SlideShare a Scribd company logo
1 of 32
1
CHAPTER 1
1. INTRODUCTION
In this age of digital technology, every device and its operation has become
digital based. Now with digital based door lock systems, it is easier to control the
door movement of the car or house. The new automated door lock system does not
need a key to lock or unlock the door of the car or house. This digital door entry
system is in fact controlled by cell-phone which is actually performing the role of
remote over here. The keyless door remote is an electronic circuit based device.
This remote transmits DTMF signals via air to another device of the system
installed in the car door or house door.. The keyless car remote can be operated
from any corner of the world. The working of this locking system is very simple.
You just have to carry the cell phone with yourself and you can control the locks
from anywhere without any problem. It works on the entry number. The owner has
to press that entry number on the cell phone for controlling the locking system. The
entry number is unique in nature and so is the remote device of an automatic
keyless system. You can install a keyless entry system in your house as well as in
your vehicle. Now, a days theft cases are increasing everywhere and the key based
locking system is no longer a safe option. It is quite easy for thieves and robbers to
open the traditional key based doors either with duplicate keys or some other way.
Therefore for safety of your house and vehicle, this system can be installed. With
this system, you will never be in tension of leaving your house and vehicle out of
your supervision. Not only this ,it also help us to move out of some really odd
situations like you locked the door and left and in your absence other members
came back and then they have to wait outside if they were not having key with
themselves.
2
1.1 Motivation
Keyless entry has been a luxury whose availability is confined primarily to
vehicles. The cell phone security system takes this idea of keyless entry and
transforms it into a convenient, versatile security system that utilizes cell phone
technology and the landline telephone network. By taking advantage of caller
identification and dual-tone multi-frequency signaling, the security system has the
ability to introduce two-levels of security. The first level will be decoding the
calling party’s identification information while the second level would consist of
the user attempting a password entry over the phone.. By combining the mobility
of this telecommunication medium with microcontrollers, the system achieves a
secure, convenient, and automated form of security for a place of residence.
1.2 PROBLEM DEFINITION
The cell phone security system is the result of a fusion of a creative idea with an
attempt to motivate change. Even though modern technology has allowed for the
automation of many aspects of domestic lifestyles, from automatic motion sensing
lights to automatic garage door openers, home security has not seen much benefit
from this revolution. Household entry has long been a very manual routine with
little effort to automate the process. Entry into a residence is still primarily limited
to a manual process which involves inserting a key into a bolt and physically
moving the locking-mechanism
1.3 OBJECTIVE OF PROJECT
The fundamental requirements for the cell phone security system remained fixed
throughout the design process. The goal was to design a system which would allow
the user automated and convenient access to their home security system through a
telephone network.
The fundamental objectives of the system include:
1. Correctly decode the DTMF signals from the user.
2. Correctly decode caller identification information from the phone line.
3. Allow the user to automatically lock the entryway.
4. Allow the user to automatically unlock the entryway.
3
1.4 LIMITATIONS OF PROJECT
The cell phone security system aims to change this. The system takes advantage of
the widespread acceptance of cell phones in today’s society in conjunction with the
deep-rooted standards of the landline telephone network to introduce automation
and convenience. The system will allow a user to use their cell phone to place a
call into their home security system. Once the system verifies the caller, the caller
is then allowed to attempt a password entry. Upon successfully entering a
password, the system will automatically unlock the door and grant entrance. This
automation introduces a form of secure, keyless entry into a residence along with
the convenience of a fully responsive security system monitor. The system will
primarily interface with telephony protocols which include dual tone multi
frequency (DTMF), caller identification (CID), and some applicable telephony
circuit standards.
1.5 ORGANIZATION OF DOCUMENTATION
In this project documentation we have initially put the definition and
objective of the project as well as the design of the project which is followed by
the implementation and testing phases. Finally the project has been concluded
successfully and also the future enhancements of the project were given in this
Documentation.
4
CHAPTER 2
LITERATURE SURVEY
2.1 INTRODUCTION
Design for an automated door locks(smart key less entry), Biometric
attendance, lecture theater/hall monitor system, railway station display, Automated
Parking System, gps navigation system, Circuit Encoder ARC M3EA from Artech
for RF Remote Control, pic16f877 interfaced to max sonar ez1 sensor, Infrared
Head phone, Microcontroller application, The first method of DTMF generation
provides two PWM (Pulse Width Modulation) outputs on pins G3 and G2 of the G
port for 100 ms. These two PWM outputs represent the selected high band and low
band frequencies respectively, and must be combined externally with an LM324 op
amp or equivalent feedback circuit to produce the DTMF signal DTMF (Dual Tone
Multiple Frequency) is associated with digital telephony, and provides two selected
output frequencies (one high band, one low band) for a duration of 100 ms. DTMF
generation consists of selecting and combining two audio tone frequencies
associated with the rows (low band frequency) and columns (high band frequency)
of a push-button touch tone telephone keypad.
According to the current article, DTMF was first introduced to the public at
the NY World's Fair in 1964. It was, however, in full "field test" usage in multiple
small towns in the US by then. Most notably, it was first used in Findlay Ohio in
1960 and then in Greensburg, PA in 1961.
WHAT IS DUAL TONE MULTI-FREQUENCY
DTMF is the global standard for audible tones that represent the digits on a
phone keypad with touch-tone land-line phones, pressing a key on the dial pad
generates the corresponding DTMF tone for that key. The land-line phone system
can then "listen" and decode that tone to determine which key was pressed,
enabling dialing.
5
Mobile phone networks use digital signals instead of DTMF for direct dialing,
but DTMF is still used over mobile phones to navigate automated systems such as
phone menus, and for secondary dialing, such as using a calling card. Each DTMF
"tone" is actually two tones - a low-frequency tone and a high-frequency tone -
combined. (Hence the name "dual tone multi-frequency".) Looking at the standard
phone keypad as a grid, the low tone corresponds to the row, while the high tone
corresponds to the column.
2.2 EXISTING SYSTEM
In the existing system of the project we had use the doors in lock systems
keys are obsolete they are use man power open and close the doors. It requires the
human energy.
2.3 DISADVANTAGES OF EXISTING SYSTEM
As mentioned above the earlier system has use the doors in lock systems
keys are obsolete there are no use of the electrical devices there are use the
mechanical systems. After being inspired by the mechanical door
opening system in that. I mean c'mon, door locks with keys are obsolete. Everyone
uses them. They’re so old fashioned! ...The second part of this project was to build
a DTMF decoder by use of mobile with the soft ware’s requirements.
2.4 PROPOSED SYSTEM
As the above disadvantages can’t be solved with in this application has
been Proposed and also the handling will be much improved than the existing
system as we are implementing the special method called door lock through
telephone using dtmf decoder.
Here the door lock through telephone using this is control the over all door
locking system there open are close the is process will take by Servo motors and
LED’S that can final operate.
6
CHAPTER 3
ANALYSIS
3.1 INTRODUCTION
After analyzing the requirements of the task to be performed, the next step
is to analyze the problem and understand its context. The first activity in the phase
is studying the existing system and other is to understand the requirements and
domain of the new system. Both the methods are equally important but the first
system states as a basis of giving the functional specifications and then successful
design of the proposed system. Understanding the properties and requirements of a
new system is more difficult and requires creative thinking as well as
understanding of existing system is also difficult. Improper understanding of
present system can lead diversion from solution
3.2 Hardware requirement
3.2.1 Servo Motors
3.2.2 LIGHT EMITTING DIODE (LED)
LED's are special diodes that emit light when connected in a circuit. They
are frequently used as "pilot" lights in electronic appliances to indicate whether the
circuit is closed or not. As a clear (or often colored) epoxy case enclosed the heart
of an LED, the semi-conductor chip.
Fig. 3.2.2.1: SYMBOL OF LED
7
Fig. 3.2.2.2: CROSS SECTIONAL VIEW OF LED
Working
The most important part of a light emitting diode (LED) is the semi-
conductor chip located in the center of the bulb as shown. The chip has two regions
separated by a junction. The p region is dominated by positive electric charges, and
the n region is dominated by negative electric charges. The junction acts as a
barrier to the flow of electrons between the p and the n regions. Only when
sufficient voltage is applied to the semi-conductor chip, can the current flow and
the electrons cross the junction into the p region.
Fig. 3.2.2.3 Semi conductor Chip
In the absence of a large enough electric potential difference (voltage) across the
LED leads, the junction presents an electric potential barrier to the flow of
electrons. When sufficient voltage is applied to the chip across the leads of the
LED, electrons can move easily in only one direction across the junction between
8
the p and n regions. In the p region there are many more positive than negative
charges. In the n region the electrons are more numerous than the positive electric
charges. When a voltage is applied and the current starts to flow, electrons in the n
region have sufficient energy to move across the junction into the p region. Once in
the p region the electrons are immediately attracted to the positive charges due to
the mutual Coulomb forces of attraction between opposite electric charges. When
an electron moves sufficiently close to a positive charge in the P region, the two
charges "re-combine”. Each time an electron recombines with a positive charge;
electric potential energy is converted into electromagnetic energy. For each
recombination of a negative and a positive charge, a quantum of electromagnetic
energy is emitted in the form of a photon of light with a frequency characteristic of
the semi-conductor material (usually a combination of the chemical elements
gallium, arsenic and phosphorus). Only photons in a very narrow frequency range
can be emitted by any material.
Color of L.E.D
LED's that emit different colors are made of different semi-conductor
materials, and require different energies to light them.
Fig 3.2.2.4 color of L.E.D
The color of an LED is determined by the semiconductor material, not by the
coloring of the 'package' (the plastic body). LEDs of all colors are available in
uncolored packages which may be diffused (milky) or clear (often described as
'water clear'). The colored packages are also available as diffused (the standard
type) or transparent.
9
3.2.3 POWER SUPPLY UNIT
BLOCK DIAGRAM
Fig 3.2.3.1 Block diagram
As we all know any invention of latest technology cannot be activated without
the source of power. So it this fast moving world we deliberately need a proper
power source which will be apt for a particular requirement. All the electronic
components starting from diode to Intel IC’s only work with a DC supply ranging
from _+5v to _+12. we are utilizing for the same, the most cheapest and commonly
available energy source of 230v-50Hz and stepping down , rectifying, filtering and
regulating the voltage. This will be dealt briefly in the forth-coming sections.
STEP DOWN TRANSFORMER
When AC is applied to the primary winding of the power transformer it can
either be stepped down or up depending on the value of DC needed. In our circuit
the transformer of 230v/15-0-15v is used to perform the step down operation
where a 230V AC appears as 15V AC across the secondary winding . One
alteration of input causes the top of the transformer to be positive and the bottom
negative. The next alteration will temporarily cause the reverse. The current rating
of the transformer used in our project is 2A. Apart from stepping down AC
voltages , it gives isolation between the power source and power supply circuitries.
BRIDGE RECTIFIER
In the power supply unit, rectification is normally achieved using a solid state
diode. Diode has the property that will let the electron flow easily in one direction
at proper biasing condition . As AC is applied to the diode, electrons only flow
when the anode and cathode is negative. Reversing the polarity of voltage will not
permit electron flow.
For a positive cycle, two diodes are connected to the positive voltage at the top
winding and only one diode conducts . At the same time one of the other two
diodes conducts for the negative voltage that is applied from the bottom winding
due to the forward bias for that diode. In this circuit due to positive half cycleD1 &
D2 will conduct to give 10.8v pulsating DC. The DC output has a ripple frequency
of 100Hz. Since each altercation produces a resulting output pulse, frequency =
Step Down
Transformer
Bridge
Rectifier
Positive
Charge
Capacitor
Positive
Voltage
Regulator
IC 7805
LPF
10
2*50 Hz. The output obtained is not a pure DC and therefore filtration has to be
done.
VOLTAGE REGULATORS
The voltage regulators play an important role in any power supply unit. The
primary purpose of a regulator is to aid the rectifier and filter circuit in providing a
constant DC voltage to the device. Power supplies without regulators have an
inherent problem of changing DC voltage values due to variations in the load or
due to fluctuations in the AC liner voltage. With a regulator connected to the DC
output, the voltage can be maintained within a close tolerant region of the desired
output. IC7812 and 7912 is used in this project for providing +12v and –12v DC
supply.
3.2.4 MICROCONTROLLER
The AT89C52 is a low-power, high-performance CMOS 8-bit
microcomputer with 8k bytes of Flash programmable and erasable read only
memory (PEROM)The device is manufactured using Atmel’s high-density
nonvolatile 11Memory technology and is compatible with the industry-standard
80C51 and 80C52 instruction set and Pin out. The on-chip Flash allows the
program memory to be reprogrammed in-system or by a conventional nonvolatile
memory programmer .By combining a versatile 8-bit CPU with Flash on a
monolithic chip.
Features
 The AT89C52 provides the following standard features
 8K Bytes of In-System Reprogrammable Flash Memory
 128 bytes of Internal RAM (128 x 8-bit)
 32 Programmable I/O Lines
 Two 16-bit Timer/Counters
 Five vector two-level interrupt architecture
 A full duplex serial port
 Three-level Program Memory Lock
 Six Interrupt Sources
 On-chip oscillator and clock circuit
PIN DIAGRAM
11
.
Fig. 3.2.4.1 89c52 Microcontroller
Pin Description
VCC: Supply voltage.
GND: Ground.
Port 0 Port 0 is an 8-bit open-drain bi-directional I/O port. As an output port,
each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can
be used as high impedance inputs. Port 0 may also be configured to be the
multiplexed low order address/data bus during accesses to external program and
data memory. In this mode P0 has internal pull-ups. Port 0 also receives the code
bytes during Flash programming, and outputs the code bytes during program
verification. External pull-ups are required during program verification.
Port 1 Port 1 is an 8-bit bi-directional I/O port with internal pull-ups.
The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to
Port 1 pins they are pulled high by the internal pull-ups and can be used as inputs.
As inputs, Port 1 pins that are externally being pulled low will source current (IIL)
12
because of the internal pull-ups. Port 1 also receives the low-order address bytes
during Flash programming and verification.
Port 2 Port 2 is an 8-bit bi-directional I/O port with internal pull-ups.
The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to
Port 2 pins they are pulled high by the internal pull-ups and can be used as inputs
.As inputs, Port 2 pins that are externally being pulled low will source current (IIL)
because of the internal pull-ups. Port 2 emits the high-order address byte during
fetches from external program memory and during accesses to externaldata16-
bitaddresses (MOVX@DPTR).Inthisapplication,itusesstrongmemoryuses internal
pullupswhenemitting1s.Duringaccessestoexternaldatamemorythatuses8-bit
addresses (MOVX @ RI); Port 2 emits the contents of the P2 Special Function
Register.
Port 3 Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port
3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3
pins they are pulled high by the internal pull-ups and can be used as inputs. As
inputs, Port 3 pins that are externally being pulled low will source current (IIL)
because of the pull-ups .Port 3 also serves the functions of various special features
of the AT89C51 as listed below:
Port Pin Alternate Functions
P3.0 RXD (serial input port)
P3.1 TXD (serial output port)
13
P3.2 INT0 (external interrupt 0)
P3.3 INT1 (external interrupt 1)
P3.4 T0 (timer 0 external input)
P3.5 T1 (timer 1 external input)
P3.6
WR (external data memory Write
strobe)
P3.7
RD (external data memory read
strobe)
Fig 3.2.4.2 Table of 89c52
Port 3 also receives some control signals for Flash programming and verification.
RST Reset input. A high on this pin for two machine cycles while the oscillator is
running resets the device.
ALE/PROG
Address Latch Enable output pulse for latching the low byte of the address during
accesses to external memory. This pin is also the program pulse input (PROG)
during Flash programming. In normal operation ALE is emitted at a constant rate
of 1/6 the oscillator frequency, and may be used for external timing or clocking
purposes. Note, however, that one ALE pulse is skipped during each access to
external Data Memory. If desired, ALE operation can be disabled by setting bit 0
of SFR location 8EH. With the bit set, ALE is active only during a MOVX or
MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-
disable bit has no effect if the microcontroller is in external execution mode.
PSEN
Program Store Enable is the read strobe to external program memory. When the
AT89C51 is executing code from external program memory, PSEN is activated
twice each machine cycle, except that two PSEN activations are skipped during
each access to external data memory.
EA/VPP
External Access Enable must be strapped to GND in order to enable the device to
fetch code from external program memory locations starting at 0000H up to
14
FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally
latched on reset. EA should be strapped to VCC for internal program executions.
Oscillator Characteristics
XTAL1 and XTAL2 are the input and output, respectively, of an inverting
amplifier which can be configured for use as an on-chip oscillator, as shown in
Figure 1. Either a quartz crystal or ceramic resonator may be used.
To drive the device from an external clock source, XTAL2 should be left
unconnected while XTAL1 is driven as shown in Figure 2. There are no
requirements on the duty cycle of the external clock signal, since the input to the
internal clocking circuitry is through a divide-by-two flip-flop, but minimum and
maximum voltage high and low time specifications must be observed.
OSCILLATOR CONNECTIONS
Fig 3.2.4.3 oscillator connections
At89c51: Types of Memory
15
The 89c51 has three very general types of memory The memory types are On-Chip
Memory, External Code Memory, and External RAM
Fig 3.2.4.4 Types of memory
On-Chip Memory
refers to any memory (Code, RAM, or other) that physically exists on the
microcontroller itself. On-chip memory can be of several types, but we'll get into
that shortly.
External Code Memory
is code (or program) memory that resides off-chip. This is often in the
form of an external EPROM.
External RAM
is RAM memory that resides off-chip. This is often in the form of
standard static RAM or flash RAM.
Code Memory:
Code memory is the memory that holds the actual 89c51 program that is to be
run. This memory is limited to 64K and comes in many shapes and sizes: Code
memory may be found on-chip, either burned into the microcontroller as ROM or
16
EPROM. Code may also be stored completely off-chip in an external ROM or,
more commonly, an external EPROM. Flash RAM is also another popular method
of storing a program. Various combinations of these memory types may also be
used--that is to say, it is possible to have 4K of code memory on-chip and 64k of
code memory off-chip in an EPROM .When the program is stored on-chip the
64K maximum is often reduced to 4k, 8k, or 16k. This varies depending on the
version of the chip that is being used.
External RAM:
As an obvious opposite of Internal RAM, the 89c51 also supports what is
called External RAM. As the name suggests, External RAM is any random access
memory which is found off-chip. Since the memory is off-chip it is not as flexible
in terms of accessing, and is also slower. For example, to increment an Internal
RAM location by 1 requires only 1 instruction and 1 instruction cycle. To
increment a 1-byte value stored in External RAM requires 4 instructions and 7
instruction cycles. In this case, external memory is 7 times slower .What External
RAM loses in speed and flexibility it gains in quantity. While Internal RAM is
limited to 128 bytes (256 bytes with an 8052), the 89c51 supports External RAM
up to 64K.
On-Chip Memory
As mentioned, the 89c51 includes a certain amount of on-chip memory.
On-chip memory is really one of two types: Internal RAM and Special Function
Register (SFR) memory. The layout of the 89c51's internal
memory is presented in the following memory map..
17
Fig 3.2.4.5 on chip memory
As is illustrated in above map, the 89c51 has a bank of 128 bytes of Internal RAM.
This Internal RAM is found on-chip on the 89c51 so it is the fastest RAM
available, and it is also the most flexible in terms of reading, writing, and
modifying it’s contents. Internal RAM is volatile, so when the 89c51 is reset this
memory is cleared.
RegisterBanks
The 89c51 uses 8 "R" registers which are used in many of its instructions.
These "R" registers are numbered from 0 through 7 (R0, R1, R2, R3, R4, R5, R6,
and R7). These registers are generally used to assist in manipulating values and
moving data from one memory location to another the Accumulator. Thus if the
Accumulator (A) contained the value 6 and R4 contained the value 3, the
Accumulator would contain the value 9 after this instruction was executed.
However, as the memory map shows, the "R" Register R4 is really part of Internal
RAM. Specifically, R4 is address 04h. This can be see in the bright green section
of the memory map. But, the 89c51 has four distinct register banks. When the
89c51 is first booted up, register bank 0 (addresses 00h through 07h) is used by
18
default. However, your program may instruct the 89c51 to use one of the alternate
register banks; i.e., register banks 1, 2, or 3. In this case, R4 will no longer be the
same as Internal RAM address 04h. For example, if your program instructs the
89c51 to use register bank 3, "R" register R4 will now be synonymous with
Internal RAM address 1Ch.
The concept of register banks adds a great level of flexibility to the 89c51,
especially when dealing with interrupts (we'll talk about interrupts later). However,
always remember that the register banks really reside in the first 32 bytes of
Internal RAM.
BIT MEMORY
The 89c51, being a communications-oriented microcontroller, gives the
user the ability to access a number of bit variables. These variables may be either 1
or 0. There are 128 bit variables available to the user, numbed 00h through 7Fh.
The user may make use of these variables with commands such as SETB and CLR.
For example, to set bit number 24 (hex) to 1 you would execute the instruction:
SETB 24h
It is important to note that Bit Memory is really a part of Internal RAM. In fact, the
128 bit variables occupy the 16 bytes of Internal RAM from 20h through 2Fh.
Thus, if you write the value FFh to Internal RAM address 20h you’ve effectively
set bits 00h through 07h. Bit variables 00h through 7Fh are for user-defined
functions in their programs. However, bit variables 80h and above are actually
used to access certain SFRs on a bit-by-bit basis.
89c51: Basic Registers
The Accumulator
The Accumulator, as it’s name suggests, is used as a general register
to accumulate the results of a large number of instructions. It can hold an 8-bit (1-
byte) value and is the most versatile register the 89c51 has due to the shear number
of instructions that make use of the accumulator. More than half of the 89c51’s 255
instructions manipulate or use the accumulator in some way.
19
The "R" registers:
The "R" registers are a set of eight registers that are named R0, R1, etc.
up to and including R7.These registers are used as auxillary registers in many
operations. To continue with the above example, perhaps you are adding 10 and
20. The original number 10 may be stored in the Accumulator whereas the value
20 may be stored in, say, register R4. To process the addition you would execute
the command
The "B" Register:
The "B" register is very similar to the Accumulator in the sense that it
may hold an 8-bit (1-byte) value. The "B" register is only used by two 89c51
instructions: MUL AB and DIV AB. Thus, if you want to quickly and easily
multiply or divide A by another number, you may store the other number in "B"
and make use of these two instructions .Aside from the MUL and DIV instructions,
the "B" register is often used as yet another temporary storage register much like a
ninth "R" register.
The Data Pointer (DPTR):
The Data Pointer (DPTR) is the 89c51’s only user-accessible 16-bit (2-
byte) register. The Accumulator, "R" registers, and "B" register are all 1-byte
values. DPTR, as the name suggests, is used to point to data. It is used by a number
of commands which allow the 89c51 to access external memory. When the 89c51
accesses external memory it will access external memory at the address indicated
by DPTR. While DPTR is most often used to point to data in external memory,
many programmers often take advantage of the fact that it’s the only true 16-
register available. It is often used to store 2-byte values which have nothing to do
with memory locations.
The Program Counter (PC)
The Program Counter (PC) is a 2-byte address which tells the 89c51
where the next instruction to execute is found in memory. When the 89c51 is
initialized PC always starts at 0000h and is incremented each time an instruction is
20
executed. It is important to note that PC isn’t always incremented by one. Since
some instructions require 2 or 3 bytes the PC will be incremented by 2 or 3 in these
cases
The Stack Pointer (SP)
The Stack Pointer, like all registers except DPTR and PC, may hold
an 8-bit (1-byte) value. The Stack Pointer is used to indicate where the next value
to be removed from the stack should be taken from.
3.3 Software Requirement Specification
One core strength of the Sensor Integration Group is the common software
product, Multi-Input Data Acquisition System (MIDAS), which can
simultaneously communicate with each interface. The software leverages the
symmetric multi-processor capabilities and is highly multithreaded -- thus capable
of handling several I/O and processing tasks simultaneously. Multiple tasks can
run independent of one another or coordinate for increased acquisition capacity or
parallel operations. The software can be synchronized across multiple servers for
additional capacity or remote acquisition capabilities. MIDAS is supported under
both the Windows and Linux platforms.
The PC Test Set 2000 is an engineering software tool for the Windows platform
designed to acquire and process multi-channel data and provide display and
analysis tools. Designed for use in conjunction with acoustic sonar systems, the PC
Test Set acquires raw data from a telemetry source and transforms it into the time,
spectral, or spatial domains. The data is calibrated and displayed for the user who
can use the built-in tools to analyze the data. In addition, the PC Test Set has
automated tools to inform technicians of the health of the sonar system.
3.3.1 User Requirements
This Multi channel system build with the use of embedded system it often
runs with limited computer hardware resources such as small or no keyboard,
21
screen, and little memory. Simple embedded devices use buttons, LEDs, and small
character- or digit only displays, often with a simple menu system.
The rise of the World Wide Web has given embedded designers another
quite Different option: providing a web page interface over a network connection.
This
Avoids the cost of a sophisticated display, yet provides complex input and display
Capabilities when needed, on another computer. This is successful for remote,
Permanently installed equipment. In particular, routers take advantage of this
ability.
Embedded Systems talk with the outside world via peripherals, such as:
 Serial Communication Interfaces (SCI): RS-232, RS-422, RS-485 etc.
 Synchronous Serial Communication Interface: I2C, JTAG, SPI, SSC and ESSI
 Universal Serial Bus (USB)
 Networks: Controller Area Network, Lon Works, etc
 Timers: PLL(s), Capture/Compare and Time Processing Unit.
3.3 Software requirements
Overview of KEIL CROSS C COMPILER
It is possible to create the source files in a text editor such as Notepad, run
the Compiler on each C source file, specifying a list of controls, run the Assembler
on each Assembler source file, specifying another list of controls, run either the
Library Manager or Linker (again specifying a list of controls) and finally running
the Object-HEX Converter to convert the Linker output file to an Intel Hex File.
Once that has been completed the Hex File can be downloaded to the target
hardware and debugged. Alternatively KEIL can be used to create source files;
automatically compile, link and covert using options set with an easy to use user
interface and finally simulate or perform debugging on the hardware with access to
C variables and memory. Unless you have to use the tolls on the command line, the
choice is clear. KEIL Greatly simplifies the process of creating and testing an
embedded application.
22
1. Click on the Keil uVision Icon on Desktop
2. The following fig will appear.
3. Click on the Project menu from the title bar
4. Then Click on New Project
5. Save the Project by typing suitable project name with no extension in u r own
folder sited in either C: or D:
6. Then Click on save button above.
7. Select the component for u r project. i.e. Atmel….
8. Click on the + Symbol beside of Atmel
9. Select AT89C51
10. Then Click on “OK”
11. The Following fig will appear
12. Then Click either YES or NO………mostly “NO”
23
13. Now your project is ready to USE
14. Now double click on the Target1, you would get another option “Source group
1”
15. Click on the file option from menu bar and select “new”
16. The next screen will be as shown in next page, and just maximize it by double
Clicking on its blue boarder.
17. Now start writing program in either in “C” or “ASM”
18. For a program written in Assembly, then save it with extension “. asm” and
for “C” based program save it with extension “ .C”
19. Now right click on Source group 1 and click on “Add files to Group Source”
20. Now you will get another window, on which by default “C” files will appear.
21. Now select as per your file extension given while saving the file
22. Click only one time on option “ADD”
23. Now Press function key F7 to compile. Any error will appear if so happen.
24
24. If the file contains no error, then press Control+F5 simultaneously.
25. The new window is as follows
26. Then Click “OK”
27. Now Click on the Peripherals from menu bar, and check your required port.
28. Drag the port a side and click in the program file.
29. Now keep Pressing function key “F11” slowly and observe.
30. You are running your program successfully.
A project contains enough information to take a set of source files and
generate exactly the binary code required for the application. Because of the high
degree of flexibility required from the tools, there are many options that can be set
to configure the tools to operate in a specific manner. It would be tedious to have
to set these options up every time the application is being built; therefore they are
stored in a project file. Loading the project file into KEIL informs KEIL which
source files are
required, where they are, and how to configure the tools in the correct way. KEIL
can
25
then execute each tool with the correct options. It is also possible to create new
projects in KEIL. Source files are added to the project and the tool options are set
as
required. The project can then be saved to preserve the settings. The project also
stores such things as which windows were left open in the simulator/debugger, so
when a project is reloaded and the simulator or debugger started, all the desired
windows are opened. KEIL project files have the extension.
Simulator/Debugger:
The simulator/ debugger in KEIL can perform a very detailed simulation of a
micro controller along with external signals. It is possible to view the precise
execution time of a single assembly instruction, or a single line of C code, all the
way up to the entire application, simply by entering the crystal frequency. A
window can be opened for each peripheral on the device, showing the state of the
peripheral. This enables quick trouble shooting of mis-configured peripherals.
Breakpoints may be set on either assembly instructions or lines of C code, and
execution may be stepped through one instruction or C line at a time. The contents
of all the memory areas may be viewed along with ability to find specific variables.
In addition the registers may be viewed allowing a detailed view of what the
microcontroller is doing at any point in time.
The Keil Software 8051 development tools listed below are the programs
you use to compile your C code, assemble your assembler source files, link your
program together, create HEX files, and debug your target program.µVision2 for
Windows™ Integrated Development Environment: combines Project Management,
Source Code Editing, and Program Debugging in one powerful environment.
 C51 ANSI Optimizing C Cross Compiler: creates relocatable object modules from
your C source code,
 A51 Macro Assembler: creates relocatable object modules from your
8051 assembler source code,
 BL51 Linker/Locator: combines relocatable object modules created by the
compiler and assembler into the final absolute object module,
 LIB51 Library Manager: combines object modules into a library, which may be
used by the linker,
 OH51 Object-HEX Converter: creates Intel HEX files from absolute object
26
modules.
CHAPTER 4
4. DESIGN
4.1 INTRODUCTION
this project, we propose door lock through telephone using dtmf decoder
system that is Supposed to replace existing hardware and door key systems. The
Proposed system is advanced.
4.2 BLOCK DIAGRAM
Fig. 4.2: BLOCK DIAGRAM
8051
Micro
controller
Mobile
Crystal
circuit
Crystal
oscillator
DTMF
Servo motor
Power
Supply
27
4.3 BLOCK DIAGRAM EXPLANATION
In the figure shows the block diagram of the door lock through telephone
using DTMF decoder .In this diagram it consist of 8051 micro controller ,mobile,
crystal circuit, ULN driver, and stepper motor.
When we call to the mobile which is connected to the microcontroller it’s
automatically receives the call from another mobile. At the time of call going on if
we press the button 2 on other mobile which we called, it transfer the command to
the microcontroller as door close then the uln drive increases the power from 5v to
50v that time motor will rotate and the motor automatically closes the door. It is
useful if we are forgetting to lock the door in hurry we may close it by using
mobile.
At the same time if we press 3 on other mobile the motor will rotate one more
time then the door will automatically open.
28
4.4 SCHEMATIC DIAGRAM
Fig 4.4 Schematic diagram
The above fig shows the schematic diagram of door lock through mobile phone
using DTMF decoder.
In port1 P1.5, P1.7 is connected for mobile. And in port2 P2.0 to P2.6 is
connected for ULN driver. From ULN driver one DC Motor is connected. This DC
motor is in contact with the door for automatically closing that door. The power for
motor to work will come from the ULN driver which is connected to the
microcontroller in the ports of P2.0 to P2.6 and 40th pin Vcc.
The power supply which is regulated as 5v DC from 230v AC is connected to
the microcontroller in 20th pin as ground and 40th pin as Vcc.
29
CHAPTER 5
IMPLEMENTATION AND RESULTS
5.1 INTRODUCTION
The implementation part is the most important phase of the project. In this
phase, we code the entire project in the chosen software according to the design
laid during the previous phase. The code has to be in such a way that the door lock
through telephone using dtmf decoder requirements are satisfied and also not
complicated for the transition i.e., the door lock through telephone using dtmf
decoder compiling and processing at the controller is made by this code. The code
should be efficient for dump to the controller. In this manner, we can dump this
code to the controller by using Flash jet.
5.2 IMPLEMENTAION
The door lock through telephone using dtmf decoder is implemented by
using microcontroller of 8051. The Embedded C code for this door lock through
telephone using dtmf decoder will dump to this microcontroller by using keil
software.
5.3 RESULTS
The testing of implemented circuit about the by use of the door lock
through telephone using dtmf decoder is implemented the was D.C motor will rest
state the hade set will connect to GSM as shown in below figures.
Fig. 5.3.1: Door Lock through Telephone Using DTMF Decoder
30
The above diagram shows the cell phone is GSM the is given to power
supply and 250v and to 9v D.C power supply and also to connect to D.C motor to
operation was will be done .
Fig 5.3.2 Out Put of Door Lock through Telephone Using Dtmf Decoder
The output of the GSM is operate then call that mobile to an other mobile
so that call activated and press the 1 button and D.C motor will rotate start then
press 2 button the D.C motor will be stopped.
CHAPTER 6
CONCLUSION
We can also extend this project The implementation of door lock through
telephone using dtmf decoder is implemented is done successfully. The
31
communication is properly done without any interference between different
modules in the design. Design is done to meet all the specifications and
requirements. Software tools like Keil Uvision Simulator, Proload to dump the
source code into the microcontroller, Orcad Lite for the schematic diagram have
been used to develop the software code before realizing the hardware. Circuit is
implemented in Orcad and implemented on the microcontroller board. The
performance has been verified both in software simulator and hardware design.
The total circuit is completely verified functionally and is following the application
software. It can be concluded that the design implemented in the present work
provide portability, flexibility and the data transmission is also done with low
power consumption to counting purpose by making some changes in the Hardware
module
By using this circuit and proper power supply we can implement various
applications Such as fans, door locking systems, etc. By modifying this circuit and
using two relays we can achieve a task of opening and closing the door. We can
also extend this project to counting purpose by making some changes in the
Hardware module
`
32
REFERENCES
1. Muhammad Ali Mazidi, Janice Gillispie Mazidi, Rolin D.McKinla
The 8051 Microcontroller and Embedded Systems Using Assembly and C,
Pearson Education Inc.., 2006, Second Edition.
2. Kenneth J.Ayala; The 8051 Microcontroller Architecture, Programming, and
Application; West Publishing Company, USA ,1991
3. B.Ram ; Computer Fundamentals Architecture and Organization ; New Age
International (P) Ltd., Publishers @2000, Third Edition
4. Horn, Delton T. ; Electronic Components A Complete Reference For Project
Builders ; McGraw-Hill/Tab Electronics @1991
5. E Balagurusamy ; Programming In ANSI C ; Tata McGraw-Hill Publishing
Company Ltd@2008,Fourth Edition
REFERENCES ON THE WEB
http://www.google.com
http://books.google.com
http://www.atmel.com
http://www.8051projects.net
http://www.ijens.org

More Related Content

What's hot

Dtmf based home appliance control 2
Dtmf based home appliance control 2Dtmf based home appliance control 2
Dtmf based home appliance control 2Krish Karn
 
DTMF (Mobile) Based Automation
DTMF (Mobile) Based AutomationDTMF (Mobile) Based Automation
DTMF (Mobile) Based AutomationYogesh Kumar
 
Home automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneHome automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneKamal Lamichhane
 
Ijmsr 2016-01
Ijmsr 2016-01Ijmsr 2016-01
Ijmsr 2016-01ijmsr
 
Cell phone based dtmf controlled
Cell phone based dtmf controlledCell phone based dtmf controlled
Cell phone based dtmf controlledslmnsvn
 
Voice recognition based advance patients room automation
Voice recognition based advance patients room automationVoice recognition based advance patients room automation
Voice recognition based advance patients room automationeSAT Journals
 
Ec tlistener
Ec tlistenerEc tlistener
Ec tlistenerferelrew
 
Home automation using dtmf decoder
Home automation using dtmf decoderHome automation using dtmf decoder
Home automation using dtmf decoderJagadeesh Yadav
 
Arm Robot Surveillance Using Dual Tone Multiple Frequency Technology
Arm Robot Surveillance Using Dual Tone Multiple Frequency TechnologyArm Robot Surveillance Using Dual Tone Multiple Frequency Technology
Arm Robot Surveillance Using Dual Tone Multiple Frequency TechnologyIJERA Editor
 
DTMF base Mobile controlled appliances control
DTMF base Mobile controlled  appliances controlDTMF base Mobile controlled  appliances control
DTMF base Mobile controlled appliances controlGopal Bardhan
 
Wireless Communication via Mobile Phone Using DTMF
Wireless Communication via Mobile Phone Using DTMF Wireless Communication via Mobile Phone Using DTMF
Wireless Communication via Mobile Phone Using DTMF Vivek chan
 
Dtmf based appliances control system for rural and agricultural applications
Dtmf based appliances control system for rural and agricultural applicationsDtmf based appliances control system for rural and agricultural applications
Dtmf based appliances control system for rural and agricultural applicationsSa Saikiran
 
Cellphone based home automation
Cellphone based home automationCellphone based home automation
Cellphone based home automationPROJECTRONICS
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phonemoxreview
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMIRJET Journal
 

What's hot (20)

Dtmf based home appliance control 2
Dtmf based home appliance control 2Dtmf based home appliance control 2
Dtmf based home appliance control 2
 
DTMF (Mobile) Based Automation
DTMF (Mobile) Based AutomationDTMF (Mobile) Based Automation
DTMF (Mobile) Based Automation
 
Home automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneHome automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhane
 
Ijmsr 2016-01
Ijmsr 2016-01Ijmsr 2016-01
Ijmsr 2016-01
 
Cell phone based dtmf controlled
Cell phone based dtmf controlledCell phone based dtmf controlled
Cell phone based dtmf controlled
 
Voice recognition based advance patients room automation
Voice recognition based advance patients room automationVoice recognition based advance patients room automation
Voice recognition based advance patients room automation
 
Ec tlistener
Ec tlistenerEc tlistener
Ec tlistener
 
Home automation using dtmf decoder
Home automation using dtmf decoderHome automation using dtmf decoder
Home automation using dtmf decoder
 
Arm Robot Surveillance Using Dual Tone Multiple Frequency Technology
Arm Robot Surveillance Using Dual Tone Multiple Frequency TechnologyArm Robot Surveillance Using Dual Tone Multiple Frequency Technology
Arm Robot Surveillance Using Dual Tone Multiple Frequency Technology
 
DTMF
DTMFDTMF
DTMF
 
DTMF base Mobile controlled appliances control
DTMF base Mobile controlled  appliances controlDTMF base Mobile controlled  appliances control
DTMF base Mobile controlled appliances control
 
DTMF based load control
DTMF based load controlDTMF based load control
DTMF based load control
 
F04502031039
F04502031039F04502031039
F04502031039
 
Wireless Communication via Mobile Phone Using DTMF
Wireless Communication via Mobile Phone Using DTMF Wireless Communication via Mobile Phone Using DTMF
Wireless Communication via Mobile Phone Using DTMF
 
Arduino dtmf controlled robot
Arduino dtmf controlled robotArduino dtmf controlled robot
Arduino dtmf controlled robot
 
Dtmf based appliances control system for rural and agricultural applications
Dtmf based appliances control system for rural and agricultural applicationsDtmf based appliances control system for rural and agricultural applications
Dtmf based appliances control system for rural and agricultural applications
 
Cellphone based home automation
Cellphone based home automationCellphone based home automation
Cellphone based home automation
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phone
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 
Final Report
Final ReportFinal Report
Final Report
 

Similar to Smart DoorLock System using DTMF

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEMHOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEMpaperpublications3
 
Home Automation using DTMF
Home Automation using DTMFHome Automation using DTMF
Home Automation using DTMFPrashant Jaitly
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systemsManpreet Chandhok
 
smartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptxsmartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptxchiragsojitra180
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadNishanth C
 
Smart door lock
Smart door lockSmart door lock
Smart door lockaswin5432
 
GSM Based Wireless Robot Vehicle with POF features using DTMF
GSM Based Wireless Robot Vehicle with POF features using DTMFGSM Based Wireless Robot Vehicle with POF features using DTMF
GSM Based Wireless Robot Vehicle with POF features using DTMFirjes
 
DTMF BASED MOBILE CONTROLL ROBOT SYSTEM
DTMF BASED MOBILE CONTROLL ROBOT SYSTEMDTMF BASED MOBILE CONTROLL ROBOT SYSTEM
DTMF BASED MOBILE CONTROLL ROBOT SYSTEMiindranilsarkar
 
Wireless control system for spy devices based dual tone multi frequency techn...
Wireless control system for spy devices based dual tone multi frequency techn...Wireless control system for spy devices based dual tone multi frequency techn...
Wireless control system for spy devices based dual tone multi frequency techn...TELKOMNIKA JOURNAL
 
Auto Room Lighting and Door lock Report
Auto Room Lighting and Door lock ReportAuto Room Lighting and Door lock Report
Auto Room Lighting and Door lock ReportBUBT
 
Mobile Controlled Car
Mobile Controlled CarMobile Controlled Car
Mobile Controlled CarMalik Zaid
 
Message based home automation & security system
Message based home automation  & security systemMessage based home automation  & security system
Message based home automation & security systemjhp_eee
 
Office communication system using rf abstract
Office communication system using rf abstractOffice communication system using rf abstract
Office communication system using rf abstractDikshya Rath
 
Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...ijsptm
 

Similar to Smart DoorLock System using DTMF (20)

Home automation using dtmf decoder
Home automation using dtmf decoderHome automation using dtmf decoder
Home automation using dtmf decoder
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEMHOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
 
Ad830 user manual
Ad830 user manualAd830 user manual
Ad830 user manual
 
GSM Based Security System
GSM Based Security SystemGSM Based Security System
GSM Based Security System
 
Home Automation using DTMF
Home Automation using DTMFHome Automation using DTMF
Home Automation using DTMF
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
 
smartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptxsmartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptx
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 upload
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
GSM Based Wireless Robot Vehicle with POF features using DTMF
GSM Based Wireless Robot Vehicle with POF features using DTMFGSM Based Wireless Robot Vehicle with POF features using DTMF
GSM Based Wireless Robot Vehicle with POF features using DTMF
 
DTMF BASED MOBILE CONTROLL ROBOT SYSTEM
DTMF BASED MOBILE CONTROLL ROBOT SYSTEMDTMF BASED MOBILE CONTROLL ROBOT SYSTEM
DTMF BASED MOBILE CONTROLL ROBOT SYSTEM
 
Wireless control system for spy devices based dual tone multi frequency techn...
Wireless control system for spy devices based dual tone multi frequency techn...Wireless control system for spy devices based dual tone multi frequency techn...
Wireless control system for spy devices based dual tone multi frequency techn...
 
Auto Room Lighting and Door lock Report
Auto Room Lighting and Door lock ReportAuto Room Lighting and Door lock Report
Auto Room Lighting and Door lock Report
 
J04701080085
J04701080085J04701080085
J04701080085
 
Mobile Controlled Car
Mobile Controlled CarMobile Controlled Car
Mobile Controlled Car
 
Message based home automation & security system
Message based home automation  & security systemMessage based home automation  & security system
Message based home automation & security system
 
Office communication system using rf abstract
Office communication system using rf abstractOffice communication system using rf abstract
Office communication system using rf abstract
 
Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...
 
MAJOR_PROJECT
MAJOR_PROJECTMAJOR_PROJECT
MAJOR_PROJECT
 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

Smart DoorLock System using DTMF

  • 1. 1 CHAPTER 1 1. INTRODUCTION In this age of digital technology, every device and its operation has become digital based. Now with digital based door lock systems, it is easier to control the door movement of the car or house. The new automated door lock system does not need a key to lock or unlock the door of the car or house. This digital door entry system is in fact controlled by cell-phone which is actually performing the role of remote over here. The keyless door remote is an electronic circuit based device. This remote transmits DTMF signals via air to another device of the system installed in the car door or house door.. The keyless car remote can be operated from any corner of the world. The working of this locking system is very simple. You just have to carry the cell phone with yourself and you can control the locks from anywhere without any problem. It works on the entry number. The owner has to press that entry number on the cell phone for controlling the locking system. The entry number is unique in nature and so is the remote device of an automatic keyless system. You can install a keyless entry system in your house as well as in your vehicle. Now, a days theft cases are increasing everywhere and the key based locking system is no longer a safe option. It is quite easy for thieves and robbers to open the traditional key based doors either with duplicate keys or some other way. Therefore for safety of your house and vehicle, this system can be installed. With this system, you will never be in tension of leaving your house and vehicle out of your supervision. Not only this ,it also help us to move out of some really odd situations like you locked the door and left and in your absence other members came back and then they have to wait outside if they were not having key with themselves.
  • 2. 2 1.1 Motivation Keyless entry has been a luxury whose availability is confined primarily to vehicles. The cell phone security system takes this idea of keyless entry and transforms it into a convenient, versatile security system that utilizes cell phone technology and the landline telephone network. By taking advantage of caller identification and dual-tone multi-frequency signaling, the security system has the ability to introduce two-levels of security. The first level will be decoding the calling party’s identification information while the second level would consist of the user attempting a password entry over the phone.. By combining the mobility of this telecommunication medium with microcontrollers, the system achieves a secure, convenient, and automated form of security for a place of residence. 1.2 PROBLEM DEFINITION The cell phone security system is the result of a fusion of a creative idea with an attempt to motivate change. Even though modern technology has allowed for the automation of many aspects of domestic lifestyles, from automatic motion sensing lights to automatic garage door openers, home security has not seen much benefit from this revolution. Household entry has long been a very manual routine with little effort to automate the process. Entry into a residence is still primarily limited to a manual process which involves inserting a key into a bolt and physically moving the locking-mechanism 1.3 OBJECTIVE OF PROJECT The fundamental requirements for the cell phone security system remained fixed throughout the design process. The goal was to design a system which would allow the user automated and convenient access to their home security system through a telephone network. The fundamental objectives of the system include: 1. Correctly decode the DTMF signals from the user. 2. Correctly decode caller identification information from the phone line. 3. Allow the user to automatically lock the entryway. 4. Allow the user to automatically unlock the entryway.
  • 3. 3 1.4 LIMITATIONS OF PROJECT The cell phone security system aims to change this. The system takes advantage of the widespread acceptance of cell phones in today’s society in conjunction with the deep-rooted standards of the landline telephone network to introduce automation and convenience. The system will allow a user to use their cell phone to place a call into their home security system. Once the system verifies the caller, the caller is then allowed to attempt a password entry. Upon successfully entering a password, the system will automatically unlock the door and grant entrance. This automation introduces a form of secure, keyless entry into a residence along with the convenience of a fully responsive security system monitor. The system will primarily interface with telephony protocols which include dual tone multi frequency (DTMF), caller identification (CID), and some applicable telephony circuit standards. 1.5 ORGANIZATION OF DOCUMENTATION In this project documentation we have initially put the definition and objective of the project as well as the design of the project which is followed by the implementation and testing phases. Finally the project has been concluded successfully and also the future enhancements of the project were given in this Documentation.
  • 4. 4 CHAPTER 2 LITERATURE SURVEY 2.1 INTRODUCTION Design for an automated door locks(smart key less entry), Biometric attendance, lecture theater/hall monitor system, railway station display, Automated Parking System, gps navigation system, Circuit Encoder ARC M3EA from Artech for RF Remote Control, pic16f877 interfaced to max sonar ez1 sensor, Infrared Head phone, Microcontroller application, The first method of DTMF generation provides two PWM (Pulse Width Modulation) outputs on pins G3 and G2 of the G port for 100 ms. These two PWM outputs represent the selected high band and low band frequencies respectively, and must be combined externally with an LM324 op amp or equivalent feedback circuit to produce the DTMF signal DTMF (Dual Tone Multiple Frequency) is associated with digital telephony, and provides two selected output frequencies (one high band, one low band) for a duration of 100 ms. DTMF generation consists of selecting and combining two audio tone frequencies associated with the rows (low band frequency) and columns (high band frequency) of a push-button touch tone telephone keypad. According to the current article, DTMF was first introduced to the public at the NY World's Fair in 1964. It was, however, in full "field test" usage in multiple small towns in the US by then. Most notably, it was first used in Findlay Ohio in 1960 and then in Greensburg, PA in 1961. WHAT IS DUAL TONE MULTI-FREQUENCY DTMF is the global standard for audible tones that represent the digits on a phone keypad with touch-tone land-line phones, pressing a key on the dial pad generates the corresponding DTMF tone for that key. The land-line phone system can then "listen" and decode that tone to determine which key was pressed, enabling dialing.
  • 5. 5 Mobile phone networks use digital signals instead of DTMF for direct dialing, but DTMF is still used over mobile phones to navigate automated systems such as phone menus, and for secondary dialing, such as using a calling card. Each DTMF "tone" is actually two tones - a low-frequency tone and a high-frequency tone - combined. (Hence the name "dual tone multi-frequency".) Looking at the standard phone keypad as a grid, the low tone corresponds to the row, while the high tone corresponds to the column. 2.2 EXISTING SYSTEM In the existing system of the project we had use the doors in lock systems keys are obsolete they are use man power open and close the doors. It requires the human energy. 2.3 DISADVANTAGES OF EXISTING SYSTEM As mentioned above the earlier system has use the doors in lock systems keys are obsolete there are no use of the electrical devices there are use the mechanical systems. After being inspired by the mechanical door opening system in that. I mean c'mon, door locks with keys are obsolete. Everyone uses them. They’re so old fashioned! ...The second part of this project was to build a DTMF decoder by use of mobile with the soft ware’s requirements. 2.4 PROPOSED SYSTEM As the above disadvantages can’t be solved with in this application has been Proposed and also the handling will be much improved than the existing system as we are implementing the special method called door lock through telephone using dtmf decoder. Here the door lock through telephone using this is control the over all door locking system there open are close the is process will take by Servo motors and LED’S that can final operate.
  • 6. 6 CHAPTER 3 ANALYSIS 3.1 INTRODUCTION After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the methods are equally important but the first system states as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking as well as understanding of existing system is also difficult. Improper understanding of present system can lead diversion from solution 3.2 Hardware requirement 3.2.1 Servo Motors 3.2.2 LIGHT EMITTING DIODE (LED) LED's are special diodes that emit light when connected in a circuit. They are frequently used as "pilot" lights in electronic appliances to indicate whether the circuit is closed or not. As a clear (or often colored) epoxy case enclosed the heart of an LED, the semi-conductor chip. Fig. 3.2.2.1: SYMBOL OF LED
  • 7. 7 Fig. 3.2.2.2: CROSS SECTIONAL VIEW OF LED Working The most important part of a light emitting diode (LED) is the semi- conductor chip located in the center of the bulb as shown. The chip has two regions separated by a junction. The p region is dominated by positive electric charges, and the n region is dominated by negative electric charges. The junction acts as a barrier to the flow of electrons between the p and the n regions. Only when sufficient voltage is applied to the semi-conductor chip, can the current flow and the electrons cross the junction into the p region. Fig. 3.2.2.3 Semi conductor Chip In the absence of a large enough electric potential difference (voltage) across the LED leads, the junction presents an electric potential barrier to the flow of electrons. When sufficient voltage is applied to the chip across the leads of the LED, electrons can move easily in only one direction across the junction between
  • 8. 8 the p and n regions. In the p region there are many more positive than negative charges. In the n region the electrons are more numerous than the positive electric charges. When a voltage is applied and the current starts to flow, electrons in the n region have sufficient energy to move across the junction into the p region. Once in the p region the electrons are immediately attracted to the positive charges due to the mutual Coulomb forces of attraction between opposite electric charges. When an electron moves sufficiently close to a positive charge in the P region, the two charges "re-combine”. Each time an electron recombines with a positive charge; electric potential energy is converted into electromagnetic energy. For each recombination of a negative and a positive charge, a quantum of electromagnetic energy is emitted in the form of a photon of light with a frequency characteristic of the semi-conductor material (usually a combination of the chemical elements gallium, arsenic and phosphorus). Only photons in a very narrow frequency range can be emitted by any material. Color of L.E.D LED's that emit different colors are made of different semi-conductor materials, and require different energies to light them. Fig 3.2.2.4 color of L.E.D The color of an LED is determined by the semiconductor material, not by the coloring of the 'package' (the plastic body). LEDs of all colors are available in uncolored packages which may be diffused (milky) or clear (often described as 'water clear'). The colored packages are also available as diffused (the standard type) or transparent.
  • 9. 9 3.2.3 POWER SUPPLY UNIT BLOCK DIAGRAM Fig 3.2.3.1 Block diagram As we all know any invention of latest technology cannot be activated without the source of power. So it this fast moving world we deliberately need a proper power source which will be apt for a particular requirement. All the electronic components starting from diode to Intel IC’s only work with a DC supply ranging from _+5v to _+12. we are utilizing for the same, the most cheapest and commonly available energy source of 230v-50Hz and stepping down , rectifying, filtering and regulating the voltage. This will be dealt briefly in the forth-coming sections. STEP DOWN TRANSFORMER When AC is applied to the primary winding of the power transformer it can either be stepped down or up depending on the value of DC needed. In our circuit the transformer of 230v/15-0-15v is used to perform the step down operation where a 230V AC appears as 15V AC across the secondary winding . One alteration of input causes the top of the transformer to be positive and the bottom negative. The next alteration will temporarily cause the reverse. The current rating of the transformer used in our project is 2A. Apart from stepping down AC voltages , it gives isolation between the power source and power supply circuitries. BRIDGE RECTIFIER In the power supply unit, rectification is normally achieved using a solid state diode. Diode has the property that will let the electron flow easily in one direction at proper biasing condition . As AC is applied to the diode, electrons only flow when the anode and cathode is negative. Reversing the polarity of voltage will not permit electron flow. For a positive cycle, two diodes are connected to the positive voltage at the top winding and only one diode conducts . At the same time one of the other two diodes conducts for the negative voltage that is applied from the bottom winding due to the forward bias for that diode. In this circuit due to positive half cycleD1 & D2 will conduct to give 10.8v pulsating DC. The DC output has a ripple frequency of 100Hz. Since each altercation produces a resulting output pulse, frequency = Step Down Transformer Bridge Rectifier Positive Charge Capacitor Positive Voltage Regulator IC 7805 LPF
  • 10. 10 2*50 Hz. The output obtained is not a pure DC and therefore filtration has to be done. VOLTAGE REGULATORS The voltage regulators play an important role in any power supply unit. The primary purpose of a regulator is to aid the rectifier and filter circuit in providing a constant DC voltage to the device. Power supplies without regulators have an inherent problem of changing DC voltage values due to variations in the load or due to fluctuations in the AC liner voltage. With a regulator connected to the DC output, the voltage can be maintained within a close tolerant region of the desired output. IC7812 and 7912 is used in this project for providing +12v and –12v DC supply. 3.2.4 MICROCONTROLLER The AT89C52 is a low-power, high-performance CMOS 8-bit microcomputer with 8k bytes of Flash programmable and erasable read only memory (PEROM)The device is manufactured using Atmel’s high-density nonvolatile 11Memory technology and is compatible with the industry-standard 80C51 and 80C52 instruction set and Pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer .By combining a versatile 8-bit CPU with Flash on a monolithic chip. Features  The AT89C52 provides the following standard features  8K Bytes of In-System Reprogrammable Flash Memory  128 bytes of Internal RAM (128 x 8-bit)  32 Programmable I/O Lines  Two 16-bit Timer/Counters  Five vector two-level interrupt architecture  A full duplex serial port  Three-level Program Memory Lock  Six Interrupt Sources  On-chip oscillator and clock circuit PIN DIAGRAM
  • 11. 11 . Fig. 3.2.4.1 89c52 Microcontroller Pin Description VCC: Supply voltage. GND: Ground. Port 0 Port 0 is an 8-bit open-drain bi-directional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 may also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode P0 has internal pull-ups. Port 0 also receives the code bytes during Flash programming, and outputs the code bytes during program verification. External pull-ups are required during program verification. Port 1 Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL)
  • 12. 12 because of the internal pull-ups. Port 1 also receives the low-order address bytes during Flash programming and verification. Port 2 Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled high by the internal pull-ups and can be used as inputs .As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to externaldata16- bitaddresses (MOVX@DPTR).Inthisapplication,itusesstrongmemoryuses internal pullupswhenemitting1s.Duringaccessestoexternaldatamemorythatuses8-bit addresses (MOVX @ RI); Port 2 emits the contents of the P2 Special Function Register. Port 3 Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups .Port 3 also serves the functions of various special features of the AT89C51 as listed below: Port Pin Alternate Functions P3.0 RXD (serial input port) P3.1 TXD (serial output port)
  • 13. 13 P3.2 INT0 (external interrupt 0) P3.3 INT1 (external interrupt 1) P3.4 T0 (timer 0 external input) P3.5 T1 (timer 1 external input) P3.6 WR (external data memory Write strobe) P3.7 RD (external data memory read strobe) Fig 3.2.4.2 Table of 89c52 Port 3 also receives some control signals for Flash programming and verification. RST Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG Address Latch Enable output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming. In normal operation ALE is emitted at a constant rate of 1/6 the oscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory. If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE- disable bit has no effect if the microcontroller is in external execution mode. PSEN Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP External Access Enable must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to
  • 14. 14 FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. Oscillator Characteristics XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1 is driven as shown in Figure 2. There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low time specifications must be observed. OSCILLATOR CONNECTIONS Fig 3.2.4.3 oscillator connections At89c51: Types of Memory
  • 15. 15 The 89c51 has three very general types of memory The memory types are On-Chip Memory, External Code Memory, and External RAM Fig 3.2.4.4 Types of memory On-Chip Memory refers to any memory (Code, RAM, or other) that physically exists on the microcontroller itself. On-chip memory can be of several types, but we'll get into that shortly. External Code Memory is code (or program) memory that resides off-chip. This is often in the form of an external EPROM. External RAM is RAM memory that resides off-chip. This is often in the form of standard static RAM or flash RAM. Code Memory: Code memory is the memory that holds the actual 89c51 program that is to be run. This memory is limited to 64K and comes in many shapes and sizes: Code memory may be found on-chip, either burned into the microcontroller as ROM or
  • 16. 16 EPROM. Code may also be stored completely off-chip in an external ROM or, more commonly, an external EPROM. Flash RAM is also another popular method of storing a program. Various combinations of these memory types may also be used--that is to say, it is possible to have 4K of code memory on-chip and 64k of code memory off-chip in an EPROM .When the program is stored on-chip the 64K maximum is often reduced to 4k, 8k, or 16k. This varies depending on the version of the chip that is being used. External RAM: As an obvious opposite of Internal RAM, the 89c51 also supports what is called External RAM. As the name suggests, External RAM is any random access memory which is found off-chip. Since the memory is off-chip it is not as flexible in terms of accessing, and is also slower. For example, to increment an Internal RAM location by 1 requires only 1 instruction and 1 instruction cycle. To increment a 1-byte value stored in External RAM requires 4 instructions and 7 instruction cycles. In this case, external memory is 7 times slower .What External RAM loses in speed and flexibility it gains in quantity. While Internal RAM is limited to 128 bytes (256 bytes with an 8052), the 89c51 supports External RAM up to 64K. On-Chip Memory As mentioned, the 89c51 includes a certain amount of on-chip memory. On-chip memory is really one of two types: Internal RAM and Special Function Register (SFR) memory. The layout of the 89c51's internal memory is presented in the following memory map..
  • 17. 17 Fig 3.2.4.5 on chip memory As is illustrated in above map, the 89c51 has a bank of 128 bytes of Internal RAM. This Internal RAM is found on-chip on the 89c51 so it is the fastest RAM available, and it is also the most flexible in terms of reading, writing, and modifying it’s contents. Internal RAM is volatile, so when the 89c51 is reset this memory is cleared. RegisterBanks The 89c51 uses 8 "R" registers which are used in many of its instructions. These "R" registers are numbered from 0 through 7 (R0, R1, R2, R3, R4, R5, R6, and R7). These registers are generally used to assist in manipulating values and moving data from one memory location to another the Accumulator. Thus if the Accumulator (A) contained the value 6 and R4 contained the value 3, the Accumulator would contain the value 9 after this instruction was executed. However, as the memory map shows, the "R" Register R4 is really part of Internal RAM. Specifically, R4 is address 04h. This can be see in the bright green section of the memory map. But, the 89c51 has four distinct register banks. When the 89c51 is first booted up, register bank 0 (addresses 00h through 07h) is used by
  • 18. 18 default. However, your program may instruct the 89c51 to use one of the alternate register banks; i.e., register banks 1, 2, or 3. In this case, R4 will no longer be the same as Internal RAM address 04h. For example, if your program instructs the 89c51 to use register bank 3, "R" register R4 will now be synonymous with Internal RAM address 1Ch. The concept of register banks adds a great level of flexibility to the 89c51, especially when dealing with interrupts (we'll talk about interrupts later). However, always remember that the register banks really reside in the first 32 bytes of Internal RAM. BIT MEMORY The 89c51, being a communications-oriented microcontroller, gives the user the ability to access a number of bit variables. These variables may be either 1 or 0. There are 128 bit variables available to the user, numbed 00h through 7Fh. The user may make use of these variables with commands such as SETB and CLR. For example, to set bit number 24 (hex) to 1 you would execute the instruction: SETB 24h It is important to note that Bit Memory is really a part of Internal RAM. In fact, the 128 bit variables occupy the 16 bytes of Internal RAM from 20h through 2Fh. Thus, if you write the value FFh to Internal RAM address 20h you’ve effectively set bits 00h through 07h. Bit variables 00h through 7Fh are for user-defined functions in their programs. However, bit variables 80h and above are actually used to access certain SFRs on a bit-by-bit basis. 89c51: Basic Registers The Accumulator The Accumulator, as it’s name suggests, is used as a general register to accumulate the results of a large number of instructions. It can hold an 8-bit (1- byte) value and is the most versatile register the 89c51 has due to the shear number of instructions that make use of the accumulator. More than half of the 89c51’s 255 instructions manipulate or use the accumulator in some way.
  • 19. 19 The "R" registers: The "R" registers are a set of eight registers that are named R0, R1, etc. up to and including R7.These registers are used as auxillary registers in many operations. To continue with the above example, perhaps you are adding 10 and 20. The original number 10 may be stored in the Accumulator whereas the value 20 may be stored in, say, register R4. To process the addition you would execute the command The "B" Register: The "B" register is very similar to the Accumulator in the sense that it may hold an 8-bit (1-byte) value. The "B" register is only used by two 89c51 instructions: MUL AB and DIV AB. Thus, if you want to quickly and easily multiply or divide A by another number, you may store the other number in "B" and make use of these two instructions .Aside from the MUL and DIV instructions, the "B" register is often used as yet another temporary storage register much like a ninth "R" register. The Data Pointer (DPTR): The Data Pointer (DPTR) is the 89c51’s only user-accessible 16-bit (2- byte) register. The Accumulator, "R" registers, and "B" register are all 1-byte values. DPTR, as the name suggests, is used to point to data. It is used by a number of commands which allow the 89c51 to access external memory. When the 89c51 accesses external memory it will access external memory at the address indicated by DPTR. While DPTR is most often used to point to data in external memory, many programmers often take advantage of the fact that it’s the only true 16- register available. It is often used to store 2-byte values which have nothing to do with memory locations. The Program Counter (PC) The Program Counter (PC) is a 2-byte address which tells the 89c51 where the next instruction to execute is found in memory. When the 89c51 is initialized PC always starts at 0000h and is incremented each time an instruction is
  • 20. 20 executed. It is important to note that PC isn’t always incremented by one. Since some instructions require 2 or 3 bytes the PC will be incremented by 2 or 3 in these cases The Stack Pointer (SP) The Stack Pointer, like all registers except DPTR and PC, may hold an 8-bit (1-byte) value. The Stack Pointer is used to indicate where the next value to be removed from the stack should be taken from. 3.3 Software Requirement Specification One core strength of the Sensor Integration Group is the common software product, Multi-Input Data Acquisition System (MIDAS), which can simultaneously communicate with each interface. The software leverages the symmetric multi-processor capabilities and is highly multithreaded -- thus capable of handling several I/O and processing tasks simultaneously. Multiple tasks can run independent of one another or coordinate for increased acquisition capacity or parallel operations. The software can be synchronized across multiple servers for additional capacity or remote acquisition capabilities. MIDAS is supported under both the Windows and Linux platforms. The PC Test Set 2000 is an engineering software tool for the Windows platform designed to acquire and process multi-channel data and provide display and analysis tools. Designed for use in conjunction with acoustic sonar systems, the PC Test Set acquires raw data from a telemetry source and transforms it into the time, spectral, or spatial domains. The data is calibrated and displayed for the user who can use the built-in tools to analyze the data. In addition, the PC Test Set has automated tools to inform technicians of the health of the sonar system. 3.3.1 User Requirements This Multi channel system build with the use of embedded system it often runs with limited computer hardware resources such as small or no keyboard,
  • 21. 21 screen, and little memory. Simple embedded devices use buttons, LEDs, and small character- or digit only displays, often with a simple menu system. The rise of the World Wide Web has given embedded designers another quite Different option: providing a web page interface over a network connection. This Avoids the cost of a sophisticated display, yet provides complex input and display Capabilities when needed, on another computer. This is successful for remote, Permanently installed equipment. In particular, routers take advantage of this ability. Embedded Systems talk with the outside world via peripherals, such as:  Serial Communication Interfaces (SCI): RS-232, RS-422, RS-485 etc.  Synchronous Serial Communication Interface: I2C, JTAG, SPI, SSC and ESSI  Universal Serial Bus (USB)  Networks: Controller Area Network, Lon Works, etc  Timers: PLL(s), Capture/Compare and Time Processing Unit. 3.3 Software requirements Overview of KEIL CROSS C COMPILER It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each Assembler source file, specifying another list of controls, run either the Library Manager or Linker (again specifying a list of controls) and finally running the Object-HEX Converter to convert the Linker output file to an Intel Hex File. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files; automatically compile, link and covert using options set with an easy to use user interface and finally simulate or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear. KEIL Greatly simplifies the process of creating and testing an embedded application.
  • 22. 22 1. Click on the Keil uVision Icon on Desktop 2. The following fig will appear. 3. Click on the Project menu from the title bar 4. Then Click on New Project 5. Save the Project by typing suitable project name with no extension in u r own folder sited in either C: or D: 6. Then Click on save button above. 7. Select the component for u r project. i.e. Atmel…. 8. Click on the + Symbol beside of Atmel 9. Select AT89C51 10. Then Click on “OK” 11. The Following fig will appear 12. Then Click either YES or NO………mostly “NO”
  • 23. 23 13. Now your project is ready to USE 14. Now double click on the Target1, you would get another option “Source group 1” 15. Click on the file option from menu bar and select “new” 16. The next screen will be as shown in next page, and just maximize it by double Clicking on its blue boarder. 17. Now start writing program in either in “C” or “ASM” 18. For a program written in Assembly, then save it with extension “. asm” and for “C” based program save it with extension “ .C” 19. Now right click on Source group 1 and click on “Add files to Group Source” 20. Now you will get another window, on which by default “C” files will appear. 21. Now select as per your file extension given while saving the file 22. Click only one time on option “ADD” 23. Now Press function key F7 to compile. Any error will appear if so happen.
  • 24. 24 24. If the file contains no error, then press Control+F5 simultaneously. 25. The new window is as follows 26. Then Click “OK” 27. Now Click on the Peripherals from menu bar, and check your required port. 28. Drag the port a side and click in the program file. 29. Now keep Pressing function key “F11” slowly and observe. 30. You are running your program successfully. A project contains enough information to take a set of source files and generate exactly the binary code required for the application. Because of the high degree of flexibility required from the tools, there are many options that can be set to configure the tools to operate in a specific manner. It would be tedious to have to set these options up every time the application is being built; therefore they are stored in a project file. Loading the project file into KEIL informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL can
  • 25. 25 then execute each tool with the correct options. It is also possible to create new projects in KEIL. Source files are added to the project and the tool options are set as required. The project can then be saved to preserve the settings. The project also stores such things as which windows were left open in the simulator/debugger, so when a project is reloaded and the simulator or debugger started, all the desired windows are opened. KEIL project files have the extension. Simulator/Debugger: The simulator/ debugger in KEIL can perform a very detailed simulation of a micro controller along with external signals. It is possible to view the precise execution time of a single assembly instruction, or a single line of C code, all the way up to the entire application, simply by entering the crystal frequency. A window can be opened for each peripheral on the device, showing the state of the peripheral. This enables quick trouble shooting of mis-configured peripherals. Breakpoints may be set on either assembly instructions or lines of C code, and execution may be stepped through one instruction or C line at a time. The contents of all the memory areas may be viewed along with ability to find specific variables. In addition the registers may be viewed allowing a detailed view of what the microcontroller is doing at any point in time. The Keil Software 8051 development tools listed below are the programs you use to compile your C code, assemble your assembler source files, link your program together, create HEX files, and debug your target program.µVision2 for Windows™ Integrated Development Environment: combines Project Management, Source Code Editing, and Program Debugging in one powerful environment.  C51 ANSI Optimizing C Cross Compiler: creates relocatable object modules from your C source code,  A51 Macro Assembler: creates relocatable object modules from your 8051 assembler source code,  BL51 Linker/Locator: combines relocatable object modules created by the compiler and assembler into the final absolute object module,  LIB51 Library Manager: combines object modules into a library, which may be used by the linker,  OH51 Object-HEX Converter: creates Intel HEX files from absolute object
  • 26. 26 modules. CHAPTER 4 4. DESIGN 4.1 INTRODUCTION this project, we propose door lock through telephone using dtmf decoder system that is Supposed to replace existing hardware and door key systems. The Proposed system is advanced. 4.2 BLOCK DIAGRAM Fig. 4.2: BLOCK DIAGRAM 8051 Micro controller Mobile Crystal circuit Crystal oscillator DTMF Servo motor Power Supply
  • 27. 27 4.3 BLOCK DIAGRAM EXPLANATION In the figure shows the block diagram of the door lock through telephone using DTMF decoder .In this diagram it consist of 8051 micro controller ,mobile, crystal circuit, ULN driver, and stepper motor. When we call to the mobile which is connected to the microcontroller it’s automatically receives the call from another mobile. At the time of call going on if we press the button 2 on other mobile which we called, it transfer the command to the microcontroller as door close then the uln drive increases the power from 5v to 50v that time motor will rotate and the motor automatically closes the door. It is useful if we are forgetting to lock the door in hurry we may close it by using mobile. At the same time if we press 3 on other mobile the motor will rotate one more time then the door will automatically open.
  • 28. 28 4.4 SCHEMATIC DIAGRAM Fig 4.4 Schematic diagram The above fig shows the schematic diagram of door lock through mobile phone using DTMF decoder. In port1 P1.5, P1.7 is connected for mobile. And in port2 P2.0 to P2.6 is connected for ULN driver. From ULN driver one DC Motor is connected. This DC motor is in contact with the door for automatically closing that door. The power for motor to work will come from the ULN driver which is connected to the microcontroller in the ports of P2.0 to P2.6 and 40th pin Vcc. The power supply which is regulated as 5v DC from 230v AC is connected to the microcontroller in 20th pin as ground and 40th pin as Vcc.
  • 29. 29 CHAPTER 5 IMPLEMENTATION AND RESULTS 5.1 INTRODUCTION The implementation part is the most important phase of the project. In this phase, we code the entire project in the chosen software according to the design laid during the previous phase. The code has to be in such a way that the door lock through telephone using dtmf decoder requirements are satisfied and also not complicated for the transition i.e., the door lock through telephone using dtmf decoder compiling and processing at the controller is made by this code. The code should be efficient for dump to the controller. In this manner, we can dump this code to the controller by using Flash jet. 5.2 IMPLEMENTAION The door lock through telephone using dtmf decoder is implemented by using microcontroller of 8051. The Embedded C code for this door lock through telephone using dtmf decoder will dump to this microcontroller by using keil software. 5.3 RESULTS The testing of implemented circuit about the by use of the door lock through telephone using dtmf decoder is implemented the was D.C motor will rest state the hade set will connect to GSM as shown in below figures. Fig. 5.3.1: Door Lock through Telephone Using DTMF Decoder
  • 30. 30 The above diagram shows the cell phone is GSM the is given to power supply and 250v and to 9v D.C power supply and also to connect to D.C motor to operation was will be done . Fig 5.3.2 Out Put of Door Lock through Telephone Using Dtmf Decoder The output of the GSM is operate then call that mobile to an other mobile so that call activated and press the 1 button and D.C motor will rotate start then press 2 button the D.C motor will be stopped. CHAPTER 6 CONCLUSION We can also extend this project The implementation of door lock through telephone using dtmf decoder is implemented is done successfully. The
  • 31. 31 communication is properly done without any interference between different modules in the design. Design is done to meet all the specifications and requirements. Software tools like Keil Uvision Simulator, Proload to dump the source code into the microcontroller, Orcad Lite for the schematic diagram have been used to develop the software code before realizing the hardware. Circuit is implemented in Orcad and implemented on the microcontroller board. The performance has been verified both in software simulator and hardware design. The total circuit is completely verified functionally and is following the application software. It can be concluded that the design implemented in the present work provide portability, flexibility and the data transmission is also done with low power consumption to counting purpose by making some changes in the Hardware module By using this circuit and proper power supply we can implement various applications Such as fans, door locking systems, etc. By modifying this circuit and using two relays we can achieve a task of opening and closing the door. We can also extend this project to counting purpose by making some changes in the Hardware module `
  • 32. 32 REFERENCES 1. Muhammad Ali Mazidi, Janice Gillispie Mazidi, Rolin D.McKinla The 8051 Microcontroller and Embedded Systems Using Assembly and C, Pearson Education Inc.., 2006, Second Edition. 2. Kenneth J.Ayala; The 8051 Microcontroller Architecture, Programming, and Application; West Publishing Company, USA ,1991 3. B.Ram ; Computer Fundamentals Architecture and Organization ; New Age International (P) Ltd., Publishers @2000, Third Edition 4. Horn, Delton T. ; Electronic Components A Complete Reference For Project Builders ; McGraw-Hill/Tab Electronics @1991 5. E Balagurusamy ; Programming In ANSI C ; Tata McGraw-Hill Publishing Company Ltd@2008,Fourth Edition REFERENCES ON THE WEB http://www.google.com http://books.google.com http://www.atmel.com http://www.8051projects.net http://www.ijens.org