTER OF TECHNOLOGY

in

Embedded Systems

Submitted

by

S.SUREKHA

(14P31D5511)

Under the Esteemed Guidance of

Mr.R.V.V.KRISHNAM.Tech., (Ph.D.)

Associate Professor& HOD, ECE

DEPARTMENT OFELECTRONICS & COMMUNICATION


ENGINEERING

ADITYA COLLEGE OF ENGINEERING AND TECHNOLOGY


(Affiliated to Jawaharlal Nehru Technological University, Kakinada)

SURAMPALEM, ADB ROAD,E.G.DIST, A.P-533437


ADITYA COLLEGE OF ENGINEERING AND TECHNOLOGY
(Affiliated to Jawaharlal Nehru Technological University, Kakinada)

DEPARTMENT OF ELECTRONICS & COMMUNICATION


ENGINEERING

CERTIFICATE

This is to certify that Project report entitled “IOT based smart and secure Traffic
management system using ARM microcontroller” is being submitted by
S.SUREKHA (14P31D5511) in the partial fulfillment of the requirement for the
award of the degree of MASTEROF TECHNOLOGY in ELECTRONICS AND
COMMUNICATION ENGINEERING with specialization in EMBEDDED
SYSTEMS during the academic period of 2014-2016 .

Signature of the Guide Signature of the Head of Dept

Mr. R.V.V.KRISHNA M.Tech., (Ph. ) Mr.R.V.V.KRISHNA M.Tech., (Ph.D.)

Head of the Department Head of the Department

EXTERNAL EXAMINER
ACKNOWLEDGEMENT

A Successful Project is a fruitful culmination of efforts by many people, some


were directly involved and some others quickly encouraged and supported from the
background. I owe a great many thanks to a great many people who helped and
supported me during the accomplishment of the Project.

It is a great privilege for me to convey sincere gratitude to Prof. T.K.RAMA


KRISHNA RAO M.Tech., Ph.D Principal of our college for his encouragement and for
providing excellent lab facilities.

I would like to gratefully acknowledge&express my sincere thanks to my


Project guide& the Head of the department of Electronics and Communication
Engineering Mr.R.V.V.KRISHNAM.Tech.,(Ph.D )who has been abundantly helpful
and has assisted me in numerous ways.

I wish to thank all the staff members in the department for their kind co-
operation and my parents to give support throughout the Project work.

Finally I acknowledge sincerely the effective services rendered by one and all
involved directly and indirectly in the entire Project.

S.SUREKHA
(14P31D5511)
CONTENTS

PAGE NO

ABSTRACT I

LIST OF FIGURES II

LIST OF TABLES III

NOMENCLATURE IV

CHAPTER 1 INTRODUCTION 01

1.1 OBJECTIVE 01

1.2 MOTIVATION 01

1.3 THESIS ORGANIZATION 02

CHAPTER 2 LITERATURE SURVEY 03


CHAPTER 3 HARDWARE SETUP AND IMPLEMENTATION 05
3.1 HARDWARE IMPLEMENTATION 05

3.2 WOKING PRINCIPLE 06


3.3 SCHEMATIC DIAGRAM 10

3.4 FLOWCHART 11

3.5 ARM & ITS ARCHITECTURE 12

3.5.1 ARM HISTORY 12

3.5.2 RISC 13

3.5.3 HARVARD ARCHITECTURE 14

3.5.4 ARM BUS TECHNOLOGY 15

3.6 ARM LPC2148 MICRO CONTROLLER ARCHITECTURE 15

3.6.1 ON-CHIP FLASH PROGRAM MEMORY AND RAM 17

3.6.2 INTERRUPT CONTROLLER AND SOURCES 17


3.6.3 GPIO AND ITS FEATURES 18

3.6.4 10-BIT ADC AND ITS FEATURES 18

3.6.5 10-BIT DAC AND ITS FEATURES 19

3.6.6 USB 2.0 DEVICE CONTROLLER AND FEATURES 19

3.6.7 UARTS AND ITS FEATURES 20

3.6.8 I2C-BUS SERIAL I/O CONTROLLER AND ITS FEATURES 20

3.6.9 WATCHDOG TIMER AND ITS FEATURES 21

3.6.10 REAL-TIME CLOCK AND ITS FEATURES 21

3.7 PIN DIAGRAM AND DESCRIPTION 22

3.8 LPC 2148 FEATURES 23

3.9 WIFI MODULE (ESP8266) 24

3.9.1 OVERVIEW AND SPECIFICATION 25

3.9.2 POWER SUPPLY AND CONSUMPTION 26

3.9.3 SERIAL COMMUNICATION 28

3.10 GSM TECHNOLOGY 29

3.10.1 DEFINITION OF GSM 29

3.10.2 THE EVOLUTION OF MOBILE TELEPHONE SYSTEMS 29

3.10.3 HISTORY 30

3.10.4 GSM/GPRS MODULE 31

3.10.5 GSM/GPRS WORKING 32

3.10.6 APPLICATIONS OF GSM/GPRS MODULE 32

3.10.7 SIM800 GSM MODEMFEATURES 33

3.11 RFID (RADIO FREQUENCY IDENTIFIER) 34


3.11.1 INTRODUCTION 34

3.11.2 RFID TRANSPONDER / TAG 34

3.11.3 RFID READER/ INTERROGATOR 35

3.11.4 EM-18 RFID READER 36

3.11.5 WORKING OF RFID 37

3.11.6 APPLICATIONS 38

3.12 LCD DISPLAY 38

3.12.1 LCD PIN DESCRIPTION 39

3.12.2 LCD SCHEMATIC 40

3.13 BUZZER 42

CHAPTER 4 SOFTWARE 43
4.1 EMBEDDED C 43

4.2 IOT PLATFORM 44

4.2.1 OPERATING PRINCIPLES 44

4.3 KEIL µVISION4 SOFTWARE 45

4.3.1 PROCEDURAL STEPS 45

4.4 THING SPEAK 52

4.4.1 THING SPEAK FUNCTIONS 53

4.4.2 GETTING STARTED ABOUT THINGSPEAK 53

4.4.3 CHANNELS AND CHARTS API 54

CHAPTER 5 RESULTS 59
CHAPTER 6 CONCLUSION & FUTURE SCOPE 62
REFERENCES 63
ABSTRACT

Our research approach is to design and develop reliable, efficient, flexible,


economical, secure and realistic monitoring ofTraffic information system, emergency
vehicle clearance and identification of theft vehicle. Indian traffic is non-lane based it
needs traffic control solutions, which are different from the other Countries. Smart
management of traffic flows can reduce the negative effect of congestion. So this
system was implemented based on present criteria that tracking three conditions in
those one is heavy traffic control and another one is making a root of emergency
vehicles like ambulance, Fire Engine and VIP vehicles and also finding the traffic
junction of theft or crime vehicle.
This system taking input as a vehicle’s VIN number which can be read by
RFID reader. Here each individual vehicle is equipped with a special radio frequency
identification (RFID) tag (placed at a strategic location), which makes it impossible to
remove or destroy.RFID reader placed nearer to the traffic junction, RFID tags are
inserted into the vehicles and the main system is placed at junction. The data will be
transmitted wirelessly using Wi-Fi module. The transmitted data is monitored
remotely using IOT by any user who wants to access the traffic information at that
particular traffic junction, this will be the output of this system. This enables user to
have accurate traffic information through a secured internet web connection. This
system helps to identifying any crime vehicle and we can easily catch that vehicle at
next possible junction, this information will be send to police control room through
GSM module. And also this system is implemented for giving priority for emergency
vehicles like Ambulance,Fire Engines and VIP vehicles which are present at that
junction, because of that those emergency vehicles can easily passes through junction
without waiting for their time slots.
Without manual intervention this system is finally gives the solution for
several problems which are facing now a days at traffic junctions.This system will
gives the traffic information at desired traffic junction through IOT.

i
LIST OF FIGURES

Figure. No. Name of the Figure Page No.


3.1 BLOCK DIAGRAM 06

3.2 SCHEMATIC DIAGRAM 10

3.3 FLOW CHART FOR WORKING PROCEDURE 11

3.4 LPC 2148 ARM CPU ARCHITECTURE 16

3.5 PIN DIAGRAM OF ARM LPC-2148 MICROCONTROLLER 23

3.6 ESP8266 25

3.7 SERIAL COMMUNICATIONS WITH ESP8266 28

3.8 GSM/GPRS MODULE 31

3.9 MOBILE STATION 32

3.10 SIM800L MODULE 33

3.11 RFID SYSTEM 34

3.12 RFID TAG 35

3.13 RFID READER AND TAG 36

3.14 EM18 RFID TECH PARAMETERS 36

3.15 EM18 RFID MODULE 37

3.16 LCD PIN DIAGRAM 38

3.17 LCD SCHEMATIC DIAGRAM 40

4.1 THINGSPEAK 45

5.1 APPLICATION BOARD 59

5.2 RFID TAGS 59

5.3 HOME PAGE OF THING SPEAK PLATFORM 60

5.4 CHANNELS LIST 60

5.5 IOT TRAFFIC CHANNEL 61

5.6 TRAFFIC INFORMATION AT ONE JUNCTION 61

ii
LIST OF TABLES

Table. No. Name of the Table Page No.

3.1 CISC & RISC DIFFERENCES 14

3.2 DATA SHEET OF ESP8266 26

3.3 DEVELOPMENT OF MOBILE PHONE SYSTEM 30

3.4 MOBILE TELEPHONY GENERATION 30

3.5 SPECIFICATIONS OFEM18 RFID 37

3.6 LCD PINS DESCRIPTION 39

NOMENCLATURE

ARM : ADVANCED RISC MACHINE

RISC : REDUCED INSTRUCTION SET COMPUTER

MAC : MULTIPLY – ACCUMULATE UNIT

ALU : ARITHMETIC LOGIC UNIT

PCI : PERIPHERAL COMPONENT INTERCONNECT

ASB : ARM SYSTEM BUS

APB : ARM PERIPHERAL BUS

AHB : ARM HIGH PERFORMANCE BUS

SPI : SERIAL PERIPHERAL INTERFACE

iii
CHAPTER-1

INTRODUCTION

1.1 OBJECTIVE
In this project, we proposed an “IOT based smart and secure Traffic
management system using ARM microcontroller”. This system was implemented
based on present criteria that tracking three conditions in those one is heavy traffic
control and another one is making a root of emergency vehicle like ambulance and
VIP vehicle and finding theft or crime vehicle. Here the radio frequency identification
tags are attached to the each and every vehicle individually it cannot destroy or
removable. Apart from that when ambulance passes through the junction then
automatically we assign green light to that junction. And any crime vehicle
approaches then we can identify at what junction that theft vehicle presents then we
can catch that vehicle at that junction if possible otherwise we can catch it in the next
junction.

1.2 MOTIVATION
INDIA is a fast growing financial prudence it is the most populous country. It
is seen that terrible road congestion problems in cities. When the increase in the
growth in number of vehicles compared Infrastructure growth is slow, due to cost
bounds and space .Also, the scenario is different from the other Countries. In India
traffic control solutions required as it is non-lane based traffic. The negative effect of
congestion has to reduce traffic flow through smart management. One of the more
cost effective options is wireless networks.To provide cost better solutions
Technologies like, GSM RFID and XBeecan be used in traffic control. Using RFID
system can transfer information between RFID Reader and RFID tag through
electromagnetic energy. Some RFID systems have range to transfer information the
range is inches or centimeters, while some others may work for 100 meters or more.
Depending on requirement we can use different RFID readers. A GSM modem is a
just like a mobile phone it is special type of modem, which operates over a
subscription to a mobile operator as it accepts a SIM card. It can send SMS alert
whenever required. In this system we can use GPRS module also for alerts of
detection of crime vehicles.

1
1.3 THESIS ORGANIZATION

The thesis for the project, “IOT based smart and secure Traffic management
system using ARM microcontroller” is organized into several chapters to give precise
details about the project.

Chapter 1 in this, the objective of the project is discussed. Then the main motivation
behind the project is discussed.

Chapter 2 inthis, literature reviews of the project was explained.

Chapter 3 in this, the hardware technologies used in the project like ARM, Wi-Fi,
GSM, RFID technologies etc., are explained.

Chapter 4 in this,the software requirements of the project like Embedded C,


THINGSPEAK and System Setup are explained.

Chapters 5 in this, the working procedure of the project are explained.

Chapter 6 in this, the results of the project work are shown.

Chapter 7 inthis, the future scope andconclusion of the project are explained.

2
CHAPTER-2

LITERATURE SURVEY

3
This RFID technique deals with multivehicle, multilane, multi road junction
areas. It provides an efficient time management scheme, in which, a dynamic time
schedule is worked out in real time for the passage of each traffic column. The real-
time operation of the system emulates the judgment of a traffic policeman on duty.
The number of vehicles in each column and the routing are proprieties, upon which
the calculations and the judgments are done. The disadvantage of this work is that it
does not discuss what methods are used for communication between the emergency
vehicle and the traffic signal controller. In [9], it proposed a RFID and GPS based
automatic lane clearance system for ambulance. The focus of this work is to reduce
the delay in arrival of the ambulance to the hospital by automatically clearing the
lane, in which, ambulance is travelling, before it reaches the traffic signal. This can be
achieved by turning the traffic signal, in the path of the ambulance, to green when the
ambulance is at a certain distance from the traffic junction. The use of RFID
distinguishes between the emergency and non-emergency cases, thus preventing
unnecessary traffic congestion. The communication between the ambulance and
traffic signal post is done through the transceivers and GPS. The system is fully
automated and requires no human intervention at the traffic junctions. The
disadvantage of this system is it needs all the information about the starting point, end
point of the travel. It may not work, if the ambulance needs to take another route for
some reasons or if the starting point is not known in advance. Traffic is a critical issue
of transportation system in most of all the cities of Countries.In [11], currently a video
traffic surveillance and monitoring system commissioned in Bangalore city. It
involves a manual analysis of data by the traffic management team to determine the
traffic light duration in each of the junction.
2.2 EXISTING SYSTEM

In the existing design it is designed for getting the present location through GPS. But
Moving to desired place has become difficulty to the driver and also the predictions of
traffic density in that route.

2.3 PROPOSED SYSTEM

Proposed system will be developed the implementation of proposed system


mainly involves three steps, which are provide traffic information system, emergency
vehicles clearance, and stolen vehicles detects.

4
CHAPTER-3

HARDWARE SETUP AND IMPLEMENTATION

The implementation of proposed system mainly involves three steps, which


are Automatic signal control system, emergency vehicles clearance, and stolen
vehicles detection.

3.1 HARDWARE IMPLEMENTATION

A. Automatic Signal Control System


In this system, for experiment purpose, we have used passive RFID reader and
passive RFID transponders having frequency of 125 KHz.
Each individual vehicle inserted with RFID tags whenever that vehicle comes in the
range of the receiver then automatically it transmits the unique RFID to the reader.
The RFID reader is connected to the microcontroller board then it will count the RFID
tags. Here we assign equal predetermined duration of 10 sec to each side of junction,
if the count is greater than 10 then the green light duration will changes. For example
if extra 5 vehicles crosses RFID then for next iteration 15 sec allocated for that side of
junction. In this way depending upon crowd the green light duration time changes.

B. Stolen Vehicle Detection System


In this module, whenever any stolen vehicle crossed this RFID reader then it
reads that unique RFID tag and compares with controller ID If we found a match then
automatically it alerts by a beep sound , and a SMS will sent to the control room with
the help of GSM Module.

C. Emergency Vehicle Clearance System


In this system, whenever any emergency vehicles like Ambulance, Fire engines are
entered in traffic junction we need to give priority for them. So whenever these
vehicles approaches the junction then controller will immediately allocate time slot
for this side of junction first, after passing away of these vehicles only it will operate
normally as predetermined time durations.

5
3.2 WOKING PRINCIPLE
BLOCK DIAGRAM:

Fig 3.1 Block diagram

In this system the block diagram shows how it will collects the information and
uploaded into the server. These all blocks are the major parts of this system.

BLOCK DIAGRAM EXPLANATION


(a) POWER SUPPLY UNIT:
When working with electronics, you always need one basic thing: Power. In
every electronic circuit power supply is required. The proper working of each and
every component, it is important to supply the exact amount of voltage and current. If
the power exceeds its limit, it can be fatal. The +5 volt power supply is based on the
commercial 7805 voltage regulator IC. This IC produces a steady +5 volt output,
accurate to within 5% (0.25 volt). It also contains current-limiting circuitry and
thermal overload protection, so that the IC won't be damaged in case of excessive load
current; it will reduce its output voltage instead. LM1117 regulator is used to get 3.3v.

6
(b) WIFI MODULE:
The CC2500 is a RF module and has transceiver, which provides an easy way
to use RF communication at 2.4 GHz. Every CC2500 is equipped with the ARM-7,
which contains Unique Identification Number (UIN). This UIN is based on the
registration number of the vehicle. One of the most important features is serial
communication without any extra hardware and no extra coding. Hence, it is a
transceiver as it provides communication in both directions, but only one direction.
The ARM-7 and CC2500 always communicate with ARM-7 via serial
communication. Rx pin of CC2500 is connected to TX (RC6) of microcontroller and
TX pin of CXC2500 is connected to Rx pin of microcontroller (RC7). Other two pins
are used to energize transceiver.

Features of Wi-Fi:
1. Operating frequency-2.4GHz.
2. Supply Voltage-2.8 to 3.4 V.
3. Urban range-100 ft.
4. RF data rate -250000bps.

(c) GSM MODULE:


GSM modem is connected with the ARM-7 microcontroller. This allows the computer
to use the GSM modem to communicate over the mobile network. These GSM
modems are most frequently used to provide mobile Internet connectivity, many of
them can also be used for sending and receiving SMS and MMS messages. GSM
modem must support an “extended AT command set” for sending/receiving SMS
messages. GSM modems are a cost effective solution for receiving SMS messages,
because the sender is paying for the message delivery. SIM 300 is designed for global
market and it is a tri-band GSM engine. It works on frequencies EGSM 900 MHz,
DCS 1800 MHz and PCS 1900 MHz SIM900 features GPRS multi-slot class 10/ class
8 (optional) and supports the GPRS coding schemes. GSM/GPRS module is used to
establish communication between a computer and a GSM-GPRS system.Global
System for Mobile communication (GSM) is an architecture used for mobile
communication in most of the countries. Global Packet Radio Service (GPRS) is an
extension of GSM that enables higher data transmission rate. GSM/GPRS module
consists of a GSM/GPRS modem assembled together with power supply circuit
7
and communication interfaces (like RS-232, USB, etc) for computer. The MODEM
is the soul of such modules.It requires a SIM (Subscriber Identity Module) card just
like mobile phones to activate communication with the network. Also they
have IMEI (International Mobile Equipment Identity) number similar to mobile
phones for their identification

This GSM modem is a highly flexible plug and play quad band GSM modem,
interface to RS232, it supports features like voice, data, SMS, GPRS.

(d) RFID:
Radio Frequency Identification (RFID) is an IT system that transmits signals
without the presence of physical gadgets in wireless communication. It is categorized
under automatic identification technology, which is well established protocol. The
working of an RFID system is very simple. The system utilizes tags that are attached
to various components to be tracked. The tags store data and information concerning
the details of the product of things to be traced. The reader reads the radio frequency
and identifies the tags. The antenna provides the means for the integrated circuit to
transmit its information to the reader. There are two types of RFID categories, active
and passive tags. The tags that do not utilize power are referred to as passive and they
are driven by an antenna that enables the tag to receive electromagnetic waves from a
reader. On the contrary, active tags rely on power and they have inbuilt power sources
that enable it to send and receive signals from RFID reader. RFID range depends on
transmit power; receive sensitivity and efficiency, antenna, frequency, tag
orientations, surroundings. Typically, the RFID range is from a few centimeters to
over hundred meters. FID reader uses frequency 125 KHz with a range of 10 cm.
(e) LCD DISPLAY:

One of the most common devices attached to a micro controller is an LCD


display. Some of the most common LCD‟s connected to the many microcontrollers
are 16x2 and 20x2 displays. This means 16 characters per line by 2 lines and 20
characters per line by 2 lines, respectively.The LCD requires 3 control lines as well as
either 4 or 8 I/O lines for the data bus. The user may select whether the LCD is to
operate with a 4-bit data bus or an 8-bit data bus. If a 4-bit data bus is used the LCD
will require a total of 7 data lines.The three control lines are referred to as EN, RS,
and RW. Itincorporating the two 10K external pull up resistors.

8
(f) BUZZER:

A buzzer or beeper is a signaling device, usually electronic, typically used in


automobiles, household appliances such as a microwave oven, or game shows.The
word "buzzer" comes from the rasping noise that buzzers made when they were
electromechanical devices, operated from stepped-down AC line voltage at 50 or 60
cycles.It most commonly consists of a number of switches or sensors connected to a
control unit that determines if and which button was pushed or a preset time has
lapsed, and usually illuminates a light on the appropriate button or control panel, and
sounds a warning in the form of a continuous or intermittent buzzing or beeping
sound. Initially this device was based on an electromechanical system which was
identical to an electric bell without the metal gong.Other sounds commonly used to
indicate that a button has been pressed are a ring or a beep.

Working:

Under the proposed work, each intersection contains RFID reader. Each lane
has its RFID to track the vehicles to passing through it. Each RFID reader has its own
data base to store the information regarding to vehicles that passes from it with
timestamp and traffic light. Every vehicle has a RFID enabled device that stores a
vehicle identification number (VIN). Every vehicle has its unique VIN number that
provides the information that regarding the priority of vehicle and type of vehicle.
With the help of VIN we can uniquely identify the vehicle and its owner. Vehicle
Identification Number In the proposed work RFID, tag will store vehicle
identification number. These numbers is divided in three parts. First part represents
the priority of the vehicles. Next part represents the type of vehicle and next, digit
represents the vehicle number. In the proposed work, different types of vehicles have
different type of priorities.
Vehicles are divided into 4 categories. First system category includes
Ambulance, Fire brigade vehicles and VIP vehicles. These vehicles have a highest
priority. The second category includes the buses school and colleges buses. These
buses need to reach their destination on time so these vehicles also need a fast service.
Third category includes the car, motorcycle and scooter and forth category includes
the heavy vehicles. Day time priority of 3rd category is high as compare to 4th
category but during night hours the priority of heavy vehicles is high.

9
3.3 SCHEMATIC DIAGRAM

Figure 3.2 Schematic diagram

This schematic diagram is drawn by using Proteus software. Port 0 and Port 1 pins of
ARM 7 Microcontroller are used to connect different modules such as GSM module,
WIFI module, LCD display, RFID reader and Traffic signals at junction.

10
3.4 FLOWCHART

Figure 3.3 Flow chart

11
Explanation:

In this system whenever a vehicle going to enter into the junction then RFID reader
will scans the VIN number which resides in RFID tag of that vehicle. Here it having
three casesthis scanned number verified by ARM microcontroller.

Case (i): If this VIN number is matched with emergency/VIP vehicles then it
increments vehicle count and rises the interrupt i.e., italerts with a buzzer sound , then
controller will gives the priority for this side of junction after passing the vehicle only
it will rotates the signals based on vehicle count and interrupt and uploads traffic
density into internet.

Case (ii): If this VIN number is matched with any stored theft/ crime vehicles
numbers then it increments the vehicle count and sends a SMS to the police control
room with a buzzer alert, thenit will rotates the signals based on vehicle count and
interrupt and uploads traffic density into internet. By using this we can easily catch
the vehicle at next possible junction.

Case (iii): If this VIN number is authorized then it only increments vehicle count
thenit will rotates the signals based on vehicle count and interrupt and uploads traffic
density into internet.

In this way depending upon density the traffic signal duration at each side will be
changed at the junction and this information will be uploaded into the internet so that
any user can access the traffic information.

HARDWARE DESIGN

In this project, the different hardware components such as ARM architecture,


GSM Modem, LCD display and WIFI module and RFID Technology are used in this
project and each of them are explained below
3.5ARM & ITS ARCHITECTURE

3.5.1 ARM History

At Acorn Computer Ltd of Cambridge, ARM (Acorn RISC Machine)


architecture was developed in 1983-1985. In 1990 ARM Ltd., was founded. In
embedded designs 32-bit RISC processor architectures are widely used.
12
Due to the power saving feature of ARM, It is dominantly used in mobile
electronics market, at which power consumption is low as the desired goal.
Approximately 75% of all consumer electronic goods (PDA‟s, mobile phones, iPods,
musical players hard drives and desktop routers etc.) are designed by using ARM
family processors (32-bit RISC processor).

3.5.2 RISC

It is a RISC (Reduced Instruction Set Computer) architecture based


microprocessor which has small, highly-optimized set of instructions, rather than a
more specialized set of instructions in other types of architectures.

Characteristics of most RISC processors:

 One cycle execution time: each instruction of CPU was optimized due
to CPI (clock per instruction) of one cycle of RISC processors.
 Pipelining: It is a technique at which instructions are divided into
different stages (fetching, decoding, execution etc.) or parts and then
executed simultaneously.
 Large number of registers: A RISC processor consists of large
number of registers to prevent in large amounts of interactions with
memory.
ARM Architecture:

 ARM architecture is based on Enhanced RISC architecture (deviates


from classic RISC architecture).

Microcontroller Architectures:

1. Von Neumann Architecture (Princeton Architecture)


2. Harvard Architecture
Von Neumann architecture is used by a very large percentage of
microcontrollers and here all memory space is on the same bus and instruction and
data are treated identically. In the Harvard architecture, code and data storage have
separate blocks and separate set of buses to carry code and data, this allows code and
data to be fetched simultaneously, resulting in a more efficient implementation.

13
To meet requirements of embedded applications ARM is having based upon RISC
Architecture with enhancements:

 A register file of large uniform.


 It has Load-store set for data processing operations which operate on
register contents only.
 Fixed and Uniform length instructions.
 High Code Density.
CISC and RISC differences:

CISC RISC

• It takes many clock • It performs basic


cycles to execute an functions as Single-cycle
instruction instructions.
• It is operated at higher • It is operated at lower
clock frequencies. clock frequencies
• Memory-to-memory • Here register-to-register
addressing modes. operations are performed
• A microcode control • Direct execution control
unit. unit

Table: 3.1 Differences between CISC and RISC

3.5.3 Harvard architecture

It has separate data and instruction busses, allowing transfers to be performed


simultaneously on both busses. It supports instruction level parallelism. In Digital
signal processor Harvard architecture is used for streaming data. The only difference
in Harvard architecture to that of Von-Neumann architectureis that the program and
data memories are separated and use physically separate transmission paths.

It is more commonly used in specialized microprocessors for real-time and


embedded application. The main disadvantage of the Harvard architecture is, it
requires many address and data pins on the chips. Whereas Von-Neumann
architecture consists of a single bus for transferring the data and fetching the
instruction. So throughput and processing speed of CPU is reduced.

14
3.5.4 ARM Bus Technology

An Embedded system uses different bus technologies. Most common PC bus


technology is the Peripheral Component Interconnect (PCI) bus which connects
devices such as video card and disk controllers to the 8086 processor buses. This type
of technology is called External or off chip bus technology. Embedded devices use an
on-chip bus that is internal to the chip and allows different peripheral devices to be
inter-connected with an ARM core. There are two different types of devices
connected to the bus. They are

1. Bus Master: Across the same bus it initiates date transfer with another device as a
logic device (here bus Master is a ARM Processor).

2. Bus Slave: From a bus master device it transfers request (here bus slaves are
peripherals).

ARM LPC2148 is a 64 pin Micro Controller which comes under ARM 7


version of ARM processors. It comes under the processor core architecture
ARM7TDMI-S.It is a 32 bit Micro Controller .This is intended for high end
applications involving complex computations. It follows the enhanced RISC
architecture. It has high performance and very low power consumption. It has serial
communications interfaces ranging from a USB 2.0 Full Speed device, multiple
UARTS, SPI, and I2Cs. Various 32-bit timers, dual 10-bit ADC(s), single 10-bit
DAC, PWM channels and 45 fast GPIO lines with 9 interrupt pins.

3.6 ARM LPC2148 MICRO CONTROLLER ARCHITECTURE

ARM-Advanced RISC Machine is a 32-bit RISC (Reduced Instruction Set


Computer) processor. It is an architecture used in many processors and
microcontroller design. LPC2148 is an ARM architecture based SOC product
developed by NXP Semiconductor (Phillips). It combines microcontroller with
high speed embedded high speed flash memory.ARM LPC2148 is intended to high
end applications involving complex computations. It has high performance and very
low power consumption.ARM LPC2148 is a 64 pin Micro Controller which comes
under ARM 7 version of ARM processors.

15
Thumb is a unique architectural strategy which employed by The
ARM7TDMI-S processor, suited to for high-volume applications it suits well with
restrictions of memory, or applications like code density is plays a key role

Fig 3.4 LPC 2148 ARM CPU Architecture


TheARM7TDMI-S processor has two instruction sets:

• A 16-bit Thumb set.

• The standard 32-bit ARM set.

The Thumb set‟s 16-bit instruction length allows it to approach twice the density of
standard ARM code. Up to 65 % of the code size of ARM the thumb code is able to
provide allows for full speed execution the flash implementation in the
LPC2141/42/44/46/48 allows also in ARM mode. For short code sections and
16
performance critical it was recommended (such as and DSP algorithms and interrupt
service routines) in ARM mode. That resulted on the overall code size will be low but
30% speed can be increased over Thumb mode.

3.6.1 On-chip flash program memory and static RAM

The LPC2148 having a 512 kB flash memory system. For both code and data
storage of data and code this memory useful. In several ways the programming of
flash memory accomplished. By using the serial port it may be programmed in the
system. While application is running the application program can erase in flash, it
allows data storage field or flexibility of upgrades of firmware, etc. The LPC2148
processor‟s flash memory provides 20 years of data-retention and its erase/write
cycles minimum of 100,000.

On-Chip Static RAM

Here also for data storage and/or code On-chip static RAM may be used. As
32-bit SRAM may be accessed. A 32 kB of static RAM is provided by the LPC2148
processor respectively. In the processor LPC2148, for data storage and code storage,
data storage and execution USB can also be used as a general purpose RAM 8 kB
SRAM block intended to utilized.

3.6.2 Interrupt Controller and sources

As defined by programmable settings non-vectored IRQ Fast Interrupt


Request (FIQ), vectored Interrupt Request (IRQ) are categorisedand and the Vectored
Interrupt Controller (VIC) allows all interrupt request inputs. The priorities of
interrupts from the various peripherals can be dynamically assigned and adjusted is
nothing but a programmable assignment. Fast interrupt request (FIQ) has the highest
priority. If more than one request is assigned to FIQ, the VIC combines the requests to
produce the FIQ signal to the ARM processor.

Interrupt sources

Dedicated to the Vectored Interrupt Controller each peripheral device has one
interrupt line, but may contain several internal interrupt flags. These Individual
interrupt flags may also recommended more than one interrupt source.

17
3.6.3 Fast general purpose parallel I/O (GPIO) and its features

The GPIO registers can control the device pins which are not connected to a
specific function. Pins may be dynamically configured as inputs or outputs. Separate
registers allow setting or clearing any number of outputs simultaneously. The current
state of the port pins and read back may be identified by the value of the output
register. Over prior LPC2000 devices the LPC2148 processor introduced the
accelerated GPIO functions:

• For the fastest possible I/O timing in the processor the GPIO registers are relocated
to the ARM local bus.

• Leaving other bits unchanged mask registers allow sets of port bits as a group.

• All GPIO registers are available as a byte addressable registers.

GPIO Features

• Individual bits direction control.

• For output set and clear it maintains separate control.

•After reset all I/O pins are act as input pins.

3.6.4 10-bit ADCand its features

The LPC2148 processor having two analog to digital converters. These two
converters are using single 10-bit successive approximation analog to digital
converters. While ADC0 contains 6 channels, ADC1 contains 8 channels.

ADC Features

• Successive approximation analog to digital converter contains 10 bits.

• Themeasurement range of 0 V to VREF (2.0 V ≤ VREF ≤ VDDA).

• More than 400,000 10-bit samples per second can possible by each converter.

• To reduce interrupt overhead every analog input contains dedicated input.

• For single or multiple inputs burst conversion mode is possible.

18
3.6.5 10-bit DACand its features

The LPC2148 processor generates a variable analog output to enable DAC.


The VREF voltage is the maximum DAC output voltage.

DAC Features

• 10-bit DAC.

• Buffered output.

• Power-down mode is available.

• Selectable power versus speed.

3.6.6 USB 2.0 device controllerand its features

The USB is a 4-wire serial bus that supports communication between a host
and a number (127 max) of peripherals. The host controller allocates the USB
bandwidth to attached devices through a token based protocol. The bus supports hot
plugging, unplugging, and dynamic configuration of the devices. All transactions are
initiated by the host controller.

The LPC2148 is equipped with a USB device controller that enables 12Mbit/s
data exchange with a USB host controller. It consists of a register interface, serial
interface engine, endpoint buffer memory and DMA controller. The serial interface
engine decodes the USB data stream and writes data to the appropriate end point
buffer memory. The status of a completed USB transfer or error condition is indicated
via status registers. An interrupt is also generated if enabled. A DMA controller
(available in LPC2146/48 only) can transfer data between an endpoint buffer and the
USB RAM.All transactions are initiated by the host controller in this LPC2148
processor of USB device controller.

USB Features

• Fully compliant with USB 2.0 Full-speed specification.

• Supports 32 physical (16 logical) endpoints.

• Supports control, bulk, interrupt and isochronous endpoints.

19
• Endpoint maximum packet size selection by software at run time.

• RAM message buffer size based on endpoint realization and maximum packet size.

• Supports bus-powered capability with low suspend current.

• Supports DMA transfer on all non-control endpoints (LPC2146/48 only).

• One duplex DMA channel serves all endpoints (LPC2146/48 only).

• Allows dynamic switching between CPU controlled and DMA modes.

3.6.7 UARTSand its features

The LPC2148 processor having two UARTs. The LPC2148 UART1 also
provides a full modem control handshake interface along with receive and
transmission lines. UARTs in LPC2148 having a fractional baud rate generator for its
both UARTs which feature is not available in LPC2000 microcontrollers , and 9600 is
the standard baud rate, apart from in hardware (UART1 in LPC2148 only) the auto
CTS/RTS flow-control functions fully implemented .

UART Features

• Receive and Transmit FIFOs length is 16 bytes.

• Register locations having „550 industry standard.

• Receiver FIFO triggers points are available at 1, 4, 8, and 14 bytes

• Without a need for external crystals Built-in fractional baud rate generator covering
wide range of baud rates of particular values.

• LPC2148 UART1 contains standard modem interface signals.

3.6.8 I2C-bus serial I/O controllerand its features

The LPC2148 having two I2C-bus controllers. It is bidirectional, it uses only


two wires for inter IC controlling: a serial clock line (SCL), and a serial data line
(SDA). Here either master or slave mode can operated by Transmitters and/or
receivers it depends on a data transfer or is only addressed. In LPC2148 bit rate is
upto 400 kbit/s (Fast I2C-bus).

20
I2C Features

• Easy to switch as master, slave, or master/slave modes.

• Data transfer is bi directional between masters and slaves.

• It does not contain any central master.

• To communicate via one serial bus there are several bit rates which allowed by
Serial clock synchronization.

• To suspend and resume serial transfer Serial clock synchronization uses a handshake
mechanism

• For test and diagnostic purposes the I2C-bus can be used for several applications
because of no central master.

• It does not contain any central master.

3.6.9 Watchdog Timerand its features

To reset the microcontroller within a predetermined time watch dog timer can
be used. When enabled, the watchdog will generate a system reset if the user program
fails to „feed‟ (or reload) then watchdog timer is going to reset the system it is done
when the watchdog reaches predetermined amount of time.

Watchdog Timer Features

• If not periodically reloaded then internally resets system.

• It usesDebug mode.

• It requires a hardware reset or a watchdog reset/interrupt for disabling, for enabling

• Watchdog reset willindicate by flag.

3.6.10 Real-time clockand its features

When normal or idle operating mode is selected the real time clock is going to
provide a set of counters to measure the time. The main purpose of real time clock is
to use very little power which is nothing but supplied by battery powered system this
is useful where CPU is in idle mode.

21
RTC Features

• To maintain a calendar and clock it measures the passage of time.

• To support battery powered systems it uses ultra low power design.

• It canProvides Seconds, Minutes, Hours, Day of Week, Day of Month, and Day of
Year of duration.

• XTAL1 Programmable reference clock divider allows fine adjustment of the RTC
which available at external crystal/oscillator input.

• Dedicated power supply 3.3 V.

3.7 PIN DIAGRAM AND DESCRIPTION

LPC2148 having several in built features and peripherals. It is a 64 pin processor.

3.7.1 Pin Description

P0.0 to P0.31 I/O Port 0: Port 0 is a 32-bit I/O port with individual direction
controls for each bit. Total of 31 pins of the Port 0 can be used as a general purpose
bidirectional digital I/Os while P0.31 is output only pin. The operation of port 0 pins
depends upon the pin function selected via the pin connect block.

These pins are P1.0 to P1.31 I/O. For each bit port 1 is used as a 32-bit
bidirectional I/O port. Via the pin connect block the pin functions can be selected
depends upon that operations of port 1 pins assigned.

In this project to Easy VR module the pins are connected P0.8, P0.9 are used.
These pins are connected To connect DTMF Decoder processor uses pins P0.10,
P0.11, P0.12, P0.13, and to motor driver L293D P0.14. P0.20, P0.21, P0.22, and
P0.23 are connected.

Port 1: These pins are P1.0 to P1.31 I/O. For each bit port 1 is used as a 32-bit
bidirectional I/O port. Via the pin connect block the pin functions can be selected
depends upon that operations of port 1 pins assigned.To interfaced with LCD the
processor uses pins P1.16, P1.17, P1.18, P1.19, P1.20, and P1.21. Pins 61 and 62
connected to 50MHz crystal Oscillator is connected to 61 and 62 pins of processor
and to reset the ARM-7 controller pin 57 used.

22
Total of 31 pins of the Port 0 can be used as a general purpose bidirectional
digital I/Os while P0.31 is output only pin of LPC2148 processor.

Fig 3.5 Pin diagram of ARM LPC-2148 microcontroller

3.8 LPC 2148 FEATURES

• 16/32-bit ARM7TDMI-S microcontroller is available in LQFP64 (Quad flat)


package.
• 64-pin High-Performance ARM Microcontroller
23
• 512 Kbytes of Flash Program Memory.
• 32 Kbytes of SRAM Data Memory.
• To perform I/O perform 45 pins are available.
• Number of Timers: Two 32-bit
• To perform analog to Digital conversion, A/D Converter: 10-bit Fourteen
Channels
• To perform to Digital to Analog conversion DAC: 10-bit
• Real-Time Clock (RTC) requires independent power and a dedicated crystal
clock 32 kHz input to meet real time operations.
• I²C: Two Modules with Master or Slave Operation
• It support SPI: Full Duplex Serial Operation
• Two Modules of UART to perform simultaneous serial data transmit and
receive
• It supports USB: 2.0B Fully Compliant Controller with RAM
• External Oscillator up to 25MHz with integrated PLL for 60MHz Operation is
used to synchronize all the operations.

3.9WIFI MODULE (ESP8266)

ESP8266 was designed by the Chinese company Espressif Systems for uses in
Internet of Things (IOT) systems. ESP8266 is a complete Wi-Fi system on chip that
incorporates a 32-bit processor, some RAM and depending on the vendor between
512KB and 4MB of flash memory. This allows the chip to either function as a
wireless adapter that can extend other systems with Wi-Fi functionality, or as a
standalone unit that can by itself execute simple applications. Depending on the
specific module variant (ESP-1 to ESP-12 at the time of this thesis) between 0 and 7
General Purpose Input/output (GPIO) pins are available, in addition to Rx and Tx pins
of the UART, making the module very suitable for IOT applications. The Software
Development Kit (SDK) provided by Espressif contains a lightweight implementation
of a TCP/IP control stack (lwIP) for Wi-Fi communication. The modules houses
libraries for optional services such as Dynamic Host Configuration Protocol (DHCP),
Domain Name System (DNS), and JavaScript Object Notation signal transmission,
encapsulation, encryption, collision management and roaming functionality. The chip
generally comes as part of a module, soldered to a Printed Circuit Board (PCB),
24
however it is possible to purchase only the chip itself in order to create a truly custom
module. The module variants currently available on the market may include an
antenna (PCB or ceramic) or a U-FL connector

3.9.1 Overview and Specification

The module comes in many different variations (ESP-01 to ESP-12), along with non-
Espressif vendors such as Olimex and NodeMCU. The main differences between
these modules are size and additional components of the PCB, with some having an
inbuilt PCB antenna and up to 7 GPIO pins, while others provide no easy access to
GPIO and no antenna, but at a lower cost and module dimensions. The processor
inside the module is a low power, 80MHz, 32bit TensilicaXtensa LX. It is classified
as a DPU, which is Tensilicas own type of CPU combining the strengths of a
traditional CPU and a DSP to achieve better performance for data-intensive tasks.
Multiple compilation tools exist for this processor with the ESP community even
attempting to design their own version of gcc compiler to achieve more efficient code
density and better performance. The amount of programmable memory varies
depending on the module manufacturer, but generally ESPs come with 512 KB, 1MB,
2MB or 4MB of flash memory. ESP8266 is interrupt driven, with a relatively simple
OS and three levels of task priority, meaning that only three user tasks that can
respond to interrupts can be defined. A function user_init() configures the module
once its provided with power, and can be used to schedule the next task, or define a
fully event-driven configuration.

Fig 3.6ESP8266

25
The module used in this thesis is an Olimex MOD-WIFI-ESP8266-DEV with all of
the basic components of ESP8266, a PCB antenna, crystal and an easily accessed
UART with support for SPI and I2C, 2Mbytes of flash, but more importantly for this
thesis it has all the available chip pins mapped out for easier access.

3.9.2 Power Supply and Consumption

Being a Wi-Fi SoC, this chip requires a fair amount of power to operate its
transceiver. It has incorporated some impressive power management features,
including highly integrated components that allow for greater optimization and
increased efficiency. All this makes ESP8266 one of the least power-hungry chips in
the Wi-Fi IC industry! Unfortunately its levels of demand are still higher than of those
based on wireless technologies such as Bluetooth, or ZigBee. The official ESP8266
datasheet states this regarding current draw

Table 3.2Data sheet of ESP8266

However this is just the power consumption of the ESP8266EX chip, the entire
module, featuring additional hardware such as LEDs, crystals, capacitors and registers
revealed that actual consumption of the MOD-WiFi-ESP8266-DEV varied greatly
from this table. The approximate idle (while ready to receive packets) current of the
module was measured to be 70mA, with somewhat higher when receiving packets in
802.11n mode. Transmission drew 80mA current.

The module was also prone to high current spikes in the range of 300mA at
unpredictable points in time, often causing a full module restart. This problem does
seem to have been dealt with in most recent SDK, however most manufacturers still

26
choose to add additional capacitances parallel to power supply in order to prevent
such instances from occurring. The ESP8266 can operate in a total of 3 power saving
modes all of which sacrifice a portion of functionality to achieve lower power
consumption. These modes are: Light Sleep Modem Sleep Deep Sleep The Light
and Modem modes are so called Wi-Fi sleep modes. They are designed to be used
when the module is in STA mode, meaning it does not have to actively send beacons
to announce its presence and verify clients‟ statuses. The Light Sleep Wi-Fi mode is
to be used when the module needs to maintain WLAN connection without actively
transmitting or receiving data, allowing the CPU to operate at a lower voltage (or be
suspended altogether) and turning off the Wi-Fi modem between AP status beacons.
This would allow the module to save power while still answer to beacons, effectively
maintaining the wireless connection. In this mode a DTIM3 setup at the AP, with
300ms sleep and 3ms wake cycle can, according to the datasheet, lower power
consumption to 0.9mA [15]. Modem Sleep is used when the CPU needs to be active.
In this mode the Wi-Fi modem is turned off between the AP status beacons,
maintaining the connection at minimal cost while allowing the CPU to perform
without interference. A similar DTIM3 setup as in previous example leaves the
current consumption at 15mA [15]. The Deep Sleep turns of all functionality (CPU
and Wi-Fi modem), while maintaining only the RTC clock, allowing the module to be
woken up by a timed interrupt. When waking up, the module performs a complete
reset, meaning all RAM data is erased (although there is limited space in RTC
memory block that does not get erased) and the Wi-Fi connection needs to be re-
established. Espressif claims a 300s sleep and 1s wake cycle (claimed as enough to
connect to AP) results in average consumption of less than 1mA [15]. Important to
note is that Wi-Fi sleep-modes described above may not always be true. In test
conducted in this thesis they only seemed to lower the power consumption to 20-
50mA in Light Sleep and 40mA in Modem Sleep. Although conventional Deep Sleep
resulted in an average of 10uA, there were instances when the deep-sleep sequence
seemed to execute in an incorrect manner, leaving the power consumption at standby
levels (~80mA). This issue has been known to Espressif that has promised to address
it in future releases of the SDK. It should also be noted that the module is specified
for voltages between 1.7V and 3.6V, meaning it can be powered by two AA alkaline

27
batteries placed in series (achieving 3V). However the ESP will not work with a
Lithium Ion (or LiPo) based batteries without additional power regulating circuits.

3.9.3 Serial Communication

ESP8266 has multiple peripherals through which it can interface with other modules
in a classic embedded fashion. In this section only the setup of the communication
link will be presented, since the exact flow of bits to achieve such communication was
handled automatically by the module and is therefore deemed of no immediate
interest for this thesis. In this case classical UART was used to decode output and
encoding data to be sent to the sensor. Similarly EM50 data logger has an UART of
its own and can do the same thing on its end. Serial asynchronous communication
does not require a common clock, however in order for the data to be processed
correctly and at right intervals a common baud rate (can be viewed as symbols per
second) needs to be set for both devices. The baud-rates supported by ESPs UART
component range from 9600 to 921600bps, while the EM50 is configured for 9600bps
as default.

Fig 3.7 serial communication withESP8266

28
3.10 GSM TECHNOLOGY

3.10.1 Definition of GSM

Digital cellular technology used for transmitting mobile voice and data
services GSM (Global System for Mobile communications) is used. In Europe and
other parts of the world GSM (Global System for Mobile communication) is a digital
mobile telephone system that is widely used.

Three digital wirelesses telephone technologies (TDMA, GSM, and CDMA)


GSM uses a variation of Time Division Multiple Access (TDMA) and is the most
widely used. Digitizes and compresses data, then sends it down a channel with two
other streams of user data can be done by GSM, each in its own time slot. At either
the 900 MHz or 1,800 MHz frequency band it operates. Voice calls and data transfer
speeds of up to 9.6 kbit/s, together with the transmission of SMS (Short Message
Service) can be supported by it.

3.10.2 The evolution of mobile telephone systems

One of the fastest growing and most demanding telecommunications


applications is Cellular concept.Today, all new telephone subscriptions around the
world represent a continuously increasing percentage. More than 45 million cellular
subscribers worldwide currently are there, and In the United States nearly 50 percent
of those subscribers are located. The concept of cellular service within a geographic
area the use of low power transmitters where frequencies can be reused. In the United
States at Bell Labs in the early 1970s the idea of cell based mobile radio service was
formulated. With the release of the advanced mobile phone service (AMPS) system in
1983 Cellular systems began in the United States.Like today's newer systems, most
mobile telephone systems were analog rather than digital in the early 1980s.As a
result, we welcomed digital technology. Ease of signaling, lower levels of
interference, integration of transmission and switching and increased ability to meet
capacity demands are the advantages of digital systems over analog systems. The
worldwide development of mobile telephone systems shown in below table.

29
Table 3.3 Development of Mobile phone System

3.10.3 History

To develop a standard for a mobile telephone system that could be used across
Europe in 1982, the European Conference of Postal and Telecommunications
Administrations (CEPT) created the Group Special Mobile (GSM). To develop a
common cellular telephone system across Europe in 1987,a memorandum of
understanding was signed by 13 countries. By SINTEF lead by TorleivMaseng was
selected finally for creating the system.
Responsibility was transferred to the European Telecommunications Standards
Institute (ETSI) and phase I of the GSM specifications were published in 1990 to
GSM. In 1991 the first GSM network was launched by Radiolinja in Finland.
Over a million subscribers were using GSM phone networks being operated
by 70 carriers across 48 countries by the end of 1993. In more than 100 countries,
GSM service was available as of the end of 1997.

Mobile Telephony Standards

Table 3.4 Mobile Telephony Generation

30
3.10.4GSM/GPRS module

GSM/GPRS module is used to establish communication between a computer and


a GSM-GPRS system. Global System for Mobile communication (GSM) is an
architecture used for mobile communication in most of the countries. Global Packet
Radio Service (GPRS) is an extension of GSM that enables higher data transmission
rate. GSM/GPRS module consists of a GSM/GPRS modem assembled together
with power supply circuit and communication interfaces (like RS-232, USB, etc)
for computer. The MODEM is the soul of such modules.

Fig 3.8GSM/GPRS module

GSM/GPRS MODEM is a class of wireless MODEM devices that are designed for
communication of a computer with the GSM and GPRS network. It requires a SIM
(Subscriber Identity Module) card just like mobile phones to activate
communication with the network. Also they have IMEI (International Mobile
Equipment Identity) number similar to mobile phones for their identification. A
GSM/GPRS MODEM can perform the following operations:

1. Receive, send or delete SMS messages in a SIM.

2. Read, add, search phonebook entries of the SIM.

3. Make, Receive, or reject a voice call.

31
Mobile Station (Cell phones and SIM)

A mobile phone and Subscriber Identity Module (SIM) together form a mobile
station. It is the user equipment that communicates with the mobile network. A
mobile phone comprises of Mobile Termination, Terminal Equipment and Terminal
Adapter.

Fig 3.9 mobile station

3.10.5 GSM/GPRS Working


Mobile Termination is interfaced with the GSM mobile network and is controlled by
a baseband processor. It handles access to SIM, speech encoding and decoding,
signaling and other network related tasks. The Terminal Equipment is an application
processor that deals with handling operations related to keypad, screen, phone
memory and other hardware and software services embedded into the handset.
The Terminal Adapter establishes communication between the Terminal Equipment
and the Mobile Termination using AT commands. The communication with the
network in a GSM/GPRS mobile is carried out by the baseband processor.

3.10.6 Applications of GSM/GPRS module


The GSM/GPRS module demonstrates the use of AT commands. They can feature all
the functionalities of a mobile phone through computer like making and receiving
calls, SMS, MMS etc. These are mainly employed for computer based SMS and
MMS services.

32
3.10.7 SIM800 GSM Modem key features and Software features10
SIM800L module key feature
Quad-band 850/900/1800/1900MHz
GPRS multi-slot class 12/10
GPRS mobile station class B
Meet the GSM 2/2 Standard
FM: Frequency range 76 ~ 109MHz, 50KHz tuning step
Size: 15.8 * 17.8 * 2.4 mm
Weight : 1.35g
Control via AT commands (3GPP TS 27.007, 27.005 and SIMCOM enhanced AT
command set )
Supply voltage range : 3.4 ~ 4.3V
Low power consumption
Operating temperature range : -40 ~ 85 c
SIM800L module Software features
0710 MUX protocol
Embedded TCP / UDP protocol
FTP / HTTP
MMS
E-mail
DTMF detection
Interference detection
Voice

Fig 3.10SIM800L module

33
3.11 RFID (RADIO FREQUENCY IDENTIFIER)

3.11.1 Introduction

Radio-frequency identification (RFID) is an automatic identification method,


relying on storing and remotely retrieving data using devices called RFID tags or
transponders. An RFID tag is an object that can be applied to or incorporated into a
product, animal, or person for the purpose of identification using radio waves. Some
tags can be read from several meters away and beyond the line of sight of the reader.
Most RFID tags contain at least two parts. One is an integrated circuit for storing and
processing information, modulating and demodulating a (RF) signal, and other
specialized functions. The second is an antenna for receiving and transmitting the
signal. Chip less RFID allows for discrete identification of tags without an integrated
circuit, thereby allowing tags to be printed directly onto assets at a lower cost

Fig 3.11RFID system

Primarily, the two main components involved in a Radio Frequency Identification


system are the Transponder (tags that are attached to the object) and the Interrogator
(RFID reader). Communication between the RFID reader and tags occurs wirelessly
and generally does not require a line of sight between the devices.

3.11.2 RFID transponder / tag


An RFID transponder, considered as a next generation barcode, is a miniscule
microchip that is attached to an antenna. They come in a wide variety of sizes, shapes,

34
and forms and can be read through most materials with the exception of conductive
materials like water and metal, but with modifications and positioning even these can
be overcome.

Fig 3.12 RFID Tag

1) Passive tags
Passive tags are generally smaller, lighter and less expensive than those that are active
and can be applied to objects in harsh environments, are maintenance free and will
last for years. These transponders are only activated when within the response range
of a reader. The RFID reader emits a low-power radio wave field which is used to
power up the tag so as to pass on any information that is contained on the chip.
2) Active tags
Active tags differ in that they incorporate their own power source, where as the tag is
a transmitter rather than a reflector of radio frequency signals which enables a broader
range of functionality like programmable and read/write capabilities.

3) Semi-passive tags

Semi-passive tags are similar to active tags in that they have their own power source,
but the battery only powers the microchip and does not power the broadcasting of a
signal. The response is usually powered by means of backscattering the RF energy
from the reader, where energy is reflected back to the reader as with passive tags.
3.11.3 RFID reader/ Interrogator
An RFID reader typically contains a module (transmitter and receiver), a control unit
and a coupling element (antenna). The reader has three main functions: energizing,
demodulating and decoding. In addition, readers can be fitted with an additional
interface that converts the radio waves returned from the RFID tag into a form that
can then be passed on to another system, like a computer or any programmable logic

35
controller. Anti-Collision algorithms permit the simultaneous reading of large
numbers of tagged objects, while ensuring that each tag is read only once.

Fig 3.13 RFID Reader and tag

RFID operates in several frequency bands. The exact frequency is controlled by the
Radio Regulatory body in each country.

3.11.4 EM-18 RFID Reader

EM-18 RFID Reader Module is the one the most commonly used module for Radio
Frequency Identification Projects. It features Low Cost, Small Size, Low Power
Consumption and Easy to use.

Fig 3.14 EM18 RFID tech parameters


36
Table 3.5specifications of EM18 RFID

3.11.5 Working of RFID

The EM-18 RFID Reader module generates and radiates RF Carrier Signals of
frequency 125 KHz through its coils. When a 125KHz Passive RFID Tag (have no
battery) is brought in to this field, will get energized from it. These RFID Tags are
usually made using a CMOS IC EM4102. It gets enough power and master clock for
its operations from the electromagnetic fields produced by RFID Reader.

Fig 3.15 EM18 RFID module

37
3.11.6 Applications

RFID tags are useful for a huge variety of applications. Some of these
applications include: supply chain management, automated payment, physical access
control, counterfeit prevention, and smart homes and offices. RFID tags are also
implanted in all kinds of personal and consumer goods, for example, passports,
partially assembled cars, frozen dinners, ski-lift passes, clothing, and public
transportation tickets. Implantable RFID tags for animals allow concerned owners to
label their pets and livestock. Verichip Corp. has also created a slightly adapted
implantable RFID chip, the size of a grain of rice, for use in humans. Since its
introduction, the Verichip was approved by the U.S. Food and Drug Administration

3.12 LCD DISPLAY

One of the most common devices attached to a micro controller is an LCD


display. Some of the most common LCD‟s connected to the many microcontrollers
are 16x2 and 20x2 displays. This means 16 characters per line by 2 lines and 20
characters per line by 2 lines, respectively.

Basic 16x 2 Characters LCD

Fig 3.16LCD Pin diagram

The LCD requires 3 control lines as well as either 4 or 8 I/O lines for the data
bus. The user may select whether the LCD is to operate with a 4-bit data bus or an 8-
bit data bus. If a 4-bit data bus is used the LCD will require a total of 7 data lines (3
control lines plus the 4 lines for the data bus).

38
3.12.1 LCD Pin description

Pin No. Name Description


Pin no. 1 VSS Power supply (GND)
Power supply
Pin no. 2 VCC
y (+5V)
Pin no. 3 VEE Contrast adjust
0 = Instruction input
Pin no. 4 RS
1 = Data input
0 = Write to LCD module
Pin no. 5 R/W
1 = Read from LCD module
Pin no. 6 EN Enable signal
Pin no. 7 D0 Data bus line 0 (LSB)
Pin no. 8 D1 Data bus line 1
Pin no. 9 D2 Data bus line 2
Pin no. 10 D3 Data bus line 3
Pin no. 11 D4 Data bus line 4
Pin no. 12 D5 Data bus line 5
Pin no. 13 D6 Data bus line 6
Pin no. 14 D7 Data bus line 7 (MSB)

Table 3.6 LCD pins description

The three control lines are referred to as EN, RS, and RW. The EN line is
called "Enable." This control line is used to tell the LCD, data is sending. To send
data to the LCD, the program should make sure this line is low (0) and then set the
other two control lines and/or put data on the data bus. When the other lines are
completely ready, bring EN high (1) and wait for the minimum amount of time
required by the LCD datasheet (this varies from LCD to LCD), and end by bringing it
low (0) again.

39
The RS line is the "Register Select" line. When RS is low (0), the data is to be
treated as a command or special instruction (such as clear screen, position cursor,
etc.). When RS is high (1), the data being sent is text data which should be displayed
on the screen. For example, to display the letter "T" on the screen need set RS high.

The RW line is the "Read/Write" control line. When RW is low (0), the
information on the data bus is being written to the LCD. When RW is high (1), the
program is effectively querying (or reading) the LCD. Only one instruction ("Get
LCD status") is a read command. All others are write commands--so RW will almost
always be low.

3.12.2 LCD Schematic

Fig 3.17LCD Schematic diagram

Circuit Description:

Above is the quite simple schematic. The LCD panel's Enable and Register
Select is connected to the Control Port. The Control Port is an open collector / open
drain output. While most Parallel Ports have internal pull-up resistors, there is a few
which don't. Therefore by incorporating the two 10K external pull up resistors, the
circuit is more portable for a wider range of computers, some of which may have no
internal pull up resistors.

The connections make no effort to place the Data bus into reverse direction.
Therefore hard wire the R/W line of the LCD panel, into write mode. This will cause
no bus conflicts on the data lines. As a result cannot read back the LCD's internal
Busy Flag which tells us if the LCD has accepted and finished processing the last

40
instruction. This problem is overcome by inserting known delays into program. The
10k Potentiometer controls the contrast of the LCD panel.

SETB RW:

Handling the EN control line: As mentioned above, the EN line is used to tell
the LCD that are ready for it to execute an instruction that prepared on the data bus
and on the other control lines. Note that the EN line must be raised/ lowered
before/after each instruction sent to the LCD regardless of whether that instruction is
read or write text or instruction.

CLR EN:

And once finished setting up instruction with the other control lines and data
bus lines, always bring this line high

SETB EN:

The line must be left high for the amount of time required by the LCD as
specified in its datasheet. This is normally on the order of about 250 nanoseconds, but
checks the datasheet. In the case of a typical microcontroller running at 12 MHz, an
instruction requires 1.08 microseconds to execute so the EN line can be brought low
the very next instruction

Checking the Busy Status Of The LCD:

As previously mentioned, it takes a certain amount of time for each instruction


to be executed by the LCD. The delay varies depending on the frequency of the
crystal attached to the oscillator input of the LCD as well as the instruction which is
being executed.

While it is possible to write code that waits for a specific amount of time to
allow the LCD to execute instructions, this method of "waiting" is not very flexible. If
the crystal frequency is changed, the software will need to be modified. A more robust
method of programming is to use the "Get LCD Status" command to determine
whether the LCD is still busy executing the last instruction received.

41
3.13BUZZER

A buzzer or beeper is a signaling device, usually electronic, typically used in


automobiles, household appliances such as a microwave oven, or game shows.

It most commonly consists of a number of switches or sensors connected to a control


unit that determines if and which button was pushed or a preset time has lapsed, and
usually illuminates a light on the appropriate button or control panel, and sounds a
warning in the form of a continuous or intermittent buzzing or beeping sound. Initially
this device was based on an electromechanical system which was identical to an
electric bell without the metal gong. Often these units were anchored to a wall or
ceiling and used the ceiling or wall as a sounding board.

42
CHAPTER 4

SOFTWARE

4.1 EMBEDDED C

Embedded C is a set of language extensions for the C Programming


language by the C Standards committee to address commonality issues that exist
between C extensions for different embedded systems. Historically, embedded C
programming requires nonstandard extensions to the C language in order to support
exotic features such as fixed-point arithmetic, multiple distinct memory banks, and
basic I/O operations.

In 2008, the C Standards Committee extended the C language to address these


issues by providing a common standard for all implementations to adhere to. It
includes a number of features not available in normal C, such as, fixed-point
arithmetic, named address spaces, and basic I/O hardware addressing.

Embedded C uses most of the syntax and semantics of standard C, e.g., main()
function, variable definition, data type declaration, conditional statements (if, switch,
case), loops (while, for), functions, arrays and strings, structures and union, bit
operations, macros, etc.

 It is small and reasonably simpler to learn, understand, program and debug.


 Compared to assembly language, C code written is more reliable and scalable,
more portable between different platforms.
 C compilers are available for almost all embedded devices in use today, and
there is a large pool of experienced C programmers.
 Unlike assembly, C has advantage of processor-independence and is not
specific to any particular microprocessor/microcontroller or any system. This
makes it convenient for a user to develop programs that can run on most of the
systems.
 As C combines functionality of assembly language and features of high level
languages, C is treated as a „middle-level computer language‟ or „high level
assembly language‟.
 It is fairly efficient.

43
 It supports access to I/O and provides ease of management of large embedded
projects.
 Java is also used in many embedded systems but Java programs require the
Java Virtual Machine (JVM), which consume lot of resources. Hence it is not
used for smaller embedded devices.
After all, it is easier to understand complex algorithms and their associated math
when you start with an intuitive grasp of how those algorithms work.

4.2 IOT PLATFORM

The term “Internet of Things” (IOT), coined by Kevin Ashtonin1999, has been
in use for several years and continues to be of interest, specifically when it comes to
technological progress. But what exactly is the IOT? Essentially, it refers to giving
objects representation in the digital realm through giving them a unique ID and
connecting them in a network. In other words, these things are connected to the
internet and are able to automatically transfer data without relying on human
interaction. Hence being “Machine to Machine” (M2M) interaction. Essentially,
M2M interaction enables networked devices to exchange data and perform actions
without the input or assistance of humans, for instance in remote monitoring. But this
is not necessarily the case. For instance, one can envision the IOT to become an
important feature of the „home of the future‟, where one can begin pre-heating the
oven just before they get home from work via a (mobile) application. Hence, the IOT
has many interesting applications that can be applied to both individuals and
corporations.

4.2.1 Operating principles

For the purpose of connecting an object to the IOT, we focus on the


ThingspeakAPI. The interface provides simple communication capabilities to objects
within the IOT environment. Moreover, Thingspeak allows you to build applications
around data collected by sensors. It offers near real-time data collection, data
processing, and also simple visualizations for its users. Data is stored in so-called
channels, which provides the user with a list of features. Each channel allows you to
store up to 8 fields of data, using maximum of 255 alphanumeric characters each.
There are also 4 dedicated fields for positional data, consisting of: Description,
Latitude, Longitude, and Elevation. All incoming data is time and date stamped and
44
receives a sequential ID. Once a channel has been created, data can be published by
accessing the ThingspeakAPI with a „write key‟, a randomly created unique
alphanumeric string used for authentication. Consequently, a „read key‟ is used to
access channel data in case it is set to keep its data private (the default setting).
Channels can also be made public in which case no read key is required.

Fig 4.1Thingspeak representing itself as 'cloud' interface

A deeper level of what occurs, especially on the server side, can be seen in Figure
6.3.1. When a device sends data through a HTTP request (communication), it is
processed by the IOT service (in this case Thingspeak), which communicates with
a virtual server. Both the server and the IOT service communicate directly with the
application. Finally, at all levels of communication from the device to the application
there is both requirements regarding security and management of the data transfer.

4.3 Keil u Vision4 SOFTWARE

The µVision IDE from Keil combines project management, make facilities,
source code editing, program debugging, and complete simulation in one powerful
environment. The µVision development platform is easy-to-use and helping quickly
create embedded programs that work. The µVision editor and debugger are integrated
in a single application that provides a seamless embedded project development
environment.

4.3.1 Procedural steps for compilation, simulation and dumping

1. Open Keil from the Start menu


2. The Figure below shows the basic names of the windows referred in this document

45
1) Starting a new Assembler Project
1. Select New Project from the Project Menu.
2. Name the project „Toggle.a51‟
3. Click on the Save Button.

4. The device window will be displayed.


5. Select the part will be using to test with. For now will use the NXP LPC2148.
6. Double Click on the NXP.

46
7. Scroll down and select the LPC2148
8. Click OK

47
2) Creating Source File:
1. Click File Menu and select New.

2. A new window will open up in the Keil IDE.

48
3. Copy the example to the Right into the new window. This file will toggle Ports 1
and with a delay.
4. Click on File menu and select Save as…
5. Name the file Toggle.a51
6. Click the Save Button
Adding File to the Project
1. Expand Target 1 in the Tree Menu
2. Click on Project and select Targets, Groups, and Files…
3. Click on Groups/Add Files tab
4. Under Available Groups select Source Group 1
5. Click Add Files to Group… button
6. Change file type to Asm Source file (*.a*; *.src)
7. Click on toggle.a51
8. Click Add button
9. Click Close Button
10. Click OK button when return to Target, Groups, Files… dialog box
11. Expand the Source Group 1 in the Tree menu to ensure that the file was added to
the project

49
3) Creating HEX for the Part:
1. Click on Target 1 in Tree menu
2. Click on Project Menu and select Options for Target 1
3. Select Target Tab
4. Change Xtal (Mhz) from 50.0 to 11.0592
5. Select Output Tab
6. Click on Create Hex File check box
7. Click OK Button
8. Click on Project Menu and select Rebuild all Target Files 9. In the Build Window it
should report „0 Errors (s), 0 Warnings‟
10. Now ready to Program Part
4) Testing Program in Debugger:
1. Comment out line ACALL DELAY by placing a Semicolon at the beginning. This
will allow seeing the port change immediately.
2. Click on the File Menu and select Save
3. Click on Project Menu and select rebuild all Target Files
4. In the Build Window it should report „0 Errors (s), 0 Warnings‟
5. Click on Debug Menu and Select Start/Stop Debug Session

50
5) Running the Keil Debugger:
1. The Keil Debugger should be now be Running.
2. Click on Peripherals. Select I/O Ports, Select Port 1
3. A new window should port will pop up. This represents the Port and Pins
4. Step through the code by pressing F11 on the Keyboard. The Parallel Port 1 Box
should change as completely step through the code.
5. To exit out, Click on Debug Menu and Select Start/Stop Debug Session
6) Downloading Hex File into MCU Board:
Through Serial Port of computer PCthe program flash magic is connected with
MCU th is is the method to download Hex File into Flash Memory of MCU in Board .
Proceeding to Download Hex File into MC:
1. Interface RS232 Cable between RS232 Serial Port of PC and Board UART-0
(CN3).
2. Supply power into board; in this case, can see red LED1 is in status ON.
3. Set jumper BR4 (INT1) in ON state.
4. Run Program Flash Magic, it will display result as shown in Figure 1.1
5. Start setting the initial values into program as desired, so configure values into
program as follows;
i) Select COM port corresponding with (in this example, it is COM1)
ii) Set the baud rate to 9600
iii) Set Device to be LPC2148
iv) Set Interface to be None ISP
v) Set Crystal Oscillator with MHz corresponding with the value
internal Board. In this case, it is 12.000MHz, so must set to be 12.
vi) Press ISP LOAD Switch (S1) and RESET Switch (S2) on Board “ARM7
LPC2148 Development Board” to reset MCU to run in Boot Loader
following the processes;
 Press ISP LOAD Switch (S1) and hold
 Press RESET Switch (S2) while ISP LOAD Switch (S1) is
being held.
 Remove RESET Switch (S2) but ISP LOAD Switch (S1) is
being held.
7. Select format of erasing data to be “Erase all Flash + Code Rd Prot”.

51
7. Set Option to be “Verify after programming”.
8. Click “Browse” to select HEX File for downloading.
9. Click “Start”, Program Flash Magic will start downloading data into MCU
instantly. In this case, can see the status operation at Status Bar and must wait
for the operation until it is completed.
10. When the operation of program is complete, press RESET Switch (S2) on
Board and MCU will start running follow the downloaded program instantly.

52
53
54
55
56
57
58
CHAPTER 5

RESULTS

5.1 RESULTS

The proposed system was fully developed and tested to demonstrate its feasibility and
effectiveness. The screenshots of the developed system has been presented in Figure.
1. Application kit which is present at Traffic junction

Fig 5.1: Application board

2. RFID tags which are individually equipped in each vehicle.

Fig 5.2: RFID tags

59
3. Home page of THINGSPEAK platform.

Fig 5.3 Home page of Thing speak platform

4. After sign in with specified user id and password it will displays channels list .

Fig 5.4 channels list

60
5. Then click on IOT Traffic channel then it displays the information.

Fig 5.5 IOT Traffic channel

6. In IOT Traffic channel the Traffic at that particular junction will be displayed and it
will be updated for every 15-20 sec of duration.

Fig 5.6 Traffic information at one junction

61
CHAPTER 6

CONCLUSION& FUTURE SCOPE

This system is requires very less human intervention as the system is


automated. It can also detect stolen vehicle at possible junctions, and also it can
implemented where the emergency vehicles need to reach their destinations as early
as possible. If its not possible the emergency vehicles have to spend a lot of time in
traffic jams. To clear the emergency vehicle as long as the emergency vehicle crosses
that traffic junction, the traffic signal turns to green. After that the signal turns to red
for that traffic junction. At present in this system it is implemented for one road of the
traffic junction.
Further we can extend same system for all roads and we can also implement
the system with the NUMBER PLATE RECOGNITION, to reduce the
implementation cost and also getting more and accurate information about the vehicle.

62
REFFERENCES:

[1] S. Tao, V. Manolopoulos, S. Rodriguez, and A. Rusu, “Real-time urban traffic


state estimation with A-GPS mobile phones as probes,” J. Transp.Technol., vol. 2, no.
1, pp. 22–31, Jan. 2011.
[2] V. Manolopoulos, P. Papadimitratos, T. Sha, and A. Rusu, “Securing smartphone
based ITS,” in Proc. 11th Int. Conf. ITST, 2011, pp. 201–206.
[3] V. Manolopoulos, S. Tao, A. Rusu, and P. Papadimitratos, “Smartphonebased
traffic information system for sustainable cities,” ACM SIGMOBILE Mobile Comput.
Commun. Rev., vol. 16, no. 4, pp. 30–31, Feb. 2013
[4] Y. Chen, L. Gao, Z. Li, and Y. Liu, “A new method for urban traffic state
estimation based on vehicle tracking algorithm,” in Proc. ITSC, 2007, pp. 1097–1101.
[5] Wifi Specifications, Wifi Alliance IEEE Standard 802.15.4k2013, 2014. [Online].
Available: http://www.wifi.org/Specifications.aspx
[6] Traffic Congestion in Bangalore—A Rising Concern. [Online]. Available:
http://www.commonfloor.com/guide/traffic-congestion-in-bangalore-arising- concern-
27238.html, accessed 2013.
[7] A. K. Mittal and D. Bhandari, “A novel approach to implement green wave system
and detection of stolen vehicles,” in Proc. IEEE 3rd Int. Adv. Comput., Feb. 2013, pp.
1055–1059. [8] S. Sharma, A. Pithora, G. Gupta, M. Goel, and M. Sinha, “Traffic
light priority control for emergency vehicle using RFID,” Int. J. Innov. Eng. Technol.,
vol. 2, no. 2, pp. 363–366, 2013.
[9] R. Hegde, R. R. Sali, and M. S. Indira, “RFID and GPS based automatic lane
clearance system for ambulance,” Int. J. Adv. Elect. Electron. Eng., vol. 2, no. 3.
[10] P. Sood. Bangalore Traffic Police-Preparing for the Future. [Online]. Available:
http://www.intranse.in/its1/sites/default/files/D1-S 2-, accessed 2011.
[11] Traffic Management Centre. [Online]. Available: http://www.
bangaloretrafficpolice.gov.in/index.php?
[12] G. Varaprasad, “High stable power aware multicast algorithm for mobile ad hoc
networks,” IEEE Sensors J., vol. 13, no. 5, pp. 1442–1446, May 2013.

63
International Journal of Applied Sciences, Engineering and Management
ISSN 2320 – 3439, Vol. 05, No. 06, November 2016, pp. 216– 220

Development of Smart and Secure Traffic Management System with


internet of things and ARM Microcontroller
Seeram Surekha, R. V. V. Krishna
M. Tech Student, Department of ECE, Aditya College of Engineering & Technology, Kakinada, Andhra
Pradesh, India.
Assoc. Prof. & HOD, Department of ECE, Aditya College of Engineering & Technology, Kakinada, Andhra
Pradesh, India.
Email: surekhaseeram@gmail.com, rvvkrishnaece@gmail.com

Abstract: In this paper, we implement an Intelligent Traffic Control for Congestion, Ambulance clearance, and
Stolen Vehicle Detection. This framework was actualized in view of present criteria following the three
conditions. In those one is overwhelming activity control and another is making a foundation of crisis vehicles
like rescue vehicle and VIP vehicle and discovering robbery or wrongdoing vehicle. Here each individual
vehicle is furnished with uncommon radio frequency identification (RFID) tag (set at a vital area), which makes
it difficult to expel or annihilate. We utilize ARM7 framework on-chip to peruse the RFID labels appended to
the vehicles. It tallies number of vehicles that passes on a specific way amid a predetermined span. If there is a
match then it can identify the stolen vehicle. GSM SIM800 is utilized for sending a message to the police
control room and also when an emergency vehicle moving towards the intersection, it will impart the movement
controller in the intersection to turn on the green light. Here the framework routinely transfers the activity data
to the IOT server in secure way, which empowers everybody to get information about that traffic junction IOT
server.

Keywords: WIFI module, GSM, ARM-7, RFID, Traffic

INTRODUCTION

INDIA is a standout amongst the most crowded points of interest of the proposed system. Segment VI
Countries in the World and is quickly developing shows the experimental results of this work.
money related judiciousness. It have been seen that Internet of Things (IOT) is an emerging research
loathsome street clog issues in urban communities. standard and apparently the discovery of its body of
Framework development is ease back when contrasted knowledge is still in an infancy stage. So, the exact
with the development in number of vehicles, because definition, architecture, scope, and standard are still
of space and cost limits. It needs an activity control not concretely defined and many literatures on IOT
arrangements, which are not quite as same as alternate have been published in recent years. However, most
Countries? Savvy administration of activity streams scholars agree on the idea of expanding and
can lessen the negative impact of blockage. As of late, interpreting the pioneering conceptual definition of
remote systems are generally utilized as a part of the Kevin Ashton who defined IOT as “a standardized
street transport as they give more practical way for computer to understand the real world”. With
alternatives. Advances like XBee, GSM and RFID a key feature to create a smart environment together
can be utilized as a part of movement control to give with quick response to support certain decisions
cost better arrangements. RFID framework is a remote and/or operations of human, IOT based systems have
innovation that utilizations radio recurrence been proposed in several applications such as
electromagnetic vitality to convey data between the supporting disabilities, managing diabetes therapy,
RFID tag and RFID reader. Some RFID frameworks building smart home, improving safety in mining
will just work within the range of inches or operations, and using IOT for an intelligent
centimeters, while others may work for 100 meters or relationship and is sometimes interchangeably used
more. A GSM modem is a unique sort of modem, with a Ubiquitous Computing (or Ubicomp).The term
which acknowledges a SIM card and works over a IOT has a strong connection to enable communication
membership to a portable administrator, much the among objects. It is used rather in a broader sense for
same as a cell phone. The entire venture is assembled defining smart ecology than IOT. For example,
into 5 sections. Section II discusses the related work. applying sensor technology to capture data to make a
Section III talks about the present issues that exist in certain response is Ubicomp but not IOT. The simple
clearing a path to a rescue vehicles and different equation to describe IOT is,
vehicles. It additionally discusses how the proposed IOT= Physical Object + Controller, Sensor, Actuators
model will conquer the issues confronted in creating + Internet
Countries and created nations. Section IV gives the From the equation above, the Internet of Things can
execution be compared to the communication of human. For
instance, human have biological sensors such as ears,

IJAEM 050641 Copyright @ 2016 SRC. All rights reserved


Development of Smart and Secure Traffic Management System with internet of things and ARM
Microcontroller

eyes, skin, taste buds, etc. to perceive what is time and should stop. This is brought over-immersion
happening in their surroundings. Human use body [12], [13]. In [8], the utilization of RFID movement
parts to make and receive sounds and require a name control to maintain a strategic distance from issues
to enable others to get an attention. Communication that as a rule emerges with standard activity control
can only succeed when the communication medium frameworks, particularly those identified with picture
exists e.g. telephony network, mobile network, and preparing and shaft intrusion procedures are talked
air. In order to let things carry the property similar to about. The quantity of vehicles in every segment and
human‟s, sensors need to be attached to physical the directing are legitimacies, whereupon the
objects being considered. Objects, both sender and estimations and the judgments are finished. The
receiver, must have names, and digital communication detriment of this work is that it doesn't examine what
is required as depicted in my project focuses on the strategies are utilized for correspondence between the
communication between traffic lights and RFID crisis vehicle and the activity flag controller. In [9], it
technology is applied to traffic lights for them to act proposed a RFID and GPS based programmed path
as an „eye‟ to count identified tags, i.e. vehicles.. freedom framework for rescue vehicle. The
Traffic lights name each other by calling RFID concentration of this work is to lessen the deferral in
Reader name. One of the contributions of IOT to landing of the rescue vehicle to the healing center via
human operations in this scenario is that it can replace naturally clearing the path, in which, emergency
human in doing tedious exhaustive work. For vehicle is going, before it achieves the activity flag.
example, traffic data can be collected and sent out This can be accomplished by turning the activity
persistently, which is nearly impossible when manual motion, in the way of the emergency vehicle, to green
communication is applied. when the rescue vehicle is at a specific separation
Literature Survey from the movement intersection. The utilization of
RFID recognizes the crisis and non-crisis cases, along
Activity blockage is a noteworthy issue in urban areas these lines anticipating superfluous movement clog.
of creating Countries like India. Development in The correspondence between the rescue vehicle and
urban populace and the white collar class fragment movement flag post is done through the handsets and
contribute essentially to the rising number of vehicles GPS. The framework is completely robotized and
in the urban areas [6]. Blockage on streets in the long requires no human mediation at the activity
run outcomes in moderate moving activity, which intersections. The impediment of this framework is it
builds the season of travel, in this way emerges as one needs all the data about the beginning stage, end
of the significant issues in metropolitan urban purpose of the travel. It may not work, if the
communities. In [7], green wave framework was emergency vehicle needs to take another course for a
examined, which was utilized to give freedom to any few reasons or if the beginning stage is not known
crisis vehicle. A 'green wave' is the synchronization of ahead of time. Movement is a basic issue of
the green period of activity signs. With a 'green wave' transportation framework in above all the urban
setup, a vehicle going through a green flag will keep communities of Countries. This is particularly valid
on receiving green flags as it goes not far off. for Countries like India and China, where the
Notwithstanding the green wave way, the framework populace is expanding at higher rate as show in figure
will track a stolen vehicle when it goes through a 1. For instance, Bangalore city has seen an incredible
movement light. Preferred standpoint of the development in vehicle populace as of late. Thus, a
framework is that GPS inside the vehicle does not large number of the blood vessel streets and crossing
require extra power. The greatest inconvenience of points are working over the limit (i.e., v/c is more
green waves is that, when the wave is irritated, the than 1) and normal voyage speeds on a portion of the
aggravation can brings about movement issues that key streets in the focal ranges are lower than 10 Km/h
can be exacerbated by the synchronization. at the pinnacle hour.
IOT- RFID testbed for supporting traffic light control
[1] The paper investigates a prototype development of
Internet of Things (IoT) application for traffic
management. The retrofitted traffic light control
solution is proposed and developed to support
decision making of police officers. This paper
discusses the ongoing research on the building of a
smart traffic management system. The advantages of
practical problem is defined, the solution is proposed,
and the initial test-bed system is prototyped
successfully. The system can figure out the congestion
level of each road at a specific intersection with the
In such cases, the line of vehicles in a green wave help of R FID technology. A copy of information is
develops in size until it turns out to be too vast and a also concurrently sent to the neighbors to support
portion of the vehicles can't achieve the green lights in decision making at adjacent sites as well. Another

International Journal of Applied Sciences, Engineering and Management


ISSN 2320 – 3439, Vol. 05, No. 06, November 2016, pp. 216 – 220
Seeram Surekha, R. V. V. Krishna

feature of the system is the ability to track vehicles


that are involved in crimes as well as illegal vehicles. 4. WOKING MODEL
Disadvantages of the project is the number of issues Under the proposed work, each intersection
to be addressed before the solution can be tested and contains RFID reader. Each lane has its RFID to track
applied to real-life problems such as heterogeneity of the vehicles to passing through it. Each RFID reader
devices, concurrency of the services, responding has its own data base to store the information
times, data volume, human factors, and intelligence regarding to vehicles that passes from it with
recommendations. Controlling of traffic lights using timestamp and traffic light. Every vehicle has a RFID
RFID and neural network [2] In this paper, the new enabled device that stores a vehicle identification
technology of RFID has been used in order to identify number (VIN). Every vehicle has its unique VIN
vehicles and also three significant parameters number that provides the information that regarding
including the average speed of vehicles at any side of the priority of vehicle and type of vehicle. With the
access point, the average time for waiting and the help of VIN we can uniquely identify the vehicle and
queue length. They have been used based on the data its owner. Vehicle Identification Number in the
from neural network for making the best decision proposed work RFID, tag will store vehicle
throughout the process of finding out duration of the identification number. These numbers divided into
cycle and percentage of green time for each of the three parts. First part represents the priority of the
access point. Advantages of this project is vehicles. Next part represents the type of vehicle and
Implementation of the system is possible in the next, digit represents the vehicle number. In the
shortest time. proposed work, different types of vehicles have
The implementation of proposed system different type of priorities. Vehicles are isolated into 3
mainly involves four steps, which are Congestion classes. In the first place framework classification
control, Ambulance clearance, stolen vehicles detects incorporates Ambulance, Fire unit vehicles and VIP
and upload the traffic information into internet. vehicles. These vehicles have a most elevated need.
A. Automatic Signal Control System The second class incorporates typical approved
In this system, for experiment purpose, we vehicles and third classification incorporates the
have used passive RFID reader and passive RFID wrongdoing vehicles.
transponders. 4.1Block diagram
Each individual vehicle inserted with RFID tags
whenever that vehicle comes in the range of the
receiver then automatically it transmits the unique
RFID to the reader. The RFID reader is connected to
the microcontroller board then it will counts the RFID
tags. Here we assign equal predetermined duration of
10 sec to each side of junction, if the count is greater
than 10 then the green light duration will changes. For
example if extra 5 vehicles passed RFID then for next
iteration 15 sec allocated for that side of junction. In
this way depending upon density the green light
duration time changes.
B. Stolen Vehicle Detection System
In this module, whenever any stolen vehicle
crossed this RFID reader then it reads that unique
RFID tag and compares with controller ID If we
found a match then automatically it alerts by a beep
sound, and a SMS will be sent to the police control Fig.2 Block diagram
room with the help of GSM Module. 4.2 Block diagram explanation
C. Emergency Vehicle Clearance System (a) Power Supply Unit:
In this system, whenever any emergency vehicles like When working with electronics, you always
Ambulance, Fire engines are passes through the traffic need one basic thing: Power. In every electronic
junction we need to give priority for them. So circuit power supply is required. The proper working
whenever these vehicles approaches the junction then of each and every component, it is important to supply
controller will immediately allocate time slot for this the exact amount of voltage and current. If the power
side of junction first, after passing away of these exceeds its limit, it can be fatal. The +5 volt power
vehicles only it will operate normally as supply is based on the commercial 7805 voltage
predetermined time durations. regulator IC.
D. Secure Information sharing (b) WIFI module:
In this module, the system automatically Here WIFI module is used for uploading data into the
uploads the traffic information into the IOT server server which empowers the users to know the
without revealing user secure details. information about traffic at precise junction.
(c) GSM Module:

International Journal of Applied Sciences, Engineering and Management


ISSN 2320 – 3439, Vol. 05, No. 06, November 2016, pp. 212 – 215
Development of Smart and Secure Traffic Management System with internet of things and ARM
Microcontroller

GSM modem is associated with the ARM-7 The proposed system was fully developed and tested
microcontroller. This permits the PC to utilize the to demonstrate its feasibility and effectiveness. When
GSM modem to convey over the portable system. a vehicle which is furnished with RFID tag passes
These GSM modems are most oftentimes used to give through a junction then RFID reader reads the VIN
versatile Internet network, a large portion of them can and send to ARM controller then controller verifies its
likewise be utilized for sending and getting SMS and number with stored stolen numbers. If there is a match
MMS messages. GSM modem must support a then it will be send a SMS alert to the control room.
"reached out AT summon set" for sending/accepting And if number is matched with ambulance then it will
SMS messages. GSM modems are a financially savvy allocate time slot for that side of junction. Here the
answer for getting SMS messages, on the grounds that framework routinely transfers the activity data to the
the sender is paying for the message conveyance. IOT server in secure way, which empowers
(d) RFID: everybody to get information about that traffic
Radio Frequency Identification (RFID) is an IT junction IOT server. The screenshots of the proposed
framework that transmits signals without any physical system has been presented in Figure below.
contraptions in remote correspondence. It is classified
under programmed recognizable proof innovation,
which is settled convention. The working of a RFID
framework is extremely basic. The framework uses
labels that are appended to different parts to be
followed. The labels store information and data
concerning the subtle elements of the result of things
to be followed. The peruser peruses the radio
recurrence and recognizes the labels. The reception
apparatus gives the way to the coordinated circuit to
transmit its data to the per user. There are two sorts of
RFID classifications, dynamic and uninvolved labels.
The labels that don't use power are alluded to as
detached and they are driven by a radio wire that
empowers the tag to get electromagnetic waves from a
peruser. Despite what might be expected, dynamic
Fig.3 Application board
labels depend on power and they have inbuilt power
sources that empower it to send and get signals from
RFID per user. RFID go relies on upon transmit
control; get affectability and effectiveness, radio wire,
recurrence, label introductions, environment.
Ordinarily, the RFID range is from a couple of
centimeters to more than hundred meters. FID per
user utilizes recurrence 125 KHz with a scope of 10
cm.
5. SOFTWARE REQUIREMENTS
KEIL uVISION4
Here we are using the Keil u Vision software
as
i. Editor to write/modify the code
ii.Compiler Fig.4 Graphs
iii.Debugger 7. CONCLUSION
PROTEUS PROFESSIONAL
Here we are using the Proteus professional Implementation of Smart Vehicle
software to Management System using Internet of Things had
i. Schematic design been proposed. The proposed scheme is very suitable
ii. Layout design for real time vehicle management. However, there are
iii. Circuit simulation a number of issues to be addressed before the solution
Flash Magic is used to dump the hex file into the can be tested and applied to real-life problems such as
ARM7 microcontroller. heterogeneity of devices, concurrency of the services,
THINGSPEAK is an open source platform which responding times, data volume, human factors, and
can be used as an IOT server to upload the traffic intelligence recommendations. This system is requires
information at regular intervals which empowers the very less human intervention as the system is
users to know about the traffic at precise junction in automated. It can also detects stolen vehicle at
their smart phones. possible junctions, and also it can implemented where
6. RESULT ANALYSIS the emergency vehicles needs to reach their

International Journal of Applied Sciences, Engineering and Management


ISSN 2320 – 3439, Vol. 05, No. 06, November 2016, pp. 216 – 220
Seeram Surekha, R. V. V. Krishna

destinations as early as possible. If its not possible the


emergency vehicles have to spend a lot of time in
traffic jams. To clear the emergency vehicle as long as
the emergency vehicle crosses that traffic junction, the
traffic signal turns to green. After that the signal turns
to red for that junction. At present in this system it is
implemented for one road of the traffic junction.
Further we can extend same system for all roads and
we can also implement the system with the NUMBER
PLATE RECOGNITION, to reduce the
implementation cost and also getting more and
accurate information about the traffic.
REFERENCES
[1] G. Varaprasad and R. S. D. Wahidabanu,
“Flexible routing algorithm for vehicular area
networks,” in Proc. IEEE Conf. Intell. Transp. Syst.
Telecommun., Osaka, Japan, 2010, pp. 30–38.
[2] B. P. Gokulan and D. Srinivasan, “Distributed
geometric fuzzy multiagent urban traffic signal
control,” IEEE Trans. Intell. Transp. Syst., vol. 11,
no. 3, pp. 714–727, Sep. 2010.
[3] K. Sridharamurthy, A. P. Govinda, J. D. Gopal,
and G. Varaprasad, “Violation detection method for
vehicular ad hoc networking,” Security Commun.
Netw., to be published.
http://onlinelibrary.wiley.com/doi/10.1002/sec
27/abstract
[4] M. Abdoos, N. Mozayani, and A. L. C. Bazzan,
“Traffic light control in non-stationary environments
based on multi agent Q-learning,” in Proc. 14th Int.
IEEE Conf. Intell. Transp. Syst., Oct. 2011, pp.
[5] ZigBee Specifications, ZigBee Alliance IEEE
Standard 802.15.4k2013, 2014.
http://www.zigbee.org/Specifications.aspx
[6] Traffic Congestion in Bangalore—A Rising
Concern. [Online]. Available:
http://www.commonfloor.com/guide/traffic-
congestion-in-bangalore-arising-
[7] A. K. Mittal and D. Bhandari, “A novel approach
to implement green wave system and detection of
stolen vehicles,” in Proc. IEEE 3rd Int. Adv. Comput.,
Feb. 2013, pp. 1055–1059. [8] S. Sharma, A. Pithora,
G. Gupta, M. Goel, and M. Sinha, “Traffic light
priority control for emergency vehicle using RFID,”
Int. J. Innov. Eng. Technol., vol. 2, no. 2, pp. 363–
366, 2013.
[9] R. Hegde, R. R. Sali, and M. S. Indira, “RFID and
GPS based automatic lane clearance system for
ambulance,” Int. J. Adv. Elect. Electron. Eng., vol.
2,2013.
[10] P. Sood. Bangalore Traffic Police-Preparing for
the Future. [Online].
http://www.intranse.in/its1/sites/default/files/D1-S 2-,
accessed 2011.
[11] Traffic Management Centre. [Online].
http://www.bangaloretrafficpolice.gov.in/ind
option=com_content&view=article&id=87&btp=8 7,
accessed 2014.

International Journal of Applied Sciences, Engineering and Management


ISSN 2320 – 3439, Vol. 05, No. 06, November 2016, pp. 212 – 215
INTERNATIONAL JOURNAL OF APPLIED
SCIENCES, ENGINEERING AND
MANAGEMENT
ISSN: 2320 - 3439

The Board of International Journal of Applied Sciences, Engineering and


Management Is Hereby Awarding the Certificate to

Seeram Surekha
In Recognition of the Publication of the Paper Entitled
Development of Smart and Secure Traffic Management System with internet of
things and ARM Microcontroller
Published In IJAEM Journal, Volume 5, Issue 6, November 2016

Editor
IJAEM
INTERNATIONAL JOURNAL OF APPLIED
SCIENCES, ENGINEERING AND
MANAGEMENT
ISSN: 2320 - 3439

The Board of International Journal of Applied Sciences, Engineering and


Management Is Hereby Awarding the Certificate to

R.V.V. Krishna
In Recognition of the Publication of the Paper Entitled
Development of Smart and Secure Traffic Management System with internet of
things and ARM Microcontroller
Published In IJAEM Journal, Volume 5, Issue 6, November 2016

Editor
IJAEM

You might also like