8991

Embed Size (px)

Citation preview

  • 7/28/2019 8991..

    1/51

    1

    CHAPTER 1

    INTRODUCTION

    1.1 RFIDRFID stands for Radio-Frequency IDentification. The acronym refers to small

    electronic devices that consist of a small chip and an antenna. The chip typically is

    capable of carrying 2,000 bytes of data or less.

    It is a generic term that is used to describe a system that transmits the identity (in the

    form of a unique serial number) of an object or person wirelessly, using radio waves. It's

    grouped under the broad category of Automatic Identification Technologies.

    Auto-ID technologies include bar codes, optical character readers and some

    biometric technologies, such as retinal scans. The auto-ID technologies have been used to

    reduce the amount of time and labor needed to input data manually and to improve data

    accuracy.

    Some auto-ID technologies, such as bar code systems, often require a person to

    manually scan a label or tag to capture the data. RFID is designed to enable readers to

    capture data on tags and transmit it to a computer systemwithout needing a person to

    be involved.

    1.2 LOCATION BASED SERVICES

    Location-based services are a general class of computer program-level services

    used to include specific controls for location and time data as control features in

    computer programs. As such (LBS) is an information and has a number of uses in Social

    Networking today as an entertainment service, which is accessible with mobile

    devices through the mobile network and which uses information on the geographical

    position of the mobile device. This has become more and more important with the

    expansion of the smart phone and tablet markets as well.

  • 7/28/2019 8991..

    2/51

    2

    Fig 1.1:Classification on Location Based Systems

    Some examples of location-based services are:

    Recommending social events in a city Requesting the nearest business or service, such as an ATM or restaurant Turn by turn navigation to any address Locating people on a map displayed on the mobile phone Receiving alerts, such as notification of a sale on gas or warning of a traffic jam Location-based mobile advertising Asset recovery combined with active RF to find, for example, stolen assets in

    containers where GPS would not work

    Games where your location is part of the game play, for example your movementsduring your day make your avatar move in the game or your position unlocks

    content.

    Real-time Q&A revolving around restaurants, services, and other venues.

    1.3 GAINING IMPORTANCE OF RFID

    Even though it has been used for more than seventy years (e.g., RFID was used

    in World War II for identifying enemy aircrafts), it is only now that this technology is re-

    emerging as an important communication paradigm that claims to revolutionize

    inventory and automation processes.

    In an international study undertaken by IT consultancy LogicaCMG, the majority of the

    companies interviewed in the Netherlands, UK, Ireland, Germany, France and Belgium,

  • 7/28/2019 8991..

    3/51

    3

    gave RFID top priority in terms of planned IT investment. The study shows that half of

    the 50 companies interviewed in Europe have or are planning to deploy RFID pilot

    projects throughout 2004, with the vast majority planning to start implementing the

    technology within the next three years. The RFID implementations will lead to an

    irreversible process in the retail market.

    1.4 ADVANTAGES OF RFID

    RFID technology does not require line-of-sight reading: Unlike a bar code, an

    RFID tag can be read through other materials (though some materials may cause

    problems). Theoretically, this means that you could take a pallet of mixed products, all of

    which contain individual RFID tags, and have an RFID reader read all the tags within the

    palletized load without having to physically move any of the materials or open any cases.

    RFID tags can hold more data than bar code: As the data storage capacity of

    RFID tags increase, so does the cost of the tags. Therefore, it is likely that many RFID

    tags will not hold any more data than a bar code.

    RFID tag data can be changed or added to as a tag passes through specific

    operations: Read-only tags are much less expensive than read/write tags. Therefore,

    limited use of this functionality is likely.

    RFID tags are more effective in harsh environments where bar code labels have

    problems: RFID tags can be sealed within a plastic enclosure eliminating many of the

    problems that plague bar codes in harsh environments where they are exposed to

    chemicals, heat, abrasion, dirt and grease buildup, etc.

    A large number of RFID tags can be read almost instantaneously: This brings us

    back to the palletized load scenario where the load contains a large quantity of products,

    each with its own RFID tag. Though it may seem as though the tags are all read at once,

    they are actually read sequentially (one at a time), however, this happens so fast that it is

    virtually imperceptible.

  • 7/28/2019 8991..

    4/51

    4

    1.5 DISADVANTAGES OF RFID

    Cost: This is the biggest hurdle to RFID tags replacing bar codes for item-level tracking

    of low-cost products. We can produce a bar code on an item for less than 1 cent, yet the

    most optimistic proponents of RFID are still hoping for 5 or 10-cent RFID tags

    sometime in the future (this may be years away). And even if we get 5-cent tags, that is

    still a significant cost to add to the manufactured cost of low-cost consumer goods. And

    even with higher-cost products, or case and pallet level tracking, the benefits of RFID

    must be greater than this additional cost. The funniest thing is that cost of these tags will

    not reduce until they are widely used, and they wont be widely used unless their cost

    decreases.

    RFID signals may have problems with some materials: Metals and liquids can cause

    problems when trying to read RFID tags. Tag placement is becoming a science in and of

    itself since depending on the product even a case-level RFID tag may have to be placed

    in a specific location on the case and cases stacked in a specific orientation to get a

    consistent read.

    Though RFID does not require of line-of-sight, it is also not restricted by it. With the

    proper bar code equipment, we can selectively read a single bar coded case on a shelf

    more than ten feet away. We cant do that with RFID since an RFID reader will read all

    tags within its range. Even though you can get directional RFID readers, they are still not

    as selective as a visual device (bar code scanner). There are still many warehouse

    applications that require this line-of-site capability.

    RFID can fail tags: The unique issue with RFID failure is the automated nature of RFID

    optimized processes. If you have a pallet of materials with RFID tags and one of the

    RFID tags is damaged, it is difficult to recognize it.

    RFID programming speed: The smart label scenario (using labels with integrated RFID

    chips) seems to be the most likely one for mass utilization of RFID for case and unit

    tracking of inventory. Unfortunately, it takes more time to print, program, and verify an

    RFID enabled label than to simply print a bar code label. In addition, RFID smart labels

  • 7/28/2019 8991..

    5/51

    5

    seem to have some serious quality problems. There have been average failure rates

    (inability to properly program and read the tag) of anywhere from 10% to 30%.

    For automated print-and-apply applications, this could be a serious problem.

    RFID standards are still being developed: Nobody would want to invest in an RFID

    system that is based on soon-to-be obsolete specs. Most RFID systems currently in place

    are based upon proprietary technology where the readers are designed to only read RFID

    tags from a specific manufacturer. When compared to bar code technology, where

    standards have been in place for decades, most bar code scanners are designed to read all

    standard bar code symbologies.

    1.6 PROBLEMS WITH RFIDRFID has been implemented in different ways by different manufacturers; global

    standards are still being worked on. It should be noted that some RFID devices are never

    meant to leave their network (as in the case of RFID tags used for inventory control

    within a company). This can cause problems for companies.

    Consumers may also have problems with RFID standards. For example, ExxonMobil'sSpeed Pass system is a proprietary RFID system; if another company wanted to use the

    convenient Speed Pass (say, at the drive-in window of your favorite fast food restaurant)

    they would have to pay to access it - an unlikely scenario. On the other hand, if every

    company had their own "Speed Pass" system, a consumer would need to carry many

    different devices with them.

    1.6.1 RFID systems can be easily disrupted

    Since RFID systems make use of the electromagnetic spectrum (like Wi-Fi networks or

    cell phones), they are relatively easy to jam using energy at the right frequency.

    Although, this would be an inconvenience for consumers in stores (longer waits at the

    checkout), it could be disastrous in other environments where RFID is increasingly used,

    like hospitals or in the military in the field.

    Also, active RFID tags (those that use a battery to increase the range of the system) can

    be repeatedly interrogated to wear the battery down, disrupting the system.

  • 7/28/2019 8991..

    6/51

    6

    1.6.2RFID Reader Collision

    Reader collision occurs when the signals from two or more readers overlap. The tag is

    unable to respond to simultaneous queries. Systems must be carefully set up to avoid this

    problem; many systems use an anti-collision protocol (also called a singulation

    protocol. Anti-collision protocols enable the tags to take turns in transmitting to a reader.

    1.6.3RFID Tag Collision

    Tag collision occurs when many tags are present in a small area, but since the read time

    is very fast, it is easier for vendors to develop systems that ensure that tags respond one

    at a time.

    1.6.4Security, privacy and ethics problems with RFID

    The contents of an RFID tag can be read after the item leaves the supply chain. An RFID

    tag cannot tell the difference between one reader and another. RFID scanners are very

    portable; RFID tags can be read from a distance, from a few inches to a few yards. This

    allows anyone to see the contents of your purse or pocket as you walk down the street.

    Some tags can be turned off when the item has left the supply chain.

    1.6.5 Attaching Issues

    RFID tags are difficult to for consumers to remove; some are very small (less than a half-

    millimeter square and as thin as a sheet of paper) - others may be hidden or embedded

    inside a product where consumers cannot see them. New technologies allow RFID tags to

    be "printed" right on a product and may not be removable at all.

    1.6.6 Others

    RFID tags can be read without your knowledge

    Since the tags can be read without being swiped or obviously scanned, anyone with an

    RFID tag reader can read the tags embedded in your clothes and other consumer products

    without your knowledge. For example, you could be scanned before you enter the store,

  • 7/28/2019 8991..

    7/51

    7

    just to see what you are carrying. You might then be approached by a clerk who knows

    what you have in your backpack or purse, and can suggest accessories or other items.

    RFID tags can be read from greater distances with a high-gain antenna

    For various reasons, RFID reader/tag systems are designed so that distance between the

    tag and the reader is kept to a minimum (see the material on tag collision above).

    However, a high-gain antenna can be used to read the tags from much further away,

    leading to privacy problems.

    RFID tags with unique serial numbers could be linked to an individual credit card

    number

    At present, the Universal Product Code (UPC) implemented with barcodes allows each

    product sold in a store to have a unique number that identifies that product. Work is

    proceeding on a global system of product identification that would allow each individual

    item to have its own number. When the item is scanned for purchase and is paid for, the

    RFID tag number for a particular item can be associated with a credit card number.

    1.7 APPLICATIONS OF RFID Asset Tracking Security People Tracking Document tracking Library Healthcare Animal Tracking Work-in-Process Container/ Yard Management Inventory Management

  • 7/28/2019 8991..

    8/51

    8

    1.7.1 SECURITYAn alarm car uses RFID system to communicate between the remote control (the

    Tag) and the car alarm system (the Verifier), farther more a thief (an Adversary) may or

    may not listen to the communications.

    The scenario is as follows:

    The Tag (remote control) sends an encrypted request to the Verifier (car) to open

    the car. The car processes and decrypts the request and composed an answer, if the

    request is genuine then "Open" message is sent back. If it is not, a "Do Not Open"

    message is sent. The thief may or may not listen to the communications, and based on

    them compose a false message that will be sent to the car in order to get an "Open"

    message back.

    Fig 1.2: Pictorial representation of the scenario

    1.7.2 PHARMACEUTICAL INDUSTRY

    The pharmaceutical industry is currently looking for a better way of

    monitoring their pharmaceuticals not only in the supply-chain but once the prescription is

    at home in the medicine cabinet for which RFID is currently being looked at as the

    answer to this question.

  • 7/28/2019 8991..

    9/51

    9

    Fig 1.3: RFID Placed Behind Label on Pharmaceutical

    There are many benefits for the pharmaceutical industry to incorporate RFID into their

    supply chain. The first being stocking drugs is a difficult task that requires more

    information and organization than is the case with any other item. Furthermore a more

    efficient supply-chain would save time and money. With all these reasons aside there is

    till a greater reason and that is patient safety. With a more accurate way of error

    prevention with drugs these should be enough of a reason for drug companies to adopt

    RFID into their supply chain. Companies like AstraZeneca, who have already adopted

    RFID into its supply chain, have had great success with dispensing over 30 Million RFID

    enabled syringes of Diprivan.

    The main difference between the food industry and the pharmaceutical industry is one of

    priority. The food industry is interested in placing RFID on pallets and cases at the

    request of the retailers, while the pharmaceutical industry is mainly interested in placing

    RFID on individual items, bottles and packages. Unlike the food industry its first concern

    is patient safety and wellbeing. This would mean RFID that can be taken with the patient

    to their home, office, or doctors office and will still function and be able to help them

    with their medical needs.

    However, one of the biggest reasons some pharmaceuticals have incorporated RFID is to

    help combat counterfeiting. By incorporating RFID pharmacies would be able to

    eliminate counterfeiting by ensuring that every drug was indeed the correct drug.

    Currently most manufacturers are using High-frequency RFID instead of its cheaper

    counterpart Ultra-high frequency RFID due to the small size they can be manufactured.

    This allows RFID tags to be placed on individual blister packs which could gather more

  • 7/28/2019 8991..

    10/51

    10

    information about a medication; if its being taken on time, if it has been tampered with,

    or what environment each pill experienced during transportation.

    1.7.3 IDENTIFICATION

    RFID tags for animals represent one of the oldest uses of RFID technology. Originally

    meant for large ranches and rough terrain, since the outbreak of mad-cow disease, RFID

    has become crucial in animalidentification management. An implantable RFID tag or

    transpoder can also be used for animal identification. The transponders are more well-

    known as passive RFID technology, or "chips" on animals. The Canadian Cattle

    Identification Agency began using RFID tags as a replacement for barcode tags.

    Currently CCIA tags are used in Wisconsin and by US farmers on a voluntary basis.

    The USDA is currently developing its own program

    Fig 1.4: A sheep with an ear tag.

    Fig 1.5: Animal management using RFID technology

    Implantable RFID chips designed for animal tagging are now being used in humans. An

    early experiment with RFID implants was conducted by British professor

    http://en.wikipedia.org/wiki/Animal_identificationhttp://en.wikipedia.org/wiki/Animal_identificationhttp://en.wikipedia.org/wiki/Animal_identificationhttp://en.wikipedia.org/wiki/File:Santa_Gertrudis.jpghttp://en.wikipedia.org/wiki/File:Sheep's_face,_Malta.jpghttp://en.wikipedia.org/wiki/File:Santa_Gertrudis.jpghttp://en.wikipedia.org/wiki/File:Sheep's_face,_Malta.jpghttp://en.wikipedia.org/wiki/Animal_identification
  • 7/28/2019 8991..

    11/51

  • 7/28/2019 8991..

    12/51

    12

    CHAPTER 2

    PROJECT OVERVIEW

    2.1 SCHEMATIC LAYOUT

    Transmitter:

    Fig 2.1: Circuit Diagram of Transmitter

  • 7/28/2019 8991..

    13/51

    13

    Receiver:

    Fig 2.2: Circuit Diagram of Receiver

  • 7/28/2019 8991..

    14/51

    14

    2.2 CIRCUIT DESCRIPTION

    Since the main intention of this project is to design a Location

    Based System using RFID. In order to fulfill this application there are few steps that has

    been performed i.e.

    1) Design the power supply for the entire circuit2) Selection of microcontroller that suits our application3) Selection of MAX2324) Selection of LCD

    Complete studies of all the above points are useful to develop this project

    2.2.1 POWER SUPPLY SELECTION

    In-order to work with any components basic requirement is power supply.

    In this section there is a requirement of two different voltage levels. Those are

    1)

    5V DC Power Supply2) 12V DC Power Supply

    Now the aim is to design the power supply section which converts 230V

    AC into 5V DC. Since 230V AC is too high to reduce it to directly 5V DC,

    therefore we need a step-down transformer that reduces the line voltage to certain

    voltage that will help us to convert it into a 5V DC. Considering the efficiency

    factor of the bridge rectifier, we came to a conclusion to choose a transformer,

    whose secondary voltage is 3 to 4V higher than the required voltage i.e. 5V. For

    this application 0-12V transformers is used, since it is easily available in the

    market.

    The output of the transformer is 12V AC, it fed to rectifier that converts

    AC to pulsating DC. As we all know that there are three kinds of rectifiers. They

    are

    1) Half-wave2) Full-wave and3) Bridge Rectifier

  • 7/28/2019 8991..

    15/51

    15

    Here we short listed to use Bridge Rectifier, because half wave rectifier

    has we less in efficiency. Even though the efficiency of full wave and bridge rectifier are

    the same, since there is no requirement for any negative voltage for our application, we

    gone with bridge rectifier.

    Since the output voltage of the rectifier is pulsating DC, in order to

    convert it into pure DC we use a high value (1000UF / 1500UF) of capacitor in parallel

    that acts as a filter. The most easy way to regulate this voltage is by using a 7805 voltage

    regulator, whose output voltage is constant 5V DC irrespective of any fluctuation in line

    voltage.

    2.2.2 SELECTION OF MICROCONTROLLER

    As we know that there are so many types of microcontroller families

    that are available in the market. Those are

    1) 8051 Family2) AVR Microcontroller Family3) PIC Microcontroller Family4) ARM Family

    Basic 8051 family is enough for our application; hence we are not

    concentrating on higher end controller families.

    In order to fulfill our application basic that is AT89C51 controller is

    enough. But still we selected AT89S52 controller because of inbuilt ISP (in system

    programmer) option.

    There are minimum six requirements for proper operation of

    microcontroller. Those are:

    1) Power supply section2) Pull-ups for ports (it is must for PORT0)3) Reset circuit4) Crystal circuit5) ISP circuit (for program dumping)6) EA/VPP pin is connected to Vcc

  • 7/28/2019 8991..

    16/51

    16

    PORT0 is open collector thats why we are using pull-up resistor which

    makes PORT0 as an I/O port. Reset circuit is used to reset the microcontroller. Crystal

    circuit is used for the timing pluses. In this project we are not using external memory

    thats why EA/VPP pin in the microcontroller is connected to Vcc that indicates internal

    memory is used for this application.

    2.2.3 SELECTION OF MAX 232

    When we want communicate GSM module with microcontroller then

    we can use RS232 port. Serial Rs-232 (V.24) communication works with voltages(between 15V3V and used to transmit a binary1 and +3V +15V to transmit a

    binary 0) which are not compatible with todays computer logic voltages. On the other

    hand, classic TTL computer logic operates between 0V +5V (roughly 0V +0.8V

    referred to as low for binary 0, +2V +5V for high binary 1). So MAX232 is used

    to convert from TTL voltage level to RS 232 voltage levels.

    2.2.4 SELECTION OF LCD

    A liquid crystal display (LCD) is an electronically-modulated-optical device

    shaped into a thin, flat panel made up of any number of color or filled monochrome

    pixels with liquid crystals and arrayed in front of a light source (back light) or reflector.

    In this project 1 LCD is used to display the GMS status.

    2.3 FUNCTIONING OF THE CIRCUIT

    A power supply of 230V AC is given to the step down transformer. The purpose of this

    step down transformer is to reduce the magnitude of the incoming current to the required

    range. Hence, that 230V AC is stepped down to 12V AC supply which is the desired

    range for our circuit. But, to drive this circuit DC current is essential. Hence, another

    problem arises here. To overcome this bridge rectifier is used. A bridge rectifier function

    is to convert AC current into Dc current of the same magnitude. Hence, when 12v AC is

    given as input to a bridge rectifier output is 12V DC. But actually we need only 5v of DC

  • 7/28/2019 8991..

    17/51

    17

    to drive the circuit. The reason why a 5v step down transformer is not used is that when

    such a high power is stepped down to a low value there is a chance of not getting the

    exact desired value. Even a slight fluctuation in the current cannot be tolerated by the

    circuit, it may even affect the system output .Hence a voltage rectifier is used the 12V

    DC supply is given to the voltage regulator to get exactly 5v of dc. This is supplied to the

    entire circuit including the RFID reader. As the power is supplied, LCD glows. This

    indicates that the system is now ready to be used. As per the program already feeded into

    the controllers as soon as the LCD glows the start message is displayed on it. When an

    RFID tag is bought into the range of RFID reader, the tag is recognized by the reader.

    Each tag has its own unique code just like each person has a name to recognize. The code

    of each tag is like its name to be recognized by the controller. As the tag is recognized

    the code of the tag is sent to the microcontroller. Microcontroller cannot accept analog

    signals. So, MAX 232 is used in between which converts analog signals into digital

    signals. The digital signal has to be sent bit by bit to the controller. For this serial

    communication purpose RS-232 is used. The program which is dumped into the

    microcontroller is executed. As the Database of the user list is already entered into the

    controller. If the code of the tag is authorized then, the information present in that tag is

    displayed on the LCD. This information is passed onto the receiver end by means of an

    antenna. The same information is displayed on the receiver side also. Hence, the data is

    displayed on the LCD at the receiver end.

  • 7/28/2019 8991..

    18/51

    18

    CHAPTER 3

    BLOCK DIAGRAM AND ITS DESCRIPTION

    3.1 BLOCK DIAGRAM

    TRANSMITTER

    RECEIVER

    Fig 3.1: Block Diagram of Transmitter

    POWER SUPPLY

    RF TRANSMITTER

    LCD DISPLAY

    MICRO-

    CONTROLLER

    AT89S52

    RFID READER

    RFID TAG

  • 7/28/2019 8991..

    19/51

    19

    Fig 3.2: Block Diagram of Receiver

    3.2 POWER SUPPLY

    Power is supplied through a transformer which supplies 12V A.C. This current is

    then passed through a rectifier circuit to convert ac into dc. Then it is sent to the voltage

    regulator through which the required 5V dc is supplied to the circuit.

    POWER SUPPLY

    RF RECEIVER

    LCD DISPLAY

    MICRO-

    CONTROLLER

    AT89S52

    RFID READER

    RFID TAG

  • 7/28/2019 8991..

    20/51

    20

    Fig 3.3: A typical transformer

    Working of the transformer:

    When a voltage is put on an inductor, it will induce an electromagnetic field. This field

    will induce in the second inductor a voltage. The ratio of voltage1 over voltage2 depends

    on the ratio of rings in the coil.

    Fig 3.4: Windings in the transformer

    The transformer is based on two principles: First that an electric current can produce a

    magnetic field (electromagnetism) and second that a changing magnetic field within a

    coil of wire induces a voltage across the ends of the coil (electromagnetic induction).

    Changing the current in the primary coil changes the magnetic flux that is developed.

    The changing magnetic flux induces a voltage in the secondary coil.

    Current passing through the primary coil creates a magnetic field. The primary and

    secondary coils are wrapped around a core of very high magnetic permeability, such as

  • 7/28/2019 8991..

    21/51

    21

    iron, so that most of the magnetic flux passes through both the primary and secondary

    coils. If a load is connected to the secondary winding, the load current and voltage will

    be in the directions indicated, given the primary current and voltage in the directions

    indicated (each will be alternating current in practice).

    3.3 AT89S52 MICRO CONTROLLER

    The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller

    with 8K bytes of in-system programmable Flash memory. The on-chip Flash allows the

    program memory to be reprogrammed in-system or by a conventional nonvolatile

    memory programmer.

    3.3.1 BLOCK DIAGRAM OF AT89S52:

    Fig 3.5: Block diagram of AT89S52

    3.3.2 FEATURES:

    8K bytes of Flash 256 bytes of RAM 32 I/O lines Watchdog timer two data pointers three 16-bit timer/counters

  • 7/28/2019 8991..

    22/51

    22

    a six-vector two-level interrupt architecture a full duplex serial port on-chip oscillator clock circuitryIn addition, the AT89S52 is designed with static logic for operation down to zero

    frequency and supports two software selectable power saving modes. The Idle Mode

    stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system

    to continue functioning. The Power-down mode saves the RAM con-tents but freezes

    the oscillator, disabling all other chip functions until the next interrupt or hardware reset.

    3.3.3 PIN DIAGRAM AND ITS DESCRIPTION

    Fig 3.6: Pin diagram of AT89S52

  • 7/28/2019 8991..

    23/51

    23

    DESCRIPTION:

    VCC: Supply voltage.

    GND: Ground.

    Port 0: Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin

    can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as

    high-impedance inputs. Port 0 can also be configured to be the multiplexed low-order

    address/data bus during accesses to external program and data memory. In this mode, P0

    has internal pull-ups. Port 0 also receives the code bytes during Flash programming and

    outputs the code bytes during program verification. External pull-ups are required

    during program verification.

    Port 1: Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output

    buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are

    pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that

    are externally being pulled low will source current (IIL) because of the internal pull-ups.

    In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count

    input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as

    shown in the following table. Port 1 also receives the low-order address bytes during

    Flash programming and verification.

    Port Pin Alternate Functions

    P1.0 T2 (external count input to Timer/Counter

    2), clock-out

    P1.1 T2EX (Timer/Counter 2 capture/reload

    trigger and direction control)

    P1.5 MOSI (used for In-System Programming)

    P1.6 MISO (used for In-System Programming)

    P1.7 SCK (used for In-System Programming)

    Table 3.1: Alternate functions of Port 1

    Port 2: It is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output

    buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are

    pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that

    are externally being pulled low will source current (IIL) because of the internal pull-ups.

  • 7/28/2019 8991..

    24/51

    24

    Port 2 emits the high-order address byte during fetches from external program memory

    and during accesses to external data memory that uses 16-bit addresses (MOVX @

    DPTR). In this application, Port 2 uses strong internal pull-ups when emitting 1s.

    During accesses to external data memory that uses 8-bit addresses (MOVX @ RI), Port

    2 emits the contents of the P2 Special Function Register. Port 2 also receives the high-

    order address bits and some control signals during Flash programming and verification.

    Port 3: It is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output

    buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are

    pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that

    are externally being pulled low will source current (IIL) because of the pull-ups. Port 3

    receives some control signals for Flash programming and verification. Port 3 also serves

    the functions of various special features of the AT89S52, as shown in the following

    table.

    Port Pin Alternate Functions

    P3.0 RXD (serial input port)

    P3.1 TXD (serial output port)

    P3.2 INT0 (external interrupt 0)

    P3.3 INT1 (external interrupt 1)

    P3.4 T0 (timer 0 external input)

    P3.5 T1 (timer 1 external input)

    P3.6 WR (external data memory write strobe)

    P3.7 RD (external data memory read strobe)

    Table 3.2: Alternate functions of Port 3

    RST: A high on this pin for two machine cycles while the oscillator is running resets

    the device. This pin drives high for 98 oscillator periods after the Watchdog times out.

    The DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In the

    default state of bit DISRTO, the RESET HIGH out feature is enabled.

    ALE/PROG: Address Latch Enable (ALE) is an output pulse for latching the low byte

    of the address during accesses to external memory. This pin is also the program pulse

    input (PROG) during Flash programming. In normal operation, ALE is emitted at aconstant rate of 1/6 the oscillator frequency and may be used for external timing or

  • 7/28/2019 8991..

    25/51

    25

    clocking purposes. Note, however, that one ALE pulse is skipped during each access to

    external data memory. If desired, ALE operation can be disabled by setting bit 0 of SFR

    location 8EH. With the bit set, ALE is active only during a MOVX or MOVC

    instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no

    effect if the microcontroller is in external execution mode.

    PSEN: Program Store Enable (PSEN) is the read strobe to external program memory.

    When the AT89S52 is executing code from external program memory, PSEN is

    activated twice each machine cycle, except that two PSEN activations are skipped

    during each access to external data memory.

    EA/VPP: External Access Enable (EA) must be strapped to GND in order to enable the

    device to fetch code from external program memory locations starting at 0000H up to

    FFFFH. However, if lock bit 1 is programmed, EA will be internally latched on reset.

    EA should be strapped to VCC for internal program executions. This pin also receives

    the 12-volt programming enable voltage (VPP) during Flash programming.

    XTAL1: Input to the inverting oscillator amplifier and input to the internal clock

    operating circuit.

    XTAL2: Output from the inverting oscillator amplifier.

    3.3.4 MEMORY ORGANISATION:

    MCS-51 devices have a separate address space for Program and Data Memory. Up to

    64K bytes each of external Program and Data Memory can be addressed.

    Program Memory

    If the EA pin is connected to GND, all program fetches are directed to external memory.

    On the AT89S52, if EA is connected to VCC, program fetches to addresses 0000H

    through 1FFFH are directed to internal memory and fetches to addresses 2000H through

    FFFFH are to external memory.

  • 7/28/2019 8991..

    26/51

    26

    Data Memory

    The AT89S52 implements 256 bytes of on-chip RAM. The upper 128 bytes occupy a

    parallel address space to the Special Function Registers. This means that the upper 128bytes have the same addresses as the SFR space but are physically separate from SFR

    space. When an instruction accesses an internal location above address 7FH, the address

    mode used in the instruction specifies whether the CPU accesses the upper 128 bytes of

    RAM or the SFR space. Instructions which use direct addressing access the SFR space.

    For example, the following direct addressing instruction accesses the SFR at location

    0A0H (which is P2).

    MOV 0A0H, #data

    Instructions that use indirect addressing access the upper 128 bytes of RAM. For

    example, the following indirect addressing instruction, where R0 contains 0A0H,

    accesses the data byte at address 0A0H, rather than P2 (whose address is 0A0H).

    MOV @R0, #data

    Stack operations are examples of indirect addressing, so the upper 128 bytes of data

    RAM are available as stack space.

  • 7/28/2019 8991..

    27/51

    27

    3.3.5 ARCHITECTURE OF AT89S52 MICROCONTROLLER:

    Fig 3.7: Architecture of AT89S52 microcontroller

    The AT89S52 has 4 different ports, each one having 8 Input/output lines providing a

    total of 32 I/O lines. Those ports can be used to output DATA and orders do other

    devices, or to read the state of a sensor, or a switch. Most of the ports of the 89S52 have

    'dual function' meaning that they can be used for two different functions.

    The first one is to perform input/output operations and the second one is used to

    implement special features of the microcontroller like counting external pulses,

    interrupting the execution of the program according to external events, performing serial

    data transfer or connecting the chip to a computer to update the software. Each port has 8

    pins, and will be treated from the software point of view as an 8-bit variable called

    'register', each bit being connected to a different Input/output pin.

    There are two different memory types: RAM and EEPROM. Shortly, RAM is used to

    store variable during program execution, while the EEPROM memory is used to store the

    program itself, that's why it is often referred to as the 'program memory'. It is clear that

    the CPU (Central Processing Unit) is the heart of the micro controllers. It is the CPU that

  • 7/28/2019 8991..

    28/51

    28

    will Read the program from the FLASH memory and execute it by interacting with the

    different peripherals.

    3.4 COMPONENTS AND WORKING OF RFID

    3.4.1 WORKING OF RFID

    In every RFID system the transponder Tags contain information. This information can

    be as little as a single binary bit, or be a large array of bits representing such things as

    an identity code, personal medical information, or literally any type of information that

    can be stored in digital binary.

    Fig 3.8: RFID transreceiver that communicates with a passive Tag.

    Passive tags have no power source of their own and instead derive power from the

    incident electromagnetic field. Commonly the heart of each tag is a microchip. When

    the Tag enters the generated RF field it is able to draw enough power from the field to

    access its internal memory and transmit its stored information. When the transponder

    Tag draws power in this way the resultant interaction of the RF fields causes the

    voltage at the transceiver antenna to drop in value. This effect is utilized by the Tag to

    communicate its information to the reader. The Tag is able to control the amount of

    power drawn from the field and by doing so it can modulate the voltage sensed at the

    Transceiver according to the bit pattern it wishes to transmit.

  • 7/28/2019 8991..

    29/51

    29

    3.4.2 COMPONENTS OF RFID

    A basic RFID system consists of three components:

    An antenna or coil A transceiver (with decoder) A transponder (RF tag) electronically programmed with unique information.

    3.4.2.1ANTENNA

    The antenna emits radio signals to activate the tag and read and write data to it. Antennas

    are the conduits between the tag and the transceiver, which controls the system's data

    acquisition and communication. Antennas are available in a variety of shapes and sizes;

    they can be built into a door frame to receive tag data from persons or things passing

    through the door, or mounted on an interstate tollbooth to monitor traffic passing by on a

    freeway. The electromagnetic field produced by an antenna can be constantly present

    when multiple tags are expected continually. If constant interrogation is not required, a

    sensor device can activate the field.

    Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a.

    interrogator), which can be configured either as a handheld or a fixed-mount device. The

    reader emits radio waves in ranges of anywhere from one inch to 100 feet or more,

    depending upon its power output and the radio frequency used. When an RFID tag passes

    through the electromagnetic zone, it detects the reader's activation signal. The reader

    decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is

    passed to the host computer for processing.

  • 7/28/2019 8991..

    30/51

    30

    Fig3.9: Internal Structure of RFID tag

    3.4.2.2 TAGS (Transponders)

    An RFID tag is comprised of a microchip containing identifying information and an

    antenna that transmits this data wirelessly to a reader. At its most basic, the chip will

    contain a serialized identifier, or license plate number, that uniquely identifies that item,

    similar to the way many bar codes are used today. A key difference, however is that

    RFID tags have a higher data capacity than their bar code counterparts. This increases the

    options for the type of information that can be encoded on the tag, including the

    manufacturer, batch or lot number, weight, ownership, destination and history (such as

    the temperature range to which an item has been exposed). In fact, an unlimited list of

    other types of information can be stored on RFID tags, depending on application needs.

    An RFID tag can be placed on individual items, cases or pallets for identification

    purposes, as well as on fixed assets such as trailers, containers, totes, etc.

    Tags come in a variety of types, with a variety of capabilities. Key variables include:

    "Read-only" versus "read-write"

    There are three options in terms of how data can be encoded on tags: (1) Read-only tags

    contain data such as a serialized tracking number, which is pre-written onto them by the

    tag manufacturer or distributor. These are generally the least expensive tags because theycannot have any additional information included as they move throughout the supply

  • 7/28/2019 8991..

    31/51

    31

    chain. Any updates to that information would have to be maintained in the application

    software that tracks SKU movement and activity. (2) "Write once" tags enable a user to

    write data to the tag one time in production or distribution processes. Again, this may

    include a serial number, but perhaps other data such as a lot or batch number. (3) Full

    "read-write" tags allow new data to be written to the tag as neededand even written

    over the original data. Examples for the latter capability might include the time and date

    of ownership transfer or updating the repair history of a fixed asset. While these are the

    most costly of the three tag types and are not practical for tracking inexpensive items,

    future standards for electronic product codes (EPC) appear to be headed in this direction.

    Fig 3.10: RFID Tags

    Data capacity: The amount of data storage on a tag can vary, ranging from 16 bits on the

    low end to as much as several thousand bits on the high end. Greater the storage capacity,

    the higher the price per tag.

    Form factor: The tag and antenna structure can come in a variety of physical form

    factors and can either be self-contained or embedded as part of a traditional label

    structure (i.e., the tag is inside what looks like a regular bar code labelthis is termed a

    'Smart Label') companies must choose the appropriate form factors for the tag very

    carefully and should expect to use multiple form factors to suit the tagging needs of

    different physical products and units of measure. For example, a pallet may have an

    RFID tag fitted only to an area of protected placement on the pallet itself. On the other

    hand, cartons on the pallet have RFID tags inside bar code labels that also provide

    operators human-readable information and a back-up should the tag fail or pass through

    non RFID-capable supply chain links.

  • 7/28/2019 8991..

    32/51

    32

    Passive versus active: Passive tags have no battery and "broadcast" their data only

    when energized by a reader. That means they must be actively polled to send

    information. "Active" tags are capable of broadcasting their data using their own battery

    power. In general, this means that the read ranges are much greater for active tags than

    they are for passive tagsperhaps a read range of 100 feet or more, versus 15 feet or less

    for most passive tags. The extra capability and read ranges of active tags, however, come

    with a cost; they are several times more expensive than passive tags. Today, active tags

    are much more likely to be used for high-value items or fixed assets such as trailers,

    where the cost is minimal compared to item value, and very long read ranges are

    required. Most traditional supply chain applications, such as the RFID-based tracking

    and compliance programs emerging in the consumer goods retail chain, will use the less

    expensive passive tags.

    Frequencies: Like all wireless communications, there are a variety of frequencies or

    spectra through which RFID tags can communicate with readers. Again, there are trade-

    offs among cost, performance and application requirements. For instance, low-frequency

    tags are cheaper than ultra high-frequency (UHF) tags, use less power and are better able

    to penetrate non-metallic substances. They are ideal for scanning objects with high water

    content, such as fruit, at close range. UHF frequencies typically offer better range and

    can transfer data faster. But they use more power and are less likely to pass through some

    materials. UHF tags are typically best suited for use with or near wood, paper, cardboard

    or clothing products. Compared to low-frequency tags, UHF tags might be better for

    scanning boxes of goods as they pass through a bay door into a warehouse. While the tag

    requirements for compliance mandates may be narrowly defined, it is likely that a variety

    of tag types will be required to solve specific operational issues. You will want to work

    with a company that is very knowledgeable in tag and reader technology to appropriately

    identify the right mix of RFID technology for your environment and applications.

    EPC Tags

    EPC refers to "electronic product code," an emerging specification for RFID tags, readers

    and business applications first developed at the Auto-ID Center at the Massachusetts

    Institute of Technology. This organization has provided significant intellectual leadership

    toward the use and application of RFID technology. EPC represents a specific approach

  • 7/28/2019 8991..

    33/51

    33

    to item identification, including an emerging standard for the tags themselves, including

    both the data content of the tag and open wireless communication protocols. In a sense,

    the EPC movement is combining the data standards embodied in certain bar code

    specifications, such as the UPC or UCC-128 bar code standards, with the wireless data

    communication standards that have been developed by ANSI and other groups.

    3.4.2.3 TRANSRECEIVER

    The RF transceiver is the source of the RF energy used to activate and power the passive

    RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it

    may be a separate piece of equipment. When provided as a separate piece of equipment,

    the transceiver is commonly referred to as an RF module. The RF transceiver controls

    and modulates the radio frequencies that the antenna transmits and receives. The

    transceiver filters and amplifies the backscatter signal from a passive RFID tag. An RFID

    transceiver is a device that transmits radio waves to RFID tags and receives the radio

    waves reflected or transmitted by the tags.

    3.5 SERIAL COMMUNICATION:

    Serial communication is a way enables different equipments to communicate with their

    outside world. It is called serial because the data bits will be sent in a serial way over a

    single line. A personal computer has a serial port known as communication port or COM

    Port used to connect a modem for example or any other device, there could be more then

    one COM Port in a PC. Serial ports are controlled by a special chip called UART

    (Universal Asynchronous Receiver Transmitter). Different applications use different pins

    on the serial port and this basically depend of the functions required. If you need to

    connect your PC for example to some other device by serial port, then you have to read

    instruction manual for that device to know how the pins on both sides must be connected

    and the setting required.

    Serial communication has some advantages over the parallel communication. One of the

    advantages is transmission distance, serial link can send data to a remote device more far

    then parallel link. Also the cable connection of serial link is simpler then parallel link and

  • 7/28/2019 8991..

    34/51

    34

    uses less number of wires. Serial link is used also for Infrared communication, now many

    devices such as laptops & printers can communicate via inferred link.

    There are two methods for serial communication, Synchronous & Asynchronous.

    (A) Synchronous serial communication:

    In Synchronous serial communication the receiver must know when to read the next bit

    coming from the sender, this can be achieved by sharing a clock between sender and

    receiver. In most forms of serial Synchronous communication, if there is no data

    available at a given time to transmit, a fill character will be sent instead so that data is

    always being transmitted. Synchronous communication is usually more efficient because

    only data bits are transmitted between sender and receiver; however it will be more

    costly because extra wiring and control circuits are required to share a clock signal

    between the sender and receiver.

    (B) Asynchronous serial communication:

    Asynchronous transmission allows data to be transmitted without the sender having to

    send a clock signal to the receiver. Instead, special bits will be added to each word in

    order to synchronize the sending and receiving of the data.

    When a word is given to the UART for Asynchronous transmissions, a bit called the

    "Start Bit" is added to the beginning of each word that is to be transmitted. The Start Bit

    is used to alert the receiver that a word of data is about to be sent, and to force the clock

    in the receiver into synchronization with the clock in the transmitter.

    After the Start Bit, the individual bits of the word of data are sent; each bit in the word is

    transmitted for exactly the same amount of time as all of the other bits. When the entire

    data word has been sent, the transmitter may add a Parity Bit that the transmitter

    generates. The Parity Bit may be used by the receiver to perform simple error checking.

    Then at least one Stop Bit is sent by the transmitter. If the Stop Bit does not appear when

    it is supposed to, the UART considers the entire word to be garbled and will report a

    Framing Error. The standard serial communications hardware in the PC does not support

    Synchronous operations.

  • 7/28/2019 8991..

    35/51

    35

    3.6 RS-232

    It is the traditional name for a series of standards for serial binary single ended data and

    control signals connecting between aDTE(Data Terminal Equipment) and aDCE(Datacircuit-terminating Equipment). It is commonly used in computer serial ports. The

    standard defines the electrical characteristics and timing of signals, the meaning of

    signals, and the physical size and pin out of connectors.

    An RS-232 port was once a standard feature of a personal computer for connections to

    modems, printers, mice, data storage, un-interruptible power supplies, and other

    peripheral devices. However, the limited transmission speed, relatively large voltage

    swing, and large standard connectors motivated development of the universal serial bus

    which has displaced RS-232 from most of its peripheral interface roles. Many modern

    personal computers have no RS-232 ports and must use an external converter to connect

    to older peripherals. Some RS-232 devices are still found, especially in industrial

    machines or scientific instruments.

    3.6.1 PIN DIAGRAM AND ITS FUNCTIONS:

    Fig 3.11: 9 pin Male D-Type plug Connector

    Fig 3.12: 9 pin Female D-Type plug Connector

  • 7/28/2019 8991..

    36/51

    36

    PIN NUMBER PIN SYMBOL FUNCTION

    1 DCD Data Carrier detect (This

    line is active when modem

    detects a carrier

    2 TD Transmit data(Serial Data

    Output)

    3 RD Receive data(Serial Data

    Input)

    4 DTR Data Terminal Ready

    5 SG Signal Ground

    6 DSR Data Ready State(UARTestablishes a link)

    7 RTS Request to send

    (acknowledge to modem

    that UART is ready to

    exchange data)

    8 CTS Clear to send (Modem is

    ready to exchange data)

    9 RI Ring Indicator (Becomesactive when modem detects

    ringing signal from PSTN )

    Table3.3: Functions of the pins in RS-232

    3.6.2 LIMITATIONS:

    The large voltage swings and requirement for positive and negative suppliesincreases power consumption of the interface and complicates power supply design.

    The voltage swing requirement also limits the upper speed of a compatible interface.

    Single-ended signaling referred to a common signal ground limits the noiseimmunity and transmission distance.

    Multi-drop connection among more than two devices is not defined. While multi-drop "work-around" has been devised, they have limitations in speed and

    compatibility.

    Asymmetrical definitions of the two ends of the link make the assignment of the roleof a newly developed device problematic; the designer must decide on either a DTE-

    like or DCE-like interface and which connector pin assignments to use.

  • 7/28/2019 8991..

    37/51

    37

    The handshaking and control lines of the interface are intended for the setup andtakedown of a dial-up communication circuit; in particular, the use of handshake

    lines for flow control is not reliably implemented in many devices.

    No method is specified for sending power to a device. While a small amount ofcurrent can be extracted from the DTR and RTS lines, this is only suitable for low

    power devices such as mice.

    The 25-way connector recommended in the standard is large compared to currentpractice.

    3.7 LIQUID CRYSTAL DISPLAY (LCD):

    Liquid Crystal Display is a type of display which used in digital watches and many

    portable computers. LCD displays utilize two sheets of polarizing material with a liquid

    crystal solution between them. An electric current passed through the liquid causes the

    crystals to align so that light cannot pass through them. Each crystal, therefore, is like a

    shutter, either allowing light to pass through or blocking the light.

    The liquid crystals can be manipulated through an applied electric voltage

    so that light is allowed to pass or is blocked. By carefully controlling where and what

    wavelength (color) of light is allowed to pass, the LCD monitor is able to display images.

    A back light provides LCD monitors brightness.

    Other advances have allowed LCDs to greatly reduce liquid crystal cell

    response times. Response time is basically the amount of time that it takes for a pixel to

    change colors. In reality response time is the amount of time it takes a liquid crystal

    cell to go from being active to inactive.

    They make complicated equipment easier to operate. LCDs come in

    many shapes and sizes but the most common is the 16 character x 4 line (16x4) display

    with no backlight. It requires only 11 connectionseight bits for data (which can be

    reduced to four if necessary) and three control lines (we have only used two here). It runs

    off a 5V DC supply and only needs about 1mA of current. The display contrast can be

    varied by changing the voltage into pin 3 of the display.

  • 7/28/2019 8991..

    38/51

    38

    Fig 3.13: Front and Back side view of LCD

    3.7.1 FEATURES OF LCD

    1. 16 Characters x 2 Lines

    2. 5x7 Dot Matrix Character + Cursor

    3. HD44780 Equivalent LCD Controller / driver Built-in

    4. 4-bit or 8-bit MPU interface

    5. Standard Type

    6. Works with almost any Microcontroller

    3.7.2 PIN CONFIGURATION OF LCD:

    Pin diagram consists of VSS, VDD and VEE. 8-bit data lines are

    connected from pin 7 to pin 14. Out of these 8 data lines only 4 data lines are used in this

    session.

  • 7/28/2019 8991..

    39/51

    39

    Fig 3.14: Pin configuration of LCD

    First pin is connected to ground. 5V of supply is provided at the VCC. Mainly LCD

    consists of Display Unit, DRAM and Controller. Controller controls the actions

    performed. VEE is used for controlling LCD contrast. Three control lines are EN, RS and

    R/W.

    3.7.3 LCD PIN DESCRIPTIONS

    VCC, VSS and VEE: While VCC and VSS provide +5V and ground respectively, VEE

    is used for controlling LCD contrast.

    PIN SYMBOL I/O DESCRIPTION

    1 VSS -- Ground

    2 VCC -- +5V power supply

    3 VEE -- Power supply to control contrast

    4 RS IRS=0 to select command register,

    RS=1 to select data register

    5 R/W I R/W=0 for write, R/W=1 for read

    6 EN I/O Enable

    7 DB0 I/O The 8-bit data bus

  • 7/28/2019 8991..

    40/51

    40

    8 DB1 I/O The 8-bit data bus

    9 DB2 I/O The 8-bit data bus

    10 DB3 I/O The 8-bit data bus

    11 DB4 I/O The 8-bit data bus

    12 DB5 I/O The 8-bit data bus

    13 DB6 I/O The 8-bit data bus

    14 DB7 I/O The 8-bit data bus

    Table 3.4: Pin description of LCD

    EN: The ENline is called Enable. This control line is used to tell the LCD that you are

    sending it data. To send data to the LCD, your program should first set this line high (1)

    and then set the other two control lines and/or put data on the data bus. When the other

    lines are completely ready, bring EN low (0) again. The 1-0 transition tells the 44780 to

    take the data currently found on the other control lines and on the data bus and to treat it

    as a command.

    RS: The RSline is the Register Select line. When RS is low (0), the data is to be

    treated as a command or special instruction (such as clear screen, position cursor etc).

    When RS is high (1), the data that is sent is a text data which should be displayed on the

    screen. For example, to display the letter T on the screen you would set RS high.

    RW: The RWline is the Read/Write control line. When RW is low (0), the

    information on the data bus is being written to the LCD. When RW is high (1), theprogram is effectively querying (or reading) the LCD. Only one instruction (Get LCD

    status) is a read command. All others are write commands, so RW will almost be low.

    Finally, the data bus consists of 4 or 8 lines (depending on the mode of

    operation selected by the user). In the case of an 8-bit data bus, the lines are referred to as

    DB0, DB1, DB2, DB3, DB4, DB5, DB6 and DB7. The ASCII code to be displayed is

    eight bits long and is sent to the LCD either four or eight bits at a time.

  • 7/28/2019 8991..

    41/51

    41

    If 4-bit mode is used, two nibbles of data (sent high four bits and then

    low four bits with an E clock pulse with each nibble)are sent to make up a full eight bit

    transfer.

    The E Clock is used to initiate the data transfer within the LCD.

    Deciding how to send the data to the LCD is most critical decision to be made for an

    LCD interface application.

    8-bit mode is best used when speed is required in an application and at

    least ten I/O pins are available. The R/S bit is used to select whether data or an

    instruction is being transferred between the microcontroller and the LCD. If the Bit is set,

    then the byte at the current LCD Cursor position can be written. When the bit is reset,

    either an instruction is being sent to the LCD or the execution status of the last

    instruction is read back.

    3.7.4 ADVANTAGES OF LCD

    LCD interfacing with microcontroller is a real-world application. In recent

    years the LCD is finding widespread use replacing LEDs (seven segment LEDs or

    other multi segment LEDs). This is due to following reasons:

    1. The declining prices of LCDs are useful to use these LCDs for displayingpurpose.

    2. The ability to display numbers, characters and graphics. This is in contrast toLEDs, which are limited to numbers and a few characters. An intelligent LCD

    displays two lines, 20 characters per line, which is interfaced to the

    microcontroller.

    3. Incorporation of a refreshing controller into the LCD, thereby relieving the CPUto keep displaying the data. Before data will be refreshed or clearing inbox as

    soon as the supply is on or when circuit is on.

    4. Ease of programming for characters and graphics.

  • 7/28/2019 8991..

    42/51

    42

    CHAPTER 4

    SOFTWARE DEVELOPMENT TOOL

    4.1 KEIL SOFTWARE

    Keil C51 is the industry-standard tool chain for all 8051-compatible devices, it

    supports classic 8051, Dallas 390, NXP MX, extended 8051 variants, and C251 devices.

    The Vision IDE/Debugger integrates complete device simulation, interfaces too many

    target debug adapters, and provides various monitor debug solutions.

    The Keil 8051 Development Tools are designed to solve the complex problems faced by

    embedded software developers.

    When starting a new project, simply select the microcontroller you use from theDevice Database and the Vision IDE sets all compiler, assembler, linker, and

    memory options for you.

    Numerous example programs are included to help you get started with the mostpopular embedded 8051 devices.

    The Keil Vision Debugger accurately simulates on-chip peripherals (IC, CAN,UART, SPI, Interrupts, I/O Ports, A/D Converter, D/A Converter, and PWM

    Modules) of your 8051 device. Simulation helps you understand hardware

    configurations and avoids time wasted on setup problems. Additionally, with

    simulation, you can write and test applications before target hardware is

    available.

    When you are ready to begin testing your software application with targethardware, use the MON51, MON390, MONADI, or FlashMON51 Target

    Monitors, the ISD51 In-System Debugger, or the ULINK USB-JTAG Adapter to

    download and test program code on your target system.

    4.2 OVERVIEWViewing Code & Data: The Vision Debugger provides a number of ways to

    display variables and program objects.

  • 7/28/2019 8991..

    43/51

    43

    Executing Code: Vision offers several ways to control and manipulate program

    execution.

    Advanced Analysis Tools: Advanced analysis tools are available to help you test

    and debug your embedded applications.

    Simulation: Simulation capabilities make it possible to test your target system

    without target hardware.

    Target Debugging: Target debug drivers allow you to test programs running on

    target hardware.

    4.3VIEWING DATAThe Vision Debugger offers a number of different views into the code and data that

    comprise your target application.

    Source Code Window: It displays high-level language and assembly program source

    code.

    Disassembly Window: It shows mixed high-level language and assembly code.

    System Registers: The Registers Tab of the Project Workspace shows system registers.

    Symbol Window: It heir archly displays program symbols in your application.

    Output Window: It displays the output of various debugger commands.

    Memory Window: It displays up to four regions of code or data memory.

    Watch Window: It displays local variables, user-defined watch expression lists, and the

    call stack.

    System Viewer Window: It provides detailed status information about device peripheralregister contents while the processor is running.

    4.4 EXECUTING CODE

    Vision provides run controls to start, stop, and step through your embedded application.

    You may use breakpoints and trace memory to conditionally halt program execution and

    review previously executed program code.

  • 7/28/2019 8991..

    44/51

    44

    Reset:

    It is possible to debug reset conditions using the Vision Simulator.

    Run/Stop:

    Buttons and Commands make starting and stopping program execution is easy.

    Single-Stepping:

    Vision supports various methods of single-stepping through your target program.

    Execution trace:

    Execution trace information for each executed instruction is stored by Vision.

    Breakpoints:

    Both simple and complex breakpoints are supported by the Vision Debugger.

  • 7/28/2019 8991..

    45/51

    45

    CHAPTER 5

    RESULT ANALYSIS

    The circuit looks like this before it is switched ON.

  • 7/28/2019 8991..

    46/51

    46

    When initially a circuit is switched on a message RFID TRANSMITTER is displayed

    on the LCD of the transmitter and RFID RECEIVER is displayed on the receiver.

  • 7/28/2019 8991..

    47/51

    47

    When an RFID tag is bought into the range of RFID reader then the message already

    feeded into the program is displayed on the LCD of the transmitter. On the other handthis detail is passed on over to the receiver which in turn displays the same on its LCD.

    CONCLUSION

  • 7/28/2019 8991..

    48/51

    48

    This technology is an upcoming technology and after a few years it is believed to replace

    all the existing used today. The main reason for it taking so long to rise in the market iscost. Unfortunately, the price of RFID will not come down until its demand increases and

    its demand in the market will not increase despite its advantages unless its price

    decreases. One of the best about RFID is that it is being developed to be ECO-

    FRIENDLY. Eco20 low power RFID are significantly more efficient because they

    consume 60% less energy when compared to most competitors comparable products in

    the market. Low power consumption in turn cascades beneficially across the required

    power supplies and utility equipment connected to the entire end user system .Low power

    consumption means less power supplies, peripheral equipment, communication

    converters etc.

    ADVANTAGES:

    Automated operation Low Power consumption Security.

    As our project is an advanced method of security system, it has few disadvantages also.

    DISADVANTAGES:

    If the number of RFID readers is increased, the cost and complexity of the projectincreases.

    Without GUI mode of operation, the working status of RFID transceiver isunpredictable.

    Security becomes unreliable, if any RFID tag is lost. Fault finding between the individual RFID modules is complex.

  • 7/28/2019 8991..

    49/51

    49

    FUTURE SCOPE

    Some vendors have been combining RFID tags with sensors of different kinds. This

    would allow the tag to report not simply the same information over and over, but

    identifying information along with current data picked up by the sensor. For example, an

    RFID tag attached to a leg of lamb could report on the temperature readings of the past

    24 hours, to ensure that the meat was properly kept cool.

    Over time, the proportion of "scan-it-yourself" aisles in retail stores will increase.

    Eventually, we may wind up with stores that have mostly "scan-it-yourself" aisles and

    only a few checkout stations for people who are disabled or unwilling.

    Efforts are being made to implant them into human beings. RFID devices that are

    intended to be implanted inside a living body (like an animal or human being) havespecial requirements. They need to be encased in a special kind of casing that will not

    irritate or react with the living tissues that they are inserted into. The casing must also be

    transparent to the scanning radio-frequency beam that activates the chip. Some RFID

    vendors have created biocompatible glass for use in these applications. Because the

    radio-frequency waves that activate the microchip containing the identification number

    are only useful within a few feet (or less), the RFID chip is typically inserted very close

    to the surface of the skin.

  • 7/28/2019 8991..

    50/51

    50

    The placement of the device is usually done with a hyperdermic-type needle. This

    method of insertion also dictates the shape and size of the device; implantable RFID

    devices are typically the size and diameter of a grain of rice. For dogs, the device is

    usually implanted between the shoulder blades.

    Going by this scenario and its increasing demand in high level applications it is very

    much clear that it will not take much time for RFID to take over the world.

  • 7/28/2019 8991..

    51/51

    BIBLIOGRAPHY

    1) www.rfidjournal.com/article/articleview/1339/1/129/2) www.technovelgy.com/ct/technology-article.asp3) www.explania.com/en/channels/technology/detail/what-is-rfid4) www.rfidjournal.com/article/view/7662/5) V. Zeimpekis, G.M. Giaglis, and G. Lekakos, A taxonomy of indoor and

    Outdoor positioning techniques for mobile location services, ACM SIGecom

    Exchanges, ACM, New York, USA, 2003, Vol.3 No.4, pp. 19-27.6) J. Korhonen, T. Ojala, M. Klemola, and P. Vnnen, mTagArchitecture for

    Discovering Location Specific Mobile Web Services Using RFID and Its

    Evaluation with Two Case Studies, Proceedings of the Advanced International

    Conference on Telecommunications and International Conference on Internet

    and Web Applications and Services (AICT/ICIW 2006), IEEE Computer

    Society, Washington DC, USA, February 19-25, 2006, pp. 191.

    7) L.M. Ni, Y. Liu, Y.C. Lau, and A.P. Patil, LANDMARC: indoor locationsensing using active RFID, Proceedings of the First IEEE Conference on

    Pervasive Computing and communications (PerCom'03), IEEE Computer

    Society, March 23-26, 2003, pp. 407-415.

    8) I.A. Junglas, An Experimental Investigation of LocationBased Services,Proceedings of the 38th Annual Hawaii International Conference on System

    Sciences (HICSS'05), IEEE Computer Society, Washington DC, USA, January 3-

    6, 2005, Vol.3, pp. 85a-85a.

    http://www.rfidjournal.com/article/articleview/1339/1/129/http://www.technovelgy.com/ct/technology-article.asphttp://www.explania.com/en/channels/technology/detail/what-is-rfidhttp://www.rfidjournal.com/article/view/7662/http://www.rfidjournal.com/article/view/7662/http://www.explania.com/en/channels/technology/detail/what-is-rfidhttp://www.technovelgy.com/ct/technology-article.asphttp://www.rfidjournal.com/article/articleview/1339/1/129/