dtmf based door opening system report

Upload: prashant

Post on 06-Jul-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/16/2019 DTMF based door opening system REPORT

    1/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    Abstract:

     

    The main objective of this project is to unlock a door by a mobile phone using a unique

     password entered through the keypad of the phone. Opening and closing of doors involves

    human labor. In this proposed system, the opening and closing of a door is achieved by using

    a mobile phone. The owner can call to a mobile phone interfaced to the system which in turn

    is connected to the door that can openclose the door by entering the password. This method

    is very convenient as one doesn!t have to carry a key or has to perform any manual labour to

    openclose the door physically.

    This project is based on the concept of "T#$ %dual tone multi & frequency'. (very numeric

     button on the keypad of a mobile phone generates a unique frequency when pressed. These

    frequencies are decoded by the "T#$ decoder I) at the receiving end which is fed to the

    microcontroller. If this decoded values %password entered by the user' matches with the

     password stored in the microcontroller, then the microcontroller initiates a mechanism to

    open the door through a motor driver interface.

    $urther this project can be incorporated with an ((*+O# i.e., a non&volatile memory so that

    the password can be changed by the owner.

    Department of ECE, SDMCET, Dhara!Pa"e #

  • 8/16/2019 DTMF based door opening system REPORT

    2/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

      TABLE OF CONTENTS

    Sl.No. Contents Page.No.

    1. CHAPTER 1  Introduction

    !. CHAPTER !

    !.1 Ob"ecti#e $

    !.! Bloc% &iagra' (

    !. Co')onent List *

      . CHAPTER  

    .1 &esigning +

    .! Po,er Su))l- Section +

    . Selection o 'icrocontroller /

    .$ Selection o 0S obile 11

    .( Selection o &TF R2 IC 11

    .3 Selection o oter 11.* Connections 1!

    $. CHAPTER $

    Sot,are Re4uire'ent 1

    (. CHAPTER (

    Circuit O)eration 1(

    A))lications and Ad#antages 1*

    Future &e#elo)'ent 1*

    Reerence 1+

    Department of ECE, SDMCET, Dhara!Pa"e $

  • 8/16/2019 DTMF based door opening system REPORT

    3/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

      CHAPTER 51

    Introduction6

    The cell phone security system is the result of a fusion of a creative idea with an attempt to

    motivate change. (ven though modern technology has allowed for the automation of many

    aspects of domestic lifestyles, from automatic motion sensing lights to automatic garage door 

    openers, home security has not seen much benefit from this revolution. ousehold entry has

    long been a very manual routine with little effort to automate the process. (ntry into a

    residence is still primarily limited to a manual process which involves inserting a key into a

     bolt and physically moving the locking mechanism. The cell phone security system aims to

    change this. The system takes advantage of the widespread acceptance of cell phones in

    today!s society in conjunction with the deep&rooted standards of the landline telephone

    network to introduce automation and convenience. The system will allow a user to use their 

    cell phone to place a call into their home security system. Once the system verifies the caller,

    the caller is then allowed to attempt a password entry. -pon successfully entering a

     password, the system will automatically unlock the door and grant entrance. This automation

    introduces a form of secure, keyless entry into a residence along with the convenience of a

    fully responsive security system monitor. The system will primarily interface with telephony

     protocols which include dual tone multi frequency %"T#$', caller identification %)I"', and

    some applicable telephony circuit standards. )aller identification will be used in the first

    level of security to verify the caller and "T#$ will be used in the second level to decode the

     button presses that form the password. The telephony standards are necessary for implementing a correct interface that will allow the phone line to go onoff&hook. *roperly

    understanding and interfacing with these standards is of utmost importance for successful

    operation.

    Department of ECE, SDMCET, Dhara!Pa"e %

  • 8/16/2019 DTMF based door opening system REPORT

    4/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

      CHAPTER&$

     O'(e)t*+e

    -e./e00 entr. ha0 'een a /121r. ho0e a+a*/a'*/*t. *0 )on3ne! pr*mar*/.

    to +eh*)/e04 The )e// phone 0e)1r*t. 0.0tem ta5e0 th*0 *!ea of 5e./e00 entr.

    an! tran0form0 *t *nto a )on+en*ent, +er0at*/e 0e)1r*t. 0.0tem that 1t*/*6e0

    )e// phone te)hno/o". an! the /an!/*ne te/ephone netor54 B. ta5*n"

    a!+anta"e of )a//er *!ent*3)at*on an! !1a/&tone m1/t*&fre71en). 0*"na/*n",

    the 0e)1r*t. 0.0tem ha0 the a'*/*t. to *ntro!1)e to&/e+e/0 of 0e)1r*t.4 The

    3r0t /e+e/ *// 'e !e)o!*n" the )a//*n" part.80 *!ent*3)at*on *nformat*on

    h*/e the 0e)on! /e+e/ o1/! )on0*0t of the 10er attempt*n" a pa00or!

    entr. o+er the phone4 B. )om'*n*n" the mo'*/*t. of th*0

    te/e)omm1n*)at*on me!*1m *th m*)ro)ontro//er0, the 0.0tem a)h*e+e0 a

    0e)1re, )on+en*ent, an! a1tomate! form of 0e)1r*t. for a p/a)e of 

    re0*!en)e Th*0 pro(e)t *0 'a0e! on the )on)ept of DTMF 9!1a/ tone m1/t* &

    fre71en).:4 E+er. n1mer*) '1tton on the 5e.pa! of a mo'*/e phone

    "enerate0 a 1n*71e fre71en). hen pre00e!4 The0e fre71en)*e0 are

    !e)o!e! '. the DTMF !e)o!er IC at the re)e*+*n" en! h*)h *0 fe! to the

    m*)ro)ontro//er4 If the0e !e)o!e! +a/1e0 9pa00or! entere! '. the 10er:

    mat)he0 *th the pa00or! 0tore! *n the m*)ro)ontro//er, then the

    m*)ro)ontro//er *n*t*ate0 a me)han*0m to open the !oor thro1"h a motor

    !r*+er *nterfa)e

     The '/o)5 !*a"ram !ep*)t0 the ent*re or5*n" of the 0.0tem 4 The 10er80

    )e// phone !*a/0 to the )e// phone atta)he! to the 0.0tem4 It a1tomat*)a//.

    p*)50 1p the )a// an! re)e*+e0 the DTMF tone0 an! 0en!0 *t a0 an *np1t to

    DTMF !e)o!er to !e)o!e *t0 BCD )o!e4 The BCD )o!e *0 then 0ent to the

    m*)ro&)ontro//er h*)h on re)e*+*n" the *np1t on one of *t0 port a)t0

    a))or!*n" to the pro"ram '1rnt *n *t4It, on re)e*+*n" the 0*"na/, 0en!0 the

    )omman! +*a ;$

  • 8/16/2019 DTMF based door opening system REPORT

    5/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    B;OC- DIAGRAM

     

    Department of ECE, SDMCET, Dhara!Pa"e >

  • 8/16/2019 DTMF based door opening system REPORT

    6/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

     

    F*"4$4# B/o)5 D*a"ram of DTMF Ba0e! Door Open*n" S.0tem W*th Se)1re! Pa00or!4

    PO7ER S8PPL9

    Department of ECE, SDMCET, Dhara!Pa"e ?

  • 8/16/2019 DTMF based door opening system REPORT

    7/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    F*"4$4$ B/o)5 D*a"ram of Poer S1pp/.4

     

    COPONENT LIST

    Sr. no E4ui)'ent :uantit-

    I) /01 #) 2 #T //30 "T#$ I)

    Department of ECE, SDMCET, Dhara!Pa"e @

  • 8/16/2019 DTMF based door opening system REPORT

    8/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    4 )rystal %4.135161mh7'

    6 8O9T;( +(;-9TO+

    1 )+

  • 8/16/2019 DTMF based door opening system REPORT

    9/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    .1 &ESI0NIN06

    =ince the main intension of this project is to design a "T#$ ?=(" "OO+ 9O)CI@;

    =

  • 8/16/2019 DTMF based door opening system REPORT

    10/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    2' $ull wave and

    4' ?ridge rectifier 

    ere we short listed to use ?ridge rectifier, because half wave rectifier has we less in

    efficiency. (ven though the efficiency of full wave and bridge rectifier are the same, since

    there is no requirement for any negative voltage for our application, we gone with bridge

    rectifier.

    =ince the output voltage of the rectifier is pulsating "), in order to convert it into pure ")

    we use a high value %000-$100-$' of capacitor in parallel that acts as a filter. The most

    easy way to regulate this voltage is by using a 3/01 voltage regulator, whose output voltage

    is constant 18 ") irrespective of any fluctuation in line voltage.

    . SELECTION OF ICROCONTROLLER6

    s we know that there so many types of micro controller families that are available in the

    market.

    Those are

    ' /01 $amily

    2' 8+ microcontroller $amily

    4' *I) microcontroller $amily

    6' +# $amily

    ?asic /01 family is enough for our applicationD hence we are not concentrating on higher 

    end controller families.

    In order to fulfill our application basic that is T/5)1 controller is enough. ?ut still we

    selected T/5=12 controller because of inbuilt I=* %in system programmer' option. There are

    minimum siE requirements for proper operation of microcontroller.

    Those are:

    ' power supply section

    2' pull&ups for ports %it is must for *O+T0'

    Department of ECE, SDMCET, Dhara!Pa"e #

  • 8/16/2019 DTMF based door opening system REPORT

    11/20

    C

    P

    8

    O

    n5

    c;

    i)

    A

    On5

    c;i

    )

    RO

    or

    )ro

    gra

    '

    cod

    e

    $

    I

  • 8/16/2019 DTMF based door opening system REPORT

    12/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    wireless applications, machine to machine or user to machine and remote data

    communications in many applications.

    .( SELECTION OF &TF R> IC6

    The #T//30"#T//30"& is a complete "T#$ receiver integrating both the

     bandsplit filter and digital decoder functions. The filter section uses switched capacitor 

    techniques for high and lowgroup filters D the decoder uses digital counting techniques

    to detect and decode all > "T#$ tonepairs into a 6&bit code. (Eternal component

    count is minimi7ed by on chip provision of a differential input amplifier , clock 

    oscillator and latched three&state bus Interface

    .3 SELECTION OF OTOR6 

    =tepper #otor is widely used in )@) machine drives , robots, and wherever an

    accurate positioning is required . In such applications, step angle , direction , operating

    modes% single coil or double coil', speed and position are important considerations.

    stepper motor is a simple dc motor with a permanent magnet rotor and a stator with

    armature consisting of coils. These coils produce a magnetic field when suitable

    current flows through them this field produces a torque in the rotor which makes it

    rotate.Fell these are a little more complicated to control than the simple ") motors

     but these provide eEact step wise rotation with an overall turn of ./ degrees step .

    The step wise motion can be easily controlled by a stepper controller which is a

    simple circuit which takes digital logic and then uses it to turn the motor step wise

    .*. 1 CONNECTIONS OF OBILE HEA&SET 6

    The mobile head set should be connected to "T#$ +B I) inputs. G fter that "T#$

    decoder I) output should be connected to the microcontroller.

    Department of ECE, SDMCET, Dhara!Pa"e #$

  • 8/16/2019 DTMF based door opening system REPORT

    13/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    .*. ! CONNECTIONS OF STEPPER OTOR6

    In this project we are using one driver I) 9254" to O@HO$$ the stepper motor.   The

    terminals of this 9254" is connected to the *O+T2. %*2.' of microcontroller.

      $ig 4.2: *in "iagram Of #otor 

      CHAPTER5$

    SOFT7ARE RE:8IREENTS

    Department of ECE, SDMCET, Dhara!Pa"e #%

  • 8/16/2019 DTMF based door opening system REPORT

    14/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    Ceil an +# )ompany makes ) compilers, macro assemblers, real&time kernels, debuggers,

    simulators, integrated environments, evaluation boards, and emulators for

    +#3+#5)orteE, B)>E)>E=T0, 21, and /01 #)- families 

    )ompilers are programs used to convert a igh 9evel 9anguage to object code. "esktop

    compilers produce an output object code for the underlying microprocessor, but not for other

    microprocessors. i.e., the programs written in one of the 99 like )! will compile the code

    to run on the system for a particular processor like E/> %underlying microprocessor in the

    computer'.

    Department of ECE, SDMCET, Dhara!Pa"e #=

  • 8/16/2019 DTMF based door opening system REPORT

    15/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    #any companies provide the /01 assembler, some of them provide shareware version of 

    their product on the Feb, Ciel is one of them. Fe can download them from their Febsites.

    owever, the si7e of code for these shareware versions is limited and we have to consider 

    which assembler is suitable for our application.

      CHAPTER5(

    Department of ECE, SDMCET, Dhara!Pa"e #>

  • 8/16/2019 DTMF based door opening system REPORT

    16/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    CIRC8IT OPERATION6

    In this application we are using mobile phones. To this mobile we are connecting one head

    set . This head set output is connected to "T#$ +B I) G This is connected to one

    microcontroller and after that microcontroller connected to the stepper motor through the

    9254" "+I8(+ I).In this application we are connecting one door type device to stepper 

    motor. ere the operation is we are calling to the target mobile . then the mobile release some

    dual tone multiple frequencies. These frequencies are received by the "T#$ +B I) and it

    converted to binary data. nd It received by the microcontroller and then it can do particular 

    operation depending upon the binary information. then controller can turn the motor to openthe door as well as close the door by pressing the keys on the keyboard .

    Table 1. "T#$ keypad frequencies

    %with sound clips)

    Department of ECE, SDMCET, Dhara!Pa"e #?

  • 8/16/2019 DTMF based door opening system REPORT

    17/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

      $ig 1. "T#$ keypad layout

    $ig.1.2 =chematic diagram of *OF(+ =-**9<

    Department of ECE, SDMCET, Dhara!Pa"e #@

  • 8/16/2019 DTMF based door opening system REPORT

    18/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    $ig.1.4 pplication )ircuit with #icro )ontroller 

    A))lications and Ad#antages6

    . This project can be used in offices, companies also at home. It will provide keyless entry.

    2. This can be used in ?anks for safety lock.

    4. -ser don!t have to carry keys along with him.

    Department of ECE, SDMCET, Dhara!Pa"e #

  • 8/16/2019 DTMF based door opening system REPORT

    19/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    Future &e#elo)'ent6

    . Fe can monitor parameters like fire, overheat

    2. Fe can provide voice feedback system

    4. Fe can interface ;=# modem which will send sms if invalid attempt is made to open the

    lock.

    REFERENCES

    •  J/01 and embedded systemK by #a7idi and #a7idi

    •  ll datasheets from www.datasheetcatalog.com

    •  bout T/5s/212 from www.atmel.com

    http:www.atml.comembeded&projectspic&>&f&//3 project .html

    Department of ECE, SDMCET, Dhara!Pa"e #

  • 8/16/2019 DTMF based door opening system REPORT

    20/20

      DTMF BASED DOOR OPENING SYSTEM WITH SECURED PASSWORD

    • http:en.m.wikipedia.orgwikipicLcontrollerMsectionLfooter 

    • http:microchip.comymsL5100&sensor.html

    • www.microe.com

    • nd www.triindia.co.in

    Department of ECE, SDMCET, Dhara!