You are on page 1of 4

ISSN 2319-8885

Vol.06,Issue.11
March-2017,
Pages:2108-2111
www.ijsetr.com

ARM-7 Based GSM Control of Home Lighting Devices with RFID


Identification and Current Detection of Outlets
K. SRAVAN KUMAR1, M. SUMAN KUMAR2, B. KEDARNATH3, DR. M. NARENDRA KUMAR4
1
PG Scholar, Dept of ECE, Guru Nanak Institute of Technology, Hyderabad, TS, India,Email: Shravankumar8511@gmail.com.
2
Assoc Prof, Dept of ECE, Guru Nanak Institute of Technology, Hyderabad, TS, India, Email: sumankumar.gnit@gmail.com.
3
HOD, Dept of ECE, Guru Nanak Institute of Technology, Hyderabad, TS, India, Email: Hodece.gnit@gniindia.org.
4
Vice Principal, Guru Nanak Institute of Technology, Hyderabad, TS, India, Email: narendrakumar_maddargi@yahoo.com.

Abstract: This paper presents a GSM control for home devices with radio-frequency identification and current detection of
outlets. This system is composed of ARM-7 based microcontroller, radio-frequency identification, solid state relays (SSR),
current transformer and Bluetooth module. The application software module will know the operation of the lighting device that
when plugged in the outlet causes an overload or short circuit, thus achieving an early warning and protection effect. The ARM
Software Development Toolkit (SDT) consists of a suite of applications together with supporting documentation and example
that enable you to write and debug applications for the ARM family of RISC processors. The MDK Core includes all the
components that you need to create build and debug an embedded application for Core-M processor based microcontroller
devices. The Pack Installer manages Software middleware updates independent from the tool chain. Each addition includes the
microVision IDE, debugger, compiler, assembler, linker, middleware libraries and the RTX RTOS.

Keywords: ARM-7, MDK, RTX RTOS, RFID, GSM, Bluetooth & House Hold Control.

I. INTRODUCTION communicator. There it can give the information about


The smart devices applications have been increased the all enable lightings information of the home. If mobile
from fast few years, but in fact it is not implemented and user identify any wrong outlet is in ON position or
used for a common house lighting systems. When we required one in FALSE potion; the user can directly
discuss the theme of lighting devices, there are many control the devices with proper authentication.
papers proposing various methods to control a variety of
LED, incandescent lights and fluorescent bulbs, but the II. HARDWARE DESIGN
majority relies on user identification of the light bulbs and The system is composed with the sensing systems, so
then finds various methods to control them. Radio- that sensed information is processed to Micro Controller
frequency identification (RFID) application is widely with analog to digital converters. Where, the current
used. In some applications, the RFID tag is put on the transformer is processed with required amount of power.
user's body and several active readers are placed in Based on the current transformer input the micro
different corners of the room. They get some received controller takes the initiative actions on the outlets with
signal strength indicator (RSSI) value which can judge the the help of stored programs within it (flash memory). The
user’s relative position in the room [1]. Based on the microcontroller has 4 main functions. The first function is
room requirement of light the RF ID number is design, to collect the information from RFID with is placed
where RFID number is unique. So, active receivers different corners of the room. The second function is
receive the node (RFID) number and process to the collecting the information of ADC; identify the difference
system to relive the corresponding amount of power based amount of power by using estimation with the current
on the tag ID. Here the tags are allocated based on the transformer. Therefore it can check the bulb is properly
intensity of light. When particular tag is activated the placed or not. Third function is to turn on the blue tooth
embedded programming’s enable the corresponding and send the information of present status of the switches
switch of light out of all others. For example the living (bulbs) and its power consumption. The fourth function is
room and rest room lighting requirement is different so to control the devices from the over load protection. Here
that two different tags are required in these application. any sudden flow of current to the device; the Micro
Based on the tag ID the RF Receiver can identify the controller can identify and immediately stop the power
room and process the light of the particular room. The supply these particular device.
user mobile blue tooth connected to the nearby blue tooth

Copyright @ 2017 IJSETR. All rights reserved.


K. SRAVAN KUMAR, M. SUMAN KUMAR, B. KEDARNATH, DR. M. NARENDRA KUMAR
and challenge-response, and over-the-air encryption.
However, GSM is vulnerable to different class of attacks,
each of them aiming a different part of the network.

Fig 1. Block diagram. Fig 2. GSM Module.

III. METHODOLOGY E. RFID: Radio Frequency Identification (RFID) is a


A. Micro controller: This section forms the control unit silicon chip-based transponder that communicates via
of the whole project. This section basically consists of a radio waves. Radio Frequency Identification is a
Microcontroller with its associated circuitry like Crystal technology which uses tags as a component in an
with capacitors, Reset circuitry, Pull up resistors (if integrated supply chain solution set that will evolve over
needed) and so on. The Microcontroller forms the heart of the next several years. RFID tags contain a chip which
the project because it controls the devices being interfaced holds an electronic product code (EPC) number that
and communicates with the devices according to the points to additional data detailing the contents of the
program being written. package. Readers identify the EPC numbers at a
B. ARM7TDMI: ARM is the abbreviation of Advanced distance, without line-of-sight scanning or involving
RISC Machines, it is the name of a class of processors, physical contact.
and is the name of a kind technology too. The RISC
instruction set, and related decode mechanism are much
simpler than those of Complex Instruction Set Computer
(CISC) designs.
C. Liquid-crystal display (LCD) is a flat panel display,
electronic visual display that uses the light modulation
properties of liquid crystals. Liquid crystals do not emit
light directly. LCDs are available to display arbitrary
images or fixed images which can be displayed or hidden,
such as preset words, digits, and 7-segment displays as in
a digital clock. Fig 3. RFID Reader.
D. GSM:Global System for Mobile Communication
(GSM) is a set of ETSI standards specifying the Middleware can perform initial filtering on data from
infrastructure for a digital cellular service. the readers. Applications are evolving to comply with
shipping products to automatically processing
The network is structured into a number of discrete transactions based on RFID technology RFID Reader
sections: Module, are also called as interrogators. They convert
 Base Station Subsystem – the base stations and their radio waves returned from the RFID tag into a form that
controllers explained. can be passed on to Controllers, which can make use of it.
 Network and Switching Subsystem – the part of the RFID tags and readers have to be tuned to the same
network most similar to a fixed network, sometimes frequency in order to communicate. RFID systems use
just called the "core network". many different frequencies, but the most common and
 GPRS Core Network – the optional part which allows widely used & supported by our Reader is 125 KHz.
packet-based Internet connections.
 Operations support system (OSS) – network Tags are classified into two types based on operating
maintenance. power supply fed to it.
SM was intended to be a secure wireless system. It has 1. Active Tags
considered the user authentication using a pre-shared key 2. Passive Tags
International Journal of Scientific Engineering and Technology Research
Volume.06, IssueNo.11, March-2017, Pages: 2108-2111
ARM-7 Based GSM Control of Home Lighting Devices with RFID Identification and Current Detection of Outlets
Active Tags: These tags have integrated batteries for one master and seven slaves. The concept of Master and
powering the chip. Active Tags are powered by batteries Slave is used in the Bluetooth technology. Only after the
and either have to be recharged, have their batteries master takes the initial action, the devices can begin to
replaced or be disposed of when the batteries fail. talk. Bluetooth GloballD is exchanged among the
electronic devices and a connection is build up after the
Passive Tags: Passive tags are the tags that do not have profiles are matched. Get in-depth of Bluetooth Protocol
batteries and have indefinite life expectancies. Stack here. Frequency hopping is used in the Bluetooth
technology to avoid interfering with other signals. After
the packet is transmitted or received, the Bluetooth signal
hops to a new frequency. Each packet can cover five time
slots. The Bluetooth technology supports asynchronous
data channel, or 3 simultaneous synchronous voice
channels, or a channel which supports asynchronous data
and synchronous voice.

Fig 4. Different types of tags.

F. Bluetooth: Bluetooth is a wireless technology used to


Fig 5. Bluetooth Module.
transfer data between different electronic devices. The
distance of data transmission is small in comparison to IV. SYSTEM SOFTWARE
other modes of wireless communication. This technology The system first detects the RFID tag when it is
eradicates the use of cords, cables, adapters and permits plugged in. otherwise it treat that outlet has no power
the electronic devices to communicate wirelessly among supply. Whenever power is available RFID communicates
each other. to the Micro Controller Unit (MCU) then microcontroller
The key features of Bluetooth technology: lighting the devices based on the demand. When device is
 Less complication. ON then the system start counts the power consumption
 Less power consumption. into account. In case of power off the system stops the
 Available at cheaper rates. power consumption go the initial state and again start
 Robustness. from recognition of RFID tag.

Bluetooth technology was discovered to have wireless V. RESULTS OF EXPERMENT


protocols to connect several electronic devices and as a With the comparison of the other systems this system
solution to synchronize the data. The Bluetooth standard gives the complete picture of the power consumption and
is maintained by the Bluetooth Special Interest Group. At its time consumed by the particular devices. It also
the physical layer, the Bluetooth RF transceiver is provides the information about the devices or outlets
positioned. At around 79 Bluetooth channels are placed based on the time. It is possible with the interaction of
with a space of 1MHz. Transmission of data and voice are RTC.
achievable at short distances and thereby creating Android Software Display
Wireless PANs. LED BULB On/Off
A Bluetooth device is comprised of an adapter. A Fluorescent BULB On/Off
Bluetooth adapter can be available in the form of a card to
connect the device or integrated into an electronic device. Incandescent BULB On/Off
Link Management Protocol (LMP) is responsible for peer
– to – peer message exchange when the electronic devices VI. CONCLUSTION
interfere in each other’s radio range. This layer creates the Now a day’s smart home lighting system is very
link and negotiation of packet size. If required this layer popular. In fact it is connected to the smart phone. But, in
can perform the segmentation and reassembling of the this the lighting device information is connected to smart
packets. The Bluetooth device enabled by the Service phone with blue tooth commutation and as well controlled
delivery protocol joins the piconet and enquires with all with RFID tag, which is most efficient power
the services available. A piconet has a star topology with consumption method.
International Journal of Scientific Engineering and Technology Research
Volume.06, IssueNo.10, March-2017, Pages: 2108-2111
K. SRAVAN KUMAR, M. SUMAN KUMAR, B. KEDARNATH, DR. M. NARENDRA KUMAR
VII. REFERENCES
[1] Zi-Ning Zhen, Qing-Shan Jia, Chen Song and
Xiaohong Guan, “AnIndoor Localization Algorithm for
Lighting Control using RFID,” IEEE Energy 2030
Conference, ENERGY 2008. Atlanta, GA, pp. 1-6, Nov.
2008.
[2] Kun-Ying Lin, Ming-Wei Hsu and Shi-Rung Liou,
“Bicycle management systems in anti-theft, certification,
and race by using RFID,” Cross Strait Quad-Regional
Radio Science and Wireless Technology Conference
(CSQRWC), 2011. Harbin, pp. 1054-1057, July 2011.
[3] F. Manzoor, D. Linton and M. Loughlin, “Occupancy
Monitoring Using Passive RFID Technology for Efficient
Building Lighting Control,” 2012 Fourth International
EURASIP Workshop on RFID Technology (EURASIP
RFID), Torino, pp. 83-88, Sept. 2012.
[4] Chia-Hung Lien, Jen-Chieh Lin and Ying-Wen Bai,
“Design and implementation of a remotely controllable
UPS outlet system,” IEEE International Symposium on
Consumer Electronics, 2008. ISCE 2008, pp. 1-4, Nov.
2008.
[5] Guangming Song, Fei Ding, Weijuan Zhang and
Aiguo Song, “A wireless power outlet system for smart
homes,” IEEE Transactions on Consumer Electronics,
vol. 54, no.4, pp. 1688-1691, Nov. 2008.

International Journal of Scientific Engineering and Technology Research


Volume.06, IssueNo.11, March-2017, Pages: 2108-2111

You might also like