power theft

73
GSM BASED POWER THEFT SUBSTATION ABSTRACT Science and technology with all its miraculous advancements has fascinated human life to a great extent that imagining a world without these innovations is hardly possible. While technology is on the raising slope, we should also note the increasing immoral activities. With a technical view, "Power Theft" is a non-ignorable crime that is highly prevalent, and at the same time it directly affects the economy of a nation. Detecting and eradicating such crimes with the assistance of the developing scientific field is the "Need of the Hour". With these views was this paper conceived and designed. Our paper provides a complete and comprehensive tool to prevent power theft which is very simple to understand and easy to implement. It includes three sections - transmitting, receiving, and processing sections. The IR transmitter transmits the IR rays (which are invisible) to the photo diode continuously at that time microcontroller does not perform any operation when the signal breaks, immediately IC555 sends a negative pulse to the microcontroller now it process and send a signals to the GSM modem using serial communication, the modem sends a message (address of that house) to the substation using GSM technology. Then they immediately take an action that to stops the power to the house and take further actions on them. Here the microcontroller performs the function of indication and identification of power theft. Pin details, features, connections and software employed for uc89c51 are described in detail. 1

Upload: sameer-guragain

Post on 31-Oct-2014

62 views

Category:

Documents


2 download

DESCRIPTION

power theft tracking using GSM module

TRANSCRIPT

Page 1: power theft

GSM BASED POWER THEFT SUBSTATION

ABSTRACT

Science and technology with all its miraculous advancements has fascinated human life to a great extent that imagining a world without these innovations is hardly possible. While technology is on the raising slope, we should also note the increasing immoral activities. With a technical view, "Power Theft" is a non-ignorable crime that is highly prevalent, and at the same time it directly affects the economy of a nation.

Detecting and eradicating such crimes with the assistance of the developing scientific field is the "Need of the Hour". With these views was this paper conceived and designed. Our paper provides a complete and comprehensive tool to prevent power theft which is very simple to understand and easy to implement. It includes three sections - transmitting, receiving, and processing sections.

The IR transmitter transmits the IR rays (which are invisible) to the photo diode continuously at that time microcontroller does not perform any operation when the signal breaks, immediately IC555 sends a negative pulse to the microcontroller now it process and send a signals to the GSM modem using serial communication, the modem sends a message (address of that house) to the substation using GSM technology. Then they immediately take an action that to stops the power to the house and take further actions on them. Here the microcontroller performs the function of indication and identification of power theft. Pin details, features, connections and software employed for uc89c51 are described in detail.

We believe our implementation ideas are a boon to the electricity board offering them a chance to detect accurately the location and amount of power theft.

1

Page 2: power theft

GSM BASED POWER THEFT SUBSTATION

CHAPTER - 1

CHAPTER 1INTRODUCTION

1.1. OVERVIEW:

"TODAY'S TECHNICIANS ARE SO FOCUSSED ON THE TREES OF TECHNOLOGICAL CHANGE THAT THEY FAIL TO SEE THE FOREST; THE UNDERLYING ECONOMIC FORCES THAT DETERMINE SUCCESS AND FAILURE..."

2

Page 3: power theft

GSM BASED POWER THEFT SUBSTATION

"TECHNOLOGY CHANGES ECONOMY LAWS DO NOT"

Electricity is the modern man's most convenient and

useful form of energy without which the present social infrastructure

would not be feasible. The increase in per capita production is the

reflection of the increase in the living standard of people. When

importance of electricity is on the increasing side, then how much

should theft of this energy or illegal consumption of power from the

transmission lines is averted? Power theft has become a great

challenge to the electricity board. The dailies report that Electricity

Board suffers a total loss of 8 % in revenue due to power theft every

year, which has to control. Our paper identifies the Power theft and

indicates it to the Electricity board through Power line. We had also

dealt about the remote monitoring of an energy meter.

MICROCONTROLLER BASED AUTOMATION:

Embedded systems - a combination of software,

hardware and additional mechanical parts that together forms a

component of a larger system, to perform a specific function. It's a

technology, characterized by high reliability, restricted memory

footprint and real time operation associated with a narrowly defined

group of functions. Automation has made the art of living

comfortable and easy. Embedded systems have made the process

of automation a most successful one. Here, we have focused on

automotive, an area of embedded controllers, in which we have

dealt with the Power theft identification and also about the remote

monitoring of an energy meter.

"Technology have taken the world by storm performance

ratings and exceptionally value for money prices"

The microcontroller chip is preprogrammed to perform a dedicated

or a narrow range of functions as a part of a larger system, usually

with minimal end user or operator intervention. Our paper throws

light on automated monitoring of theft identification, which is an

application of embedded controllers.

MODES OF THEFT:3

Page 4: power theft

GSM BASED POWER THEFT SUBSTATION

It has been seen that there are 4 common methods of

power theft as given below:-

Bogus seals and tampering of seals.

Meter tampering, meter tilting, meter interface

and

Meter bypassing.

Changing connection.

Direct tapping from line. Due to introduction of modern

electronic metering equipments, power thieves are utilizing more

technological methods. Recent cases of power theft discovered by

British inspectors included customers tunneling out to roadside

mains cables and splicing into the supply, a garage taking its night

time power supply from the nearest lamp post and domestic

customers drilling holes into meter boxes and attempting to stop the

counter wheels from turning. Another method of Power theft is by

keeping a strong magnet in front of the disc in the energy meter and

thus arresting the rotation of the disc, connecting the load directly

to the power line bypassing the energy meter. But, it can be avoided

easily by providing a non magnetic enclosure.

MODERN DETECTING TOOLS:

There are many modern tools that assist in power theft

identification. Some of them are:-

Tamper proof seals and labels. Meter leaders. Tamper resistant

screws / locks. Check meter and remote meter readers. Tamper

alarms and sensors. This paper undertakes the Check meter and

remote meter readers for power theft identification. In our case, the

consumption recurred by the check meter is compared with the

revenue meters consumption. If there is a difference, then it

indicates either there is a theft or revenue meter malfunction. The

check meter can also be used to monitor the energy used on the

secondary of a distribution transformer serving several customers

and compared to the sum of all the meter usage. Besides spotting

out the line where power theft is suspected to occur, it also detects

4

Page 5: power theft

GSM BASED POWER THEFT SUBSTATION

the amount of energy stolen. Compact size, lightweight for quick

and high accuracy make the system more effective.

1.2. REQUIREMENTS AND SPECIFICATIONS:

The functional units of our project are

1. 89s52 Microcontroller

2. MAX-232

3. 555

4. DB9 connector

5. IR Sensor

6. Photo Diode

89s52 Microcontroller:

The device also has four 8-bit I/O ports, three 16-bit

timer/event counters, a multi-source, a four-priority-level, nested

interrupt structure, an enhanced UART on-chip oscillator and timing

circuits. The added features of 89c51 make it a powerful

microcontroller for applications that require pulse width modulation,

high-speed I/O and up/down counting capabilities such as motor

control.

MAX-232:

The MAX232 is a dual driver/receiver that includes a capacitive

voltage generator to supply 232 voltage levels from a single 5-V

supply. Each receiver converts 232 inputs to 5-V TTL/CMOS levels.

These receivers have a typical threshold of 1.3 V and a typical

hysteresis of 0.5 V, and can accept ±30-V inputs. Each driver

converts TTL/CMOS input levels into 232 levels.

5

Page 6: power theft

GSM BASED POWER THEFT SUBSTATION

555:

The LM555 is a highly stable device for generating accurate

time delays or oscillation. Additional terminals are provided for

triggering or resetting if desired. In the time delay mode of

operation, the time is precisely controlled by one external resistor

and capacitor. For astable operation as an oscillator, the free

running frequency and duty cycle are accurately controlled with two

external resistors and one capacitor. The circuit may be triggered

and reset on falling waveforms, and the output circuit can source or

sink up to 200mA or drive TTL circuits.

IR Sensor:

The MAX232 is a dual driver/receiver that includes a capacitive

voltage generator to supply EIA-232 voltage levels from a single 5-V

supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS

levels. These receivers have a typical threshold of 1.3 V and a

typical hysteresis of 0.5 V, and can accept ±30-V inputs. Each driver

converts TTL/CMOS input levels into EIA-232 levels.

Photo Diode:

A photodiode consists of an active p-n junction which is

operated in reverse bias. When light falls on the junction, reverse

current flows which is proportional to the illuminance. The linear

response to light makes it an element in useful photo detectors for

some applications. It is also used as the active element in light-

activated switches.

1.3. BLOCK DIAGRAM:

Power theft identification, in this paper, is done by

converting the disc revolutions of each consumer's energy meter

and distribution transformer into pulses. These pulses are frequency

division multiplexed and transmitted through power line. These

signals are individually picked and counted at the receiver end. If

6

Page 7: power theft

GSM BASED POWER THEFT SUBSTATION

the difference of the sum of the consumer's readings and that of

distribution transformer exceeds the preset value, which is set by

considering transmission loss, the power theft is said to occur.

The project can be categorized into 4 modules:-

© Transmitting section

© Receiving section

© Processing section

© Counter section the transmitted signal is selected at the

receiving end by the intermediate frequency transformer.

DESIGN LAYOUT:

1.4. COMPONENTS USED:

Semiconductors:

IC1 - 89s52 MicrocontrollerIC2 - MAX-232IC3 - 555

Resistors:

R1 - 8.2-kilo-ohm7

Sensor

Circuit

89s52 microcontroller

GSM modem

Page 8: power theft

GSM BASED POWER THEFT SUBSTATION

R2, R3 - 1-kilo-ohmR4, R5 - 100-ohmR6-R9 - 10K-Preset

Capacitors:

C1 - 10µF ElectrolyticC2-C5 - 1µF ElectrolyticC6, C7 - 33PF Ceramic Disk

Miscellaneous:

XTAL - 11.0592MHzModem - GSM-300MHzD1, D2 - IR DiodeD3, D4 - Photo DiodeConnector - DB9Battery - 5V

1.5. Circuit Diagram:

8

Page 9: power theft

GSM BASED POWER THEFT SUBSTATION

9

Page 10: power theft

GSM BASED POWER THEFT SUBSTATION

CHAPTER - 2

CHAPTER 2

INTRODUCTION TO MICROCONTROLLER’S

2.1 Definition:

Microprocessors and microcontrollers stems from the same

basic idea, microprocessor is a general purpose digital computer

central processing unit popularly known as memory usually

ROM,RAM, “computer on chip ’’ .To make a complete microcomputer

, one must add memory, usually ROM, RAM Memory decoders, an

isolator and a number of I/O devices, such as parallel and serial data

ports. The design of microcontroller added all these features along

with ALU, PC, SP and registers.10

Page 11: power theft

GSM BASED POWER THEFT SUBSTATION

2.2 History:

The past three decades have seen the introduction that has radically

changed the way in which we analyze and control the world around us.

Born of parallel developments in computer on chip first becomes a

commercial reality in 1971 with the introduction of the 4-bit 4004 by a

small, unknown company by the name of Intel corporation other, well

established, semiconductor firms soon followed Intel’s pioneering

technology so that by the late 1970’s we could choose from half-a-

dozen or micro processor types.

A bi-product of microprocessor development was the microcontroller.

The same fabrication techniques and programming concepts that make

possible general-purpose microprocessor also yield the microcontroller.

The criteria in choosing micro controller are as follows:

• Meeting the computing needs of the task at hand efficiently and

cost effectively.

• Availability of software development tools such as compilers,

assemblers and debuggers.

11

Page 12: power theft

GSM BASED POWER THEFT SUBSTATION

• With availability and reliable sources of the microcontroller.

• The number of I/O pins and the timer on the chip. Speed and packaging Power consumption

• The amount of RAM and ROM on chip.

• The number of I/O pins and the timer on the chip.

• It is easy to upgrade to higher performance or lower power

consumption versions.

• Cost per unit.

Microprocessor and microcontroller systems form the same basic idea,

microprocessor is a general-purpose digital computer central

processing unit (CPU) popularly known as “computer pm chip”. To

make a complete microcomputer, one must add memory usually ROM,

RAM, Memory decoders as isolator and number of I/O devices such as

parallel and serial data ports. The design of microcontroller added all

these features along with ALU, PC, SP and registers.

The primary use of microprocessor is to read data, perform extensive

calculations on that data and store those calculations on a mass

storage device or display the results for human use. Like the

microprocessor, a microcontroller is general purpose device, but one

that is meant to read data, perform limited calculations on that data

and control its environment based on those calculations the primary

use of microcontroller is to control the operation of a machine using a

fixed program that is stored in ROM and that does not change over the

life time of the system.

2.3 Use of a Micro Controller:

The time use of microprocessor is to read data, perform extensive

calculations on that data and store those calculations on that data and

store those calculations on a mass storage device or display the results

12

Page 13: power theft

GSM BASED POWER THEFT SUBSTATION

for human use. Like the microprocessor, a microcontroller is a general

purpose device, but one that is meant to read data, performs limited

calculations on that data and control its environment based on those

calculations. The prime use of micro controller is to control the

operation of a machine using a fixed program that is stored in ROM and

that does not change over the lifetime of the system.

2.4 Comparing With Microprocessor:

The contrast between a microcontroller and a microprocessor is that

most processors have many operational codes for moving data from

external memory to C.P.U; Microcontrollers may have one or two.

Processor may have one or two types of bit handling instructions, micro

controllers will have many. The microprocessor is concerned with rapid

movement of code and data from external address to the chip whereas

the microcontroller is concerned with the rapid movements of bits

within the chip. The microcontroller can function as a computer of no

external digital parts and the microprocessor must have many

additional parts to be operational.

2.5 Memory Unit:

Memory is part of the microcontroller whose function is to store data.

The easiest way to explain it is to describe it as one big closet with lots

of drawers. If we suppose that we marked the drawers in such a way

that they cannot be confused, any of their contents will then be easily

accessible. It is enough to know the designation of the drawer and so

its contents will be known to us for sure.

13

Page 14: power theft

GSM BASED POWER THEFT SUBSTATION

Figure2.2: Simplified model of a memory unit

Memory components are exactly like that. For a certain input we get

the contents of a certain addressed memory location and that's all.

Two new concepts are brought to us: addressing and memory location.

Memory consists of all memory locations, and addressing is nothing but

selecting one of them. This means that we need to select the desired

memory location on one hand, and on the other hand we need to wait

for the contents of that location. Besides reading from a memory

location, memory must also provide for writing onto it. This is done by

supplying an additional line called control line. We will designate this

line as R/W (read/write). Control line is used in the following way: if

r/w=1, reading is done, and if opposite is true then writing is done on

the memory location.

Memory is the first element, and we need a few operation of our

microcontroller. The amount of memory contained within a

microcontroller varies between different microcontrollers. Some may

not even have any integrated memory (e.g. Hitachi 6503, now

discontinued). However, most modern microcontrollers will have

integrated memory. The memory will be divided up into ROM and RAM,

with typically more ROM than RAM.

Typically, the amount of ROM type memory will vary between around

512 bytes and 4096 bytes, although some 16 bit microcontrollers such

14

Page 15: power theft

GSM BASED POWER THEFT SUBSTATION

as the Hitachi H8/3048 can have as much as 128 Kbytes of ROM type

memory.

ROM type memory, as has already been mentioned, is used to store

the program code. ROM memory can be ROM (as in One Time

Programmable memory), EPROM, or EEPROM.

The amount of RAM memory is usually somewhat smaller, typically

ranging between 25 bytes to 4 Kbytes.

RAM is used for data storage and stack management tasks. It is also

used for register stacks (as in the microchip PIC range of

microcontrollers).

2.6 Central processing Unit:

Let add 3 more memory locations to a specific block that will have a

built in capability to multiply, divide, subtract, and move its contents

from one memory location onto another. The part we just added in is

called "central processing unit" (CPU). Its memory locations are called

registers.

Figure2.3: Simplified central processing unit with three registers

Registers are therefore memory locations whose role is to help with

performing various mathematical operations or any other operations

15

Page 16: power theft

GSM BASED POWER THEFT SUBSTATION

with data wherever data can be found. Look at the current situation.

We have two independent entities (memory and CPU) which are

interconnected, and thus any exchange of data is hindered, as well

as its functionality. If, for example, we wish to add the contents of

two memory locations and return the result again back to memory,

we would need a connection between memory and CPU. Simply

stated, we must have some "way" through data goes from one block

to another.

2.7 EEPROM:

EEPROM means Electrical Erasable Programmable Read Only Memory

and also referred to as E²PROM chip or i2c.

As the name suggest, an EEPROM can be both erased and programmed

with electrical pulses from a programmer kit, burner or the equipment

itself. Since it can be both electrically written into and electrically

erased, the EEPROM IC can be quickly programmed and erased in

circuit for reprogramming without taking them out from the main

board.

EEPROM IC is also called a non-volatile memory because when the

power is switched off, the stored data (information) in the EEPROM IC

will not be erased or corrupt and the data is still intact. New EEPROM IC

have no data (blank) inside and normally have to program it first with a

programmer tools before it can be use on electron IC circuit.

16

Page 17: power theft

GSM BASED POWER THEFT SUBSTATION

Figure3.1: Showing EEPROM of Atmel

If you just installed a new or blank EEPROM IC into a main board, even

though with the same part number, I can say that the equipment will

surely not going to work because the CPU or microprocessor do not

know how to function. Information or data stored in this type of

memory can be retained for many years even without a continuous dc

power supply to the IC.

Application/ Operation of EEPROM:

EEPROM’s mainly store user programmable information such as: -

• VCR programming information or data

• CD programming information or data

• Digital satellite receiver control data or information

• User information on various consumer products such as in T.V.

The EEPROM IC in Computer Monitor performs two tasks: -

• When a monitor is turn on it will copies all the data or information

from the EEPROM to the microprocessor or CPU. For instance, the

EEPROM will let the CPU know the frequencies at which the monitor is

going to run.

• The EEPROM IC is used to store the current settings of the

Monitor. The current settings of the monitor will not be erased even

when the monitor is switched off. Anytime when a change is made in

the monitor settings, the CPU updates the setting in the EEPROM (store

data in EEPROM). When the monitor is switch on again, the stored

settings in EEPROM IC are used to set up the monitor for operation.

Assuming the data file in MONITOR or TV’s EEPROM are corrupted

damaged and failure detected, what would be the display symptoms like?

17

Page 18: power theft

GSM BASED POWER THEFT SUBSTATION

• There would be no high voltage (no display) because the CPU

don’t activate the 12 volt line supply to the horizontal and vertical

oscillator IC.

• The IC will not save (store) the current setting of the equipment

• Some control functions like sound, brightness, horizontal size and

contrast control will not work.

• The On Screen Display (OSD) would not work or the OSD will have

a corrupted or erratic display.

CHAPTER - 3

18

Page 19: power theft

GSM BASED POWER THEFT SUBSTATION

CHAPTER – 3

HARDWARE DISCRIPTION

3.1. 89S52:

Features• Compatible with MCS-51® Products • 8K Bytes of In-System Programmable (ISP)

Flash Memory – Endurance: 1000 Write/Erase Cycles

• 4.0V to 5.5V Operating Range • Fully Static Operation: 0 Hz to 33 MHz • Three-level Program Memory Lock • 256 x 8-bit Internal RAM • 32 Programmable I/O Lines • Three 16-bit Timer/Counters • Eight Interrupt Sources • Full Duplex UART Serial Channel • Low-power Idle and Power-down Modes • Interrupt Recovery from Power-down Mode • Watchdog Timer • Dual Data Pointer • Power-off Flag

Description:

The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the indus-try-standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory pro-grammer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller

19

Page 20: power theft

GSM BASED POWER THEFT SUBSTATION

which provides a highly-flexible and cost-effective solution to many embedded control applications.

The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM con-tents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset.

3.2. GSM Module:

GSM has been the backbone of the phenomenal success in

mobile telecom over the last decade. Now, at the dawn of the era of

true broadband services, GSM continues to evolve to meet new

demands. GSM is an open, non-proprietary system that is constantly

evolving. One of its great strengths is the international roaming

capability. This gives consumers seamless and same standardized

same number contact ability in more than 212 countries. This has

been a vital driver in growth, with around 300 million GSM

subscribers currently in Europe and Asia. In the Americas, today's 7

million subscribers are set to grow rapidly, with market potential of

500 million in population, due to the introduction of GSM 800, which

allows operators using the 800 MHz band to have access to GSM

technology too. GSM satellite roaming has extended service access

to areas where terrestrial coverage is not available.

GSM differs from first generation wireless systems in that it

uses digital technology and time division multiple access

transmission methods. Voice is digitally encoded via a unique

encoder, which emulates the characteristics of human speech. This

method of transmission permits a very efficient data

rate/information content ratio.

20

Page 21: power theft

GSM BASED POWER THEFT SUBSTATION

Cellular mobile communication is based on the concept of

frequency reuse. That is, the limited spectrum allocated to the

service is partitioned into, for example, N non-overlapping channel

sets, which are then assigned in a regular repeated pattern to a

hexagonal cell grid. The hexagon is just a convenient idealization

that approximates the shape of a circle (the constant signal level

contour from an omni directional antenna placed at the center) but

forms a grid with no gaps or overlaps. The choice of N is dependent

on many tradeoffs involving the local propagation environment,

traffic distribution, and costs. The propagation environment

determines the interference received from neighboring co-channel

cells, which in turn governs the reuse distance, that is, the distance

allowed between co-channel cells (cells using the same set of

frequency channels).

The cell size determination is usually based on the local traffic

distribution and demand. The more the concentration of traffic

demand in the area, the smaller the cell has to be sized in order to

avail the frequency set to a smaller number of roaming subscribers

and thus limit the call blocking probability within the cell. On the

other hand, the smaller the cell is sized, the more equipment will be

needed in the system as each cell requires the necessary

transceiver and switching equipment, known as the base station

subsystem (BSS), through which the mobile users access the

network over radio links. The degree to which the allocated

frequency spectrum is reused over the cellular service area,

however, determines the spectrum efficiency in cellular systems.

That means the smaller the cell size, and the smaller the number of

cells in the reuse geometry, the higher will be the spectrum usage

efficiency. Since digital modulation systems can operate with a

smaller signal to noise (i.e., signal to interference) ratio for the same

service quality, they, in one respect, would allow smaller reuse

21

Page 22: power theft

GSM BASED POWER THEFT SUBSTATION

distance and thus provide higher spectrum efficiency. This is one

advantage the digital cellular provides over the older analogue

cellular radio communication systems. It is worth mentioning that

the digital systems have commonly used sectored cells with 120-

degree or smaller directional antennas to further lower the effective

reuse distance. This allows a smaller number of cells in the reuse

pattern and makes a larger fraction of the total frequency spectrum

available within each cell. Currently, research is being done on

implementing other enhancements such as the use of dynamic

channel assignment strategies for raising the spectrum efficiency in

certain cases, such as high uneven traffic distribution over cells.

3.2.1. GSM SPECIFICATION

Device Name : Vegarobo

ROM (Flash) : 16Mb

RAM : 2Mb

Operating Voltage : 3.1 – 4.5 V

Receiving Frequency : 925 – 960 MHz

Transmitting Frequency : 880 – 915 MHz

22

Page 23: power theft

GSM BASED POWER THEFT SUBSTATION

3.2.2. GSM BLOCK DIAGRAM

3.2.3. GSM NETWORK:

A GSM network is composed of several functional entities,

whose functions and interfaces are specified. The GSM network can

be divided into three broad parts. The Mobile Station is carried by

the subscriber. The Base Station Subsystem controls the radio link

with the Mobile Station. The Network Subsystem, the main part of

which is the Mobile services Switching Center (MSC), performs the

switching of calls between the mobile users, and between mobile

and fixed network users.

The MSC also handles the mobility management operations. Not

shown is the Operations and Maintenance Center, which oversees

the proper operation and setup of the network. The Mobile Station

and the Base Station Subsystem communicate across the Um

23

Page 24: power theft

GSM BASED POWER THEFT SUBSTATION

interface, also known as the air interface or radio link. The Base

Station Subsystem communicates with the Mobile services Switching

Center across the A interface.

3.2.3.1. Mobile Station:

Mobile Equipment (ME) such as hand portable and vehicle

mounted unit. Subscriber Identity Module (SIM), which contains the

entire customer related information (identification, secret key for

authentication, etc.). The SIM is a small smart card, which contains

both programming and information. The A3 and A8 algorithms are

implemented in the Subscriber Identity Module (SIM). Subscriber

information, such as the IMSI (International Mobile Subscriber

Identity), is stored in the Subscriber Identity Module (SIM). The

Subscriber Identity Module (SIM) can be used to store user-defined

information such as phonebook entries. One of the advantages of

the GSM architecture is that the SIM may be moved from one Mobile

Station to another. This makes upgrades very simple for the GSM

telephone user. The use of SIM card is mandatory in the GSM world,

whereas the SIM (RUIM) is not very popular in the CDMA world.

3.2.3.2. Base Station Subsystem (BSS):

24

Page 25: power theft

GSM BASED POWER THEFT SUBSTATION

All radio-related functions are performed in the BSS, which

consists of base Station controllers (BSCs) and the base transceiver

stations (BTSs).

3.2.3.3. Base Transceiver Station (BTS):

The Base Transceiver Station (BTS) contains the equipment for

transmitting and receiving of radio signals (transceivers), antennas,

and equipment for encrypting and decrypting communications with

the Base Station Controller (BSC). A group of BTSs are controlled by

a BSC. Typically a BTS for anything other than a picocell will have

several transceivers (TRXs), which allow it to serve several different

frequencies and different sectors of the cell (in the case of

sectorised base stations). A BTS is controlled by a parent BSC via

the Base Station Control Function (BCF). The BCF is implemented as

a discrete unit or even incorporated in a TRX in compact base

stations. The BCF provides an Operations and Maintenance (O&M)

connection to the Network Management System (NMS), and

manages operational states of each TRX, as well as software

handling and alarm collection.

3.2.3.4. Base Station Controller (BSC):

The BSC controls multiple BTSs and manages radio channel

setup, and handovers. The BSC is the connection between the

Mobile Station and Mobile Switching Center. The Base Station

Controller (BSC) provides, classically, the intelligence behind the

BTSs. Typically a BSC has 10s or even 100s of BTSs under its

control. The BSC handles allocation of radio channels, receives

measurements from the mobile phones, controls handovers from

BTS to BTS. A key function of the BSC is to act as a concentrator

where many different low capacity connections to BTSs become

reduced to a smaller number of connections towards the Mobile

Switching Center (MSC) (with a high level of utilization). Overall, this 25

Page 26: power theft

GSM BASED POWER THEFT SUBSTATION

means that networks are often structured to have many BSCs

distributed into regions near their BTSs which are then connected to

large centralized MSC sites.

The BSC is undoubtedly the most robust element in the BSS as

it is not only a BTS controller but, for some vendors, a full switching

center, as well as an SS7 node with connections to the MSC and

SGSN. It also provides all the required data to the Operation Support

Subsystem (OSS) as well as to the performance measuring centers.

A BSC is often based on a distributed computing architecture, with

redundancy applied to critical functional units to ensure availability

in the event of fault conditions. Redundancy often extends beyond

the BSC equipment itself and is commonly used in the power

supplies and in the transmission equipment providing the A-ter

interface to PCU.

The databases for all the sites, including information such as carrier

frequencies, frequency hopping lists, power reduction levels,

receiving levels for cell border calculation, are stored in the BSC.

3.2.3.5. Network Switching Subsystem (NSS):

Network Switching Subsystem is the component of a GSM

system that carries out switching functions and manages the

communications between mobile phones and the Public Switched

Telephone Network. It is owned and deployed by mobile phone

operators and allows mobile phones to communicate with each

other and telephones in the wider telecommunications network. The

architecture closely resembles a telephone exchange, but there are

additional functions which are needed because the phones are not

fixed in one location. There is also an overlay architecture on the

GSM core network to provide packet-switched data services and is

known as the GPRS core network. This allows mobile phones to have

access to services such as WAP, MMS, and Internet access. All

26

Page 27: power theft

GSM BASED POWER THEFT SUBSTATION

mobile phones manufactured today have both circuit and packet

based services, so most operators have a GPRS network in addition

to the standard GSM core network.

3.2.3.6. Mobile Switching Centre (MSC):

The Mobile Switching Centre or MSC is a sophisticated

telephone exchange, which provides circuit-switched calling,

mobility management, and GSM services to the mobile phones

roaming within the area that it serves. This means voice, data and

fax services, as well as SMS and call divert. In the GSM mobile phone

system, in contrast with earlier analogue services, fax and data

information is sent directly digitally encoded to the MSC. Only at the

MSC is this re-coded into an "analogue" signal. There are various

different names for MSCs in different context, which reflects their

complex role in the network, all of these terms though could refer to

the same MSC, but doing different things at different times.

A Gateway MSC is the MSC that determines which visited MSC

the subscriber who is being called is currently located. It also

interfaces with the Public Switched Telephone Network. All mobile to

mobile calls and PSTN to mobile calls are routed through a GMSC.

The term is only valid in the context of one call since any MSC may

provide both the gateway function and the Visited MSC function,

however, some manufacturers design dedicated high capacity MSCs

which do not have any BSCs connected to them. These MSCs will

then be the Gateway MSC for many of the calls they handle.

The Visited MSC is the MSC where a customer is currently

located. The VLR associated with this MSC will have the subscriber's

data in it. The Anchor MSC is the MSC from which a handover has

been initiated. The Target MSC is the MSC toward which a Handover

should take place. An MSC Server is a part of the redesigned MSC

concept starting from 3GPP Release 5.

27

Page 28: power theft

GSM BASED POWER THEFT SUBSTATION

3.2.4. FREQUENCY BAND USAGE:

Since radio spectrum is a limited resource shared by all users,

a method must be devised to divide up the bandwidth among as

many users as possible. The method chosen by GSM is a

combination of Time- and Frequency-Division Multiple Access

(TDMA/FDMA). The FDMA part involves the division by frequency of

the (maximum) 25 MHz bandwidth into 124 carrier frequencies

spaced 200 kHz apart. One or more carrier frequencies are assigned

to each base station. Each of these carrier frequencies is then

divided in time, using a TDMA scheme. The fundamental unit of time

in this TDMA scheme is called a burst period and it lasts 15/26 ms

(or approx. 0.577 ms). Eight burst periods are grouped into a TDMA

frame (120/26 ms, or approx. 4.615 ms), which forms the basic unit

for the definition of logical channels. One physical channel is one

burst period per TDMA frame.

Channels are defined by the number and position of their

corresponding burst periods. All these definitions are cyclic, and the

entire pattern repeats approximately every 3 hours. Channels can

be divided into dedicated channels, which are allocated to a mobile

station, and common channels, which are used by mobile stations in

idle mode. A traffic channel (TCH) is used to carry speech and

data traffic. Traffic channels are defined using a 26-frame

multiframe, or group of 26 TDMA frames. The length of a 26-frame

multiframe is 120 ms, which is how the length of a burst period is

defined (120 ms divided by 26 frames divided by 8 burst periods per

frame). Out of the 26 frames, 24 are used for traffic, 1 is used for

the Slow Associated Control Channel (SACCH) and 1 is currently

unused. TCHs for the uplink and downlink are separated in time by 3

burst periods, so that the mobile station does not have to transmit

and receive simultaneously, thus simplifying the electronics. In

28

Page 29: power theft

GSM BASED POWER THEFT SUBSTATION

addition to these full-rate TCHs, there are also half-rate TCHs

defined, although they are not yet implemented. Half-rate TCHs will

effectively double the capacity of a system once half-rate speech

coders are specified (i.e., speech coding at around 7 kbps, instead of

13 kbps). Eighth-rate TCHs are also specified, and are used for

signaling. In the recommendations, they are called Stand-alone

Dedicated Control Channels (SDCCH).

Organization of bursts, TDMA frames, and multiframes for speech

and data GSM is a digital system, so speech which is inherently

analog, has to be digitized. The method employed by ISDN, and by

current telephone systems for multiplexing voice lines over high

speed trunks and optical fiber lines, is Pulse Coded Modulation

(PCM). The output stream from PCM is 64 kbps, too high a rate to be

feasible over a radio link. The 64 kbps signal, although simple to

implement, contains much redundancy. The GSM group studied

several speech coding algorithms on the basis of subjective speech

quality and complexity (which is related to cost, processing delay,

and power consumption once implemented) before arriving at the

choice of a Regular Pulse Excited -- Linear Predictive Coder (RPE--

LPC) with a Long Term Predictor loop. Basically, information from

previous samples, which does not change very quickly, is used to

29

Page 30: power theft

GSM BASED POWER THEFT SUBSTATION

predict the current sample. The coefficients of the linear

combination of the previous samples, plus an encoded form of the

residual, the difference between the predicted and actual sample,

represent the signal. Speech is divided into 20 millisecond samples,

each of which is encoded as 260 bits, giving a total bit rate of 13

kbps. This is the so-called Full-Rate speech coding. Recently, an

Enhanced Full-Rate (EFR) speech-coding algorithm has been

implemented by some North American GSM1900 operators. This is

said to provide improved speech quality using the existing 13 kbps

bit rate.

3.2.5. WORKING:

The GSM module is connected with the controller. As the

controller is keeping on monitoring the door when the door gets

opened, the microcontroller sends the command “AT” to initiate the

module. Now the module sends a sms as “Theft Occurred” to the

already fed mobile number. Thus the information is passed from the

module to the Authorized person.

3.2.6. FEATURES:

Performance - Fast with high real throughput

Integrity - Secure controlled data transfer

Network Access - Quick and consistent

Contention Control - Avoid conflicts and collisions

Installation - Simple quick installation

Frequency Choice - Choice of RF bands to suit different terrains

Network Diagnostics - For ease of maintenance and cost saving

3.3. MAX-232:

3.3.1. Logic Signal Voltage:

30

Page 31: power theft

GSM BASED POWER THEFT SUBSTATION

Serial RS-232 (V.24) communication works with voltages (between -

15V ... -3V are used to transmit a binary '1' and +3V ... +15V to

transmit a binary '0') which are not compatible with today's

computer logic voltages. On the other hand, classic TTL computer

logic operates between 0V ... +5V (roughly 0V ... +0.8V referred to

as low for binary '0', +2V ... +5V for high binary '1' ). Modern low-

power logic operates in the range of 0V ... +3.3V or even lower.

So, the maximum RS-232 signal levels are far too high for today's

computer logic electronics, and the negative RS-232 voltage can't

be rocked at all by the computer logic. Therefore, to receive serial

data from an RS-232 interface the voltage has to be reduced, and

the 0 and 1 voltage levels inverted. In the other direction (sending

data from some logic over RS-232) the low logic voltage has to be

"bumped up", and a negative voltage has to be generated, too.

RS-232 TTL Logic

-----------------------------------------------

-15V ... -3V <-> +2V ... +5V <-> 1

+3V ... +15V <-> 0V ... +0.8V <-> 0

All this can be done with conventional analog electronics, e.g. a

particular power supply and a couple of transistors or the once

popular 1488 (transmitter) and 1489 (receiver) ICs. However, since

more than a decade it has become standard in amateur electronics

to do the necessary signal level conversion with an integrated circuit

(IC) from the MAX232 family (typically a MAX232A or some clone). In

fact, it is hard to find some RS-232 circuitry in amateur electronics

without a MAX232A or some clone.

3.3.2. The MAX232 & MAX232A:

31

Page 32: power theft

GSM BASED POWER THEFT SUBSTATION

The MAX232 from Maxim was the first IC which in one package

contains the necessary drivers (two) and receivers (also two), to

adapt the RS-232 signal voltage levels to TTL logic. It became

popular, because it just needs one voltage (+5V) and generates the

necessary RS-232 voltage levels (approx. -10V and +10V) internally.

This greatly simplified the design of circuitry. Circuitry designers no

longer need to design and build a power supply with three voltages

(e.g. -12V, +5V, and +12V), but could just provide one +5V power

supply, e.g. with the help of a simple 78x05 voltage converter. The

MAX232 has a successor, the MAX232A. The ICs are almost

identical, however, the MAX232A is much more often used (and

easier to get) than the original MAX232, and the MAX232A only

needs external capacitors 1/10th the capacity of what the original

MAX232 needs.

It should be noted that the MAX232 (A) is just a driver/receiver. It

does not generate the necessary RS-232 sequence of marks and

spaces with the right timing, it does not decode the RS-232 signal,

and it does not provide a serial/parallel conversion. All it does is to

convert signal voltage levels. Generating serial data with the

right timing and decoding serial data has to be done by additional

circuitry, e.g. by a 16550 UART or one of these small micro

controllers (e.g. Atmel AVR, Microchip PIC) getting more and more

popular.

The MAX232 and MAX232A were once rather expensive ICs, but

today they are cheap. It has also helped that many companies now

produce clones (i.e. SiPix). These clones sometimes need different

external circuitry, e.g. the capacities of the external capacitors vary.

It is recommended to check the data sheet of the particular

manufacturer of an IC instead of relying on Maxim's original data

sheet.

32

Page 33: power theft

GSM BASED POWER THEFT SUBSTATION

The original manufacturer (and now some clone manufacturers, too)

offers a large series of similar ICs, with different numbers of

receivers and drivers, voltages, built-in or external capacitors, etc.

E.g. The MAX232 and MAX232A need external capacitors for the

internal voltage pump, while the MAX233 has these capacitors built-

in. The MAX233 is also between three and ten times more expensive

in electronic shops than the MAX232A because of its internal

capacitors. It is also more difficult to get the MAX233 than the

garden variety MAX232A.

A similar IC, the MAX3232 is nowadays available for low-power 3V

logic.

3.3.3. MAX232 (A) DIP Package:

+---v---+ C1+ -|1 16|- Vcc V+ -|2 15|- GND C1- -|3 14|- T1out C2+ -|4 13|- R1in C2- -|5 12|- R1out V- -|6 11|- T1inT2out -|7 10|- T2in R2in -|8 9|- R2out +-------+

33

Page 34: power theft

GSM BASED POWER THEFT SUBSTATION

3.4. DB9 connector:

RS232 serial cable layout

Almost nothing in computer interfacing is more confusing than selecting the right RS232 serial cable. These pages are intended to provide information about the most common serial RS232 cables in normal computer use, or in more common language "How do I connect devices and computers using RS232?"

34

Page 35: power theft

GSM BASED POWER THEFT SUBSTATION

RS232 serial connector pin assignment

The RS232 connector was originally developed to use 25 pins. In this DB25 connector pinout provisions were made for a secondary serial RS232 communication channel. In practice, only one serial communication channel with accompanying handshaking is present. Only very few computers have been manufactured where both serial RS232 channels are implemented. Examples of this are the Sun SparcStation 10 and 20 models and the Dec Alpha Multia. Also on a number of Telebit modem models the secondary channel is present. It can be used to query the modem status while the modem is on-line and busy communicating. On personal computers, the smaller DB9 version is more commonly used today. The diagrams show the signals common to both connector types in black. The defined pins only present on the larger connector are shown in red. Note, that the protective ground is assigned to a pin at the large connector where the connector outside is used for that purpose with the DB9 connector version.

RS232 DB9 pinout

DEC MMJ pinout

RS232 DB25 pinout

35

Page 36: power theft

GSM BASED POWER THEFT SUBSTATION

3.5. 555-Timer:

An Overview of the 555 Timer:

The 555 Integrated Circuit (IC) is an easy to use timer that has

many applications. It is widely used in electronic circuits and this

popularity means it is also very cheap to purchase, typically costing

around 30p. A 'dual' version called the 556 is also available which

includes two independent 555 ICs in one package.

The following illustration shows both the 555 (8-pin) and the 556

(14-pin).

In a circuit diagram the 555 timer chip is often drawn like the

illustration below. Notice how the pins are not in the same order as

the actual chip, this is because it is much easier to recognize the

function of each pin, and makes drawing circuit diagrams much

easier.

36

Page 37: power theft

GSM BASED POWER THEFT SUBSTATION

For the 555 to function it relies on both analogue and digital

electronic techniques, but if we consider its output only, it can be

thought of as a digital device. The output can be in one of two states

at any time, the first state is the 'low' state, which is 0v. The second

state is the 'high' state, which is the voltage Vs (The voltage of your

power supply which can be anything from 4.5 to 15v. 18v absolute

maximum). The most common types of outputs can be categorized

by the following (their names give you a clue as to their functions):

Monostable mode: in this mode, the 555 functions as a "one-

shot". Applications include timers, missing pulse detection,

bouncef ree switches, touch switches, frequency divider,

capacitance measurement, pulse-width modulation (PWM) etc

Astable - free running mode: the 555 can operate as an

oscillator. Uses include LED and lamp flashers, pulse

generation, logic clocks, tone generation, security alarms,

pulse position modulation, etc.

Bistable mode or Schmitt trigger: the 555 can operate as a flip-

flop, if the DIS pin is not connected and no capacitor is used.

Uses include bounce free latched switches, etc.

Pin Configuration of the 555 Timer

Here is the identification for each pin:

When drawing a circuit diagram, always draw the 555 as a building block, as shown below with the pins in the following locations. This will help you instantly recognise the function of each pin:

37

Page 38: power theft

GSM BASED POWER THEFT SUBSTATION

Pin 1 (Ground):Connects to the 0v power supply.

Pin 2 (Trigger):

Detects 1/3 of rail voltage to make output HIGH. Pin 2 has control

over pin 6. If pin 2 is LOW, and pin 6 LOW,  output goes and stays

HIGH. If pin 6 HIGH, and pin 2 goes LOW, output goes LOW while pin

2 LOW. This pin has a very high impedance (about 10M) and will

trigger with about 1uA.

Pin 3 (Output):

(Pins 3 and 7 are "in phase.") Goes HIGH (about 2v less than rail)

and LOW (about 0.5v less than 0v) and will deliver up to 200mA.

Pin 4 (Reset):

Internally connected HIGH via 100k. Must be taken below 0.8v to

reset the chip.

Pin 5 (Control):

A voltage applied to this pin will vary the timing of the RC network

(quite considerably).

Pin 6 (Threshold):

Detects 2/3 of rail voltage to make output LOW only if pin 2 is HIGH.

This pin has very high impedance (about 10M) and will trigger with

about 0.2uA.

Pin 7 (Discharge):

Goes LOW when pin 6 detects 2/3 rail voltage but pin 2 must be

HIGH. If pin 2 is HIGH, pin 6 can be HIGH or LOW and pin 7 remains

LOW. Goes OPEN (HIGH) and stays HIGH when pin 2 detects 1/3 rail

voltage (even as a LOW pulse) when pin 6 is LOW.  (Pins 7 and 3 are

38

Page 39: power theft

GSM BASED POWER THEFT SUBSTATION

"in phase.") Pin 7 is equal to pin 3 but pin 7 does not go high - it

goes OPEN.  But it goes LOW and will sink about 200mA.

Pin 8 (Supply):

Connects to the positive power supply (Vs). This can be any voltage

between 4.5V and 15V DC, but is commonly 5V DC when working

with digital ICs.

3.6. INFRA-RED:

The term infrared is   a Latin word meaning beyond the red.

Infrared is commonly shortened to IR.  The  process  of  detecting  or

sensing  infrared radiation  from  a  target  without  being  in

physical contact with that target is known as remote sensing. Active

and passive systems are used for remote sensing. Active systems

send a signal to the target and receive a return signal. Radar sets

are examples of active systems.  Passive systems detect a signal or

disturbance originating at the target.  The  signal  may be  emitted

either  by  the  target  or  another  source. Photography using

natural light is an example of a passive system

Humans can see only a small part of the entire electromagnetic

spectrum. However, even though we cannot see them, other parts of

the spectrum contain useful information. The infrared spectrum is a

small portion of the entire electromagnetic spectrum.  IR radiation is

a form of electromagnetic energy.  IR waves have certain

characteristics similar to those of light and RF waves. These

characteristics include reflection,   refraction,   absorption,   and

speed   of transmission. IR  waves  differ  from  light,  RF,  and other

electromagnetic  waves  only  in  wavelengths  and frequency of

oscillation. The IR frequency range is from about 300 gigahertz   to

400   terahertz.   Its   place   in   the electromagnetic spectrum (fig.

6-1) is between visible light   and   the   microwave   region   used

39

Page 40: power theft

GSM BASED POWER THEFT SUBSTATION

for high-definition radar.  The IR region of the electromagnetic

spectrum lies between wavelengths of 0.72 and 1,000 micrometers.

Discussion of the IR region is usually in terms of wavelength rather

than frequency.

When the sensor is controlled by a microcontroller to generate the

low duty cycle pulses, you can benefit from the High and Low pulses

to be able to detect any false readings due to ambient light. This is

done by recording 2 different outputs of the sensor, one of them

during the ON pulse (the sensor is emitting infra red light) and the

other during the OFF time. and compare the results.

The Idea is enlightened by this graph, where in the first period, there is low ambient noise, so the microcontroller records a "1" during the on cycle, meaning that an object reflected the emitted IR Light, and then the microcontroller records a "0" meaning that during the OFF time, it didn't receive anything, which is logic because the emitter LED was OFF. But study the second period of the graph, where the sensor is put in a high ambient light environment. As you can see, the the microcontroller records "1" in both conditions (OFF or ON). This means that we can't be sure whether the sensor reception was caused by an object that reflected the sent IR light, or it is simply receiving too much ambient light, and is giving "1" whether there is an obstacle or not.

40

Page 41: power theft

GSM BASED POWER THEFT SUBSTATION

The following table show the possible outcomes of this method.

Output recorded during:Software based deduction

On pluse Off time

1 0There is definitely an Obstacle in

front of the sensor

1 1

The sensor is saturated by ambient

light, thus we can't know if there is

an obstacle

0 0There is definitely Nothing in front

of the sensor, the way is clear

0 1This reading is un logical, there is

something wrong with the sensor.

Example C Code for 8051 microcontrollers

#include<REGX51.h>

#include<math.h>

unsignedchar ir; // to store the final result

bit ir1,ir2; // the 2 recording point required for our algorithm

delay(y) // simple delay function

unsignedinti;

for(i=0;i<y;i++){;}

41

Page 42: power theft

GSM BASED POWER THEFT SUBSTATION

}

voidmain()

{

//P2.0 IR control pin going to the sensor

//P2.1 IR output pin coming from the sensor

while(1){

P2_0=1; //sendIR

delay(20);

ir1=P2_1;

P2_0 = 0; //stop IR

delay(98);

ir2 = P2_1;

if ((ir1 == 1)&(ir2 == 0)){

ir = 1; // Obstacle detected

P2_3 = 1; // Pin 3 of PORT 2 will go HIGH turning ON a LED.

if ((ir1 == 1)&(ir2 == 1)){

ir = 2; // Sensor is saturated by ambient light

}else{

ir = 0; // The way is clear in front of the sensor.

}

}

}

The correct positioning of the sender LED, the receiver LED with

regard to each other and to the Op-Amp can also increase the

performance of the sensor. First, we need to adjust the position of

the sender LED with respect to the receiver LED, in such a way they

are as near as possible to each others , while preventing any IR light

42

Page 43: power theft

GSM BASED POWER THEFT SUBSTATION

to be picked up by the receiver LED before it hit and object and

returns back. The easiest way to do that is to put the sender(s)

LED(s) from one side of the PCB, and the receiver LED from the

other side, as shown in the 3D model below.

This 3D model shows the position of the LEDs. The green plate is

the PCB holding the electronic components of the sensor. you can

notice that the receiver LED is positioned under the PCB, this way,

there wont be ambient light falling directly on it, as ambient light

usually comes from the top. It is also clear that this way of

positioning the LEDs prevent the emitted IR light to be detected

before hitting an eventual obstacle.

Another important issue about components positioning, is the distance between the receiver LED and the Op-Amp. which should be as small as possible. Generally speaking, the length of wires or PCB tracks before an amplifier should be reduced, otherwise, the amplifier will amplify - along with the original signal - a lot of noise picked up form the electromagnetic waves traveling the surrounding.

3.7. Photo Diode:

A second optoelectronic device that conducts current when exposed

to light is the PHOTOTRANSISTOR. A phototransistor, however, is

43

Page 44: power theft

GSM BASED POWER THEFT SUBSTATION

much more sensitive to light and produces more output current for a

given light intensity that does a photodiode. Figure 3-32 shows one

type of phototransistor, which is made by placing a photodiode in

the base circuit of an NPN transistor. Light falling on the photodiode

changes the base current of the transistor, causing the collector

current to be amplified. Phototransistors may also be of the PNP

type, with the photodiode placed in the base-collector circuit.

Figure 3-32. - Phototransistor.

Figure 3-33 illustrates the schematic symbols for the various types

of phototransistors. Phototransistors may be of the two-terminal

type, in which the light intensity on the photodiode alone

determines the amount of conduction. They may also be of the

three-terminal type, which have an added base lead that allows an

electrical bias to be applied to the base. The bias allows an optimum

transistor conduction level, and thus compensates for ambient

(normal room) light intensity.

Figure 3-33. - 2-terminal and 3-terminal phototransistors.

44

Page 45: power theft

GSM BASED POWER THEFT SUBSTATION

3.8. Voltage Regulator:

Voltage Regulator (regulator), usually having three legs, converts

varying input voltage and produces a constant regulated output

voltage. They are available in a variety of outputs. 

 The most common part numbers start with the numbers 78 or 79

and finish with two digits indicating the output voltage. The number

78 represents positive voltage and 79 negative one. The 78XX series

of voltage regulators are designed for positive input. And the 79XX

series is designed for negative input.

 Examples:  

·         5V DC Regulator Name: LM7805 or MC7805

·         -5V DC Regulator Name: LM7905 or MC7905

·         6V DC Regulator Name: LM7806 or MC7806

·         -9V DC Regulator Name: LM7909 or MC7909

The LM78XX series typically has the ability to drive current up to 1A.

For application requirements up to 150mA, 78LXX can be used. As

mentioned above, the component has three legs: Input leg which

can hold up to 36VDC Common leg (GND) and an output leg with the

regulator's voltage. For maximum voltage regulation, adding a

capacitor in parallel between the common leg and the output is

usually recommended. Typically a 0.1MF capacitor is used. This

eliminates any high frequency AC voltage that could otherwise

combine with the output voltage. See below circuit diagram which

represents a typical use of a voltage regulator.  

45

Page 46: power theft

GSM BASED POWER THEFT SUBSTATION

 

 

Note:  

As a general rule the input voltage should be limited to 2 to 3 volts

above the output voltage. The LM78XX series can handle up to 36

volts input, be advised that the power difference between the input

and output appears as heat. If the input voltage is unnecessarily

high, the regulator will overheat. Unless sufficient heat dissipation is

provided through heat sinking, the regulator will shut down.

46

Page 47: power theft

GSM BASED POWER THEFT SUBSTATION

CHAPTER - 4

CHAPTER - 4

SOFTWARE DESCRIPTION

47

Page 48: power theft

GSM BASED POWER THEFT SUBSTATION

4.1. Kiel Compiler:

The Real View Microcontroller Development Kit is the complete

software development environment for all ARM7, ARM9, Cortex - M1,

and Cortex-M3 processor based devices. It combines the industry

leading Real View compilation tools (by ARM) with the LVision

IDE/Debugger, providing developers with an easy to use, feature-rich

environment optimized for ARM Powered devices. The Real View

Microcontroller Development Kit (MDK) provides an easy-to-use

development interface, with many unique features designed to help

you develop your project quickly and easily. Save time by using the

Device Database to automatically configure device and project

parameters. Benefit from better verification by using the integrated

Device Simulator which accurately models more than 260 ARM

Powered devices including the ARM instruction set and on-chip

peripherals. The Real View MDK is based on the ARM Real View

compilation tools, recognized as delivering the tightest, highest

performing code for all ARM-Powered devices. In addition, further

code size savings can be gained by selecting the new MicroLib, which

has been specifically developed and optimized for embedded

systems.

4.2. Debugger and Device Simulator:

The LVision Debugger supports complex breakpoints (with

conditional or logical expressions) and memory access breakpoints

(with read/write access from an address or range).The debugger also

displays code coverage and execution profiling information in the

editor windows. Additionally, the LVision Debugger simulates a

complete ARM Powered microcontroller including the instruction set

and on-chip peripherals. These powerful simulation capabilities

provide serious benefits and promote rapid, reliable embedded

software development and verification.48

Page 49: power theft

GSM BASED POWER THEFT SUBSTATION

Simulation allows software testing with no hardware. Improve overall reliability with early software debugging. Simulation allows breakpoints that are not possible with hardware debuggers. Simulation allows for optimal input signals (hardware debuggers add extra noise). Signal functions are easily programmed to reproduce complex, real-world input signals. Single-step through signal processing algorithms.

Test failure scenarios that would destroy real hardware.

MAIN WINDOW OF KEIL COMPILER

4.3. Project Configuration:

The LVision IDE incorporates a Device Database of supported

ARM Powered microcontrollers. In LVision projects, required options

are set automatically when you select the device from the Device

Database. LVision displays only those options that are relevant to

the selected device and prevents you from selecting incompatible

directives. Only a few dialogs are required to completely configure

all the tools (assembler, compiler, linker, debugger, and flash

download utilities) and memory map for the application.

4.4. Editor and source browser:

49

Page 50: power theft

GSM BASED POWER THEFT SUBSTATION

The LVision Editor includes all the standard features you expect

in a professional editor. Workflow is optimized with intuitive toolbars

providing quick access to editor functions, most of which are also

available while debugging for easy source code changes. The

integrated LVision Source Browser quickly displays information about

symbols and variables in your program using the F12 key and the

Source Browser Window.

4.5. Getting Started:

The LVision IDE is the easiest way for most developers to create

embedded applications using the Keil development tools. To launch

LVision, click on the icon on your desktop or select Keil LVision3 from

the Start Menu.

FIGURE 4.5: CREATING A PROJECT

In the Project Menu:

New Creates a new project.

Open opens an existing project.

4.6. Project Management:

File Groups allow you to group associated files together. They

may be used to separate files into functional blocks or to identify

engineers in your software team.

Project Targets allow you to create several programs from a

single project. You may require one target for testing and another

target for a release version of your application. Each target allows

50

Page 51: power theft

GSM BASED POWER THEFT SUBSTATION

individual tool settings within the same project file.

A Project is the collection of all the source files as well as the

compiler, assembler, and linker settings required to compile and link

a program. LVision includes several robust features that make

project management easy.

4.7. Device Support:

One of the hardest parts of starting a new project is selecting

the right mix of compiler, assembler, and linker options for the

particular chip you use. LVision provides the Device Database which

use and LVision sets all the necessary assembler, compiler, and

linker options automatically.

4.8. Startup Code:

Configuring startup code can be one of the most frustrating

aspects of embedded software development. The LVision IDE

automatically includes the appropriate startup code (based on the

device you select) and provides a known foundation from which to

start. The configuration Wizard helps you set startup options for your

target hardware using familiar dialog controls.

4.9. Option Settings:

LVision lets you set the options for all files in a target, a group,

or even a single source file. Click the Options for Target button on

the toolbar to change the project options for the currently selected

target. In the Project Workspace, you may right-click the target,

group, or source file to open the options dialog specific to that item.

The Options Dialog offers several Tabs where you specify option

settings:

The Device tab allows you to select the device for this target. The

Target tab allows you to specify the memory model and memory

51

Page 52: power theft

GSM BASED POWER THEFT SUBSTATION

parameters. You may enter the external (or off-chip) memory

address ranges under External Memory. When you start a new

project, you typically only need to setup the options on this tab. The

Output tab allows you to specify the contents of the output files

generated by the assembler, compiler, and linker.

The Listing tab allows you to configure the contents of the listing

files. The C/C++, Asm, and Linker tabs allow you to enter tool-

specific options and display the current tool settings. The Debug tab

configures the LVision Debugger. The Utilities tab configures Flash

memory programming for your target system.

4.10. Target and Groups:

LVision projects are composed of one or more targets, one or more

file groups, and source files. A target is a collection of all files groups

and the development tool options. While most projects require only

one target, you may create as many targets as you like. Each target

generates a different target file with different options. These two

targets, Simulator-Real View and Simulator-CARM, create distinct

binary files. The Simulator-Real view target uses the Real View

compilation tools for ARM while the Simulator-CARM target uses the

Kiel compilation tools for ARM.

Each target has its own tool configuration settings. Files and groups

may be included or excluded as needed for startup or other target-

specific source code.

Click the Setup Editor Button to manage the targets maintained

in your project. In the Project Components tab, you may configure

the Project Targets, Groups, and Files in your project.

Each Target has its own option settings and output file name

that you may define. You may create one Target for testing with the

simulator and another Target for a release version of your application

52

Page 53: power theft

GSM BASED POWER THEFT SUBSTATION

that will be programmed into Flash ROM. Within Targets, you may

have one or more file Groups which allow you to associate source

files together. Groups are useful for grouping files into functional

blocks or for identifying engineers in a software team. Files are

simply the source files within a group.

4.11. Source Files:

The source files in your LVision project display in a Project

Workspace. Each Project can be configured to generate one or more

Targets. Each Target has its own option settings and output file name

that you may define. You may create one Target for testing with the

simulator and another Target for a release version of your application

that will be programmed into Flash ROM. Within a Target, you may

have one of more file Groups which allow you to associate source

files together. Groups are useful for grouping files into functional

blocks or for identifying engineers in a software team.

The Project menu provides access to all dialogs for project

management including... New Project... which creates a new project.

Targets, Groups, Files... which add components to a project. The

Local menu in the Project window allows you to add files to the

project. Open Project... which opens an existing project.

Building Projects:

LVision includes an integrated make facility that compiles,

assembles, and links your program. Click the Build Target button on

the toolbar to compile and assemble the source files in your project

and link them together into an absolute, executable program. The

assembler and compiler automatically generate file dependencies

and add them to the project. File dependency information is used

during the make process to build only those files that have changed

or that include other files that have changed.

53

Page 54: power theft

GSM BASED POWER THEFT SUBSTATION

As LVision compiles and assembles your source files, status

information as well as errors and warnings appear in the Output

Window. You may double-click on an error or warning to immediately

begin editing the file with the problem--even while LVision continues

compiling your source files in the background. The line numbers for

errors and warnings are synchronized even after you make changes

to the source file(s). To get more information about a particular error

message, select the message and press F1 for full help text. If you

enable global optimizations, LVision re-compiles your source files to

achieve the most optimal global use of registers.

54

Page 55: power theft

GSM BASED POWER THEFT SUBSTATION

CHAPTER - 5

CHAPTER – 5

RESULTS

55

Page 56: power theft

GSM BASED POWER THEFT SUBSTATION

CONCLUSION

We started this project with a basic idea of building a

wireless technology. We can operate this project in any home to

substation from power theft by using gsm technology. This project

does have more advantages for power stations

Finally we succeeded in building a wireless technology

56

Page 57: power theft

GSM BASED POWER THEFT SUBSTATION

BIBLIOGRAPHY

Books Referred:

1. Microprocessor, Architecture, Programming and interfacing with 8085 Microprocessor BY Ramesh Gaonkar

2.The 8051 Microcontroller and Embedded systems BY Mahammad Ali Mazidi, Jason Gillespie Mazidi

3. The 8051 Microcontroller Architecture, Programming and applications

BY Kenneth J.Ayala

Websites Referred:

1. www.atmel.com

57

Page 58: power theft

GSM BASED POWER THEFT SUBSTATION

2. www.instuctables.com

3. www.efy.com

4. www.google.com

5. www.alldatasheet.com

6. www.scribd.com

58