Professional Documents
Culture Documents
CHAPTER 1
INTRODUCTION
1.1 INTRODUCTION
The overview of this project is to design GSM based ATM SECURITY system
using AT89S52.
1.3 METHODOLOGY
The Project ‘Atm security system using gsm module ’ is designed using GSM
technology. According to this technology the communication takes place between
GSM and microcontroller.
1.4. SIGNIFICANCE
This System stops any sort of robbery by taking GSM as its input functional
bock. It’s the GSM that is activating the total project by receiving the message from
the mobile number stored in the card. Once the micro controller is activated the
following sequence is started which involves entering of correct password once again
which is the CARD password for the further transaction to be continued.
S.R.T.I.S.T 1
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 2
ATM SECURITY
USING GSM AND MEMS
. The input to the circuit is applied from the regulated power supply. The a.c. input
i.e., 230V from the mains supply is step down by the transformer to 12V and is fed to
a rectifier. The output obtained from the rectifier is a pulsating d.c voltage. So in order
to get a pure d.c voltage, the output voltage from the rectifier is fed to a filter to
remove any a.c components present even after rectification. Now, this voltage is given
to a voltage regulator to obtain a pure constant dc voltage.
Transformer:
Usually, DC voltages are required to operate various electronic equipment and
these voltages are 5V, 9V or 12V. But these voltages cannot be obtained directly.
Thus the a.c input available at the mains supply i.e., 230V is to be brought down to
the required voltage level. This is done by a transformer. Thus, a step down
transformer is employed to decrease the voltage to a required level.
Rectifier:
The output from the transformer is fed to the rectifier. It converts A.C. into
pulsating D.C. The rectifier may be a half wave or a full wave rectifier. In this project,
a bridge rectifier is used because of its merits like good stability and full wave
rectification.
Filter:
Capacitive filter is used in this project. It removes the ripples from the output
of rectifier and smoothens the D.C. Output received from this filter is constant until
the mains voltage and load is maintained constant. However, if either of the two is
S.R.T.I.S.T 3
ATM SECURITY
USING GSM AND MEMS
varied, D.C. voltage received at this point changes. Therefore a regulator is applied at
the output stage.
Voltage regulator:
As the name itself implies, it regulates the input applied to it. A voltage
regulator is an electrical regulator designed to automatically maintain a constant
voltage level. In this project, power supply of 5V and 12V are required. In order to
obtain these voltage levels, 7805 and 7812 voltage regulators are to be used. The first
number 78 represents positive supply and the numbers 05, 12 represent the required
output voltage levels.
The Intel 8051 is Harvard architecture, single chip microcontroller (µC) which was
developed by Intel in 1980 for use in embedded systems. It was popular in the 1980s
and early 1990s, but today it has largely been superseded by a vast range of enhanced
devices with 8051-compatible processor cores that are manufactured by more than 20
independent manufacturers including Atmel, Infineon Technologies and Maxim
Integrated Products.
8051 is an 8-bit processor, meaning that the CPU can work on only 8 bits of data at a
time. Data larger than 8 bits has to be broken into 8-bit pieces to be processed by the
CPU. 8051 is available in different memory types such as UV-EPROM, Flash and
NV-RAM
S.R.T.I.S.T 4
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 5
ATM SECURITY
USING GSM AND MEMS
CHAPTER 2
LITERATURE REVIEW
2.1 INTRODUCTION TO EMBEDDED SYSTEMS
An embedded system can be defined as a computing device that does a specific
focused job. Appliances such as the air-conditioner, VCD player, DVD player,
printer, fax machine, mobile phone etc. are examples of embedded systems. Each of
these appliances will have a processor and special hardware to meet the specific
requirement of the application along with the embedded software that is executed by
the processor for meeting that specific requirement.
The embedded software is also called “firm ware”. The desktop/laptop computer
is a general purpose computer. You can use it for a variety of applications such as
playing games, word processing, accounting, software development and so on.
In contrast, the software in the embedded systems is always fixed listed below:
· Embedded systems do a very specific task, they cannot be programmed to do
different things. . Embedded systems have very limited resources, particularly the
memory. Generally, they do not have secondary storage devices such as the CDROM
or the floppy disk. Embedded systems have to work against some deadlines. A
specific job has to be completed within a specific time. In some embedded systems,
called real-time systems, the deadlines are stringent. Missing a deadline may cause a
catastrophe-loss of life or damage to property. Embedded systems are constrained for
power. As many embedded systems operate through a battery, the power consumption
has to be very low.
· Some embedded systems have to operate in extreme environmental conditions such
as very high temperatures and humidity.
S.R.T.I.S.T 6
ATM SECURITY
USING GSM AND MEMS
1. They are designed to do a specific task and have real time performance
constraints which must be met.
2. They allow the system hardware to be simplified so costs are reduced.
3. They are usually in the form of small computerized parts in larger devices
which serve a general purpose.
4. The program instructions for embedded systems run with limited computer
hardware resources, little memory and small or even non-existent keyboard or
screen.
The concept of cellular service is the use of low power transmitters where frequencies
can be reused within a geographic area. The idea of cell based mobile radio service
was formulated in the United States at Bell Labs in the early 1970s. Cellular systems
began in the United States with the release of the advanced mobile phone service
(AMPS) system in 1983. The AMPS standard was adopted by Asia, Latin America
and Oceanic countries, creating the largest potential market in the world for cellular.
In the early 1980s, most mobile telephone systems were analog rather than digital,
like today's newer systems. One challenge facing analog systems was the inability to
handle the growing capacity needs in a cost efficient manner. As a result, digital
technology was welcomed.
The advantages of digital systems over analog systems include ease of signaling,
lower levels of interference, integration of transmission and switching and increased
ability to meet capacity demands. The table below shows the worldwide development
of mobile telephone systems.
S.R.T.I.S.T 7
ATM SECURITY
USING GSM AND MEMS
• Office automation
• Industrial automation:
• Medical electronics.
• Telecommunications
• Wireless technologies
• Security& finance
Calculators
Laser Printer
Security Systems
Musical Instruments
Medical Equipment's
Automatic Teller Machines (ATMs)
Cellular telephones and telephone switches
S.R.T.I.S.T 8
ATM SECURITY
USING GSM AND MEMS
2.3 MICROCONTROLLER
A Micro controller consists of a powerful CPU tightly coupled with memory
RAM, ROM or EPROM), various I / O features such as Serial ports, Parallel Ports,
Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital
Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a
single Silicon Chip.
It does not mean that any micro controller should have all the above said
features on chip, Depending on the need and area of application for which it is
designed, the ON-CHIP features present in it may or may not include all the
individual section said above.
Any microcomputer system requires memory to store a sequence of
instructions making up a program, parallel port or serial port for communicating with
an external system, timer / counter for control purposes like generating time delays,
Baud rate for the serial port, apart from the controlling unit called the Central
Processing Unit.
S.R.T.I.S.T 9
ATM SECURITY
USING GSM AND MEMS
2.4 ADVANTAGES
If a system is developed with a microprocessor, the designer has to go for
external memory such as RAM, ROM or EPROM and peripherals and hence the size
of the PCB will be large enough to hold all the required peripherals. But, the micro
controller has got all these peripheral facilities on a single chip so development of a
similar system with a micro controller reduces PCB size and cost of the design.
One of the major differences between a micro controller and a microprocessor
is that a controller often deals with bits , not bytes as in the real world application, for
example switch contacts can only be open or close, indicators should be lit or dark
and motors can be either turned on or off and so forth
2.6 SOLUTION
If we introduce the project then it would be easy to stop the thief without
drawing money from the ATM though he knew the password. As the thief inserts the
ATM into the machine, the GSM is activated. This gives signal to the microcontroller
to wait until it the GSM module receives the code from the pre defined user number
2.7 DESCRIPTION
In this project, the GSM module is placed in the upper or lower panel of the
atm machine, when a thief inserts the ATM card into the machine or swipes the card,
a message is sent to the predefined mobile number and makes the controller to wait
until the password message is received from that number before the transaction timed
out. When the message is received to GSM module, it verifies the password. If the
S.R.T.I.S.T 10
ATM SECURITY
USING GSM AND MEMS
As the microcontroller is activated it then has to start a sequence which verifies the
CHAPTER 3
AT89S52 MICROCONTROLLER
3.1 AT89S52
3.1.1 A BRIEF HISTORY OF 8051
In 1981, Intel corporation introduced an 8 bit microcontroller called 8051. this
microcontroller had 128 bytes of RAM, 4K bytes of chip ROM, two timers, one serial
port, and four ports all on a single chip. At the time it was also referred as “ A
SYSTEM ON A CHIP”
The 8051 is an 8-bit processor meaning that the CPU can work only on 8 bits
data at a time. Data larger than 8 bits has to be broken into 8 bits pieces to be
processed by the CPU. The 8051 has a total of four I\O ports each 8 bit wide.
There are many versions of 8051 with different speeds and amount of on-chip
ROM and they are all compatible with the original 8051. this means that if you write a
program for one it will run on any of them.
The 8051 is an original member of the 8051 family. There are two other
members in the 8051 family of microcontrollers. They are 8052 and 8031. All the
three
microcontrollers will have the same internal architecture, but they differ in the
following
aspects.
8031 has 128 bytes of RAM, two timers and 6 interrupts.
interrupts.
interrupts.
S.R.T.I.S.T 11
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 12
ATM SECURITY
USING GSM AND MEMS
3.4 FEATURES
Compatible with MCS-51® Products
• 8K Bytes of In-System Programmable (ISP) Flash Memory
– Endurance: 1000 Write/Erase Cycles
• 4.0V to 5.5V Operating Range
• Fully Static Operation: 0 Hz to 33 MHz
• Three-level Program Memory Lock
• 256 x 8-bit Internal RAM
• 32 Programmable I/O Lines
• Three 16-bit Timer/Counters
• Eight Interrupt Sources
• Full Duplex UART Serial Channel
• Low-power Idle and Power-down Modes
S.R.T.I.S.T 13
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 14
ATM SECURITY
USING GSM AND MEMS
Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can
sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high
impedance inputs. Port 0 can also be configured to be the multiplexed low-order
address/data bus during accesses to external program and data memory. In this mode,
P0 has internal pull-ups. Port 0 also receives the code bytes during Flash
programming and outputs the code bytes during Program verification. External pull-
ups are required during program verification
Port 1
S.R.T.I.S.T 15
ATM SECURITY
USING GSM AND MEMS
Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output
buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they
are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port
1 pins that are externally being pulled low will source current (IIL) because of the
internal pull-ups. In addition, P1.0 and P1.1 can be configured to be the
timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger
input (P1.1/T2EX), respectively, as shown in the following table. Port 1 also
receives the low-order address bytes during Flash programming and verification.
Port 2
Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output
buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they
are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port
2 pins that are externally being pulled low will source current (IIL) because of the
internal pull-ups.
Port 2 emits the high-order address byte during fetches from external program
memory and during accesses to external data memory that uses 16-bit addresses
(MOVX @ DPTR). In this application, Port 2 uses strong internal pull-ups when
emitting 1s. During accesses to external data memory that uses 8-bit addresses
(MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. The
port also receives the high-order address bits and some control signals during Flash
programming and verification
Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pullups. The Port 3
S.R.T.I.S.T 16
ATM SECURITY
USING GSM AND MEMS
output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins,
they are pulled high by the internal pullups and can be used as inputs. As inputs,
Port 3 pins that are externally being pulled low will source current (IIL) because of
the pullups. Port 3 also serves the functions of various special features of the
AT89C51, as shown in the following table.
Port 3 also receives some control signals for Flash pro- gramming and verification.
RST
A high on this pin for two machine cycles while the oscillator is running resets
the device. This pin drives high for 98 oscillator periods after the Watchdog times out.
The DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In
the default state of bit DISRTO, the RESET HIGH out feature is enabled
ALE/PROG
Address Latch Enable is an output pulse for latching the low byte of the
address during accesses to external mem- ory. This pin is also the program pulse
input (PROG) during Flash programming.
In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator
frequency and may be used for external timing or clocking Note, however, that
one ALE pulse is skipped during each access to external data memory. If
desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the
bit set, ALE is active only dur-ing a MOVX or MOVC instruction. Otherwise, the
S.R.T.I.S.T 17
ATM SECURITY
USING GSM AND MEMS
pin is weakly pulled high. Setting the ALE-disable bit has no effect if the
microcontroller is in external execution mode.
S.R.T.I.S.T 18
ATM SECURITY
USING GSM AND MEMS
3.7 MEMORIES
3.7.1 Types of memory:
The 8052 have three general types of memory. They are on-chip memory,
external Code memory and external Ram. On-Chip memory refers to physically
existing memory on the micro controller itself. External code memory is the code
memory that resides off chip. This is often in the form of an external EPROM.
External RAM is the Ram that resides off chip. This often is in the form of standard
static RAM or flash RAM.
a) Code memory
Code memory is the memory that holds the actual 8052 programs that is to be
run. This memory is limited to 64K. Code memory may be found on-chip or off-chip.
It is possible to have 8K of code memory on-chip and 60K off chip memory
simultaneously. If only off-chip memory is available then there can be 64K of off chip
ROM. This is controlled by pin provided as EA
b) Internal RAM
S.R.T.I.S.T 19
ATM SECURITY
USING GSM AND MEMS
The 8052 have a bank of 256 bytes of internal RAM. The internal RAM is
found on-chip. So it is the fastest Ram available. And also it is most flexible in terms
of reading and writing. Internal Ram is volatile, so when 8051 is reset, this memory is
cleared. 256 bytes of internal memory are subdivided. The first 32 bytes are divided
into 4 register banks. Each bank contains 8 registers. Internal RAM also contains 256
bits, which are addressed from 20h to 2Fh. These bits are bit addressed i.e. each
individual bit of a byte can be addressed by the user. They are numbered 00h to FFh.
The user may make use of these variables with commands such as SETB and CLR.
Special Function registered memory:
Special function registers are the areas of memory that control specific
functionality of the 8052 micro controller.
a) Accumulator (0E0h)
As its name suggests, it is used to accumulate the results of large no of
instructions. It can hold 8 bit values.
b) B registers (0F0h)
The B register is very similar to accumulator. It may hold 8-bit value. The b
register is only used by MUL AB and DIV AB instructions. In MUL AB the higher
byte of the product gets stored in B register. In div AB the quotient gets stored in B
with the remainder in A.
c) Stack pointer (81h)
The stack pointer holds 8-bit value. This is used to indicate where the next
value to be removed from the stack should be taken from. When a value is to be
pushed onto the stack, the 8052 first store the value of SP and then store the value at
the resulting memory location
d) Data pointer
The SFRs DPL and DPH work together work together to represent a 16-bit
value called the data pointer. It is a 16-bit SFR and also an addressable SFR.
e) Program counter
The program counter is a 16 bit register, which contains the 2 byte address,
which tells the 8052 where the next instruction to execute to be found in memory.
And is incremented each time an instruction is executes. It is not addressable SFR.
S.R.T.I.S.T 20
ATM SECURITY
USING GSM AND MEMS
The power control SFR is used to control the 8051’s power control modes.
Certain operation modes of the 8051 allow the 8051 to go into a type of “sleep
mode” which consumes much lee power.
S.R.T.I.S.T 21
ATM SECURITY
USING GSM AND MEMS
This is port 0 latch. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register. For
e.g., bit 0 of port 0 is pin P0.0, bit 7 is pin p0.7. Writing a value of 1 to a bit of this
SFR will send a high level on the corresponding I/O pin whereas a value of 0 will
bring it to low level.
l) P1 (port 1, address 90h, bit addressable)
This is port latch1. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register. For
e.g., bit 0 of port 0 is pin P1.0, bit 7 is pin P1.7. Writing a value of 1 to a bit of this
SFR will send a high level on the corresponding I/O pin whereas a value of 0 will
bring it to low level
m) P2 (port 2, address 0A0h, bit addressable):
This is a port latch2. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register. For
e.g., bit 0 of port 0 is pin P2.0, bit 7 is pin P2.7. Writing a value of 1 to a bit of this
SFR will send a high level on the corresponding I/O pin whereas a value of 0 will
bring it to low level.
n) P3 (port 3, address B0h, bit addressable) :
This is a port latch3. Each bit of this SFR corresponds to one of the pins on a
micro controller. Any data to be outputted to port 0 is first written on P0 register. For
e.g., bit 0 of port 0 is pin P3.0, bit 7 is pin P3.7. Writing a value of 1 to a bit of this
SFR will send a high level on the corresponding I/O pin whereas a value of 0 will
bring it to low level.
o) IE (interrupt enable, 0A8h):
The Interrupt Enable SFR is used to enable and disable specific interrupts. The
low 7 bits of the SFR are used to enable/disable the specific interrupts, where the
MSB bit is used to enable or disable all the interrupts. Thus, if the high bit of IE is 0
all interrupts are disabled regardless of whether an individual interrupt is enabled by
setting a lower bit.
S.R.T.I.S.T 22
ATM SECURITY
USING GSM AND MEMS
PORT 0
S.R.T.I.S.T 23
ATM SECURITY
USING GSM AND MEMS
Port 0 pins may serve as inputs, outputs, or, when used together, as a bi
directional low-order address and data bus for external memory. When used for
interfacing with the external memory, the lower byte of address is first sent via
PORT0, latched using Address latch enable (ALE) pulse and then the bus is turned
around to become the data bus for external memory.
PORT 1
Port 1 is exclusively used for input/output operations. PORTS 1 pin have no
dual function. When a pin is to be configured as input, 1 is to be written into the
corresponding Port 1 latch.
PORT 2
Port 2 maybe used as an input/output port. It may also be used to supply a
high –order address byte in conjunction with Port 0 low-order byte to address external
memory.. Port 2 latches remain stable when external memory is addressed, as they do
not have to be turned around (set to 1) for data input as in the case for Port 0.
PORT 3
Port 3 may be used to input /output port. The input and output functions can be
programmed under the control of the P3 latches or under the control of various special
function registers. Unlike Port 0 and Port 2, which can have external addressing
functions and change all eight-port b se, each pin of port 3 maybe individually
programmed to be used as I/O or as one of the alternate functions.
Pin (SFR) Alternate Use
P3.0-RXD (SBUF) Serial data input
P3.1-TXD (SBUF) Serial data output
3.8 P3.2-INTO 0 (TCON.1) External interrupt 0
P3.3 - INTO 1 (TCON.3) External interrupt 1
P3.4 - T0 (TMOD) External Timer 0 input
P3.5 – T1 (TMOD) External timer 1 input
P3.6 - WR External memory write pulse
P3.7 - RD External memory read pulse
INTERRUPTS:
The AT89S52 has a total of six interrupt vectors: two external interrupts
(INT0 and INT1), three timer interrupts (Timers0, 1, and 2), and the serial port
S.R.T.I.S.T 24
ATM SECURITY
USING GSM AND MEMS
interrupt. These interrupts are all shown in Figure 10. Each of these interrupt sources
can be individually enabled or disabled by setting or clearing a bit in Special Function
Register IE. IE also contains a global disable bit, EA, which disables all interrupts at
once. Note that Table 5 shows that bit position IE.6 is unimplemented. In the
AT89S52, bit position IE.5 is also unimplemented.Timer 2 interrupt is generated by
the logical OR of bits TF2 and EXF2 in register T2CON. Neither of these flags is
cleared by hardware when the service routine is vectored to. In fact, the service
routine may have to determine whether it was TF2 or EXF2 that generated the
interrupt, and that bit will have to be cleared in software.The Timer 0 and Timer 1
flags, TF0 and TF1, are set at S5P2 of the cycle in which the timers overflow. The
values are then polled by the circuitry in the next cycle. However, the Timer 2 flag,
TF2, is set at S2P2 and is polled in the same cycle in which the timer overflows
S.R.T.I.S.T 25
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 26
.
ATM SECURITY
USING GSM AND MEMS
CHAPTER 4
ADC 0804
4.1 Introduction
S.R.T.I.S.T 27
ATM SECURITY
USING GSM AND MEMS
1. Resolution 8 Bits
2. Total Unadjusted Error ±1/2 LSB and ±1 LSB
3. Single Supply 5 VDC
4. Low Power 15 mW
5. Conversion Time 100 µs
S.R.T.I.S.T 28
ATM SECURITY
USING GSM AND MEMS
Digital-Ramp ADC
Successive Approximation ADC
Flash ADC
S.R.T.I.S.T 29
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 30
ATM SECURITY
USING GSM AND MEMS
Illustrated is a 3-bit flash ADC with resolution 1 volt (after Tocci). The
resistor net and comparators provide an input to the combinational logic circuit, so the
conversion time is just the propagation delay through the network - it is not limited by
the clock rate or some convergence sequence. It is the fastest type of ADC available,
but requires a comparator for each value of output (63 for 6-bit, 255 for 8-bit, etc.)
Such ADCs are available in IC form up to 8-bit and 10-bit flash ADCs (1023
comparators) are planned. The encoder logic executes a truth table to convert the
S.R.T.I.S.T 31
ATM SECURITY
USING GSM AND MEMS
CHAPTER 5
GSM (Global System for Mobile communications)
5.1 Introduction
S.R.T.I.S.T 32
ATM SECURITY
USING GSM AND MEMS
the same timeslot. The channel data rate is 270.833 kbit/s, and the frame duration is
4.615 ms.
S.R.T.I.S.T 33
ATM SECURITY
USING GSM AND MEMS
The switching system (SS) is responsible for performing call processing and
subscriber-related functions. The switching system includes the following functional
units.
Home location register (HLR): The HLR is a database used for storage and
management of subscriptions. The HLR is considered the most important
database, as it stores permanent data about subscribers, including a
subscriber's service profile, location information, and activity status. When an
S.R.T.I.S.T 34
ATM SECURITY
USING GSM AND MEMS
Mobile services switching center (MSC): The MSC performs the telephony
switching functions of the system. It controls calls to and from other telephone
and data systems. It also performs such functions as toll ticketing, network
interfacing, common channel signaling, and others.
All radio-related functions are performed in the BSS, which consists of base
station controllers (BSCs) and the base transceiver stations (BTSs).
BSC: The BSC provides all the control functions and physical links between
the MSC and BTS. It is a high-capacity switch that provides functions such as
handover, cell configuration data, and control of radio frequency (RF) power
levels in base transceiver stations. A number of BSCs are served by an MSC.
S.R.T.I.S.T 35
ATM SECURITY
USING GSM AND MEMS
BTS: The BTS handles the radio interface to the mobile station. The BTS is
the radio equipment (transceivers and antennas) needed to service each cell in
the network. A group of BTSs are controlled by a BSC.
Message center (MXE): The MXE is a node that provides integrated voice,
fax, and data messaging. Specifically, the MXE handles short message service,
cell broadcast, voice mail, fax mail, e-mail, and notification.
Mobile service node (MSN): The MSN is the node that handles the mobile
intelligent network (IN) services.
S.R.T.I.S.T 36
ATM SECURITY
USING GSM AND MEMS
The GSM network is made up of geographic areas. As shown in bellow figure, these
areas include cells, location areas (LAs), MSC/VLR service areas, and public land
mobile network (PLMN) areas.
The cell is the area given radio coverage by one base transceiver station. The GSM
network identifies each cell via the cell global identity (CGI) number assigned to each
cell. The location area is a group of cells. It is the area in which the subscriber is
paged. Each LA is served by one or more base station controllers, yet only by a single
MSC Each LA is assigned a location area identity (LAI) number.
An MSC/VLR service area represents the part of the GSM network that is covered by
one MSC and which is reachable, as it is registered in the VLR of the MSC.
S.R.T.I.S.T 37
ATM SECURITY
USING GSM AND MEMS
Frequency band: The frequency range specified for GSM is 1,850 to 1,990
MHz (mobile station to base station).
Access method: GSM utilizes the time division multiple access (TDMA)
concept. TDMA is a technique in which several different calls may share the
same carrier. Each call is assigned a particular time slot.
Speech coder: GSM uses linear predictive coding (LPC). The purpose of
LPC is to reduce the bit rate. The LPC provides parameters for a filter that
mimics the vocal tract. The signal passes through this filter, leaving behind a
residual signal. Speech is encoded at 13 kbps.
S.R.T.I.S.T 38
ATM SECURITY
USING GSM AND MEMS
Short message services: A convenient facility of the GSM network is the short
message service. A message consisting of a maximum of 160 alphanumeric characters
can be sent to or from a mobile station. This service can be viewed as an advanced
form of alphanumeric paging with a number of advantages. If the subscriber's mobile
unit is powered off or has left the coverage area, the message is stored and offered
back to the subscriber when the mobile is powered on or has reentered the coverage
area of the network. This function ensures that the message will be received.
Cell broadcast: A variation of the short message service is the cell broadcast facility.
A message of a maximum of 93 characters can be broadcast to all mobile subscribers
in a certain geographic area. Typical applications include traffic congestion warnings
and reports on accidents.
Voice mail: This service is actually an answering machine within the network, which
is controlled by the subscriber. Calls can be forwarded to the subscriber's voice-mail
box and the subscriber checks for messages via a personal security code.
Fax mail: With this service, the subscriber can receive fax messages at any fax
machine. The messages are stored in a service center from which they can be
retrieved by the subscriber via a personal security code to the desired fax number
Supplementary Services:
Call forwarding: This service gives the subscriber the ability to forward incoming
calls to another number if the called mobile unit is not reachable, if it is busy, if there
is no reply, or if call forwarding is allowed unconditionally.
Barring of outgoing calls: This service makes it possible for a mobile subscriber to
prevent all outgoing calls.
Barring of incoming calls: This function allows the subscriber to prevent incoming
calls. The following two conditions for incoming call barring exist: baring of all
incoming calls and barring of incoming calls when roaming outside the home PLMN.
Advice of charge (AoC): The AoC service provides the mobile subscriber with an
estimate of the call charges. There are two types of AoC information: one that
S.R.T.I.S.T 39
ATM SECURITY
USING GSM AND MEMS
provides the subscriber with an estimate of the bill and one that can be used for
immediate charging purposes. AoC for data calls is provided on the basis of time
measurements.
Call hold: This service enables the subscriber to interrupt an ongoing call and then
subsequently reestablish the call. The call hold service is only applicable to normal
telephony.
Closed user groups (CUGs): CUGs are generally comparable to a PBX. They are a
group of subscribers who are capable of only calling themselves and certain numbers
S.R.T.I.S.T 40
ATM SECURITY
USING GSM AND MEMS
CHAPTER 6
MAX 232
6.1 INTRODUCTION
Computers can transfer data in two ways: parallel and serial. In parallel data
transfers, often 8 or more lines (wire conductors) are used to transfer data to a device
that is only a few feet away. Examples of parallel data transfer are printers and hard
disks; each uses cables with many wire strips. Although in such cases a lot of data
can be transferred in a short amount of time by using many wires in parallel, the
distance cannot be great. To transfer to a device located many meters away, the serial
method is used. In serial communication, the data is sent one bit at a time, in contrast
to parallel communication, in which the data is sent a byte or more at a time. Serial
communication of the 8051 is the topic of this chapter.
S.R.T.I.S.T 41
ATM SECURITY
USING GSM AND MEMS
The 8051 has serial communication capability built into it, there by making
possible fast data transfer using only a few wires.
The data coming in at the receiving end of the data line in a serial data
transfer is all 0s and 1s; it is difficult to make sense of the data unless the sender and
receiver agree on a set of rules, a protocol, on how the data is packed, how many bits
constitute a character, and when the data begins and endsbits. This is called framing.
In the data framing for asynchronous communications, the data, such as ASCII
characters, are packed between a start bit and a stop bit.
S.R.T.I.S.T 42
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 43
ATM SECURITY
USING GSM AND MEMS
12345
6789
Pin Description
1 Data carrier detect (DCD)
2 Received data (RXD)
3 Transmitted data (TXD)
4 Data terminal ready(DTR)
5 Signal ground (GND)
6 Data set ready (DSR)
7 Request to send (RTS)
8 Clear to send (CTS)
9 Ring indicator (RI)
(Note: DCD, DSR, RTS and CTS are active low pins.)
The method used by RS-232 for communication allows for a simple
connection of three lines: Tx, Rx, and Ground.
The three essential signals for 2-way RS-232 Communications are these:
S.R.T.I.S.T 44
ATM SECURITY
USING GSM AND MEMS
The 8051 has two pins that are used specifically for transferring and receiving
data serially. These two pins are called TXD and RXD and a part of the port 3 group
(P3.0 and P3.1). Pin 11 of the 8051 is assigned to TXD and pin 10 is designated as
RXD. These pins are TTL compatible; therefore, they require a line driver to make
them RS232 compatible. One such line driver is the MAX232 chip.
MAX232 converts from RS232 voltage levels to TTL voltage levels, and
vice versa. One advantage of the MAX232 chip is that it uses a +5V power source
which, is the same as the source voltage for the 8051. In the other words, with a
single +5V power supply we can power both the 8051 and MAX232, with no need for
the power supplies that are common in many older systems. The MAX232 has two
sets of line drivers for transferring and receiving data. The line drivers used for TXD
are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In
many applications only one of each is used.
S.R.T.I.S.T 45
ATM SECURITY
USING GSM AND MEMS
The 8051 has two pins that are used specifically for transferring and receiving
data serially. These two pins are TXD and RXD and are a part of the port 3 (P3.0 and
P3.1). Pin 11 of the 8051 is designated as TXD and pin 10 as RXD. These pins are
TTL compatible; therefore, they require a line driver to make them RS232 compatible.
One such line driver is the MAX232 chip.
MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice
versa. One advantage of the MAX232 chip is that it uses a +5V power source which,
is the same as the source voltage for the 8051. In the other words, with a single +5V
power supply we can power both the 8051 and MAX232, with no need for the power
supplies. The MAX232 has two sets of line drivers for transferring and receiving data.
The line drivers used for TXD are called T1 and T2, while the line drivers for RXD
are designated as R1 and R2. In many applications only one of each is used.
S.R.T.I.S.T 46
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 47
ATM SECURITY
USING GSM AND MEMS
Pin 10, 11 form the dual inputs with TTL logic whereas 14, 7 form the outputs
for RS 232 logic. And the 12, 9, 13, 8 form the vice versa inputs and outputs as shown
in fig.
The inputs and outputs of the drivers and receivers are shown in fig above.
CHAPTER 7
LIQUID CRYSTAL DISPLAY
7.1 INTRODUCTION
Liquid crystal displays (LCDs) have materials which combine the properties
of both liquids and crystals. Rather than having a melting point, they have a
temperature range within which the molecules are almost as mobile as they would be
in a liquid, but are grouped together in an ordered form similar to a crystal.
An LCD consists of two glass panels, with the liquid crystal material sand
witched in between them. The inner surface of the glass plates are coated with
transparent electrodes which define the character, symbols or patterns to be displayed
polymeric layers are present in between the electrodes and the liquid crystal, which
makes the liquid crystal molecules to maintain a defined orientation angle.
One each polarizers are pasted outside the two glass panels. These polarisers
would rotate the light rays passing through them to a definite angle, in a particular
direction
S.R.T.I.S.T 48
ATM SECURITY
USING GSM AND MEMS
When the LCD is in the off state, light rays are rotated by the two polarisers
and the liquid crystal, such that the light rays come out of the LCD without any
orientation, and hence the LCD appears transparent.
When sufficient voltage is applied to the electrodes, the liquid crystal
molecules would be aligned in a specific direction. The light rays passing through the
LCD would be rotated by the polarizers, which would result in activating /
highlighting the desired characters.
The LCD’s are lightweight with only a few millimeters thickness. Since the
LCD’s consume less power, they are compatible with low power electronic circuits,
and can be powered for long durations.
The LCD s doesn’t generate light and so light is needed to read the display. By
using backlighting, reading is possible in the dark. The LCD’s have long life and a
wide operating temperature range.
Changing the display size or the layout size is relatively simple which makes
the LCD’s more customer friendly.
This section describes the operation modes of LCD’s then describe how to
program and interface an LCD to 8051 using Assembly and C.
In recent years the LCD is finding widespread use replacing LED s (seven-
segment LED s or other multi-segment LED s).This is due to the following reasons:
1. The declining prices of LCDs.
S.R.T.I.S.T 49
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 50
ATM SECURITY
USING GSM AND MEMS
The LCD discussed in this section has 14 pins. The function of each pin is
given in table.
S.R.T.I.S.T 51
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 52
ATM SECURITY
USING GSM AND MEMS
7.4 Uses
The LCDs used exclusively in watches, calculators and measuring instruments
are the simple seven-segment displays, having a limited amount of numeric data. The
recent advances in technology have resulted in better legibility, more information
displaying capability and a wider temperature range. These have resulted in the LCDs
being extensively used in telecommunications and entertainment electronics.
So in this project, the LCD is used to display the instantaneous information. The
information may be prompting or alerting or instructing the user.
S.R.T.I.S.T 53
ATM SECURITY
USING GSM AND MEMS
CHAPTER 8
RELAYS
8.1 Introduction
A relay is an electrical switch that opens and closes under the control of another
electrical circuit. In the original form, the switch is operated by an electromagnet to
open or close one or many sets of contacts. A relay is able to control an output circuit
of higher power than the input circuit, it can be considered to be, in a broad sense, a
form of an electrical amplifier.
Relays are usuallly SPDT (single pole double through switch)or DPDT (double
pole double through switch) but they can have many more sets of switch contacts, for
example relays with 4 sets of changeover contacts are readily available.
S.R.T.I.S.T 54
ATM SECURITY
USING GSM AND MEMS
Inductors react against changes in current because of the energy stored in this
magnetic field. When we construct a transformer from two inductor coils around a
common iron core, we use this field to transfer energy from one coil to the other.
However, there are simpler and more direct uses for electromagnetic fields than the
applications we've seen with inductors and transformers. The magnetic field produced
by a coil of current-carrying wire can be used to exert a mechanical force on any
magnetic object, just as we can use a permanent magnet to attract magnetic objects,
except that this magnet (formed by the coil) can be turned on or off by switching the
current on or off through the coil.
S.R.T.I.S.T 55
ATM SECURITY
USING GSM AND MEMS
If we place a magnetic object near such a coil for the purpose of making that object
move when we energize the coil with electric current, we have what is called a
solenoid. The movable magnetic object is called an armature, and most armatures can
be moved with either direct current (DC) or alternating current (AC) energizing the
coil. The polarity of the magnetic field is irrelevant for the purpose of attracting an
iron armature. Solenoids can be used to electrically open door latches, open or shut
valves, move robotic limbs, and even actuate electric switch mechanisms and is used
to actuate a set of switch contacts
This is the most elementary type of relay. The neutral relays have a magnetic
coil, which operates the relay at a specified current, regardless of the polarity of the
voltage applied.
Biased relays have a permanent magnet above the armature. The relay
operates if the current through the coil winding establishes a magneto-motive force
that opposes the flux by the permanent magnet. If the fluxes are in the same direction,
the relay will not operate, even for a greater current through the coil.
Like the biased relays, the polarized relays operate only when the current
through the coil in one direction. But there the principle is different. The relay coil has
a diode connected in series with it. This blocks the current in the reverse direction.The
major difference between biased relays and polarized relays is that the former allows
the current to pass through in the reverse direction, but does the not operate the relay
and the later blocks the current in reverse direction. You can imagine how critical
these properties when relays are connected in series to form logic circuits.
S.R.T.I.S.T 56
ATM SECURITY
USING GSM AND MEMS
These relays have a magnetic circuit with high permanence. Two coils, one to
operate (pick up) and one to release (drop) are present. The relay is activated by a
current in the operate coil. On the interruption of the current the armature remains in
picked up position by the residual magnetism. The relay is released by a current
through the release coil.
These relays have a capacitor connected in parallel to their coil. When the
operating current is interrupted the release of relay is delayed by the stored charge in
the capacitor. The relay releases as the capacitor discharges through the coil.
These are neutral relays and picked up for a.c. current through their coil. These
are very fast in action and used on power circuits of the point motors, where high
current flows through the contacts. A normal relay would be slow and make sparks
which in turn may weld the contacts together.All relays have two operating values
(voltages), one pick-up and the other other drop away. The pick-up value is higher
than the drop away value.
8.4 Applications
S.R.T.I.S.T 57
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 58
ATM SECURITY
USING GSM AND MEMS
CHAPTER 9
REGULATED POWER SUPPLY
9.1 INTRODUCTION
The power supplies are designed to convert high voltage AC mains electricity
to a suitable low voltage supply for electronics circuits and other devices. A RPS
(Regulated Power Supply) is the Power Supply with Rectification, Filtering and
Regulation being done on the AC mains to get a Regulated power supply for
Microcontroller and for the other devices being interfaced to it.
A power supply can by broken down into a series of blocks, each of which
performs a particular function. A d.c power supply which maintains the output voltage
constant irrespective of a.c mains fluctuations or load variations is known as
“Regulated D.C Power Supply”
S.R.T.I.S.T 59
ATM SECURITY
USING GSM AND MEMS
9.2 TRANSFORMER
A transformer is an electrical device which is used to convert electrical power
from one Electrical circuit to another without change in frequency. Transformers
convert AC electricity from one voltage to another with little loss of power.
Transformers work only with AC and this is one of the reasons why mains electricity
is AC. Step-up transformers increase in output voltage, step-down transformers
decrease in output voltage. Most power supplies use a step-down transformer to
reduce the dangerously high mains voltage to a safer low voltage. The input coil is
called the primary and the output coil is called the secondary. There is no electrical
connection between the two coils; instead they are linked by an alternating magnetic
field created in the soft-iron core of the transformer. The two lines in the middle of
the circuit symbol represent the core. Transformers waste very little power so the
power out is (almost) equal to the power in. Note that as voltage is stepped down
current is stepped up. The ratio of the number of turns on each coil, called the turn’s
ratio, determines the ratio of the voltages. A step-down transformer has a large
number of turns on its primary (input) coil which is connected to the high voltage
mains supply, and a small number of turns on its secondary (output) coil to give a low
output voltage.
S.R.T.I.S.T 60
ATM SECURITY
USING GSM AND MEMS
9.3 RECTIFIER
S.R.T.I.S.T 61
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 62
ATM SECURITY
USING GSM AND MEMS
During negative half cycle of secondary voltage, the diodes D1 and D4 are in
forward biased while D2 and D3 are in reverse biased as shown in the fig(c). The
current flow direction is shown in the fig (c) with dotted arrows.
S.R.T.I.S.T 63
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 64
ATM SECURITY
USING GSM AND MEMS
CHAPTER 10
CIRCUIT DESCRIPTION
10.1 INTRODUCTION
ATM security system using GSM Modules is one of the hot topics in
embedded systems industry. For providing Security at ATMs GSM Modules are
controlled by using ATMEL Processor based AT89S52 Microcontroller.
Probably the most useful thing to know about the global system for mobile
communication is that it is an international standard. If you travel in parts of world,
GSM is only type of cellular service available. Instead of analog services, GSM was
developed as a digital system using TDMA technology.
In this project ATMEL based AT89S52 Microcontroller monitors GSM
Module . Whenever the user inserts his ATM card into ATM machine, a message will
be sent to the user mobile providing the details like time of card insertion, date, name
of the user and place where the card has been inserted. This database will be
maintained both in the bank and at the ATM center.
The microcontroller in the ATM machine asks for the confirmation from the user
mobile. This user mobile can be changed whenever the user wishes to. As the details
are received by the user in his mobile, he has to send the confirmation message to the
modem. Thus, the microcontroller receives this message as the confirmation and
allows the person to proceed with the further transactions.
S.R.T.I.S.T 65
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 66
ATM SECURITY
USING GSM AND MEMS
Firstly, the required operating voltage for Microcontroller 89S52 is 5V. Hence
the 5V D.C. power supply is needed by the same. This regulated 5V is generated by
first stepping down the 230V to 9V by the step down transformer.
The step downed a.c. voltage is being rectified by the Bridge Rectifier. The
diodes used are 1N4007. The rectified a.c voltage is now filtered using a ‘C’ filter.
Now the rectified, filtered D.C. voltage is fed to the Voltage Regulator. This voltage
regulator allows us to have a Regulated Voltage which is +5V.The rectified; filtered
and regulated voltage is again filtered for ripples using an electrolytic capacitor
100μF. Now the output from this section is fed to 40 th pin of 89S52 microcontroller to
supply operating voltage.
The microcontroller 89S52 with Pull up resistors at Port0 and crystal oscillator
of 11.0592 MHz crystal in conjunction with couple of capacitors of is placed at 18 th
& 19th pins of 89S52 to make it work (execute) properly.
The LCD is interfaced to Microcontroller. The data pins and control pins of
LCD are connected to Port 0 as shown in schematic. The GSM is interfaced to
microcontroller through a voltage level converter i.e. MAX 232.
The GSM o/p & i/p pins i.e. RX and TX are connected to MAX 232 serial
drivers 7th and 13th pins and its output to Microcontroller from 11 th & 12th of MAX to
TX and RX pins of Microcontroller.
A Motor is connected across port 2 at 24th pin.
And the main functional input block MEMS is interfaced at port 1,at p1.0 to
p1.7 with 18th to 11th pins of ADC 0804 and in turn this ADC 0804 is connected with
mems at 2nd 3rd and 5th pins.
S.R.T.I.S.T 67
ATM SECURITY
USING GSM AND MEMS
µVision3 adds many new features to the Editor like Text Templates, Quick
Function Navigation, and Syntax Coloring with brace high lighting Configuration
Wizard for dialog based startup and debugger setup. µVision3 is fully compatible to
µVision2 and can be used in parallel with µVision2.
What is µVision3?
S.R.T.I.S.T 68
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 69
ATM SECURITY
USING GSM AND MEMS
12. Now double click on the Target1, you would get another option “Source
group 1” as shown in next page.
13. Click on the file option from menu bar and select “new”
14. The next screen will be as shown in next page, and just maximize it by
double clicking on its blue boarder.
15. Now start writing program in either in “C” or “ASM”
16. For a program written in Assembly, then save it with extension “. asm”
and for “C” based program save it with extension “ C”
S.R.T.I.S.T 70
ATM SECURITY
USING GSM AND MEMS
17. Now right click on Source group 1 and click on “Add files to Group
Source”
18. Now you will get another window, on which by default “C” files will
appear.
19. Now select as per your file extension given while saving the file
21. Now Press function key F7 to compile. Any error will appear if so happen.
24. Now Click on the Peripherals from menu bar, and check your required port
as shown in fig below.
25. Drag the port a side and click in the program file.
26. Now keep Pressing function key “F11” slowly and observe.
S.R.T.I.S.T 71
ATM SECURITY
USING GSM AND MEMS
============================================================
#include<reg51.h>
#include<string.h>
#include"UART.h"
#include"eeprom.h"
#include "lcddisplay.H"
sbit sw = P3^7;
unsigned int i;
void main()
{
lcd_init();
S.R.T.I.S.T 72
ATM SECURITY
USING GSM AND MEMS
lcd_init();
msgdisplay("welcome");
UART_init();
delay(1000);
lcdcmd(1);
msgdisplay("CHECKING GSM");
newmsg=0;
xxx: delay(20);
send_to_modem("AT+CPIN?"); // sim checking
enter();
delay(500);
if(newmsg==0)
goto xxx;
lcdcmd(0XC0);//move the cursor to second line of lcd
msgdisplay("MODEM CONNECTED");
send_to_modem("AT+CREG=0"); //
enter();
buz=0; //buzzer on
send_to_modem("at+cmgf=1"); //to set message format as
text
enter();
send_to_modem("at+cmgd=1"); //delecte the message1
enter();
send_to_modem("at+cmgd=2");
enter();
send_to_modem("at+cmgd=3");
enter();
delay(500);
buz=1; //buzzer off
start:
while(1)
{
lcdcmd(0x01);
msgdisplay("ATM SECURITY ");
lcdcmd(0xC0);
msgdisplay("SYSTEM");
back:
delay(100);
a=read_eeprom(1);
S.R.T.I.S.T 73
ATM SECURITY
USING GSM AND MEMS
if(a==0xff)
goto back;
if(a=='A')
{
lcdcmd(0X01);
msgdisplay("CARD DETECTED");
send_to_modem("at+cmgs=");
ch_send_to_modem('"');
send_to_modem(mobilenum);
ch_send_to_modem('"');
enter();
delay(50);
send_to_modem("SEND COMFIRMATION PASSWORS TO ACCESS YOUR ATM CARD");
ch_send_to_modem(0x1a);//control z
delay(500);
lcdcmd(0Xc0);
msgdisplay("SEND PASSWORD");
buz=0;
newmsg=0;
while(newmsg==0); //wait till message is delivered succesfully
buz=1;
delay(1000);
newmsg=0;
while(newmsg==0);//waiting for reply
newmsg=0;
ES=0;
readmsg();
buz=1;
if(!strcmp(msg,"123"))
{
lcdcmd(0X01);
msgdisplay("thank you!!");
lcdcmd(0Xc0);
msgdisplay("do transaction");
while(sw==1); //wait till switch is pressed
lcdcmd(0x01);
msgdisplay("THANK YOU!!!");
delay(500);
dd: lcdcmd(0x01);
msgdisplay("Remove ur card");
again1:
delay(100);
a=read_eeprom(1);
if(a!=0xff)
goto again1;
ES=1;
goto start;
}
else
{
buz=0;
lcdcmd(0x01);
S.R.T.I.S.T 74
ATM SECURITY
USING GSM AND MEMS
delay(100);
ES=1;
delay(300);
ES=0;
while(RI==1)
{
RI=0;
delay(100);
}
send_to_modem("at+cmgr=1");
enter();
count=0;
i=0;
a=0;
numcnt=0;
while(count!=3)
{
while(RI==0);
b=SBUF;
if((b==',')||(a==1))
{
if(numcnt<15)
{
if(numcnt>4)
{
mobilenum[numcnt-5]=b;
}
a=1;
numcnt++;
}
else
S.R.T.I.S.T 75
ATM SECURITY
USING GSM AND MEMS
a=0;
}
if(count==2)
{
msg[i++]=SBUF;
RI=0;
if(b==10)
count+=1;
}
msg[--i]='\0';
msg[--i]='\0';
mobilenum[10]='\0';
send_to_modem("at+cmgd=1");
enter();
CHAPTER 11
FUTURE ASPECTS
1. The microcontroller in this project can be interfaced with smoke sensor to identify
fire accidents and can be approached in time.
2. The GSM modem can be replaced with internet connection in which all the data
which data base of all the users are maintained. Hence the sms is sent through the
net to which the concerned bank and ATM are interlinked.
3. A virtual password can be generated and sent to the predefined number at each
time of insertion of card instead of a fixed password to be entered at the ATM
center.
S.R.T.I.S.T 76
ATM SECURITY
USING GSM AND MEMS
CHAPTER 12
CONCLUSION
S.R.T.I.S.T 77
ATM SECURITY
USING GSM AND MEMS
S.R.T.I.S.T 78
ATM SECURITY
USING GSM AND MEMS
REFERENCES
TEXT BOOKS
WEB PREFERENCES
http://www.aaroncake.net/circuits/supply.asp
http://www.8052.com/tut8051
http://electrosofts.com/serial/
http://www.8052.com/tuttimer.phtml
www.tkk.fi/Misc/Electronics/circuits/ir_send.html
S.R.T.I.S.T 79