You are on page 1of 58

GSM BASED CAR PARKING RESERVATION SYSTEM

SESSION (2015-2019)

PROGRAM

(Bs Electrical & Electronics )

SUBMITTED BY:

Name: Ateeq ur Rehman Reg: suit-15-01-008-0022

SUPERVISED BY:

Engr Ehtizaz Aziz


Lecturer
Electrical Department
COMWAVE Haripur

SARHAD UNIVERSITY OF SCIENCE & INFORMATION


TECHNOLOGY, PESHAWAR.
s
ABSTRACT

The project mainly aims in designing an advanced vehicle parking slot booking

system for parking any vehicle in the parking area. Security is the bigger concern for an

individual or a firm.

A parking lot (car park), also known as a car lot, is a cleared area that is intended

for parking vehicles. Usually, the term refers to a dedicated area that has been provided with a

durable or semi-durable surface. In most countries where cars are the dominant mode

of transportation, parking lots are a feature of every city and suburban area. Shopping malls,

sports stadiums, megachurches and similar venues often feature parking lots of immense area.

Modern parking lots utilize a variety of technologies to help motorists find unoccupied parking

spaces, retrieve their vehicles, and improve their experience. This includes adaptive

lighting, sensors, indoor positioning system (IPS) and mobile payment options. The Santa

Monica Place shopping mall in California has cameras on each stall that can help count the lot

occupancy and find lost cars.

Recognizing the need of security of the vehicles we developed an advanced vehicle

parking slot booking system with user friendly access. Automation is the most frequently

spelled term in the field of electronics. The hunger for automation brought many

revolutions in the existing technologies. One among the technologies which had greater

developments is RF communications. The result of  t h i s i s t h e R F I D c a r d s w h i c h

t r a n s m i t a u n i q u e i d e n t i f i c a t i o n n u m b e r . T h i s n u m b e r   transmitted by the RFID

can be read with the help of a RF reader. We make use of both these devices to construct an

advanced slot booking system for vehicle parking system. The concerned person of the
4
vehicle should initially book a s l o t u s i n g G S M m o b i l e , w h e n t h e a l l o t t e d s l o t

i s c o n f i r m e d t h e n t h e v e h i c l e c a n b e allotted a particular parking area,

depending on the RFID cards. The decisions like slot a r e a i s f i l l e d o r v a c a n t a r e

taken by an onboard computer to which the RF reader is interfaced. The

p a r k i n g g a t e f o r m s t h e o u t p u t m o d u l e a n d i s i n t e r f a c e d t o t h e s a m e onboard

computer. This onboard computer consists of number of input and output ports. The onboard

computer is commonly termed as micro controller. The input and output ports of

thec o n t r o l l e r   a r e   i n t e r f a c e d   w i t h   d i f f e r e n t   i n p u t   a n d   o u t p u t   m o d u l e s   d e p e n

d i n g   o n   t h e requirements. In other words micro controller acts as a communication medium

for all the modules involved in the project .The device also consists of LCD which displays the

information about the status of gate open and close.

5
TABLE OF CONTENTS
CHAPTER 1....................................................................................................................................8

INTRODUCTION...........................................................................................................................8

1.1. LITERATURE REVIEW.................................................................................................9

CHAPTER 2..................................................................................................................................11

HARWARE COMPONENTS.......................................................................................................11

2.1. Hardware implementation..................................................................................................11

2.2. Functional Description........................................................................................................11

2.3. Block diagram of the system..............................................................................................12

2.4. Hardware components used................................................................................................12

2.4.1. GSM Technology.........................................................................................................12

2.4.2. RFID Technology........................................................................................................13

2.4.3. IR Sensor.....................................................................................................................14

2.4.4. LED (LIGHT EMITTING DIODE)............................................................................16

2.4.5. GSM MODULE...........................................................................................................17

2.4.6. Microcontroller (ATmega328)....................................................................................19

2.4.7. 10K Resistor................................................................................................................19

CHAPTER 3..................................................................................................................................22

MICROCONTROLLER AND GSM MODULE..........................................................................22

4.1. Key parameters for ATmega328........................................................................................22

4.2. Introduction to ATmega32 (AVR Series) 8bit Microcontroller.........................................24

4.2.1. Arduino Digital and Analog I/O Pins..........................................................................28

4.2.2. Arduino Analog I/O.....................................................................................................29

4.3. PWM – Pulse Width Modulation.......................................................................................29

4.4. Applications........................................................................................................................30

6
4.5. GSM module.......................................................................................................................30

4.5.1. GSM Modem Principle................................................................................................32

CHAPTER 4..................................................................................................................................37

RFID TECHNOLOGY FEATURES AND APPLICATIONS......................................................37

4.1. Overview Of RFID.............................................................................................................37

4.2. What is RFID?....................................................................................................................38

4.3. How Does RFID Work?.....................................................................................................39

4.4. What is meant by RFID tag?..............................................................................................39

4.5. RFID Tags and Smart Labels.............................................................................................40

4.6. DESIGN OF RFID.............................................................................................................41

4.6.1. Tags..............................................................................................................................41

4.6.2. Readers........................................................................................................................42

4.7. USES OF RFID..................................................................................................................42

4.7.1. Logistics & Supply Chain Visibility............................................................................42

4.7.2. Item level inventory tracking.......................................................................................43

4.7.3. Race timing..................................................................................................................43

4.7.4. Attendee Tracking.......................................................................................................43

4.7.5. Materials management.................................................................................................43

4.7.6. Access Control.............................................................................................................43

4.7.7. IT Asset Tracking........................................................................................................44

4.7.8. RTLS (Real Time Location System)...........................................................................44

4.8. RFID Security Benefits and Threats...................................................................................44

4.9. Security Goals.....................................................................................................................45

4.10. Low-Cost RFID Issues.....................................................................................................45

4.11. APPLICATIONS OF RFID..............................................................................................46

7
4.12. Some Approaches to RFID Protection.............................................................................47

CHAPTER 5..................................................................................................................................49

RESULTS AND CONCLUSION..................................................................................................49

REFRENCES.................................................................................................................................50

8
CHAPTER 1

INTRODUCTION

1.1. 1.1. In the case of today’s transport professionals, visitor management, safety and security initiatives
are becoming an increasing priority. State and neighborhood businesses are looking for mobility,
efficiency and safety operations and opportunities for people to use. Today’s transportation facilities
have many problems.

1.2. Accident threat management

1.3. Environmental alert

1.4. Manipulate traffic violations

1.5. Identify vehicle theft

1.6. Traffic signal management

It has been a consistent assignment to appear for parking areas in the parking lot. There has been
a large trouble in metropolitan cities due to lack of parking and so on. Therefore,
a laptop can assist us locate the nearest parking lot nearby. This
will assist us keep time, gasoline and money. Most are hand-managed and few are effective. All
work is carried out by using parking staff. Drivers provide cash at once to employees.
Many human beings these days are now not blissful with the administration of the
parking system and the flexibility to locate an empty residence for parking vehicles. The demand
for parking is too an awful lot to purchase automatically in theaters, branch shops and offices.
The hassle that is continuously occurring in the parking lot is being
wasted searching for accessible parking lots. Users will hold the vicinity round the parking
lot till an empty parking lot is determined. That is, human beings are typically “surrounded” in
search of a actual parking lot, then a tourist stumble might also additionally appear. Parking is on

9
the upward thrust in cities and cities round the world. Therefore, the demand for a reservation-
based parking gadget is anticipated to be developed in the close to future to scare
or limit this trouble with auto parks, as lengthy as the parking house is reserved for SMS use, in
addition to having get right of entry to to the network. The important purpose is toward layout a
car parks system with the ATMega328 microcontroller that can be route on implanted system.
In huge cities, particularly giant cities, parking troubles the use of GSM and RFID science are
one of the key motives for the accumulation of metropolitan visitors. The reservation-based
parking machine is believed to be a notable way to enhance the kingdom of the parking lots.

1.7. LITERATURE REVIEW

Knowledge of RFID science has various features in advance of the retail sector. RFID tags are


embedded in passports for public identification playing cards for protection and for manipulating
the entrance to constructions in unidentified card games. The labels are used at
a specific fee for special transport machines and loading systems, such as card video
games and mild card storage. In the monitoring of hospital-born children, it has a range of
scientific makes use of for storing surgical affected person data, procedures, and scientific
equipment. RFID buildings charge tolls, transport amortization and use of
the typical RFID device used in logistics administration structures. When the performance of RF
conversations is examined in detail, it can be viewed that there are higher chances beforehand.
After wondering about the points and behaviors of RF communications, it
is possible to plan new elements that enhance safety,
security, comfort and productiveness whilst respecting the environment.
Automatic car identification determines car identification. There are severa door amenities at the
toll booth. So it creates a lot of problems. In this AVI system, barcodes are non-stop at
all fee factors that the target tag scans. This gadget is carefully associated to the Vehicle
Classification System. The Vehicle Classification System used
for exclusive kinds of automobiles has had an special value when passing toll equipment,
however, due to the confined users, there is a large vary of sensors to provide the presence of the
vehicle. It is used to decide the machine for violating the toll or toll violations used
to decrease the toll. In this system, the expertise of the vary plate is bought as an image.

10
This automated parking safety machine has been developed with the assist of microcontroller
and RFID technology. Already the dreams are to use regular RFID tags
and hold a special variety, and the facts related with the tag is extracted from sure databases.
Although RF tags can have a excellent role in our undertaking to acquire safety,
security, productiveness and restore capability, their present day use is now not the
most frequent alternative for many reasons. If a individual makes use of RFID science it is
an computerized gadget to shield parking plenty with a large key plan. RF tags can play a
key position in reaching safety, security, productiveness and convenience. The significance of
the RFID machine is that it receives verification from the Office of Road Transport (RTO).
The purchaser will need an authentication to be in a position to go to the fingerprint module with
the mannequin (PMA) to enhance the effectivity of the use of the algorithm. The
face awareness gadget is a view that will be used after the finger recording system. Eventually,
this system permits the character to get admission to it by using urgent the vehicle and for
emergencies, a key entry slot will be positioned to get right of entry to the key in that device. In
emergency mode, the digital digital camera takes a photograph of the driver and sends it to the
owner’s telephone as a Multimedia Messaging Service (MMS) and the proprietor will furnish the
authentication password. The Dialogue Mobile for Global System (GSM) module is saved on
its very own to manage the purpose [8]. The gadget used a clear contactless card to avert the
entry of undesirable people. The contactless mild card shops records and reads
the documents saved on the card when you enter the RFID reader field. The reader is
aware the statistics and has the same opinion with the records saved in it. If this reader
has facts about the card, it will enable the card patron to enter the field. If the reader does no
longer locate the information on the label in his memory, he will no longer be given them.

11
CHAPTER 2

HARWARE COMPONENTS

2.1. Hardware implementation

The proposed system is designed with the ATmega328 controller. The primary elements used in


this computing device are the ATmega328 microcontroller, GSM module and RFID module. The
ATmega328 microcontroller is linked to GSM and RFID modules. Using GSM technological
knowledge, we can check the use of the corresponding guidelines with the aid of SMS (Short
Message Service) thru the auto park. The Infra red sensor is positioned in the slot units and
analyzes the accessibility of slots. If accessibility is available, a response message will be got for
the consumer’s mobile. The conformation message carries the parking number, parking duration,
parking prices with time interval, and safety code. Knowledge of RFID science consists of
controlling tags associated to safety restrictions and objects used in the parking lot, as properly as
debiting the quantity of parking expenses.

2.2. Functional Description


Primary, the client directs a communication to GSM modem at the quit of the parking lot. The
modem will ship a affirmation communication to the character whether or not the space is empty
or not. Condition it remains empty, the individual will have to ship the time and size of
the vehicle they prefer to park, such as 30 minutes, 60 minutes, ninety minutes, one hundred
minutes, whether or not they choose to park the auto or not. and twenty min. The GSM modem
will ship you a password and a parking range to get entry to the reserved parking space. After
sending the affirmation message, the backup timer will begin sending the message robotically.
vehicle. When the parked the automobile in the selected area, an inexperienced LED will light up
to designate that the aperture is occupied. The sponsor can wish to use the countersign provided
once confirming the registration to cross the edge then leaving barrier gate. An automobile
owner should register with the parking area owner and acquire AN RFID tag. The tag consists of
electronically hold on statistics like the car’s number, the car’s owner’s name, and a spread of

12
credit scores. after you wish to park your automobile, the RFID tag could be a descendant of the
RFID reader. to evidence registered users with the parking entrance and entrance fully closed.

2.4. Used hardware items


2.4.1. GSM Technology
The worldwide mobile amendment system could be a digital native of digital wireless telephone phones, and
has developed fleetly in fashionable years. it's a widely known and notably used European mobile phone
telephone for mobile phrase exchange, that is sometimes viewed everywhere the globe, for a 900 megacycle
mobile radio machine. In contemporary work, the SIM900 module is cast-off. The SIM900 unit could be a
Triband GSM / GPRS reaction, a compact plug-in module that introduces Associate in Nursing industry-
standard interface. it's used cellularly generally gadgets. because the encompassing GSM advocates nearly
the complete country, it's presently not possible to make totally different regions within the use of wi-fi
technology. As a result, it will limit the burden on the institution and also the provider, which is able to have a
bigger economic advantage. Compared to the distinctive sciences utilized in the Wi-Fi community, subscribers
get free access to the GSM community with none restrictions. As an important organization within the GSM
network, Short Message Services (SMS) area unit additional appropriate than ever. we are able to observe
the transmission characteristics of duplex records via SMS modes, and also the usual average overall
performance is stable. Therefore, SMS provides a nice platform for semipermanent transmission of statistics.
The GSM module is understood as SIMCOM_900 with RS232, the ability supply; buzzer and audio interface
area unit used. It will be connected to a pc via a USB Serial adapter. Terminal packets like real time area unit
wont to send and retrieve knowledge. The interface between the GSM module and also the microcontroller
will be accessed with a wi-fi guide apart from the delay
The GSM module works with AT COMMANDS and is used via AT on behalf of the Application Terminal.
Approximately recommended AT instructions 

1. AT

2. AT+CMGS

3.AT+CMGR

4.AT+CMGD

5.AT+CSQ

13
For the connection between the ATmega microcontroller and the GSM, the microcontroller receiver pin (Rx)
is connected to the GSM module transmitter pin (Tx) and the microcontroller pin transmitter (Tx) is
connected to the pin pin. GSM module receiver (Rx).

2.4.2. RFID Technology

Radio Frequency Identification (RFID) is a computer-assisted identification approach. This allows you to
remotely retrieve events stored on RFID tags. RFID tagging is a machine that can link or access products,
animals, or men or women to discover and control the radio wave use. Some tags can be viewed a few
meters from the reader’s field of view. its usage of contactless wi-fi computers that use electromagnetic
fields of radio frequency to alternate documents on labels associated with objects. Some labels do not
require batteries and use the electromagnetic fields they use to power them. Others use environmental
forces to supply and irradiate radio waves (radio frequency electromagnetic radiation). Labels are made up of
by electronic means stored matches that be scanned a insufficient meters away. Unlike barcodes, labels do
not choose to be within the reader’s line of sight and cover the objects they track. The use of RFID is widely
used to manipulate inventories in retail environments, but this science quickly created gas benefit payments
and changed economic savings cards. RFID devices have three simple modules.

1. RFID tag transponder.

2. RFID reader transmitter.

3. Predefined protocol for transferred records.

2.4.3. IR Sensor

IR devices operate with the assistance of a particular sharpening sensor to pick out the chosen wavelength of
the InfraRed (IR) spectrum. Once you use associate degree junction rectifier with a similar wavelength
because the device you're searching for, it seems to be at the depth of the sunshine obtained. Commonly all
objects within the spectrum emit some structure of heatradiation. This kinds of radiation ar unseen to human
eyes, may be noticed by associate degree infrared device. The electrode is actually associate degree IR
junction rectifier and also the indicator is associate degree honest IR photodiod touched by a sleek below
Red of same wave. discharged with the assistance of below Red junction rectifier. once a sleek IR cataracts on
the photodiode, these regulators and production voltages ar changed as a proportion of the magnitude of the
received sleek IR

14
. .IR sensing element Drawing and dealing Principle

The infrared sensing element is one amongll|one among stone in every of} the foremost vital and
well-liked sensing element modules in a digital device. This sensing element is comparable to
the human visual senses, will be wont to observe boundaries and is one in every of the common
targets in real time. once Associate in Nursing object closes to the sensing element, the
swishness of the LED falls on high of the thing and becomes smooth. sensor. This result's
achieved with an outsized increase in intensity and that we already perceive that the utilization of
the edge will be detected.

Altered IR Sensors Uses

IR sensors square measure categorized into many classes supported their meant use. These
square measure a number of the foremost common functions of varied device sorts.

The rhythm device is employed to stay the speed of 2 motors in correct. The temperature device
is employed to stay track of the industry's temperature. The inaudible device is employed to find
distance and also the PIR device is utilized for electronic door openers.

IR sensing element Applications

IR sensing elements square {measure} rummage-sale in a very wide selection of initiatives


supported sensor and square measure too employed in varied digital units that measure
temperature beneath.

Radiation Thermometers

Radio sensors square measure employed in radiation thermometers to live hotness and therefore
the sensible purpose, these heat meter devise a number of these characteristics.

15
o apart from an on the spot relationship with the article of measure

oFaster response

o simple sample measurements

Flame Monitors

This type of device is employed to discover flames given off by fires and monitor their
combustion. the sunshine discharged by the flames may be found in a very type of ultraviolet
radiation and IR wavelengths. a number of the detectors employed in hearth monitors embody
PbS, PbSe, two-color detectors, and pyro electrical detectors.

Moisture Analyzers

Humidity analyzers use moisture-absorbing wavelengths at intervals the Infra Red area.
Substances unit exposed with the sleek wavelengths of those wavelengths (1.1 µm, 1.4 µm, 1.9
µm, and 2.7 µm) and jointly the mention wavelengths. the sunshine mirrored from the objects
depends on the condition gratified and is noticed with the assistance of condition analyzers (the
relationship between the mirrored smoothness and jointly the mirrored smoothness at these
reference wavelengths). In GaAs PIN photodiodes, Pbs photoconductor detectors unit utilised in
circuits to analysis condition.

Gas Analyzers

IR sensors area unit utilised in gas analyzers that use gas absorption characteristics inside the IR
region. two kinds of ways live} accustomed live the density of gas, like scatterers and scatterers.

Dispersive

The discharged light-weight is split spectroscopically and its absorption properties area unit
accustomed study the components of the gas and additionally the amount of sample.

16
Non dispersive

It is a unremarkably used technique and uses fascinating properties that distribute the produced
light-weight. Non-scattering varieties use distinct optical strip filtering filters, rather like the
eyeglasses aimed at eye safety to filter fascinating nonparticulate radiation radiation.

Infra-Red imaging Campaigns

An IR imaging scheme is one in all the key uses of IR influences that has the advantage of a
things that's not specifically noticeable. it's used for warm air imaging, sight devices then on.

On behalf of sample, soil ,water, rock, undergrowth, the air, and social tissues release IR
radiation. Infrared warm pointers live these IR radiations and guide the consultation temperature
scatterings of the thing/field at extends the figure. The warm picture is occasionally made out of
Sb sensors (indium antimonite), mercury doped germanium Gd Hg, (mercury-cadmium telluride)
Hg Cd Te sensors.

The electronic identifier is chilled to small hotness plan liquid engineered part or N. Then,
cooling the marker ensures that the sharp energy (photons) recorded by the locaters comes from
unmatched low and not from the shut temperature of the things at extends vague scanner through
IR to cutting edge devices.

So normally this will be} commonly all agitating the IR contraption circuit with work and
applications.

17
2.4.4. Junction rectifier (LIGHT EMITTING DIODE)

The light emitting diode (LED) could be a swish semiconductor supply. LEDs square measure
used as a lamp indicator in several devices, and square measure getting used additional and
additional clearly. Introduced as a practical electronic side in 1962, the first LEDs emitted low-
intensity red lightweight, however fashionable versions reach all wavelengths that square
measure visible, ultraviolet, and infrared, with terribly high brightness. they're ready to
recombine electrons with holes within the device, cathartic photon-like force. electro
luminescence is the name of the impact and therefore the tint of the sleek is set by the electrical
opening of the semiconductors. associate degree junction rectifier tends to possess atiny low
location (less than one mm2), and integrated optical aspects square measure wont to structure
and aid within the reflection of its radiation sample. LEDs have several benefits over red
lightweight sources, reduced energy consumption, longer life, long sturdiness ... smaller size,
quicker shift and larger sturdiness and responsibility. Powerful LEDs for space lighting square
measure valuable and need additional correct and hotter recommendation than compact
fluorescent lamps with comparable output.

Light-emitting diodes square measure utilized in aviation lightweight substitutes, automotive


lighting (especially indicators) and website traveller signs. The dense mensuration of LEDs has
allowed the event of latest text and video screens and sensors, however their excessive shift rates
square measure useful in higher communication technology. Infrared LEDs are utilized in device
devices for several industrial merchandise, together with televisions, videodisk players, and
alternative digital devices.

18
FIGURE 2.8:LED

2.4.5GSM MODULE

This is a GSM/GPRS suitable four-band transient that works at 850/900/1800/1900 megacycle


and might be used not just for net access, at any rate additionally for oral conversations (reliably
connected with an electro-acoustic transducer and little speaker) and through SMS. . Apparently,
it's sort of a colossal group (0.94 inches x zero.94 inches x zero.12 inches) with L-formed
contacts on four perspectives in this manner it may be welded aside and base. Inside, the module
is managed by AN AMR926EJ-S processor, that controls phone correspondence, correspondence
of events (through A planned TCP/science stack) and a controlled circuit (UART and TTL
consecutive interface). with a PDA with him. The processor costs the SIM card (3 or one.8 V)
you wish to associate with the outside mass of the module. additionally, the GSM900 structures
have A straightforward interface, A/D device, a RTC, a SPI transport, AN I²C and a PWM
module. The radio a piece of the GSM 2/2 + region fits well and is four class (2 W) 850/900
megacycle or one order (1 W) 1800/1900 megacycle. The TTL successive interface can't inspect
with each got Sm and GPRS data all through all TCP/science periods (data rate is set by GPRS
sort 10: most. 85.6 kbps), at any rate besides to getting circuit headings (for our circumstance, far
off PIC control) , called AT or higher SIMCom AT. The module has uninterruptible power
(some place in the scope of three.4 and 4.5 V) and ingests a by far most of zero.8 A for the
length of the transmission.

19
Features

• E-GSM 900/1800 MHz and GSM 1800/1900 GSM 2 / 2+ phase.

• Output power class 4 (2W) on GSM 850/900 MHz and class 1 (1W) on GSM 1800/1900
MHz.

• Control via AT commands (ITU, GSM, GPRS and additional manufacturer)

• Supply voltage range: 3.22 V - 4.2 V, nominal: 3.8 V.

• Power consumption: Idle mode: <1.8 mA, speech mode: 200 mA (average)

• Dimensions (mm): 3 x 20 x 20 and weight (g): 3.2 (including shield)

The GSM module offers the following advantages

• Very small size (22x22x3 mm), lightweight (3.2 g) and easy to integrate

• Low energy consumption

• I + TTE approval plus CE, GCF, FCC, PTCRB, IC

• Full RS232 with CMOS level flow control (RX, TX, CTS, RTS, CTS, DTR, DSR, DCD,
RI).

• Embedded TCP / IP stacks UDP / IP stacks, embedded FTP and SMTP clients

• High performance at a low price.

20
FIGURE 2.10. GSM MODULE

2.4.6. Microcontroller (ATmega328)

ATMega328 is an Arduino UNO based ATMEL microcontroller. This will make us understand our little
challenge except the use of a complete extent Arduino board. To operate this microcontroller through
Arduino IDE one essential sixteen Mhz crystals, a 5 V supply and a serial connection.

21
2.4.7. 10K resistance

A resistance may be a standoffish two-terminal electrical part that sets the ohmic deterrent by
way of a part of the circuits. The resistors doing to scale down this stream and at consistent time
act to cut back the voltage stages inside the circuits. Resistors locale unit utilized in cutting edge
circuits to confine stylish stream, to move signal levels, to dodge dynamic parts, to finish traces
of transmission between absolutely different vocations. high-voltage resistors will disperse a
couple of watts of power as a glow, by way of a portion of motor controls, as an effect
appointment system, or as a store for generator testing. joined regulators have securities that
change barely with high temperature, interval, or working energy. Adjustable resistors may be
used as a gadget to control circuit parts (e.g., controlled volume or light reducing) or to find heat,
light, suddenness, force, or engineered development.

Resistors district unit typical components in electrical associations and electronic circuits and
area unit unpreventable in gear. As an alternate part sensible insurances may be made out of the
various blends and constructions. Resistors in like manner are set up among facilitated circuits.

The electrical attribute of the resistance is directly through its hindrance: business resistors locale
unit regularly producing plant made in extra than nine sizes. The apparent worth of the resistance
can fall among a making strength.

Securities locale unit assessed in ohms. concealed "gatherings" district unit wont to insist each
band. There district unit 3 gatherings and conflictingly four. quarter band is strength (Gold or
Silver) if the band isn't, the opposition is 2 hundredth. the fundamental 3 gatherings locale unit
toned:

22
Black = 0   Brown = 1  Red = 2  Orange = 3  Yellow = 4
Green = 5   Blue = 6   Violet = 7   Gray = 8   White = 9
The fourth band (if any) is colored:

Gold = 5%,   Silver = 10%,  (NONE = 20%)


 

To utilize the adding machine, pick the shadow of each band starting from the drop menus. Snap "show
esteem" to incite the outcome. To figure, pick a drop-down shading band again and proceed

One and 2 shading groups square measure NUMBERS BLACK = zero, BROWN = 1, and so forth (see tones
above). Model: BROWN, BLACK would be ten and BLACK would be BROWN one .The other band that is third
is the multiplier factor of the essential a couple of groups (X); Black = one, earthy colored = 10, red = 100,
orange = 10K, yellow = 100K, green = 1M, blue = 10M.

Model: Brown, Black, Blue = 10M Ohm. NOTE: Black band isn't any more extended utilized higher than nine
ohms, Brown is that the first band for each of the ten and 100 resistors - a thousand, 10,000 and afterward
on. Model: Brown, Black, Red = thousand Ohms not Black, Brown, orange This number cruncher can show
1,000 Ohms.

The fourth bunch is that the TOLERANCE group. There square measure 2 possible groups here: If there could
be no Silver (10%) and Gold (5%) band, the obstruction includes a resilience of 2 hundredth. Model: 1,000
ohm electrical gadget with a resilience of 2 hundredth would be esteem 900 ohms or 1100 ohms and might
be inside TOLERANCE. NOTE: Silver is that the most regular of the present awards, as to such an extent as we
as a whole know. ANNOTATION: About Japanese controllers have exposed a dark band (20%) or a white band
(2%). In any case, they're uncommon and this number cruncher doesn't share esteems.

23
FIGURE 10K RESISTOR

24
CHAPTER 3

MICROCONTROLLER AND GSM MODULE

MICROCONTROLLER (ATmega328)

The microcontroller (sometimes abbreviated science lab, µC, uC, or MCU) may


additionally moreover be a tiny single-circuit laptop computer pc with a processor core, memory,
and programmable peripheral enter / output. RAM internal the method of ferroelectric , NOR
flash,RAM or OTP computer storage is sporadically secured on the
chip, usually fairly a complete lot as applicable as alittle extent of RAM. Microcontrollers ar
designed for embedded applications, destroy away microprocessors employed in non-
public pc structures or in severa functions of far-famed cause. Microcontrollers ar employed
in mechanically managed product and devices like automobile engine administration systems,
deployable scientific devices, some distance off controls, location of work machines,
appliances, electrical energy gears, agates, and severa entrenched systems. By decreasing the
mensuration and rate in contrast to the pix that use separate microprocessors, memory,
and enter / output devices, microcontrollers provide clever rate for digitally dominant
even large devices and processes. Mixed sign microcontrollers ar common, integration
analog components that achieve to govern non-digital systems.
Some smallcontrollers can also additionally use four-bit phrases and function at frequencies
at 4 kHz frequencies for low strength consumption (single-digit millwatt or micro watt).
Typically, they're going to have the energy to raise a overall
performance whereas urgent companion diploma button or searching beforehand to
a occurring like some other pause; whereas asleep (CPU clock and most peripherals off)
the potential consumption should additionally be sincerely nanowatts, countless of which can
be excellent for sturdy battery applications. exceptional microcontrollers may want
to have necessary performance, the residence they have to act as a ordinal sign processor (DSP),
with greater clock pace and strength consumption.

25
4.1. Key parameters for ATmega328

Parameter price

Flash (Kbytes):32 Kbytes

Pin Count:32

Max. in operation Freq. (MHz):20 rate

CPU:8-bit AVR

# of bit Channels:16

Hardware QTouch Acquisition:No

Max I/O Pins:23

Ext Interrupts:24

USB Speed:No

USB Interface:No

SPI:2

TWI (I2C):1

UART:1

Graphic LCD:No

Video Decoder:No

Camera Interface:No

ADC channels:8

ADC Resolution (bits):10

ADC Speed (ksps):15

26
Analog Comparators:1

Resistive bit Screen:No

DAC Resolution (bits):0

Temp. Sensor:Yes

Crypto Engine:No

SRAM (Kbytes):2

EEPROM (Bytes):1024

Self Program Memory:YES

External Bus Interface:0

DRAM Memory:No

NAND Interface:No

picoPower:No

Temp. vary (deg C):-40 to eighty five

I/O offer Class:1.8 to 5.5

Operating Voltage (Vcc):1.8 to 5.5

FPU:No

MPU / MMU:no / no

Timers:3

Output Compare channels:6

Input Capture Channels:1

PWM Channels:6

27
32kHz RTC:Yes

Calibrated RC Oscillator:Yes

Watchdog:Yes

CAN:0

LIN:0

Ethernet:0

Debug Interface:debugWIRE

I2S:No

RTC:Counter

4.2. Introduction to ATmega32 (AVR Series) 8bit Microcontroller

Nowadays, masses of advances are created inside the concern of physics


and loads of factors of slicing ar actuality advanced each day; but, eight-bit
microcontrollers nonetheless have a personal operate inside the digital physics market that
dominates the 16-32 and 64-bit digital marketplace. devices. even though reasonably
priced microcontrollers with greater technique abilities ar on the market, 8bit
microcontrollers nevertheless preserve the quota thanks to easy-to-understand operation,
overwhelming, capability to alter digital circuit, low rate in contrast to
things, countless new elements in single IC and producer and client pursuit. Today’s
microcontrollers ar immensely definitely one-of-a-kind from what they have been inside the
early stages, and consequently the kind of producers is a long way better than the cloth in count
number a decade or two agone. a wide variety of the most important present makers ar chip
Atmel, Hitachi, Phillips, Maxim, NXP, Intel so on. Our pastime is ATmega32. It belongs to the
Atmel household of AVR sequence small controllers. Let's think about the options.
PIN count:
The Atmega32 has nonheritable forty pins. two for Power (pin 10: + 5v, pin 11: ground), for two
generator (12, 13 pin), one for reset (pin 9), three base electrical energy then state of affairs
voltage to allow its internal ADC, and thirty two ( four × 8) I / O pin.

28
About I/O pins:
ATmega32 is prevailing in managing analog inputs. A port A DIGITAL I / O line or
all personapins will be used as one channel for get admission to to the ADmega32 ADC, and
a combine of AREF, AVCC and GND pin pairs (see
ATmega32 information sheet). confederate diploma ADC channel. No pin will function and
serve two performs (for example: Port A pins cannot attributeas a digital I / O pin whereas the
indoors ADC is activated) at regular time. it is the accountability of programmers to urge to all-
time low of the circuit and software war. Programmers ar cautioned to
be internal the priority tables on the files sheet and interior the internal configuration.

Digital I/O pins:


ATmega32 has thirty two pins (4portsx8pins) configurable as Digital I/O pins.
Timers: 
three timers / counters, two eight bits (timer0, timer2) and one sixteen bits (timer1).
ADC:
The serial strategy carries a structure of ADC, inside which totally eight single channels will be
elite. seven (for TQFP packets) or two (for DIP packets) might also be used as a differential
channel. A reference will be elite, Associate in Nursing exterior reference will be used, or
an indoors two.56V reference motion will be entered. There the exterior reference will
be linkedto the AREF pin.
Communication Options: 
ATmega32 has three data switch modules embedded in it. They are
 Two Wire Interface
 USART
 Serial Peripheral Interface

29
Atmega32 pin diagram

Analog comparator:

On-chip analog comparator is available. An interrupt is assigned


for special contrast result obtained from the inputs.

External Interrupt: 

3External interrupt is accepted. Interrupt sense is configurable.

30
Memory: 

It has 32Kbytes of In-System Self-programmable Flash application memory, 1024 Bytes EEPROM, 2Kbytes


Internal SRAM. Write/Erase Cycles: 10,000 Flash / 100,000 EEPROM.

Clock: 

It can run at a frequency from 1 to 16 MHz. Frequency can be obtained from external Quartz
Crystal, Ceramic crystal or an R-C network. Internal calibrated RC oscillator can also be used.

More Features:

Up to 16 MIPS throughput at 16MHz. Most of the instruction executes in a single cycle. Two
cycle on-chip multiplication. 32 × 8 General Purpose Working Registers

Debug: 

JTAG boundary scan facilitates on chip debug.

Programming: 

It can be programmed via the peripheral interface of the Atmega32 device or thru parallel


programming. It is additionally feasible to application with the aid of the JTAG interface. The
programmer have to make sure that SPI programming and JTAG will no longer be disabled the
usage of fuse bits; if programming is assumed to be executed the use of SPI or JTAG.

31
BLOCK DIAGRAM OF Atmega328

4.2.1. Arduino Digital and Analog I/O Pins

Digital pins
Pins 0 – 7: PORT D [0:7]
Pins 8 – 13: PORT B [0:5] 
Pins 14 – 19: PORT C [0:5] (Arduino analog pins 0 – 5) 
digital pins 0 and 1 are RX and TX for serial communication 
digital pin 13 connected to the base board LED 

32
Digital Pin I/O Functions
 pinMode(pin, mode)
Sets pin to INPUT or OUTPUT mode
Writes 1 bit in the DDRx register
 digitalWrite(pin, value)
Sets pin value to LOW or HIGH (0 or 1)
Writes 1 bit in the PORTx register
 int value = digitalRead(pin)
Reads back pin value (0 or 1)
Read 1 bit in the PINx register

4.2.2. Arduino Analog I/O

Analog input pins: 0 – 5


Analog output pins: 3, 5, 6, 9, 10, 11 (digital pins)
 Analog input functions
int val = analogRead(pin)
Converts 0 – 5v. voltage to a 10-bit number (0 – 1023)
Don’t use pinMode
analogReference(type)
Used to change how voltage is converted (advanced) 
 Analog output
analogWrite(pin, value)
value is 0 – 255
Generates a PWM output on digital pin (3, 5, 6, 9, 10, 11)
@490Hz frequency

4.3. PWM – Pulse Width Modulation

 Use one wire to represent a multi-bit value.


 A clock with a variable duty cycle.
 Duty cycle used to represent value.

33
 We can turn it into a analog voltage using an integrating filter.

4.4. Applications

100
Today the ATmega328 is usually used in many initiatives and self reliant constructions the area a
guileless, low-powered, low-priced micro-controller is desirable. Maybe the
greatest prevalentimplementation of this chip is on the well-
known Arduino enchancment platform, mainly the Arduino Uno and Arduino Nano models.

Advantages OF ATMEGA328

1. Still runs on 5 V, so legacy 5 V stuff interfaces cleaner

2. Even though it's 5 V capable, newer parts can run to 1.8 V. This wide range is very rare.

3. Nice instruction set, very good instruction throughput compared to other processors
(HCS08, PIC12/16/18).

4. High quality GCC port (no proprietary crappy compilers!)

5. "PA" variants have good sleep mode capabilities, in micro-amperes.

6. Well rounded peripheral set

7. QTouch capability.

4.5. GSM module

The GSM module may be a specialised electronic equipment that supports the SIM card and
works by subscribing to a mobile operator, a bit like a mobile. From the purpose of read of the
cellular operator, a GSM electronic equipment is sort of a mobile.

34
When a GSM digital tools is related to a laptop, it allows the computer to use the
GSM digitalgear to talk to the mobile network. even though these GSM
modems rectangular measure basically wont
to provide a cell community affiliation, numerous of them may additionally be wont
to ship and acquire SMS and MMS messages.
It will be a digital tools system with a GSM digital tools serial, USB or Bluetooth affiliation, or it
will be a cell that has GSM digital tools capabilities.
For the rationalization of this paper, the GSM digital gear length is employed as
a virtuallyprolonged duration for naming any digital tools that helps one or a lot of of the
GSM naturalmanner household protocols, as nicely as the two.5G sciences utilized to GPRS and
EDGE. 3G is as best as 3G WCDMA, UMTS, HSDPA and HSUPA bailiwick.
A GSM digital gear indicates AN interface that permits objectives like NowSMS to
be despatched and obtained via the digital tools interface. The telephone operator fees you for
causation and receiving this message as if you had been doing it on your cell at an equal time.
To operate these tasks, the GSM digital tools ought to information the “extended set of AT
commands” for causation / receiving SMS messages, as delineated in ETSI GSM 07.05 and
3GPP TS twenty seven.005 specifications.

GSM modems will be a quick and environmentally pleasant thanks to begin with SMS, as


no precise subscription is wanted for a causation SMS supplier. In most components of the
planet, GSM modems rectangular measure a sound declare receiving SMS messages as a end
result of the sender will pay to ship the message.
It will be a compromised digital tools desktop with a GSM serial digital equipment, USB or
Bluetooth affiliation, like Falcom Samba seventy five (Other makers of
GSM digital equipmentunits embody Wavecom, Multitech and iTegno. we've
got moreover reviewed many modems in our technical assist journal.) acquiring began , insert
the GSM SIM card into the digital toolsANd insert it into an reachable USB port on your laptop.
The GSM digital tools need to even be a usual GSM smartphone with a cable and software
program gadget software driver to get right of entry to a port on your laptop computer or a USB
port. Any smartphone that helps causation / receiving SMS messages to the "extended AT
command set" will presently be supported by using SMS & MMS entree, like ETSI GSM 07.05
and / or 3GPP TS twenty seven.005 document. Note that now

35
not all cell telephones assist this digital gear interface.
Due to some compatibility troubles that will exist with cell phones, the employment of a
compromised GSM digital tools is usually greater than using a GSM mobile.
MMS digitalconversation is an extra issue. If you desire to set off incoming MMS messages on
the portal, the digital gear interface of most GSM telephones can entirely allow you to ship MMS
messages. this can be as a end result of the cell strategies the notifications of wellknown MMS
messages, apart from forwarding exploitation the digital gear interface.
It ought to even be stated that now not all telephones help the digital tools interface
to shipand acquire SMS messages. specially, most smartphones, at the facet of Blackberry,
iPhone, and Windows Mobile devices, do not assist this GSM digital tools interface
to ship and acquire SMS messages. additionally, Nokia telephones exploitation the Symbian-
based S60 (Series 60) interface entirely ship SMS messages via the digital tools interface
and now not obtain SMS with the help of the digital tools interface. 

4.5.1. GSM digital tools Principle
4.5.1.1. FACTS OF GSM MODEM:

The GSM/GPRS digital tools comes with a serial interface by way of that the digital gear will be


managed the utilization of AT command interface. AN antenna and
a electricity adapter rectangular measure provided. The easy segregation of running of
the digital gear is as under:•Voice calls

•SMS

•GSM information calls

• GPRS

36
Voice calls:

Voice calls are no longer any longer the native utilities to center of attention on. If inside the
future interfaces like electro-acoustic transducer and speaker rectangular measure geared up for a
few purpose, it need to be idea of.

SMS:
An SMS digital gear might also be a region at any place a digital gear will be wont to provide the
subsequent aspects:
• Transmission of pre-saved SMS, these SMS will be despatched surely in AN automation
system.
• SMS can also be utilized in locations anyplace tiny textual content content material should be
sent. The transmitter will be AN automation machine, for features like commerce machines,
serial machines, or positioning structures, at any place the browser continues to ship SMS
at positive times.
• SMS will be the title of GSM archives or the answer as soon as GPRS provides do not
appear to be on the market

GSM statistics calls:
statistics calls will be created thru this digital equipment. statistics calls may also be created
(as nicely as received) to a every day PSTN digital tools / phonephone
line. data calls rectangular measure specially created
to ship / acquire occasions between two units or between embedded devices.
The gain of data choice SMS is that each and every match is prevailing in causation /
receiving occasions thru its terminals.
Some elements to remain in idea inside the case of expertise calls:
• The registrar identify provider would not have it with the ordinary SIM purchased, however,
it ought to be
ask at the facet of the service service (say Airtel).
• after you prompt the data / fax carrier, you have received two separate numbers,
the records Name quantity and additionally the Fax dealer range.
• data calls rectangular measure put in exploitation Circuit Switched utilized math connections.
• the current transmission fee of documents is nine.6 kbps.
• digital tools helps additionally at fourteen.4 kbps. However, the company gives the
very niceprice of nine.6 kbps at some motive inside the GSM facts decision.
• Technologies like HSCSD (Modified High Speed Circuit Data)
can extensively enhance datarates, however, in piping.

37
Full type Supported Quad Band Embedded GSM Module (GSM 850/900 1800/1900) with AT
command set and RS232 interface at CMOS level.
This GSM wi-fi data module is that the reply to any or all
vertical purposes inside the marketfor far off wi-fi applications,
for transportable laptop gadgets or for computer systems and for far
off information communications. 
The GSM module gives the advantages as below
• terribly tiny dimension (22x22x3 mm), lightweight (3.2 g) and simple to integrate
• Low electricity consumption
• I + TTE approval and metal, GCF, FCC, PTCRB, IC
• Full RS232 with CMOS stage glide administration (RX, TX, CTS, RTS, CTS, DTR, DSR,
DCD, RI)
• Embedded communications protocol / scientific self-discipline stacks UDP / scientific self-
discipline stacks, embedded FTP and SMTP purchasers
• High overall performance at an occasional value

Smallest size designed for small applications

Tracking (people, animals, people), instrumentality chase, PDA, POS terminals, PCMCIA cards,
AMR

Pin to Pin upgrade policy to assist you save on investment High-level technical support to assist
integrate your answer

• elaborated product documentation

• analysis kit and reference style

• fast technical support through e-mail services and user forum

• Providing in-depth technical support in engineering support

• RD support and certification science lab for all of your wants

Product options

38
• E-GSM 900/1800 rate and GSM 1800/1900 GSM a pair of / 2+ part

• Output power category four (2W) on GSM 850/900 rate and sophistication one (1W) on GSM
1800/1900 rate

• management via AT commands (ITU, GSM, GPRS and extra manufacturer)

• offer voltage range: three.22 V - 4.2 V, nominal: 3.8 V

• Power consumption: Idle mode: <1.8 mA, speech mode: two hundred mA (average)

• Dimensions (mm): three x twenty x twenty and weight (g): three.2 (including shield)

Interfaces

• 3.8 V nominal power supply

• General purpose ten I / O port and two-way serial bus in CMOS a pair of.8 V

• External SIM

• Analog audio and digital voice interface for electro-acoustic transducer, speaker and handsfree

• 2.8 V in RS232 CMOS (one RS232 (2.8V) with flow management (RX, TX, CTS, RTS, CTS,
DTR, DSR, DCD, RI), 300-115,200 bps, 1200 - 57,600 bps)

• fifty Ohm antenna connective

Audio

• telecom and emergency calls (Half Rate (HR), Full Rate (FR), increased Full Rate (EFR))

• Eliminate echo and cut back noise

• DTMF

• Basic phone operation and hands-free operation

SMS

• Mobile SMS Origin (MO), Mobile finish (MT) and Cell Transmission (CB - DRX)

39
GPRS, information and Fax

• Circuit-switched information (CSD) up to fourteen.4 kbps

• Fax cluster three

• prepacked information (GPRS category B, category 10) up to one hundred fifteen kbps

GSM further Services

• decision blackball and decision amusing

• assortment recommendation

• telephone and telephone

• decision Line Identification Submission (CLIP)

• decision Line Identification Restriction (CLIR)

• Origin of Unstructured Mobile SS (USSD)

• Closed user cluster

Other features

• SIM phone book management

• Fixed Dialing Number (FDN)

• SIM Toolkit 2nd class

• Real time clock

• Alarm management

Interfaces

Interface to external SIM 3V/ 1.8V ”

40
analog audio interface

RTC backup

SPI interface

Serial interface

Antenna pad

I2C

GPIO

PWM

ADC

41
CHAPTER 4

RFID TECHNOLOGY FEATURES AND APPLICATIONS

4.1. Overview Of RFID

The RFID gadget has three elements usually the expertise with machine (tag), type (reader)


and laptop computer computer. As proven in Figure one. the form reads the logs of the tags and
sends them to the laptop computer laptop for authentication. The information unit
of size handled and as soon as verification, enter is provided. The computing
device affords an truthful fluctuate of prevalence bands with the aid of way of of low regularities
in the route of microwave frequencies [5]:
• Low frequency: 125-134 kilohertz
• High frequency: 13.56 MHz
• radical High Frequency: 902-928 megahertz
• Microwave frequency: a attempt of.4 GHz

Depending on the facilities available, RFID tags are a unit of direct or passive activity. Active
tags use the battery to determine the circuit of the device and to communicate records of the
reader’s charm tags. However, these tags are a very expensive unit of activity and are hardly
used. according to various indicators, passive tags get electricity from the reader to strengthen
the circuit. These activity unit labels have tremendous value and are then used by most functions.
It has been shown that the analysis of these labels is based on the main points [6] - [8] in Table I.
within this work the RFID tag tag unit is used. The passive RFID tag transmits records to the
reader about the discipline of attractive force generated by the reader. the event focuses in
particular on regulating the induction of Faraday’s force of attraction. The tip from the
interrogation coil generates magnetic matter that binds to the coil of the device and is therefore
generated daily in the coil of the device. The coil of the device is being replaced with the help of
fixing the antenna load. This variant is certainly a modulated sign (the subject is known as load
modulation), which is obtained by shared induction among the coils with the help of the

42
interrogation coil. The pronunciation coil deciphers this sign and passes it to the laptop to get the
same methodology.

FIGURE: BASIC RFID SYSTEM

43
4.2. What is RFID?

RFID is degree descriptor for “radio frequency identification” and refers to the technological knowledge that
is captured with the help of radio waves with the help of a reader once digital records encoded in RFID tags
or sensible tags (as specified below). RFID is that a similar as barcode coding, where events from a tag or tag
ar retrieved through a machine that stores statistics inside the knowledge. RFID, however, has many
supersystems that use bar and management package. most importantly, the information on RFID tags is also
analyzed out of sight, with barcodes having to be aligned with the optical scanner. If you are thinking of
imposing degree RFID answer, take future step and create contact with the RFID specialists at yank Barcode
& RFID. RFID (Radio Frequency Identification) is that the science that involves the use of degree magnetism or
electricity coupling inside the rate (RF) a part of the spectrum for possession of degree object, animal, or
person. RFID is being used loads of and loads of in corporations to come to a decision on barcodes. The
benefit of RFID is that it not desires direct contact or line of sight scanning. degree RFID device has three
components: degree associatetenna and a transceiver (often mixed in an passing single reader) and a device
(tag). The antenna uses rate waves to transmit an indication to the device. once activated, the tag transmits
events to the antenna. it's accustomed apprize a programmable feedback driver that an occurrence ought to
occur. The move got to be as simple as uploading the portal entry or as sophisticated as linking it to the
knowledge to spice up the economic dealing. Low frequency RFID structures (30 rate and five hundred KHz)
have fast transmission stages (generally loads of however six meters). High-frequency RFID structures (from
850 megacycle to 950 megacycle and from 2.4 to 2.5 giga hertz give longer transmission stages (over ninety
ends). In over-all, the advanced the regularity, the higher the worth of the method.

4.3. How Does RFID Work?

RFID refers to a bunch of applied sciences called automatic identification and data capture
(AIDC). AIDC techniques unit mechanically conscious of objects, acquire records regarding
them, and directly enter those records into the structures of laptops, through slight or not at all
human interference.

RFID ways that use radio waves to appreciate this. At an easy level, RFID structures contains
three components: associate RFID tag or light-weight tag, associate RFID reader, associated
associate degree antenna. RFID tags have associate integrated circuit associated associate degree
antenna, that unit accustomed transmit records to the RFID reader (also referred to as a

44
questionnaire). The reader then makes the radio waves a loads of useful variety of data. the info
collected from the tags is transferred through a communication interface to variety ADPS, where
the events unit keep inside the data and may well be analyzed later.

4.4. what's meant by RFID tag?

A radio frequency identification tag (RFID tag) is in addition a digital tag that exchanges radio
wave archives with an related RFID reader.
Most RFID tags encompass at least two fundamental elements. The first is a secondary antenna
that receives frequency (RF) waves. It is the 2nd built-in circuit (IC) used for processing and
storage, which is equal to modulating and demodulating radio waves received/sent via an
antenna. In addition, the RFID tag is recognized as the related RFID chip.
Although RFID tags have associated bar code functions, they are very advanced. Taking
the confederate diploma as an example, the correlation contrast of the archives from
the confederate diploma RFID tag does no longer require line of sight and can be carried out
internal a range of meters. One tag can serve one reader at a time.
In the context of RFID technology, the extent of "tags" consists of tags and cards. The structure
of the label relies upon upon on the physique or object related to the label. The
RFID shape can attribute at very excessive frequency (UHF), excessive frequency (HF) or low
frequency (LF). Therefore, the tag can be modified in addition to the frequency phrase used.
These tags are normally linked to nearly any object. Common wishes consist of clothing,
suitcases, containers, enchancment materials, laundry, and bottles. They are even associated to
animals, humans, and vehicles. Some RFID tag units are designed for rugged backyard
applications.
These units are designed to face up to grass and reasonable incandescent light, vibration, shock,
rain, dust, oil and a huge range harsh conditions. They are generally very passive about numbers,
do now no longer in contemporary instances prefer batteries, and can additionally additionally
feature 24/7, barring for the hazard of energy outages. Industrial label devices are normally
linked to trucks, product containers and moderate rail motors for product management, fleet
management, auto tracking, automobile identification and device tracking, etc.

45
4.5. RFID Tags and sensible Labels

As referred to earlier, accomplice diploma RFID tag consists of partner diploma circuit


ANd accomplice diploma antenna. The label consists of a material safety that at the same
time continues the matters and protects them from all completely one-of-a-kind environmental
conditions. the shielding fabric is primarily based on the applying. for
example, worker identification plates with RFID tags ar normally fictional from sturdy plastic,
and moreover the tag is inserted between layers of plastic. RFID tags rectangular measure on
hand in many shapes and sizes and ar passive or active. Passive labels ar
the important generally used as a outcomes of they are smaller and fee nicely endowed much
less to implement. Passive tags acquired to be “turned on” by using the RFID reader earlier
than information rectangular measure generally transmitted. in big difference to passive tags,
RFID strength tags furnish inside energy (e.g., battery power) so as
that understanding rectangular measure normally transmitted the smallest quantity bit times. For
a in addition complex discussion, see this article: Passive vs. RFID tags. Active RFID Tags.

Smart tags ar definitely one of a kind from RFID tags as a end result of they create
up every RFID and barcode technology. They embody AN adhesive tag embedded with RFID
tag inlay and will even have a barcode or absolutely exclusive written data. right tags
are regularly encoded and written exploitation laptop computer machine label printers,
programming RFID tags consumes past normal time and wishes superb instrumentation.

4.6. DESIGN OF RFID

4.6.1. Tags

A charge photograph makes use of tags or labels related with objects to be renowned. Two-way


radio transmitters mentioned as questioners or else readers ship a sign to label and analyze its
response.
RFID tags should additionally be passive, live, or powered. companion electricity tag consists
of electric powered battery-operated and occasionally communicates that one ID signal. The

46
battery-assisted passive (BAP) consists of a small battery interior the instrumentation and is
activated as soon as the RFID reader is gift. The passive tag may additionally be a
smaller volume costly and smaller as a effects of it is no battery; instead, the tag makes use
of radio strength transmitted exploitation the reader. However, accordingly as for the passive tag
to perform, it ought to be mild with accomplice inflated validity stage instead than one
thousand cases for sign transmission. This distinguishes them from radiation interference and
advertising. Both labels could also be read-only, a diffusion of factory-assigned series used as a
key terribly} very information, or they'll even be scan / written, correct statistics of the article
could also be written to the label by the machine user. . Once labels in programmable space
unitas ar written, they'll be multiple reads; “Empty” tags will even be written with a digital
product code through the user.

RFID tags have a minimum of two parts: associate computer design for loading and method
information, for modulating and demodulating the rate (RF) signal, accumulating DC power
from the event reader signal, and diverse specialised functions; and signal receiving and causing
antenna. Label data is detain a awfully non-volatile memory. RFID tags have good resolutions
that square measure continuous or programmable for method transmission and sensor data,
severally.

An RFID reader transmits associate encoded radio radiation for tag labeling. The RFID tag
responds with identification and fully completely different information once receiving the
message. this can even be a special serial selection on the label, or it will even be product-related
records, sort of a stock selection, batch or batch selection, date of manufacture, or fully
completely different information. Since the tags square measure serial numbers, the RFID
machine organize can distinguish and analyze many of the tags which will be embedded inside
the RFID reader modification.

4.6.2. Readers

RFID structures is assessed pattern tags and reader varieties. The Active Reader Tag (PRAT)
convenience contains a passive reader that alone receives radio indicators from live tags (battery-
powered, transmission-only). The reception of the body part convenience reader is varied,

47
starting from 0-200 quantity (1-2000 ft), permitting flexibility in objectives like and security and
management.

An Active Reader Passive Label (ARPT) device has degree energy reader that transmits kind
indicators and additionally receives passive tag authentication responses.

An Active Reader Active Label (ARAT) device uses energy tags that ar aroused from lie with
the live reader interrogation image. One version of this convenience additionally aims to use a
battery-assisted passive label (BAP). It behaves kind of a passive tag. However, the label come
back notification signal contains a occasional battery.

Fixed readers ar organized to make a particular survey sector in order that they will be
controlled. This leaves a markedly delineate place of study for once labels enter and leave the
form field. Mobile readers will be established by hand or in carts or vehicles.

4.7. USES OF RFID

4.7.1. provision & supply Chain Visibility

Gaining within the give chain will increase potency, reduces errors and improves quality. In chaotic
producing, shipping, and distribution environments, quantity information on the recognition of character
objects give insights into action measures. With the visibility provided via RFID, you’ll air your as a result of
hearing Six written symbol Master Belt Black in no time

4.7.2. Item level inventory trailing

It is suggested to trace the extent of objects in a very wide section of sectors, however, the
likelihood of retail use of RFID has one among the simplest ceilings in most random sentences.
As noted higher than, it's marvelous to follow objects through the grant chain; but, it's assumed
that the management of objects through the provision chain reaches the sales issue. If the stock
convenience that shares events all told commerce business units is correctly designed, you'll have
a treasure treasure of active information. Recent Earnings: Store workers will use a hand-held
RFID reader to extra service on a couple of minutes.

48
4.7.3. Race temporal order

Seasonal marathons and races unit variety of the foremost common for RFID use. However,
many races do not understand in any implies that they are mistreatment the use of RFID
technology over time, that's that the potential of RFID to be the right consumer experience. If
you choose to need a additional in-depth check abreast of the temporal property of RFID
athletics, verify our home guide and verify the foremost recent interview with TimeWire for a
wonderful race organization.

4.7.4. participant following

Condition you’ve achieved a colossal deal earlier, you’ll acknowledge that crucial to remain up
with the flood of tourists to sites that unit constantly moving at a gradual pace, significantly at
seminars and seminars. With academic degree RFID participant resolution, deduct any traces of
registration from the entries.

4.7.5. Materials management

In construction and varied connected industries, substances tend to possess the best risk costs. In
massive workplaces, finding a substance can actually be problematic. RFID decisions like Jovix
take the betting work out of the equation.

4.7.6. Access management

Some areas wish the expected level of security and access. From doors to parking masses, RFID
access management tags solely forbid access to pre-approved ones

4.7.7. Observance of IT assets

Active computing, like server boards, laptops, tablets, and totally different peripherals ar a
fashionable investment for any business, to not mention that information carry on these items is
harmful to the wrong hands. Active IT tags modify your IT team to quickly track the amount of
inventories and guarantee everything is in place.

49
4.7.8. RTLS (Real Time Location System)

In some applications you would like to trace things of assets, staff or customers in real time.
whether or not or not you’re chase the efficiency of employee movements, the efficiency of a
store’s set up, or things of valuable resources, RFID systems offer visibility anywhere.

4.8. RFID Security benefits and Threats

The customary practise of RFID tags presents a number of safety blessings, on the other


hand should depiction new privateness threats. instead, invasive or unwieldly safety practices,
like pursuit airline passengers and baggage, may additionally even be accomplished exploitation
RFID systems. Authentication structures already use RFID technology, like keyless entry
systems. Inserting RFID tags into documents, clothier product and currencies as a seal of
legitimacy will quit counterfeiting. whereas RFID tags decorate fashion of
the protection residences of these applications, they're going to extend privateness threats or
manufacture new protection risks. RFID structures ar entire altogether {different
completely definitely different} from exclusive suggests that of identification as
a consequences of RF conversation is contactless and non-visual, altogether absolutely one of a
kind suggests that of identification ar contact-based or would surely like vision. in many
words, it is extra long lasting for the RF tag proprietor to bodily cease conversation by the label.
The sexual intercourse of RF tags isn't always unique; reminiscence machine cards,
as companion diploma example, ar confusing, alternatively we've got bought a bent to have a
tendency to expect that the cardboardboardboardholder
takes bodily accountability for stopping unauthorized users from bodily having access to the
postcard. Obviously, the expansion traits of magnetism fields restriction the differ of passive
RFID card readings. In fact, most labels that function at thirteen.56 MHz can no longer be
browse over a meter and in addition the 915 MHz label is challenging to flick thru most
materials. However, as a outcomes of the statistics keep on on the tag turns into a amazing deal
of and a high-quality deal of valuable, it is vital to show up at pretty troubles related with
RFID safety and privacy.

50
4.9 security goals

With these protection needs in mind, mirror onconsideration on the protection homes of labels
that unit read-only in passive producing unit programming. every tag choices a special image,
like Associate in Nursing EPC. though not larger “promiscuous” than optical barcodes,
processed manage of RF tags is feasible. This primary started simply violates the reason behind
privacy, as a results of it's come-at-able to music tag proprietors and examine tag content
material if the tag is acceptable introduced among the form reader house. Neither tags nor
readers unit authenticated; therefore there's not any organize of have religion either. To tackle
these shortcomings, let’s calculate that we have Associate in Nursing inclination to want the
coverage of dillydallying single sequential figures on the issue of sale. Labels saved through
shoppers would still embrace product code data, but not distinctive identification numbers. sadly,
observation is still viable through linking “constellations” of certain kinds of labels to the
identities of the holders. as Associate in Nursing example, RFID-labels , Rolex watches, Gucci
shoes and a special fondness for Cohiba cigarettes will denounce your obscurity. Moreover, this
format cannot however furnish a dependable mechanism. Providing the named protection
objectives needs the establishment of get entry to manage and authentication. Public key
cryptography affords an answer. every tag will embrace a public key and a private key for a
novel reader (type). throughout the question, tags and readers will certify with each totally
wholly totally different the usage of protocols that unit properly understood with these keys.. To
avoid following, holders will ought to notice and disable any tags they'll have. publicly on the
market tag departures got to be random or just changeable on the way to evade lengthy linkage
among labels and owners. The content of private tags ought to be protected through access
management and, if the polling channels do not appear to be secure, encrypted. every labels and
readers got to trust each other. It ought to be difficult to falsify either side. in addition to
providing a mechanism to control access, mutual authentication between the tag collectively the}
reader conjointly provides confidence. Session hijacking and playback attacks are also a priority.
creating errors or interrupting power mustn't open protocols or windows to hijack tries. every the
label and so the reader ought to be proof against copy or mid-range assaults.

51
4.10. Low value RFID issues

With these protection needs in mind, mirror onconsideration on the protection homes of labels
that unit read-only in passive producing unit programming. every tag choices a special image,
like Associate in Nursing EPC. though not larger “promiscuous” than optical barcodes,
processed manage of Radio Frequency labels is feasible. This primary started simply violates the
reason behind privacy, as a results of it's come-at-able to music tag proprietors and examine tag
content material if the tag is acceptable introduced among the form reader house. Neither tags
nor readers unit authenticated; therefore there's not any organize of have religion either. To
tackle these shortcomings, let’s calculate that we have Associate in Nursing inclination to want
the coverage of dillydallying single sequential statistics by the issue of sale. Labels saved
through shoppers would static embrace invention code data, but not distinctive identification
numbers. sadly, observation is still viable through linking “constellations” of certain kinds of
labels to the identities of the holders. as Associate in Nursing example, RFID-tagged Gucci
shoes, Rolex watches, and a special fondness for Cohiba cigarettes will denounce your obscurity.
Moreover, this format cannot however furnish a dependable mechanism. Providing the named
protection objectives needs the establishment of get entry to manage and authentication. Public
key cryptography affords an answer. every tag will embrace a public key and a private key for a
novel reader (type). throughout the question, tags and readers will certify with each totally
wholly totally different the usage of protocols that unit properly understood with these keys. to
forestall listening among the shape field, tags can cipher their content material the use of a
random receiver to forestall following. sadly, the acceptance of sturdy public key cryptography
goes past the assets of less costly (US $ zero.05-0.10) labels, though the alternatives unit larger
pricey to label [13]. bilateral message authentication desires every label to half one vital through
a reader or to share a vital between a gaggle of tags. acceptive alone one key per tag desires
subtle key management. If keys unit to be shared, the tags got to be proof against the bodily
assaults delineated in [18]; otherwise, endangering one label places Associate in Nursing
complete batch at risk. Implementing ladder-proof reminiscence on a reasonable label with many
logical ports could also be a discouraging task, specifically due to the matter of securing

52
reminiscence on clever collaborating in cards with implausibly large resources. acceptive robust
bilateral encryption is also a venture among the quick term.

4.11. APPLICATIONS OF RFID

RFID technological power is utilized in several industries to perform such duties as:

• Inventory management

• quality chase

• Personnel chase

• dominant get right of entry to to restrained zones

• ID badging

• give chain management

• Counterfeit interference (e.g., within the pharmaceutical industry)

Although RFID science has been used as soon as you mirror that hostilities II, the demand for
RFID tools is growing speedily, in part to permit RFID merchandise to be derived to
suppliers geared up by the U.S. Department of Defense (WalD Mart) and Wal-Mart.
Whether or now not RFID compliance is needed, features that currently use barcode
technological electricity ar captivating candidates for upgrading to a device that produces use of
RFID or some combination of each. RFID affords quite a few edges over
barcodes, extensively thinking about the precise indeniable reality that qualification RFID tag
will include large information involving qualification object than a barcode. to boot, RFID tags
ar no longer problem to the harm that barcode tags will cause, like croaky and marking.

53
4.12. Some methods to RFID protection

Accepting the fugitive boundaries of low tag resources, we will have a seem to be at
a effortless RFID protection theme specially based totally often absolutely proceeding a one-
sided hash perform. In follow, a hardware-optimized challenge place hash characteristic would
serve, assumptive that it is carried out with way fewer property than interchangeable secret
writing. all via this vogue, every and each hash-enabled label consists of a factor of
the memory hold on for a "meta-ID" and works unsecured or secured. tho' unsecured,
the entire usual overall performance of the tag and so
the reminiscence question willpower neighborhood unit reachable to anyone. To lock a tag, the
man or girl of affairs calculates the hash charge of a random key and directs that one to the tag as
a lock value, that is lock = hash (key). In turn, the tag shops the lock fee inside the meta-
ID reminiscence place and enters the secured state. whereas secured, a tag responds to any or all
queries with the dependent meta-ID fee and limits all in
reality certainly sincerely wonderful utility. To undo a tag, the proprietor sends the simply well
worth of the real key to the tag. The tag breaks this price and compares it to the lock saved to
a limit area the meta-ID. If the values match, the tag
can release itself. every label perpetually responds to
thereforeme tremendously question so typically reveals it. Tags unit set with a bodily destruct
mechanism and may additionally moreover on my personal be unsecured as quickly as speakme
with partner authorized reader. inner the suit of a loss of electrical electricity or interruption of
transmission, the tags can return to the default lock state. A positive channel is equipped for
administration preferences like key management, disabling tags, or writing tags, requiring bodily
contact between a manipulate machine and a tag. Requiring bodily contact
for integral basic overall performance helps defend con to wi-fi sabotage or denial
of carrier attacks. The hash-based lockup mechanism satisfies most of our privateness problems.
Access manage for tag content material fabric material is administration via myself by means
of methodology of key house owners. can|they will|they'll} take a seem at and disable tags that
guys and woman will carry. Labels normally reply to queries. prolongedassociations is avoided,

54
as blocked tags on my personal reply to the perfect meta-ID. One seemat is that ancient meta-ID
values is accustomed song associations over time. This received to refresh the periodic meta-ID
values with the aid of methodology of unlocking and re-locking the tags.
even although authenticating readers and furnish a certain channel meets trend of
our positive needs, this plan sacrifices a number safety residences to stay costs; in unique tag
authentication. Label macintosh general overall performance would allow tags
to disclosethemselves, then again is preceding the elegant much less luxurious tag resources.
Lack of authentication well-known tags in mid-range attacks, the location confederate aggressor
will question meta-ID tags, in boost these values to an straightforward operator, and future
unhitch the codes thru the operator key responses. more than a few keyless entry structureshave
the equal vulnerability of late. In any case, attackers World Health Organization do now not get
admission to companion approved reader cannot get appropriate of entry to the tag content
material cloth material grounds of bodily channels.

55
CHAPTER 5

RESULTS AND ASSUMPTION

The objectives of this project ar achieved. the matter of trying to find on the market parking areas
consumes absolutely eliminated by booking openings beforehand via the SMS system and
conjointly the RFID system. this system permits users to waste time in search parking lots and
improve the use of parking lots. Designed as a system to produce an entire answer to issues
associated with transport, like accident alert, Vehicle police investigation.

• It is extended with the latest RFID technology for toll controller, traffic signal regulator, traffic
desecration, car parks organization, vehicle theft then distinct zone attentive changes.

• Low price optimized answer the use of RFID and GSM cell technologies. This is steady with


developed international locations such as the US, England, Germany and Japan, the place RFID,
GPS and GSM applied sciences are broadly used to control traffic.
• There is no automated transportation administration machine in India due to excessive cost.
With this in mind, the proposed machine is at low cost. The system we have designed will make
it easier for users and a safe way to park:

• Makes entry tracks for unwanted vehicles.

• At the exit of a paid car park, parking cards can be checked in front of the vehicle trapped in the
system. This prevents a parking lot from leaving the facility with another parking card.

• If you lose your parking ticket, the operator can easily track the time of entry of the vehicle to
determine the amount to be paid.

• For seasonal parker members who use transponder cards, RFID ensures that the registered
vehicle is used only by the member system.

56
REFRENCES

1) Rushikesh Shinde “Parking Space Searching & Reserving With Mobile Using Bluetooth
Technology” Proceedings of the NCNTE2012, Third Biennial National Conference on
Nascent Technologies.
2) Pala Z., Inanc N., “Smart Parking Applications Using RFID Technology”, 1st Annual
Eurasia RFID Conference, September 2007, Turkey
3) www.wikipedia.org
4) “RFID based Parking Management System ”Rutuja Patil, Student Member, IEEE, Shruti
Shetty, Student Member, IEEE and Sreedevi Sanjeev Nair, Asst. Professor, Dept. of
EXTC FCRIT, Vashi
5) Zeydin Pala, “Smart Parking Applications using RFID Technology”, Yuzuncu Yil
University, Electrical and Electronics Engineering Dept
6) http://www.engineersgarage.com
7) Shihong Qin, Xiangling Yao.,” An intelligent parking system based on GSM module”,
School of Electrical and Information Engineering, Wuhan Institute of Technology,
Wuhan 430073 P.R. China.
8) Xiaolong Li, Uma Kanth Ranga.,” Design and Implementation of a Digital Parking Lot
Management System”, the Technology Interface Journal/Fall 2009.
9) D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding, “A brief survey on current
RFID applications,” in Proc. International Conference on Machine Learning and
Cybernatics, Baoding, July 12-15, 2009, pp. 2330-2334.
10) B. Yan and D. Y. Lee, “Design of spot ticket management system based on RFID,” in
Proc. International Conference on Networks Security, Wireless Communications and
Trusted Computing, 2009, pp. 496-499.
11) G. Ostojic, S. Stankovski, and M. Lazarevic, “Implementation of RFID technology in
parking lot access control system,” in Proc. Annual RFID Eurasia Conference, 2007, pp.
1-5. [4] N. Ahmad, S. Butler, and U. Ramachandran, “GuardianAngel: An RFID based
indoor guidance and monitoring system,” 2010, pp. 546-551.

57
12) K. S. Huang and S. M. Tang, “RFID applications strategy and deployment in bike renting
system,” in Proc. ICACT 2008, pp. 660-663.
13) S. Lahiri, RFID sourcebook, IBM Press, Westford, Massachusetts, 2006.
14) F. Lourenco and C. Almeida, “RFID based monitoring and access control system,” in
Proc. INFORUM, 2009.

58

You might also like