Professional Documents
Culture Documents
Final Year Report GTU BE Electrical
Final Year Report GTU BE Electrical
A PROJECT REPORT
ON
RFID BASED ATTENDANCE SYSTEM
Submitted by
IN
VALLABH VIDYANAGAR,ANAND
Gujarat Technological University,Ahmedabad
December,2013.
i
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
CERTIFICATE
Date:
ii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
CERTIFICATE
Date:
iii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
OF ENGINEERING COLLEGE
INFORMATION &COMMUNIATION TECHNOLOGY DEPARTMENT
2013
CERTIFICATE
Date:
iv
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
ACKNOWLEDGEMENT
We wish to avail the opportunity to express our sincere gratitude to our project
guide Prof.Vaibhvi Bhaviskar for their tremendous support, encouragement and
help throughout the project. We would also like to thank Prof.V.M.Dabhi and
Prof.Keyur Prajapati for their help. They have helped us a lot in the project and
related experimental work. Their creative thinking and motivation have oriented us
to work harder and to develop logical approach for the project.
v
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
ABSTRACT
The main objective of this project is to record the attendance of students using
RFID tags. Each student is provided with his/her authorized tag to swipe over the
reader to record their attendance. In classrooms, time is wasted in roll calls as it is
done manually. In this proposed system, authorized student is given an RFID tag. This
tag contains an integrated in built circuit that is used for storing, processing
information through modulating and demodulating of the radio frequency signal that
is being transmitted. Thus, the data stored in this card is referred as the
identification/attendance of the person once the student places the card in front of
the RFID card reader; it reads the data and verifies it with the data stored in the
microcontroller from 8051 family. If the data matches, then it displays a message on
the LCD confirming the entry of that student else displays a message denying the
attendance. The status of a student’s attendance can be retrieved from this system by
pressing the status button interfaced to the microcontroller Hence, a lot of time is
saved as all the students attendance is directly stored in the data base. The project
can be further enhanced by adding features like sending an SMS of the daily
attendance of students to their parents. It can also be enhanced by using a finger
print module in place of RFID module that has certain drawbacks of tags be misused.
vi
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
LIST OF FIGURE
FIG. 2.3.1 RFID Tag xvii
vii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
LIST OF TABLES
Table 1 The different sizes of tags and their application at different frequencies xviii
Table 2 Size of Smart Tags and Read Distances at Different Frequencies xviii
viii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
Index
Ch-1 Introduction xi
1.1 Introduction xi
ix
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
References lvi
CHAPTER: 1
x
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
INTRODUCTION
1.1 INTRODUCTION
At its most basic, RFID systems consist of small transponders, or tags, attached to physical
objects. RFID tags may soon become the most pervasive microchip in history. When
wirelessly interrogated by RFID transceivers, or readers, tags respond with some identifying
information that may be associated with arbitrary data records. Thus, RFID systems are one
type of automatic identification system, similar to optical bar codes.
There are many kinds of RFID systems used in different applications and settings. These
systems have different power sources, operating frequencies, and functionalities. The
properties and regulatory restrictions of a particular RFID system will determine its
manufacturing costs, physical specifications, and performance. Some of the most familiar
RFID applications are item-level tagging with electronic product codes, proximity cards for
xi
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
physical access control, and contact-less payment systems. Many more applications will
become economical in the coming years.
While RFID adoption yields many efficiency benefits, it still faces several hurdles. Besides
the typical implementation challenges faced in any information technology system and
economic barriers, there are major concerns over security and privacy in RFID
systems.Without proper protection, RFID systems could create new threats to both corporate
security and personal privacy.
CHAPTER: 2
xii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
LITERATURE REVIEW
The origins of RFID technology lie in the 19th century when luminaries of that era made great
scientific advances in electromagnetism. Of particular relevance to RFID are Michael
Faraday’s discovery of electronic inductance, James Clerk Maxwell’s formulation of
equations describing electromagnetism, and Heinrich Rudolf Hertz’s experiments validating
Faraday and Maxwell’s predictions. Their discoveries laid the foundation for modern radio
communications.
One of the first applications of a radio frequency identification system was in “Identify Friend
or Foe” (IFF) systems deployed by the British Royal Air Force during World War II. IFF
allowed radar operators and pilots to automatically distinguish friendly aircraft from enemies
via RF signals. IFF systems helped prevent “friendly fire” incidents and aided in intercepting
enemy aircraft. Advanced IFF systems are used today in aircraft and munitions, although
much of the technology remains classified.
Electronic detection, as opposed to identification, has a long history of commercial use. By the
mid- to late-1960s, Electronic Article Surveillance (EAS) systems were commercially offered
by several companies, including Checkpoint Systems and Sensormatic. These EAS systems
typically consisted of a magnetic device embedded in a commercial product and would be
deactivated or removed when an item was purchased. The presence of an activated tag passing
through an entry portal would trigger an alarm. These types of systems are often used in
xiii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
libraries, music stores, or clothing stores. Unlike RFID, these types of EAS systems do not
automatically identify a particular tag; they just detect its presence.
2.2 Applications
Early commercial examples of RFID applications include automatic tracking of train cars,
shipping containers, and automobiles. Railroad cars were originally labeled with optical bar
code labels for tracking. These labels began to deteriorate and be obscured by dirt, causing
reads to fail. As a solution, railroad companies began to tag railcars with RFID devices. By
1994, these devices were mandatory and nearly every railcar in the United States was tagged.
RFID devices began to be used for automated toll collection in the late 1980s and early 1990s.
Electronic toll systems have since been adopted around the world. Like railway and shipping
applications, electronic toll systems may use sturdy, self-powered RFID devices.
Automobiles, railcars, and shipping containers are all high-value items, with ample physical
space that can accommodate more expensive and bulky RFID devices. These types of tags
could offer much more functionality than simple identification. For example, shipping
containers might have accelerometer sensors, tamper alarms, or satellite tracking integrated
into an identification device.
As manufacturing costs dropped, RFID systems began to be used for lower-value items in
industries besides transport. An example is in animal identification of both pets and livestock.
Glass-encapsulated RFID devices have been implanted in millions of pets throughout the
United States. These tags allow lost animals to be identified and returned to their rightful
owners. These tags have a very short read range.
Livestock, particularly cattle, are often labeled with a RFID device that is clamped or pierced
through their ear, attached to a collar, or swallowed. Unlike implanted pet tags, these RFID
devices are rugged and able to be read from greater distances. Concerns over Bovine
Spongiform Encephalopathy (mad cow) disease have motivated proposals for universal
tracking of livestock with these types of RFID systems. Like transport applications, animal
tracking is still essentially a low-volume, high-value market that may justify relatively
expensive RFID systems..
xiv
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
This section discusses basics of RFID systems and offers taxonomy of the many various types
of RFID systems. Discussion of RFID technology tends to focus only on tag devices. It is
more accurate to view RFID as a complete system that includes not only tags, but also other
important components. RFID systems are composed of at least three core components:
Active tags
Semi-passive tags
Passive tags
Active tags
Active RFID tags have their own internal source of power. This is used to power the circuits
and broadcast signals to the reader. These tags are usually more reliable than passive tags.
xv
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
They also have a stronger signal because of their built-in power supply. This also allows them
to work in places that passive tags wouldn't be able to, such as in water(which would incluce
humans and other animals), metal, or from longer distances. They are however, larger and
more expensive than passive tags. Today, active tags can transmit from hundreds of meters
and their batteries can last for about 10 years. Some active tags contain different sensors that
can read things like temperature, humidity, and radiation
Semi-passive tags
Semi-passive tags have an internal power source like active tags, but it only powers the
integrated circuit and doesn't broadcast a signal to the reader. The radiofrequency is used to
broadcast a signal like a passive tag. These tags have a higher sensitivity than passive tags.
This means that they can have a higher range and enhanced reliability. They also have a
longer battery life than active tags.
Passive tags
Passive RFID tags don't have an internal source of power. There is an electrical current that is
created in the antenna by the incoming radio frequency signal from the reader. This means
that the antenna has to be able to collect power from the incoming signal and also transmit the
outbound signal to the reader. A passive tag can respond with identification numbers or non-
volatile storage data. It can be read from about 10 cm to a couple of meters and since they
don't have to have a power source on the device, they can be extremely small(they can be
embedded in a sticker or under the skin).
In 2007, a company called RFIDsec created a passive tag that had many more privacy
capabilities built into the device. These included built-in firewall acces controls,
communication encryption, and a silent mode that would ensure that the soncumer at the point
of sales can get exclusive control of the key to control the tag. In 2007, Hitachi,Ltd. developed
a passive tag that was table to embedded in a sheet of paper. The problem with this is the
antenna is 80 times bigger than the device. It can receive and send signals from as far away as
a couple hundred meters. Companies are currently developing methods of production that will
hopefully lower the prices of RFID tags dramatically.
xvi
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
A Silicon chip.
An antenna, which is connected to the chip.
Encapsulation.
The card is internally having a Silicon chip which controls communication with the reader.
Chip has a section of memory that stores the Identification code and the content of the
memory are transferred to the reader when the chip is activated. The card has an antenna
attached to the chip to transmit the frequency.
xvii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
Readers often power what are called passive tags through their RF communication channel.
These types of tags carry no on-board power and rely solely on a reader to operate. Since
these tags are so limited, may subsequently rely on a reader to perform computation as well.
xviii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
Readers come in many forms, operate on many different frequencies, and may offer a wide
range of functionality. Readers may have their own processing power and internal storage, and
may offer network connectivity. Readers might be a simple conduit to an external system, or
could store all relevant data locally.
Currently, many applications rely on fixed reading devices. Early trials of EPC at a major
supermarket chain integrated fixed readers into docking-bay entrances. These readers scan
tags at the pallet level as shipments of products arrive. In the long term, readers may be
integrated at a shelf level as a “smart shelf ”. Smart shelves would scan for tags at the item
level and monitor when they are added and removed from a shelf.
RFID readers may also be integrated into hand-held mobile devices. These mobile readers
would allow someone to, for example, take inventory of a warehouse by walking through its
aisles. The cellular phone manufacturer Nokia is already offering RFID-reading functionality
in some of their cell phones. If EPC-type tags become highly successful, interesting and useful
consumer applications might arise. If this occurs, RFID reading functionality might become a
common feature on cellular phones, PDAs, or other handheld computing devices.
As briefly mentioned before, tags may obtain their power in several different ways. The power
source is an essential property of a tag, since it will determine a tag’s potential read range,
lifetime, cost, and what kind of functionalities it may offer. The power source will also be
important in determining how a tag may be oriented and what physical forms it may take.
There are three main classes of tag power sources: active, semi-passive, and passive. Active
tags have their own source of power, such as a battery, and may initiate communication to a
reader or other active tags. Because they contain their own power source, active tags typically
have a much longer operating range than passive-tags. Large asset and livestock tracking
applications often use active tags, since the items they are attached to (e.g. railcars, shipping
containers, or cattle) are high in value and have physical space for a bulkier, rugged tag.
xix
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
A key feature of active tags is that they are able to initiate their own communication with
readers. Advanced active tags, or “smart dust”, might even form ad hoc peer networks with
each other. One useful application of active tags is in shipping containers, which can fall off
ships over rough seas. These missing containers sometimes are not accounted for until well
after the ship has docked. An active tag with an accelerometer sensor could detect when it was
falling off a stack of containers and broadcast a log of its demise before it sank into the ocean.
Active tags could also function as security alarms using the same functionality. By contrast a
semi-passive (or semi-active) tag have an internal battery, but are not able to initiate
communications. This ensures that semi-passive tags are only active when queried by a reader.
Because semi-passive tags do have an internal power source, they do offer a longer reader
range than passive attacks, but at a higher cost.
Passive tags have neither their own power source, nor the ability to initiate communication.
Passive tags obtain energy by harvesting it from an incoming RF communication signal. At
lower frequencies, this energy is typically harvested inductively, while at higher frequencies it
is harvested through capacitance.
While passive tags have the shortest read range of all three powering types, they are the
cheapest to manufacture and the easiest to integrate into products. Batteries are relatively
expensive and cannot easily be incorporated into some items, like paper packaging. For this
reason, passive tags are the most common tags. EPC tags are passive. Lacking an internal
power source dictates many properties of passive tags. First, they cannot operate without the
presence of a reader, although passive tag could temporarily cache some energy in a capacitor.
Because of their necessarily weak response signal, passive tags are often more sensitive to
environmental noise or interference. Table 1 compares various properties of passive, semi-
passive, and active tags.
xx
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
Different RFID systems operate at a variety of radio frequencies. Each range of frequencies
offers its own operating range, power requirements, and performance. Different ranges may be
subject to different regulations or restrictions that limit what applications they can be used for.
The operating frequency determines which physical materials propagate RF signals. Metals
and liquids typically present the biggest problem in practice. In particular, tags operating in
the ultra-high frequency (UHF) range do not function properly in close proximity to liquids or
metal.
Operating frequency is also important in determining the physical dimensions of an RFID tag.
Different sizes and shapes of antennae will operate at different frequencies. The operating
frequency also determines how tags physically interact with each other. For instance, stacking
flat foil inlay tags on top of each other may interfere or prevent tags from reading properly.
Table 2 lists standard frequencies and their respective passive read
distances.
Frequency Range Frequencies Passive Read Distance
Lower Frequency (LF) 120-140 KHz 10-20 cm
High Freuency(HF) 13.56 MHz 10-20 cm
Ultra High Frequency (UHF) 868-928 MHz 3m
Microwave 2.45-5.8 GHz 3m
Ultra Wide Band (UWB) 3.1-10.6 GHz 10 m
Table 4 : Common RFID operating frequencies
2.3.4(A)Low Frequency (LF)
Low frequency (LF) RFID tags typically operate in the 120-140 kilohertz range. Most
commonly, LF tags are passively powered through induction. As a result, they typically have
very short read ranges of 10-20 centimeters.
LF tags can be used in rugged environments and can operate in proximity to metal, liquids, or
dirt. This makes them useful for applications like implantable pet identification tags or
laundry management tags. One disadvantage of LF tags is they have a very low data read rate
compared to other operating frequencies.
xxi
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
LF tags are often used in car immobilization and access control systems. In these systems, car
will only start if an LF tag, typically attached to the ignition key, is in proximity to the
ignition. This takes advantage of LF’s short read range and uses it as a security feature. In
2006, LF passive tags may be purchased in bulk for US$1 per tag or less. Two major
manufacturers of LF tags are Texas Instruments and Phillips Semiconductor. The ISO 18000-
2 standard offers specifications for LF RFID tag.
High frequency (HF) RFID tags operate at the 13.56 megahertz frequency. HF tags are often
packaged in a foil inlay or credit card form factor. This makes HF tags useful for building
access control, contact-less credit cards, and ID badges. Again, the relatively short read range
of HF is an advantage in theses settings.
HF tags are also used in many asset-tracking applications. Libraries and bookstores often use
HF foil inlays to track books. Some airports have started using HF RFID luggage tags for
baggage handling applications. HF tags offer a higher data read rate than LF tags, but do not
perform as well as LF tags in proximity to metals or liquids. HF tags do, however, offer better
performance near metals or liquids than UHF tags do.
The HF frequency range lies on a heavily regulated part of the radio spectrum. Signals
broadcast by readers must operate in a narrow frequency band. This presents a problem for
environments with sensitive electronics, like medical equipment, that operate on nearby
frequencies. This makes HF tags inappropriate for environments like hospitals.
In 2006, HF passive tags may be purchased for US$0.50 or less per tag in quantity. Texas
Instruments and Phillips both offer HF tag lines, although there are many smaller and
specialized manufacturers or integrators in the HF space.
International Standards Organization (ISO) specifications for HF RFID tags are specified by
the ISO 18000-3 standard.Related specifications for HF contact-less smart cards and
proximity cards appear in ISO standards.
xxii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
Ultra-high frequency (UHF) RFID tags operate in the 868-928 megahertz range. European
tags typically operate within the 868-870 MHz range, while the United States and Canada
operate at 902-928 MHz. UHF tags are most commonly used for item tracking and supply-
chain management applications. This is largely because they offer a longer read range and are
cheaper to manufacture in bulk than LF or HF tags. The first generation EPC tags operate at
UHF frequencies.
A major disadvantage of UHF tags is that they experience interference in proximity to liquids
or metals. Many applications like animal tracking, metal container tracking, or even many
access control systems are infeasible with UHF tags. Some materials have been developed that
may shield UHF tags from metal-related distortion, but these may be costprohibitive to use in
practice. UHF readers may also interfere with sensitive electronics like medical equipment.
.
In active RFID systems, tags have their own transmitter and power source. Usually, the power
source is a battery. Active tags broadcast their own signal to transmit the information stored
on their microchips.
Active RFID systems typically operate in the ultra-high frequency (UHF) band and offer a
range of up to 100 m. In general, active tags are used on large objects, such as rail cars, big
reusable containers, and other assets that need to be tracked over long distances.
There are two main types of active tags: transponders and beacons. Transponders are “woken
up” when they receive a radio signal from a reader, and then power on and respond by
transmitting a signal back. Because transponders do not actively radiate radio waves until they
receive a reader signal, they conserve battery life.
xxiii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
In passive RFID systems, the reader and reader antenna send a radio signal to the tag. The
RFID tag then uses the transmitted signal to power on, and reflect energy back to the reader.
Passive RFID systems can operate in the low frequency (LF), high frequency (HF) or ultra-
high frequency (UHF) radio bands. As passive system ranges are limited by the power of the
tag’s backscatter (the radio signal reflected from the tag back to the reader), they are
typically less than 10 m. Because passive tags do not require a power source or transmitter,
and only require a tag chip and antenna, they are cheaper, smaller, and easier to manufacture
than active tags.
Passive tags can be packaged in many different ways, depending on the specific RFID
application requirements. For instance, they may be mounted on a substrate, or sandwiched
between an adhesive layer and a paper label to create smart RFID labels. Passive tags may
also be embedded in a variety of devices or packages to make the tag resistant to extreme
temperatures or harsh chemicals.
Passive RFID solutions are useful for many applications, and are commonly deployed to track
goods in the supply chain, to inventory assets in the retail industry, to authenticate products
such as pharmaceuticals, and to embed RFID capability in a variety of devices. Passive RFID
can even be used in warehouses and distribution centers, in spite of its shorter range, by
setting up readers at choke points to monitor asset movement.
Two promising technological developments especially relevant to RFID are printed circuits
and organic components. These technologies have the potential to greatly lower
manufacturing costs and to produce RFID tags built out of flexible plastic materials, instead of
silicon.
The long-term vision is that a large-scale packaging manufacturer could print RFID tags
directly into paper or plastic as it is produced. Product makers would not use this
RFIDenhanced packaging material as they normally would. One advantage in terms of privacy
is that RFID tags would only be attached to product packaging, and not the product itself.
xxiv
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
This technology is still years away from being economic and there are many hurdles to
overcome. Currently, circuits printed by an inkjet have a very low resolution; circuit gates
take much more surface area than traditionally fabricated circuits. Other technologies like
gravure printing also produce relatively large circuit surface areas. Regardless, much research
is being focused on organic components for other purposes, like flexible displays.
Developments in this area will benefit RFID, potentially opening the door to many
inexpensive and interesting future applications.
The need for an individual for carrying out attendance is eliminated thereby
reducing time and labor of human resource.
A proper and advanced record can be maintained with date and time for years together
thereby eliminating the need of maintaining files and reducing the space occupied because
of it.
A high range of accuracy can be achieved nullifying the error caused because of human.
It is difficult for an RFID reader to read the information in case of RFID tags installed
in liquids and metal products. The problem is that the liquid and metal surfaces tend to
reflect the radio waves, which makes the tags unreadable. The tags have to be placed
in various alignments and angles for taking proper reading. This is a tedious task when
the work involves big firms.
Interference has been observed if devices such as forklifts and walkie-talkies are in the
vicinity of the distribution centers. The presence of mobile phone towers has been
found to interfere with RFID radio waves. Wal-Mart, the retail sector giant, has
installed billions of RFID tags in their products throughout the world and they have
encountered such problems.
The USA and Europe, for instance, have different range of frequencies that allow
RFID tags to function. This makes it mandatory for international shipping companies
and other organizations to be aware of the working pattern of other nations also, which
can be very time-consuming.
xxv
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
CHAPTER: 3
xxvi
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
xxvii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
CHAPTER: 4
COMPONENTS DETAIL
4.1 MICROCONTROLLER
A Microcontroller is a single chip that contains the processor, non-volatile memory for the
program(ROM or Flash),volatile memory for input and output(RAM),a clock and an I/O
control unit.AT89C51 is a low power,high performance CMOS 8-bit microcontroller with 8K
bytes of in system programmable flash memory.The AT89C51 provides following standard
features:8K bytes of Flash, 256 bytes of RAM,32 I/O liens, two data pointer, three 16 bit
timer/counters, on chip oscillator.
xxviii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
Pin Description
VCC
Supply voltage.
GND
Ground.
Port 0
Port 0 is an 8-bit open drain bi-directional I/O port. As an output port, each pin can sink eight
TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs.
Port 0 can also be configured to be the multiplexed low order address/data bus during accesses
to external program and data memory. In this mode, P0 has internal pull-ups. Port 0 also
receives the code bytes during Flash programming and outputs the code bytes during program
verification. External pull-ups are required during program verification.
Port 1
Port 1 is an 8-bit bi-directional I/O port with internal pull ups. The Port 1 output buffers can
sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the
internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being
pulled low will source current (IIL) because of the internal pull-ups. In addition, P1.0 and P1.1
can be configured to be the timer/counter 2 external count input (P1.0/T2) and the
timer/counter 2 trigger input (P1.1/T2EX), respectively.
Port 1 also receives the low-order address bytes during Flash programming and verification.
Port 2
Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output buffers can
sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the
internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being
pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-
order address byte during fetches from external program memory and during accesses to
external data memory that uses 16-bit addresses (MOVX @ DPTR). Port 2 also receives the
high-order address bits and some control signals during Flash programming and verification.
xxix
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output buffers can
sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the
internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being
pulled low will source current (IIL) because of the pull-ups. Port 3 also serves the functions of
various special features of the AT89C51. Port 3 also receives some control signals for Flash
programming and verification.
Table 5 Port 3
RST
Reset input. A high on this pin for two machine cycles while the oscillator is running resets
the device.
ALE/PROG
Address Latch Enable is an output pulse for latching the low byte of the address during
accesses to external memory. This pin is also the program pulse input (PROG) during Flash
programming. In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator
frequency and may be used for external timing or clocking purposes.
PSEN
Program Store Enable is the read strobe to external program memory. When the AT89C52 is
executing code from external program memory, PSEN is activated twice each machine cycle,
except that two PSEN activations are skipped during each access to external data memory.
xxx
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
EA/VPP
External Access Enable. EA must be strapped to GND in order to enable the device to fetch
code from external program memory locations starting at 0000H up to FFFFH. Note,
however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should
be strapped to VCC for internal program executions. This pin also receives the 12-volt
programming enable voltage (VPP) during Flash programming when 12-volt programming is
selected.
XTAL1
Input to the inverting oscillator amplifier and input to the internal clock operating circuit.
XTAL2
Output from the inverting oscillator amplifier.
Description
16 Characters x 2 Lines,
Built-in HD44780 Equivalent LCD Controller,
Works directly with ATMEGA, ARDUINO, PIC and many other microcontroller/kits.
4 or 8 bit data I/O interface,
Low power consumption,
Datasheet available on the Internet (copy provided with product),
Lowest offer among online shopping sites.
LCD (Liquid Crystal Display) screen is an electronic display module and find a wide range of
applications. A 16x2 LCD display is very basic module and is very commonly used in various
devices and circuits. These modules are preferred over seven segments and other multi
segment LEDs. The reasons being: LCDs are economical; easily programmable; have no
limitation of displaying special & even custom characters (unlike in seven segments),
animations and soon.
A 16x2 LCD means it can display 16 characters per line and there are 2 such lines. In this
LCD each character is displayed in 5x7 pixel matrix. This LCD has two registers, namely,
Command and Data.
xxxi
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
The command register stores the command instructions given to the LCD. A command is an
instruction given to LCD to do a predefined task like initializing it, clearing its screen, setting
the cursor position, controlling display etc. The data register stores the data to be displayed on
the LCD. The data is the ASCII value of the character to be displayed on the LCD.
Pin
Function Name
No
1 Ground (0V) Ground
2 Supply voltage; 5V (4.7V – 5.3V) Vcc
3 Contrast adjustment; through a variable resistor VEE
4 Selects command register when low; and data register when Register Select
high
5 Low to write to the register; High to read from the register Read/write
6 Sends data to data pins when a high to low pulse is given Enable
7 DB0
8 DB1
9 DB2
10 DB3
8-bit data pins
11 DB4
12 DB5
13 DB6
14 DB7
15 Backlight VCC (5V) Led+
16 Backlight Ground (0V) Led-
Table 6 Pin Description of LCD Module
xxxii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
RFID Reader module, are also called as interrogators. They convert radio waves returned from
the RFID tag into a form that can be passed on to controllers, which can make use of it. RFID
tag and readers have to be turned to the same frequency in order to communicate. RFID
systems use many different frequencies, but the most common and widely used & supported
by our reader is 125 kHz.
Technical Data :
Pin Description
1 VCC 5V
2 GND GND
3 BEEP BEEP AND LED
4 NC NOT CONNECTED
5 NC NOT CONNECTED
6 SEL HIGH IS UART,LOW IS WEIGAND
7 TX UART TX
8 D1 WEIGAND DATA 1
9 D0 WEIGAND DATA 0
Table 8: RFID Reader Pin Description
xxxiv
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
4.5 RS232
To allow compatibility among data communication equipment made by various manufactures,
an interfacing standard called RS232 was set by EIA in 1960.RS232 is the most widely used
serial I/O interfacing standard. This standard is used in PCs and numerous types of equipment.
xxxv
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
4.6 RTC
The purpose of an RTC or a real time clock is to provide precise time and date which can be
used for various applications. RTC is an electronic device in the form of an Integrated Chip
(IC) available in various packaging options. It is powered by an internal lithium battery. As a
result of which even if the power of the system is turned off, the RTC clock keeps running.
They play a very important role in the real time systems like digital clock, attendance system,
digital camera etc.
The RTC used here is DS 12C887 .89C51 microcontroller is a very commonly used controller
from the family of 8051 series of microcontroller
xxxvi
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
PIN DESCRIPTION
NC - No Connect
AS - Address Strobe
DS - Data Strobe
GND – Ground
4.7 EEPROM
AT24C02 is an electrically erasable and programmable ROM. It has a 2Kbits of memory size
arranged in 32 pages of 8 byte each. There are 256 (32 x 8) words each of one byte. The data
is transferred and received serially through serial data (SDA) pin.
xxxvii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
Pin Description:
Pin
Function Name
No
1 Address input pins; Provide addresses when more than one AD0
2 EEPROM is interfaced to a single microcontroller; AD1
3 Ground when only one EEPROM is used AD2
4 Ground (0V) Ground
5 Bi-directional pin for serial data transfer Serial Data
6 Provides clock signals Serial Clock
7 Ground allows normal read/write functions; Write protect
Vcc enables write protection
8 Supply voltage; 5V (up to 5.5V) Vcc
Table 9 EEPROM Pin description
xxxviii
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
CHAPTER: 5
PROJRCT WORK
CONCLUSION:
xxxix
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
Low frequency RFID works on the principle of radio waves and at the frequency of 125 KHz.
There is a coil inside the RFID tag and when it is influenced by magnetic field, it sends an
identity code to a device for further processing. The RFID tag is used as an identity for a
particular user. If the identity (serial number of the tag) of the user is matched with the one
already stored in this system, he gets immediate access through it. This RFID based secured
access system also has many additional features.
REFERENCES:
xl
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
1. “The 8051 Microcontroller and Embedded Systems” by Muhammad Ali Mazidi and
Janice Gillispie Mazidi, Pearson Education.
2.8051 Micro-controller Architecture, programming and application by
KENNETHJAYALA3.
7. www.maxim-ic.com
8. www.digi.com
9. www.wikipedia.org
10. www.atmel.com
11. www.beyondlogic.org
REFERENCES
xli
INFORMATION &COMMUNICATION TECHNOLOGY PROJECT REPORT
BOOKS:
(1) 8051 Microcontroller And Embedded Systems by Muhammad Ali Mazidi
(2) RFID Technology and Applications by Stephen B.Mills, Sanjay E.Sarma and
John R.Williams, Massachusetts Institute of Technology
(3) RFID HANDBOOK Applications,Technology,Security and Privacy By Syed
Ahson and Mohammad Ilyas
(4) Low cost and reliable RFID tags for all frequencies , by Dr. Kevin Chung, Alien
Technology Corp.
ONLINE:
(1) DALLAS SEMICONDUCTOR
(2) RFID.NET
(3) Electronics.stackexchange.com
(4) alldatasheet.com
(5) datasheet4u.com
(6) electronicsforu.com
xlii