8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
1/79
BlueStooth based security enabled powered devices control system
CHAPTER 1: INTRODUCTION
1.1 Introduction:
The project mainly aims in designing completely automated powered devices
control with the help of Bluetooth technology and a graphical LCD to display the status of the
devices and also provides a user friendly environment to operate the devices effectively. It majorly
aims in providing a reliable system for illiterates and old people who finds difficulty in operating
few high end devices like C! water heaters etc.
utomation is the most fre"uently spelled term in the field of electronics. The
hunger for automation brought many revolutions in the e#isting technologies. These had greater
importance than any other technologies due to its user$friendly nature. These can be used as areplacement of the e#isting switches in home which produces sparks and also results in fire
accidents in few situations. Considering the advantages of Bluetooth an advanced automation
system was developed to control the devices.
The device consists of a microcontroller! which is interfaced with the input and
output modules! the controller acts as an intermediate medium between both of them. %o the
controller can be termed as a control unit. The input module is nothing but a Bluetooth module!
which takes the input from the user&s mobile phone with Bluetooth features and provides the same
to the microcontroller. The output module is graphical LCD and the devices to be controlled. 'ere
the microcontroller receives the input from the Bluetooth and switches the device with respect to
the input. The controller also takes the responsibility to display the status of the individual devices
on the graphical LCD. The (icrocontroller is programmed using )mbedded C language.
Features:
*. Bluetooth based user$friendly operation.+. Low power consumption.
,. Controls high and low voltage devices.
-. Long life.
. 'ighly sensitive.
1.2 Project Overvie:
n embedded system is a combination of software and hardware to perform a
dedicated task. %ome of the main devices used in embedded products are (icroprocessors and
(icrocontrollers.
Department of E.C.E 1 S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
2/79
BlueStooth based security enabled powered devices control system
(icroprocessors are commonly referred to as general purpose processors as they
simply accept the inputs! process it and give the output. In contrast! a microcontroller not only
accepts the data as inputs but also manipulates it! interfaces the data with various devices! controls
the data and thus finally gives the result.
The /!"uetoot# $ased securit% ena$"ed &oered devices contro" s%ste'0 using
1IC*234, microcontroller is an e#clusive project which is designed such that home appliances can
be controlled by using a touch screen sensor.
5e can use this project to control the home appliances like lights! fans etc..! by
using touch screen sensor i.e. manual switching mechanism is eliminated and we can switch any
home appliance just by a gentle touch on touch screen sensor.
1.( T#esis:
The thesis e#plains the implementation of /!"uetoot# $ased securit% ena$"ed
&oered devices contro" s%ste') using 1IC*234, microcontroller. The organi6ation of
the thesis is e#plained here with7
C#a&ter 1 1resents introduction to the overall thesis and the overview of the project. In the
project overview a brief introduction of Bluetooth! 8elay and Triac and its applications are
discussed.
C#a&ter 2 1resents the topic embedded systems. It e#plains the about what is embedded systems!
need for embedded systems! e#planation of it along with its applications.
C#a&ter ( 1resents the hardware description. It deals with the block diagram of the project and
e#plains the purpose of each block. In the same chapter the e#planation of microcontrollers!
Bluetooth module! power supplies! 8elay and Triac are considered.
C#a&ter *1resents the software description. It e#plains the implementation of the project using
1IC C Compiler software.
C#a&ter + 1resents the project description along with Bluetooth module! relay and Triac
interfacing to microcontroller.
C#a&ter , 1resents the advantages! disadvantages and applications of the project.
C#a&ter - 1resents the results! conclusion and future scope of the project.
Department of E.C.E ! S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
3/79
BlueStooth based security enabled powered devices control system
Advantaes:
*. This system eliminates electrical shocks when manual switching mechanism is used.
+. The electrical appliances can be switched 9:;933 wirelessly through Bluetooth.
,. )fficient and low cost design.
-. Low power consumption.
. 3ast response.
2. 'igh voltage devices can also be operated.
Disadvantaes:
*. 8ange of Bluetooth is limited.
+. Interfacing Bluetooth module to (icrocontroller is sensitive.
A&&"ications:
This system is an efficient solution for operating many electrical appliances through
Bluetooth which can be used in real time.
Department of E.C.E " S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
4/79
BlueStooth based security enabled powered devices control system
CHAPTER 2: E/!EDDED 00TE/0
2.1 E'$edded 0%ste's:
n embedded system is a computer system designed to perform one or a few
dedicated functions often with real$time computing constraints. It is embedded as part of a
complete device often including hardware and mechanical parts. By contrast! a general$purpose
computer! such as a personal computer
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
5/79
BlueStooth based security enabled powered devices control system>designed to perform one or a few dedicated functions>! and is thus appropriate to call
>embedded>. modern e#ample of embedded system is shown in fig7 +.*.
Fi 2.1:A 'odern ea'&"e o3 e'$edded s%ste'
Labeled parts include microprocessor
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
6/79
BlueStooth based security enabled powered devices control systemproject?s inception! the pollo guidance computer was considered the riskiest item in the pollo
project as it employed the then newly developed monolithic integrated circuits to reduce the si6e
and weight. n early mass$produced embedded system was the utonetics D$*4 guidance
computer for
the (inute man missile! released in *@2*. It was built fromtransistorlogicand had a hard diskfor
main memory. 5hen the (inuteman II went into production in *@22! the D$*4 was replaced with
a new computer that was the first high$volume use of integrated circuits.
2.1.2 Too"s:
)mbedded development makes up a small fraction of total programming. There?s
also a large number of embedded architectures! unlike the 1C world where * instruction set rules!
and the :IE world where there?s only , or - major ones. This means that the tools are more
e#pensive. It also means that they?re lowering featured! and less developed. 9n a major embedded
project! at some point you will almost always find a compiler bug of some sort.
Debugging tools are another issue. %ince you can?t always run general programs on
your embedded processor! you can?t always run a debugger on it. This makes fi#ing your program
difficult. %pecial hardware such as FT ports can overcome this issue in part. 'owever! if you
stop on a breakpoint when your system is controlling real world hardware
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
7/79
BlueStooth based security enabled powered devices control systemgenerally use deterministic memory techni"ues and avoid the default >new> and >malloc>
functions! so that leaks
can be found and eliminated more easily. 9ther resources programmers e#pect may not even e#ist.
3or e#ample! most embedded processors do not have hardware 31s writing your own software> becomes a very trivial task indeed. 3rom
an implementation viewpoint! there is a major difference between a computer and an embedded
system. )mbedded systems are often re"uired to provide 8eal$Time response. The main elements
that make embedded systems uni"ue are its reliability and ease in debugging.
2.2.1 De$uin:
)mbedded debugging may be performed at different levels! depending on the
facilities available. 3rom simplest to most sophisticate they can be roughly grouped into the
following areas7
Interactive resident debugging! using the simple shell provided by the embedded operating
system
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
8/79
BlueStooth based security enabled powered devices control system
n in$circuit debugger Limp modes> are less tolerable.
9ften backups are selected by an operator. )#amples include aircraft navigation! reactor
controlsystems! safety$critical chemical factory controls! train signals! engines on single$
engine aircraft.
Department of E.C.E ' S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
9/79
BlueStooth based security enabled powered devices control system
The system will lose large amounts of money when shut down7 Telephone switches!
factory controls! bridge and elevator controls! funds transfer and market making!
automated sales and service.
variety of techni"ues are used! sometimes in combination! to recover from errors
Gboth software bugs such as memory leaks! and also soft errors in the hardware7
5atchdog timer that resets the computer unless the software periodically notifies the
watchdog
%ubsystems with redundant spares that can be switched over to
software >limp modes> that provide partial function
Designing with a Trusted Computing Base
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
10/79
BlueStooth based security enabled powered devices control systemsually these kinds of systems run a simple task in a main loop also! but this task is
not very sensitive to une#pected delays. %ometimes the interrupt handler will add longer tasks to a
"ueue structure. Later! after the interrupt handler has finished! these tasks are e#ecuted by the main
loop. This method brings the system close to a multitasking kernel with discrete processes.
Cooperative (ultitasking7
non$preemptive multitasking system is very similar to the simple control loop
scheme! e#cept that the loop is hidden in an 1I. The programmer defines a series of tasks! and
each task gets its own environment to /run0 in. 5hen a task is idle! it calls an idle routine! usually
called /pause0! /wait0! /yield0! /nop0
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
11/79
BlueStooth based security enabled powered devices control system
(icrokernels nd )#okernels7
microkernel is a logical step up from a real$time 9%. The usual arrangement is
that the operating system kernel allocates memory and switches the C1 to different threads of
e#ecution. ser mode processes implement major functions such as file systems! network
interfaces! etc.
In general! microkernels succeed when the task switching and intertask
communication is fast! and fail when they are slow. )#okernels communicate efficiently by
normal subroutine calls. The hardware and all the software in the system are available to! and
e#tensible by application programmers. Based on performance! functionality! re"uirement the
embedded systems are divided into three categories7
2.(.2 0tand A"one E'$edded 0%ste':
These systems takes the input in the form of electrical signals from transducers or
commands from human beings such as pressing of a button etc..! process them and produces
desired output. This entire process of taking input! processing it and giving output is done in
standalone mode. %uch embedded systems comes under stand alone embedded systems
)g7 microwave oven! air conditioner etc.
2.(.( Rea"4ti'e e'$edded s%ste's:
)mbedded systems which are used to perform a specific task or operation in a
specific time period those systems are called as real$time embedded systems. There are two typesof real$time embedded systems.
'ard 8eal$time embedded systems7
These embedded systems follow an absolute dead line time period i.e..! if the
tasking is not done in a particular time period then there is a cause of damage to the entire
e"uipment.
Department of E.C.E 11 S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
12/79
BlueStooth based security enabled powered devices control system)g7 consider a system in which we have to open a valve within ,A milliseconds. If this
valve is not opened in ,A ms this may cause damage to the entire e"uipment. %o in such cases we
use embedded systems for doing automatic operations.
%oft 8eal Time embedded systems7
These embedded systems follow a relative dead line time period i.e..! if the task is
not done in a particular time that will not cause damage to the e"uipment.
)g7 Consider a T remote control system! if the remote control takes a few milliseconds
delay it will not cause damage either to the T or to the remote control. These systems which will
not cause damage when they are not operated at considerable time period those systems comes
under soft real$time embedded systems.
2.(.* Netor5 co''unication e'$edded s%ste's:
wide range network interfacing communication is provided by using embedded
systems.
)g7
Consider a web camera that is connected to the computer with internet can be used to
spread communication like sending pictures! images! videos etc..! to another computer
with internet connection throughout anywhere in the world.
Consider a web camera that is connected at the door lock.
5henever a person comes near the door! it captures the image of a person andsends to the desktop of your computer which is connected to internet. This gives an alerting
message with image on to the desktop of your computer! and then you can open the door lock just
by clicking the mouse. 3ig7 +.+ show the network communications in embedded systems.
Department of E.C.E 1! S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
13/79
BlueStooth based security enabled powered devices control system
Fi 2.2: Netor5 co''unication e'$edded s%ste's
2.(.+ Di33erent t%&es o3 &rocessin units:
The central processing unit
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
14/79
BlueStooth based security enabled powered devices control systemt home we use a number of embedded systems which include microwave oven! remote
control! CD players! DD players! camera etcM.
Fi2.(: Auto'atic co33ee 'a5es e7ui&'ent
2.*.2 O33ice auto'ation:
5e use systems like fa# machine! modem! printer etcM
Fi2.*: Fa 'ac#ine Fi2.+: Printin 'ac#ine
2.*.(. Industria" auto'ation:
Today a lot of industries are using embedded systems for process control. In
industries we design the embedded systems to perform a specific operation like monitoring
temperature! pressure! humidity !voltage! current etc..! and basing on these monitored levels we do
control other devices! we can send information to a centrali6ed monitoring station.
Department of E.C.E 1# S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
15/79
BlueStooth based security enabled powered devices control system
Fi2.,: Ro$ot
In critical industries where human presence is avoided there we can use robots
which are programmed to do a specific operation.
2.*.+ Co'&uter netor5in:
)mbedded systems are used as bridges routers etc..
Fi2.-: Co'&uter netor5in
2.*., Te"e co''unications:
Cell phones! web cameras etc.
Department of E.C.E 1$ S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
16/79
BlueStooth based security enabled powered devices control system
Fi2.8: Ce"" P#one Fi2.9: e$ ca'era
CHAPTER (: HARDARE DE0CRIPTION
(.1 Introduction7
Department of E.C.E 1% S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
17/79
BlueStooth based security enabled powered devices control systemIn this chapter the block diagram of the project and design aspect of independent
modules are considered. Block diagram is shown in fig7 ,.*7
FI; (.1: !"oc5 diara' o3 !"uetoot# $ased securit% ena$"ed &oered devices contro"
s%ste'.
The main blocks of this project are7
*. (icro controller
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
18/79
BlueStooth based security enabled powered devices control system
(.2 /icro contro""er:
Fi: (.2 /icrocontro""ers
(.2.1 Introduction to /icrocontro""ers:
Circumstances that we find ourselves in today in the field of microcontrollers had
their beginnings in the development of technology of integrated circuits. This development has
made it possible to store hundreds of thousands of transistors into one chip. That was a
prere"uisite for production of microprocessors! and the first computers were made by adding
e#ternal peripherals such as memory! input$output lines! timers and other. 3urther increasing of the
volume of the package resulted in creation of integrated circuits. These integrated circuits
contained both processor and peripherals. That is how the first chip containing a microcomputer!
or what would later be known as a microcontroller came about.
(icroprocessors and microcontrollers are widely used in embedded systems products.
(icrocontroller is a programmable device. microcontroller has a C1 in addition to a fi#ed
amount of 8(! 89(! I;9 ports and a timer embedded all on a single chip. The fi#ed amount of
on$chip 89(! 8( and number of I;9 ports in microcontrollers makes them ideal for many
applications in which cost and space are critical.
The microcontroller used in this project is 1IC*234+. The 1IC families of microcontrollers
are developed by (icrochip Technology Inc. Currently they are some of the most popular
microcontrollers! selling over *+A million devices each year. There are basically four families of
1IC microcontrollers7
1IC*+CEEE *+;*-$bit program word
1IC *2CE *+$bit program word
Department of E.C.E 1' S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
19/79
BlueStooth based security enabled powered devices control system1IC*2CEEE and 1IC*23EEE *-$bit program word
1IC*4CEEE and 1IC*NCEEE *2$bit program word
The features! pin description of the microcontroller used are discussed in the following sections.
(.2.2 Descri&tion:
Introduction:
The 1IC*234, C(9% 3L%'$based N$bit microcontroller is upward compatible with the
1IC*2C4,B;4-B;42;44!1IC*23N4,;N4-;N42;N44devices. It features +AA ns instruction e#ecution!
self programming! an ICD! + Comparators! N channels of N$bit nalog$to$Digital
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
20/79
BlueStooth based security enabled powered devices control system
O 1rocessor read access to program memory
0&ecia" /icrocontro""er Features:
O 1ower$up Timer
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
21/79
BlueStooth based security enabled powered devices control system
Ana"o Co'&arator 'odu"e
+ analog comparators
1rogrammable on$chip voltage reference module
1rogrammable input multiple#ing from device inputs and internal 8)3
Comparator outputs are e#ternally accessible
3ollowing are the major blocks of 1IC (icrocontroller.
Prora' 'e'or%
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
22/79
BlueStooth based security enabled powered devices control system
Fi(.2.2: Harvard =s =on Neu'ann !"oc5 Arc#itectures
Cr%sta" osci""ator:
The crystal oscillator speed that can be connected to the 1IC microcontroller range from
DC to +A(h6. sing the CC% C compiler normally +A(h6 oscillator will be used and the price is
very cheap. The +A ('6 crystal oscillator should be connected with about ++p3 capacitor. 1lease
refer to my circuit schematic.
There are input;output ports on 1IC microcontroller namely port ! port B! port C! port D
and port ). )ach port has different function. (ost of them can be used as I;9 port.
A&&"ications:
1IC*234, perfectly fits many uses! from automotive industries and controlling home
appliances to industrial instruments! remote sensors! electrical door locks and safety devices. It is
also ideal for smart cards as well as for battery supplied devices because of its low consumption.
))189( memory makes it easier to apply microcontrollers to devices where permanent
storage of various parameters is needed
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
23/79
BlueStooth based security enabled powered devices control system
Pin descri&tion:
1IC*234, has a total of +N pins. It is most fre"uently found in a DI1+N type of case but can
also be found in %(D case which is smaller from a DI1. DI1 is an abbreviation for Dual In
1ackage. %(D is an abbreviation for %urface (ount Devices suggesting that holes for pins to go
through when mounting aren?t necessary in soldering this type of a component.
Fi (.(: Pin Diara' o3 PIC1,F-(
1ins on 1IC*234, microcontroller have the following meaning7
There are +N pins on 1IC*234,. (ost of them can be used as an I9 pin. 9thers are already for
specific functions. These are the pin functions.
*. (CL8 to reset the 1IC
+. 8A port pin A
,. 8* port pin *
-. 8+ port pin +
. 8, port pin ,
Department of E.C.E !" S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
24/79
BlueStooth based security enabled powered devices control system2. 8- port pin -
4. 8 port pin
N. %% ground
@. 9%C* connect to oscillator
*A. 9%C+ connect to oscillator
**. 8CA port C pin A DD power supply
*+. 8C* port C pin *
*,. 8C+ port C pin +
*-. 8C, port C pin ,
*. 8C- $ port C pin -
*2. 8C $ port C pin
*4. 8C2 $ port C pin 2
*N. 8C4 $ port C pin 4
*@. %% $ ground
+A. DD power supply
+*. 8BA $ port B pin A
++. 8B* $ port B pin *
+,. 8B+ $ port B pin +
+-. 8B, $ port B pin ,
+. 8B- $ port B pin -
+2. 8B $ port B pin
+4. 8B2 $ port B pin 2
+N. 8B4 $ port B pin 4
By utili6ing all of this pin so many application can be done such as7
*. LCD connect to 1ort B pin.
+. L)D connect to any pin declared as output.
,. 8elay and (otor $ connect to any pin declared as output.
-. )#ternal ))189( connect to I+C interface pin 8C, and 8C-
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
25/79
BlueStooth based security enabled powered devices control system
Ports
Term >port> refers to a group of pins on a microcontroller which can be accessed
simultaneously! or on which we can set the desired combination of 6eros and ones! or read from
them an e#isting status. 1hysically! port is a register inside a microcontroller which is connected
by wires to the pins of a microcontroller. 1orts represent physical connection of Central 1rocessing
nit with an outside world. (icrocontroller uses them in order to monitor or control other
components or devices. Due to functionality! some pins have twofold roles like 1-;T9CPI for
instance! which is in the same time the fourth bit of port and an e#ternal input for free$run
counter. %election of one of these two pin functions is done in one of the configuration registers.
n illustration of this is the fifth bit TAC% in 91TI9: register. By selecting one of the functions
the other one is disabled.
ll port pins can be designated as input or output! according to the needs of a device
that?s being developed. In order to define a pin as input or output pin! the right combination of6eros and ones must be written in T8I% register. If the appropriate bit of T8I% register contains
logical >*>! then that pin is an input pin! and if the opposite is true! it?s an output pin. )very port
has its proper T8I% register. Thus! port has T8I%! and port B has T8I%B. 1in direction can be
changed during the course of work which is particularly fitting for one$line communication where
data flow constantly changes direction. 198T and 198TB state registers are located in bank A!
while T8I% and T8I%B pin direction registers are located in bank*.
PORT! and TRI0!:
198TB has adjoined N pins. The appropriate register for data direction is T8I%B.
%etting a bit in T8I%B register defines the corresponding port pin as input! and resetting a bit in
T8I%B register defines the corresponding port pin as output.
Department of E.C.E !$ S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
26/79
BlueStooth based security enabled powered devices control system
)ach 198TB pin has a weak internal pull$up resistor
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
27/79
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
28/79
BlueStooth based security enabled powered devices control systemdevices. Low voltage! low power DC power supply units are commonly integrated with the
devices they supply! such ascomputersand household electronics.
Batteries.
Chemicalfuel cells and other forms ofenergy storagesystems.
%olar power.
enerators oralternators.
(.(.2 !"oc5 Diara':
Fi (.(.2 Reu"ated Poer 0u&&"%
The basic circuit diagram of a regulated power supply
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
29/79
BlueStooth based security enabled powered devices control system
C1CIT98
9LT) 8)LT98
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
30/79
BlueStooth based security enabled powered devices control system
Fi (.(.*: 0te&4Don Trans3or'er
The voltage induced in the secondary is determined by the T8:% 8TI9.
%ome transformers have an electrostatic screen between primary and secondary.
This is to prevent some types of interference being fed from the e"uipment down into the mains
supply! or in the other direction. Transformers are sometimes used for I(1)D:C)
(TC'I:.
5e can use the transformers as step up or step down.
0te& U& trans3or'er:
In case of step up transformer! primary windings are every less compared to
secondary winding.
Because of having more turns secondary winding accepts more energy! and it
releases more voltage at the output side.
0te& don trans3or'er:
Incase of step down transformer! 1rimary winding induces more flu# than the
secondary winding! and secondary winding is having less number of turns because of that it
accepts less number of flu#! and releases less amount of voltage.
Department of E.C.E ") S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
31/79
BlueStooth based security enabled powered devices control system
!atter% &oer su&&"%:
batteryis a type of linear power supply that offers benefits that traditional line$
operated power supplies lack7 mobility! portability and reliability. battery consists of multiple
electrochemical cells connected to provide the voltage desired. 3ig7 ,.,. shows 'i$5att @
battery
Fi (.(.+: Hi4att 9= !atter%
The most commonly used dry$cellbattery is thecarbon$6incdry cell battery. Dry$
cell batteries are made by stacking a carbon plate! a layer of electrolyte paste! and a 6inc plate
alternately until the desired total voltage is achieved. The most common dry$cell batteries have
one of the following voltages7 *.! ,! 2! @! ++.! -! and @A. During the discharge of a carbon$6inc
battery! the 6inc metal is converted to a 6inc salt in the electrolyte! and magnesium dio#ide isreduced at the carbon electrode. These actions establish a voltage of appro#imately *. .
Recti3ication:
The process of converting an alternating current to a pulsating direct current is
called as rectification. 3or rectification purpose we use rectifiers.
Recti3iers: rectifier is an electrical device that converts alternating current
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
32/79
BlueStooth based security enabled powered devices control systemone of usage! i.e.! the term rectifier describes a diode that is being used to convert C to DC.
lmost all rectifiers comprise a number of diodes in a specific arrangement for more efficiently
converting C to DC than is possible with only one diode. Before the development of silicon
semiconductor rectifiers! vacuum tube diodes and copper
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
33/79
BlueStooth based security enabled powered devices control system
D!1>-:
:ow $a $days Bridge rectifier is available in IC with a number of DB*A4. In our
project we are using an IC in place of bridge rectifier. The picture of DB *A4 is shown in fig7 ,.,.N.
Features:
ood for automation insertion
%urge overload rating $ ,A amperes peak
Ideal for printed circuit board
8eliable low cost construction utili6ing molded
lass passivated device
1olarity symbols molded on body
(ounting position7 ny
5eight7 *.A gram
Fi (.(.,: D!1>-
Fi"tration:
Department of E.C.E "" S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
34/79
BlueStooth based security enabled powered devices control systemThe process of converting a pulsating direct current to a pure direct current using
filters is called as filtration.
Fi"ters:
)lectronic filters are electronic circuits! which perform signal$processing functions!
specifically to remove unwanted fre"uency components from the signal! to enhance wanted ones.
Introduction to Ca&acitors:
The Capacitor or sometimes referred to as a Condenser is a passive device! and one
which stores energy in the form of an electrostatic field which produces a potential
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
35/79
BlueStooth based security enabled powered devices control system
Fi (.(.8:E"ectro"%tic Ca&aticor
Units o3 Ca&acitance:
(icrofarad
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
36/79
BlueStooth based security enabled powered devices control system
Fi (.(.9: =o"tae Reu"ator
Resistors:
resistor is a two$terminal electronic component that produces a voltage across its
terminals that is proportional to the electric current passing through it in accordance with 9hm?s
law7
VSIR
8esistors are elements of electrical networks and electronic circuits and are ubi"uitous in
most electronic e"uipment. 1ractical resistors can be made of various compounds and films! as
well as resistance wire
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
37/79
BlueStooth based security enabled powered devices control systemThe behavior of an ideal resistor is dictated by the relationship specified in 9hm?s
law7
S I8
9hm?s law states that the voltage
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
38/79
BlueStooth based security enabled powered devices control systemare available across the visible! ultraviolet and infrared wavelengths! with very high brightness.
The internal structure and parts of a led are shown in figures ,.-.* and ,.-.+ respectively.
Fi (.*.1: Inside a 6ED Fi (.*.2: Parts o3 a 6ED
or5in:
The structure of the L)D light is completely different than that of the light bulb.
ma6ingly! the L)D has a simple and strong structure. The light$emitting semiconductor material
is what determines the L)D?s color. The L)D is based on the semiconductor diode.
5hen a diode is forward biased
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
39/79
BlueStooth based security enabled powered devices control systemadvanced communications technology. The electrical symbol and polarities of led are shown in fig7
,.-.,.
Fi (.*.(: E"ectrica" 0%'$o" @ Po"arities o3 6ED
L)D lights have a variety of advantages over other light sources7
'igh$levels of brightness and intensity
'igh$efficiency
Low$voltage and current re"uirements
Low radiated heat
'igh reliability
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
40/79
BlueStooth based security enabled powered devices control system enerate light for measuring and interacting with processes that do not involve the human
visual system.
(.+: !"uetoot#
Introduction:
The Bluetooth technology is a wireless communication that operates as radio waves!
using a band set at +.-'6. This fre"uency is available at no charge. The Bluetooth technology
allows two devices to connect wirelessly with each other! and incorporates the use of >Centrino>
chips. These chips are available easily in most standard electronic devices such as laptops! cellular
phones! computers! headsets! etc.
Bluetooth is another developing a competing specification for a low$cost! short range
radio link between mobile computers! cameras! and other portable in$home devices. The Bluetooth
technology is the result of a co$operation between leaders in the telecommunication and computer
industries. It enables home networking users to connect a wide range of computing and
telecommunications devices easily and simply eliminating the need to purchase proprietary or
additional cabling to connect individual devices.
It delivers opportunities for the special purpose or concerned with one specific purposeconnections! and the possibility of automatic connections between devices.
Because Bluetooth can be used for a variety of purposes! it will also potentially replace
multiple cable connections via a single radio link.
!"uetoot# Tec#no"o% Overvie:
The technology is an open specification for wireless communication of data and voice. It
is based on a low$cost! short$range radio link built into a @ # @mm microchipK facilitating protected
ad hoc
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
41/79
BlueStooth based security enabled powered devices control systemreplace the cumbersome cables used today to connect a laptop to a cellular telephone. 1rinters!
1Ds! desktops! fa# machines! keyboards! joysticks! and virtually any other digital device can be
part of the Bluetooth system.
Fi (.+.1: !"uetoot# 'odu"e
Bluetooth radio technology provides a universal bridge to e#isting data networks! a
peripheral interface! and a mechanism to form small private ad hoc groupings of connected
devices away from fi#ed network infrastructures. Designed to operate in a noisy radio fre"uency
environment such as a home! the Bluetooth radio uses a fast acknowledgement and fre"uency$
hopping scheme to make the link robust.
Bluetooth radio modules avoid interference from other signals by hopping to a new
fre"uency after transmitting or receiving a packet. Compared with other systems operating in the
same fre"uency band! the Bluetooth radio typically hops faster and uses shorter packets. This
makes the Bluetooth radio more robust than other systems. %imilar to 'ome 83! Bluetooth radios
also operate in the unlicensed I%( band at +.- '6.
5hile the I%( band is freely available for anyone to use! there are rules for devices
designed to operate in it. Bluetooth has a ma#imum data capacity of only * (bps! which translates
to a throughput of only 4NA Pbps once the protocol overhead is taken into account. 3rom a
security perspective! Bluetooth provides user protection and information privacy mechanisms at
the lower layers of its protocol stack. uthentication is based on a challenge response algorithm.
uthentication is a key component of any Bluetooth home networking system! allowing us to
develop a domain of trust between personal Bluetooth devices! such as allowing only our personal
notebook to communicate through our cellular telephone.
Department of E.C.E #1 S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
42/79
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
43/79
BlueStooth based security enabled powered devices control systemknown as fre"uency hopping. They also use three different but complimentary error correction
schemes. Built$in encryption and verification is provided.
(oreover! Bluetooth devices won?t drain precious battery life. The Bluetooth
specification targets power consumption of the device from a >hold> mode consuming ,A micro
amps to the active transmitting range of N,A milliamps
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
44/79
BlueStooth based security enabled powered devices control systemBluetooth radio transmissions will conform to the safety standards re"uired by the countries where
the technology will be used with respect to the affects of radio transmissions on the human body.
)missions from Bluetooth enabled devices will be no greater than emissions from industry$
standard cordless phones. The Bluetooth module will not interfere or cause harm to public or
private telecommunications network.
The Bluetooth base band protocol is a combination of circuit and packet switching.
%lots can be reserved for synchronous packets. )ach packet is transmitted in a different hop
fre"uency. packet nominally covers a single slot! but can be e#tended to cover up to five slots.
Bluetooth can support an asynchronous data channel! up to three simultaneous synchronous voice
channels! or a channel! which simultaneously supports asynchronous data and synchronous voice.
It is thus possible to transfer the date asynchronously whilst at the same time talking
synchronously at the same time. )ach voice channel supports 2- kb;s synchronous 2.1+ Protoco")
/odes o3 o&eration:
n interesting aspect of the technology is the instant formation of networks once
the Bluetooth devices come in range to each other. piconet is a collection of devices connected
via Bluetooth technology in an ad hoc fashion. 1iconet can be a simple connection between two
devices or more than two devices. (ultiple independent and non$synchroni6ed piconets can form
a scatternet. ny of the devices in a piconet can also be a member of another by means of time
multiple#ing. I.e. a device can be a part of more than one piconet by suitably sharing the time. The
Bluetooth system supports both point$to$point and point$to$multi$point connections. 5hen a
device is connected to another device it is a point to point connection. If it is connected to more
that one
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
45/79
BlueStooth based security enabled powered devices control systemll Bluetooth devices are peer units and have identical implementations.
'owever! when establishing a piconet! one unit will act as a master and the other
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
46/79
BlueStooth based security enabled powered devices control system
Persona" Area Netor5s:
Bluetooth was originally conceived to replace the myriad of cables that are
synonymous with a 1C$based home network. 'owever! as the Bluetooth evolved it became clear
that it would also enable a totally new networking paradigm! 1ersonal rea :etworks
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
47/79
BlueStooth based security enabled powered devices control system
Fiure (.+.2:A !"uetoot# 0catter net
(., Re"a%:
re"a%is an electrically operated switch. (any relays use an electromagnet to operate a
switching mechanism! but other operating principles are also used. 8elays find applications where
it is necessary to control a circuit by a low$power signal! or where several circuits must be
controlled by one signal. The first relays were used in long distance telegraph circuits! repeating
the signal coming in from one circuit and re$transmitting it to another. 8elays found e#tensive use
in telephone e#changes and early computers to perform logical operations. type of relay that can
handle the high power re"uired to directly drive an electric motor is called a contactor. %olid$state
relays control power circuits with no moving parts! instead using a semiconductor device triggered
by light to perform switching. 8elays with calibrated operating characteristics and sometimes
multiple operating coils are used to protect electrical circuits from overload or faultsK in modern
electric power systems these functions are performed by digital instruments still called >protection
relays>.
Department of E.C.E #& S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
48/79
BlueStooth based security enabled powered devices control system
T%&es o3 re"a%s:
1. 0i'&"e e"ectro'ec#anica" re"a%:
simple electromagnetic relay! such as the one taken from a car in the first picture! is an
adaptation of an electromagnet. It consists of a coil of wire surrounding a soft iron core! an iron
yoke! which provides a low reluctance path for magnetic flu#! a movable iron armature! and a set!
or sets! of contactsK two in the relay pictured. The armature is hinged to the yoke and mechanically
linked to a moving contact or contacts. It is held in place by a spring so that when the relay is de$
energi6ed there is an air gap in the magnetic circuit. In this condition! one of the two sets of
contacts in the relay pictured is closed! and the other set is open. 9ther relays may have more or
fewer sets of contacts depending on their function. The relay in the picture also has a wire
connecting the armature to the yoke. This ensures continuity of the circuit between the moving
contacts on the armature! and the circuit track on the printed circuit board
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
49/79
BlueStooth based security enabled powered devices control system
!asic desin and o&eration:
5hen an electric current is passed through the coil! the resulting magnetic field
attracts the armature and the conse"uent movement of the movable contact or contacts either
makes or breaks a connection with a fi#ed contact. If the set of contacts was closed when the relay
was De$energi6ed! then the movement opens the contacts and breaks the connection! and vice
versa if the contacts were open. 5hen the current to the coil is switched off! the armature is
returned by a force! appro#imately half as strong as the magnetic force! to its rela#ed position.
sually this force is provided by a spring! but gravity is also used commonly in industrial motor
starters. (ost relays are manufactured to operate "uickly. In a low voltage application! this is to
reduce noise. In a high voltage or high current application! this is to reduce arcing.
If the coil is energi6ed with DC! a diode is fre"uently installed across the coil! to
dissipate the energy from the collapsing magnetic field at deactivation! which would otherwise
generate a voltage spike dangerous to circuit components. %ome automotive relays already includea diode inside the relay case. lternatively a contact protection network! consisting of a capacitor
and resistor in series! may absorb the surge. If the coil is designed to be energi6ed with C! a small
copper ring can be crimped to the end of the solenoid. This >shading ring> creates a small out$of$
phase current! which increases the minimum pull on the armature during the C cycle.
By analogy with the functions of the original electromagnetic device! a solid$state
relay is made with a thyristor or other solid$state switching device. To achieve electrical isolation
an opt coupler can be used which is a light$emitting diode
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
50/79
BlueStooth based security enabled powered devices control system
(. 6atc#in re"a%:
Latching relay! dust cover removed! showing pawl and ratchet mechanism. The
ratchet operates a cam! which raises and lowers the moving contact arm! seen edge$on just below
it. The moving and fi#ed contacts are visible at the left side of the image.
"atc#in re"a%has two rela#ed states impulse>!
>keep>! or >stay> relays. 5hen the current is switched off! the relay remains in its last state. This is
achieved with a solenoid operating a ratchet and cam mechanism! or by having two opposing coils
with an over$center spring or permanent magnet to hold the armature and contacts in position
while the coil is rela#ed! or with a remnant core. In the ratchet and cam e#ample! the first pulse to
the coil turns the relay on and the second pulse turns it off. In the two coil e#ample! a pulse to one
coil turns the relay on and a pulse to the opposite coil turns the relay off. This type of relay has the
advantage that it consumes power only for an instant! while it is being switched! and it retains its
last setting across a power outage. remnant core latching relay re"uires a current pulse of
opposite polarity to make it change state.
(. Reed re"a%
reed re"a% has a set of contacts inside a vacuum or inert gas filled glass tube!
which protects the contacts against atmospheric corrosion. The contacts are closed by a magnetic
field generated when current passes through a coil around the glass tube. 8eed relays are capable
of faster switching speeds than larger types of relays! but have low switch current and voltage
ratings.
Department of E.C.E $) S.K.DEngineering College, ooty.
http://en.wikipedia.org/wiki/File:Reedrelay.jpg8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
51/79
BlueStooth based security enabled powered devices control system
*. /ercur%4etted re"a%
'ercur%4etted reed re"a% is a form of reed relay in which the contacts are
wetted with mercury. %uch relays are used to switch low$voltage signals
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
52/79
BlueStooth based security enabled powered devices control systemare often used for motor starters. motor starter is a contactor with overload protection devices
attached. The overload sensing devices are a form of heat operated relay where a coil heats a bi$
metal strip! or where a solder pot melts! releasing a spring to operate au#iliary contacts. These
au#iliary contacts are in series with the coil. If the overload senses e#cess current in the load! the
coil is de$energi6ed. Contactor relays can be e#tremely loud to operate! making them unfit for use
where noise is a chief concern.
8. 0o"id4state re"a%
%olid state relay! which has no moving parts
+ or -A solid state contactors
so"id state re"a%
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
53/79
BlueStooth based security enabled powered devices control system
1>. !uc##o" re"a%
!uc##o" re"a%is a safety device sensing the accumulation of gas in large oil$
filled transformers! which will alarm on slow accumulation of gas or shut down the transformer if
gas is produced rapidly in the transformer oil.
11. Forced4uided contacts re"a%
3orced4uided contacts re"a%has relay contacts that are mechanically linked
together! so that when the relay coil is energi6ed or de$energi6ed! all of the linked contacts move
together. If one set of contacts in the relay becomes immobili6ed! no other contact of the same
relay will be able to move. The function of forced$guided contacts is to enable the safety circuit to
check the status of the relay. 3orced$guided contacts are also known as >positive$guided contacts>!
>captive contacts>! >locked contacts>! or >safety relays>.
12. Over"oad &rotection re"a%
)lectric motors need over current protection to prevent damage from over$loading
the motor! or to protect against short circuits in connecting cables or internal faults in the motor
windings. 9ne type of electric motor overload protection relay is operated by a heating element in
series with the electric motor. The heat generated by the motor current heats a bimetallic strip or
melts solder! releasing a spring to operate contacts. 5here the overload relay is e#posed to the
same environment as the motor! a useful though crude compensation for motor ambient
temperature is provided.
Department of E.C.E $" S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
54/79
BlueStooth based security enabled powered devices control system
1(. Po"e and t#ro:
Circuit symbols of relays. >C> denotes the common terminal in %1DT and D1DT types.
The diagram on the package of a D1DT C coil relay
%ince relays are switches! the terminology applied to switches is also applied to relays.
relay will switch one or more poles! each of whose contacts can be thrown by energi6ing the
coil in one of three ways7
:ormally$open break>
contact.
Change$over
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
55/79
BlueStooth based security enabled powered devices control systemThe following designations are commonly encountered7
0P0T %ingle 1ole %ingle Throw. These have two terminals which can be connected or
disconnected. Including two for the coil! such a relay has four terminals in total. It is
ambiguous whether the pole is normally open or normally closed. The terminology
>%1:9> and >%1:C> is sometimes used to resolve the ambiguity.
0PDT %ingle 1ole Double Throw. common terminal connects to either of two others.
Including two for the coil! such a relay has five terminals in total.
DP0T Double 1ole %ingle Throw. These have two pairs of terminals. )"uivalent to two
%1%T switches or relays actuated by a single coil. Including two for the coil! such a relay
has si# terminals in total. The poles may be 3orm or 3orm B
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
56/79
BlueStooth based security enabled powered devices control system Isolate the controlling circuit from the controlled circuit when the two are at different
potentials! for e#ample when controlling a mains$powered device from a low$voltage
switch. The latter is often applied to control office lighting as the low voltage wires are
easily installed in partitions! which may be often moved as needs change. They may also
be controlled by room occupancy detectors in an effort to conserve energy!
Logic functions. 3or e#ample! the Boolean :D function is reali6ed by connecting
normally open relay contacts in series! the 98 function by connecting normally open
contacts in parallel. The change$over or 3orm C contacts perform the E98
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
57/79
BlueStooth based security enabled powered devices control system
Disadvantaes o3 re"a%s:
8elays are $u"5ierthan transistors for switching small currents.
8elays cannot sitc# ra&id"%
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
58/79
BlueStooth based security enabled powered devices control systemdoesn?t have any polarity. It can be triggered by either a positive or a negative voltage being
applied to its gate electrode
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
59/79
BlueStooth based security enabled powered devices control system
Fi(.-.2: 0%nc#roniation across t#e TRIAC 4 ave3or's
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
60/79
BlueStooth based security enabled powered devices control system
Fiure (.-.(: 0%nc#roniation across t#e TRIAC 4 ave3or's
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
61/79
BlueStooth based security enabled powered devices control system bsence of a separate power supply
Little power dissipated in 1 and 8t
Disadvantae:
1. Because of its principle! this circuit cannot be used for highly inductive loads with a
narrow conduction angle because it can result in unacceptable asymmetrical operation.
This very simple triggering circuit should be reserved for low$cost applications with the
following characteristics7
2. 8esistive or slightly inductive loads
(. :o stringent re"uirements concerning the accuracy of regulation
*. highly inductive loads where the power varies between N and *AAV of the ma#imum
power
A&&"ications o3 TRIAC:
O Industrial controls O %olenoid;valve controls
O Traffic lights O %tatic C power switch
O ending machines O Incandescent lamp dimmers
O %olid state relay O (otor control
O Lamp ballasts
CHAPTER *: 0OFTARE DE0CRIPTION
This project is implemented using following software&s7
)#press 1CB for designing circuit
1IC C compiler $ for compilation part
1roteus 4
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
62/79
BlueStooth based security enabled powered devices control systemBreadboards are great for prototyping e"uipment as it allows great fle#ibility to
modify a design when neededK however the final product of a project! ideally should have a neat
1CB! few cables! and survive a shake test. :ot only is a proper 1CB neater but it is also more
durable as there are no cables which can yank loose.
)#press 1CB is a software tool to design 1CBs specifically for manufacture by the
company )#press 1CB
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
63/79
BlueStooth based security enabled powered devices control system5hen a project is first started you will be greeted with a yellow outline. This
yellow outline is the dimension of the 1CB. Typically after positioning of parts and traces! move
them to their final position and then crop the 1CB to the correct si6e. 'owever! in designing a
board with a certain si6e constraint! crop the 1CB to the correct si6e before starting.
3ig7 -.* show the toolbar in which the each button has the following functions7
Fi *.1.2: Too" $ar necessar% 3or t#e inter3ace
The select tool7 It is fairly obvious what this does. It allows you to move and manipulate
parts. 5hen this tool is selected the top toolbar will show buttons to move traces to the
top ; bottom copper layer! and rotate buttons.
The 6oom to selection tool7 does just that.
The place pad7 button allows you to place small soldier pads which are useful for board
connections or if a part is not in the part library but the part dimensions are available.
5hen this tool is selected the top toolbar will give you a large selection of round holes!
s"uare holes and surface mount pads.
The place component7 tool allows you to select a component from the top toolbar and then
by clicking in the workspace places that component in the orientation chosen using the
buttons ne#t to the component list. The components can always be rotated afterwards with
the select tool if the orientation is wrong.
The place trace7 tool allows you to place a solid trace on the board of varying thicknesses.
The top toolbar allows you to select the top or bottom layer to place the trace on.
The Insert Corner in trace7 button does e#actly what it says. 5hen this tool is selected!
clicking on a trace will insert a corner which can be moved to route around components
and other traces.
The remove a trace button is not very important since the delete key will achieve the same
result.
Department of E.C.E %" S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
64/79
BlueStooth based security enabled powered devices control system
*.1.( Desin Considerations:
Before starting a project there are several ways to design a 1CB and one must be
chosen to suit the project&s needs.
%ingle sided! or double sided
5hen making a 1CB you have the option of making a single sided board! or a
double sided board. %ingle sided boards are cheaper to produce and easier to etch! but much
harder to design for large projects. If a lot of parts are being used in a small space it may be
difficult to make a single sided board without jumper over traces with a cable. 5hile there&s
technically nothing wrong with this! it should be avoided if the signal travelling over the traces is
sensitive
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
65/79
BlueStooth based security enabled powered devices control system1IC compiler is software used where the machine language code is written and
compiled. fter compilation! the machine source code is converted into he# code which is to be
dumped into the microcontroller for further processing. 1IC compiler also supports C language
code.
It&s important that you know C language for microcontroller which is commonly
known as )mbedded C. s we are going to use 1IC Compiler! hence we also call it 1IC C. The
1CB! 1C(! and 1C' are separate compilers. 1CB is for *+$bit opcodes! 1C( is for *-$
bitopcodes! and 1C' is for *2$bit opcode 1IC microcontrollers. Due to many similarities! all three
compilers are covered in this reference manual. 3eatures and limitations that apply to only specific
microcontrollers are indicated within. These compilers are specifically designed to meet the
uni"ue needs of the 1IC microcontroller. This allows developers to "uickly design applications
software in a more readable! high$level language. 5hen compared to a more traditional C
compiler! 1CB! 1C(! and 1C' have some limitations. s an e#ample of the limitations! function
recursion is not allowed.
This is due to the fact that the 1IC has no stack to push variables onto! and also
because of the way the compilers optimi6e the code. The compilers can efficiently implement
normal C constructs! input;output operations! and bit twiddling operations. ll normal C data types
are supported along with pointers to constant arrays! fi#ed point decimal! and arrays of bits.
1IC C is not much different from a normal C program. If you know assembly!writing a C program is not a crisis. In 1IC! we will have a main function! in which all your
application specific work will be defined. In case of embedded C! you do not have any operating
system running in there. %o you have to make sure that your program or main file should never
e#it. This can be done with the help of simple while
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
66/79
BlueStooth based security enabled powered devices control systemone which is to be programmed. This microcontroller has a program in it written in such a way
that it accepts the he# file from the pic compiler and dumps this he# file into the microcontroller
which is to be programmed. s the 1roteus programmer re"uires power supply to be operated! this
power supply is given from the power supply circuit designed and connected to the
microcontroller in proteus. The program which is to be dumped in to the microcontroller is edited
in proteus and is compiled and e#ecuted to check any errors and hence after the successful
compilation of the program the program is dumped in to the microcontroller using a dumper.
*.*Procedura" ste&s 3or co'&i"ation si'u"ation and du'&in7
*.*.1 Co'&i"ation and si'u"ation ste&s:
3or 1IC microcontroller! 1IC C compiler is used for compilation. The compilation
steps are as follows7
9pen 1IC C compiler.
Qou will be prompted to choose a name for the new project! so create a separate folder
where all the files of your project will be stored! choose a name and click save.
Fi *.(.1: Picture o3 o&enin a ne 3i"e usin PIC C co'&i"er
Click 1roject :ew! and something the bo# named ?Te#t*? is where your code should be
written later.
Department of E.C.E %% S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
67/79
BlueStooth based security enabled powered devices control system
:ow you have to click ?3ile! %ave as? and choose a file name for your source code ending
with the letter ?.c?. Qou can name as ?project.c? for e#ample and click save. Then you have
to add this file to your project work.
Fi *.(.2: Picture o3 co'&i"in a ne 3i"e usin PIC C co'&i"er
Fi *.(.(: Picture o3 co'&i"in a &roject.c 3i"e usin PIC C co'&i"er
Qou can then start to write the source code in the window titled ?project.c? then before
testing your source codeK you have to compile your source code! and correct eventualsynta# errors.
Department of E.C.E %& S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
68/79
BlueStooth based security enabled powered devices control system
Fi *.(.*: Picture o3 c#ec5in errors and arnins usin PIC C co'&i"er
By clicking on compile option .he# file is generated automatically.
This is how we compile a program for checking errors and hence the compiled program is
saved in the file where we initiated the program.
Fi *.(.+: Picture o3 .#e 3i"e eistin usin PIC C co'&i"er
fter compilation! ne#t step is simulation. 'ere first circuit is designed in )#press
1CB using 1roteus 4 software and then simulation takes place followed by dumping. The
simulation steps are as follows7
Department of E.C.E %' S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
69/79
BlueStooth based security enabled powered devices control system
9pen 1roteus 4 and click on I%*%2.
:ow it displays 1CB where circuit is designed using microcontroller. To design circuit
components are re"uired. %o click on component option.
*A. :ow click on letter &p&! then under that select 1IC*234, !other components related to theproject and click 9P. The 1IC *234, will be called your /'Target device,which is the final
destination of your source code.
*.*.2 Du'&in ste&s:
The steps involved in dumping the program edited in proteus 4 to microcontroller
are shown below7
*. Initially before connecting the program dumper to the microcontroller kit the window isappeared as shown below.
Fi *.(.,: Picture o3 &rora' du'&er indo
Department of E.C.E %( S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
70/79
BlueStooth based security enabled powered devices control system
+. %elect Tools option and click on Check Communication for establishing a connection as
shown in below window
Fi *.(.-: Picture o3 c#ec5in co''unications $e3ore du'&in &rora' into 'icrocontro""er
,. fter connecting the dumper properly to the microcontroller kit the window is appeared as
shown below.
Fi *.(.8: Picture a3ter connectin t#e du'&er to 'icrocontro""er
Department of E.C.E &) S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
71/79
BlueStooth based security enabled powered devices control system
-. gain by selecting the Tools option and clicking on Check Communication the
microcontroller gets recogni6ed by the dumper and hence the window is as shown below.
Fi *.(.9: Picture o3 du'&er reconition to 'icrocontro""er
. Import the program which is .he#& file from the saved location by selecting 3ile option and
clicking on Import 'e#& as shown in below window.
Fi *.(.1>: Picture o3 &rora' i'&ortin into t#e 'icrocontro""er
Department of E.C.E &1 S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
72/79
BlueStooth based security enabled powered devices control system
2. fter clicking on Import 'e#& option we need to browse the location of our program and click
the prog.he#& and click on open& for dumping the program into the microcontroller.
Fi *.(.11: Picture o3 &rora' $rosin #ic# is to $e du'&ed
4. fter the successful dumping of program the window is as shown below.
Department of E.C.E &! S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
73/79
BlueStooth based security enabled powered devices control systemFi *.(.12: Picture a3ter &rora' du'&ed into t#e 'icrocontro""er
CHAPTER +: PROECT DE0CRIPTION
In this chapter! schematic diagram and interfacing of 1IC*234, microcontroller with each
module is considered.
Fi+.1: 0c#e'atic diara' o3 B!"uetoot# $ased securit% ena$"ed &oered devices contro"
s%ste')
The above schematic diagram of !"uetoot# $ased securit% ena$"ed &oered devices
contro" s%ste'e#plains the interfacing section of each component with micro controller and
Bluetooth module. Crystal oscillator connected to @th and *Ath pins of micro controller and
regulated power supply is also connected to micro controller and L)D&s also connected to micro
controller through resistors.
Thedetailed e#planation of each module interfacing with microcontroller is as follows7
Department of E.C.E &" S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
74/79
BlueStooth based security enabled powered devices control system
CHAPTER ,: RE0U6T0
,.1 Resu"t:
The project /!"uetoot# $ased securit% ena$"ed &oered devices contro" s%ste'0
was designed such that controlling operation of the home appliances can be done using Bluetooth
technology.
,.2 Conc"usion:
Integrating features of all the hardware components used have been developed in it.
1resence of every module has been reasoned out and placed carefully! thus contributing to the best
working of the unit. %econdly! using highly advanced IC&s with the help of growing technology!
the project has been successfully implemented. Thus the project has been successfully designed
and tested.
,.( Future 0co&e:
9ur project /!"uetoot# $ased securit% ena$"ed &oered devices contro" s%ste'0
is mainly intended to control the 9:;933 operations of electrical appliances like fans! lights by
using Bluetooth module. The input is given by the user using 1C to which Bluetooth is connected.
Bluetooth module interfaced to micro controller receives the input and in turn operates switches
like 8elay and Triac accordingly to which the electrical appliances are connected. The input value
to the micro controller will be checked and respective operation of that key will be performed like
switching 9:;933 a light.
The main disadvantage of this project is that the range of Bluetooth is limited.
This drawback can be eliminated by introducing a %( module! through which the devices can be
operated from anywhere in the world and it is also possible to get the status of the devices.
This system can be e#tended by using wireless Wigbee technology to operate the
devices from longer distances.
Department of E.C.E S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
75/79
BlueStooth based security enabled powered devices control system
CHAPTER -: EPERI/ENTA6 RE0U6T0
Fi -.1: EPERI/ENTA6 GIT ITH OUT OPERATION
Department of E.C.E &$ S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
76/79
BlueStooth based security enabled powered devices control system3ig 4.+7 )E1)8I():TL PIT 5IT' 9:) BLB 9:
3ig 4.,7 )E1)8I():TL PIT 91)8T)D BQ BL)T99T' (9BIL)
Department of E.C.E &% S.K.DEngineering College, ooty.
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
77/79
BlueStooth based security enabled powered devices control system
REFERENCE0:
The sites which were used while doing this project7
*. www.wikipedia.com
+. www.allaboutcircuits.com
,. www.microchip.com
-. www.howstuffworks.com
. 5ww. Bluetooth.com
!oo5s Re3erred:
*. 8aj kamal (icrocontrollers rchitecture! 1rogramming! Interfacing and %ystem Design.
+. (a6idi and (a6idi )mbedded %ystems.
,. 1CB Design Tutorial David.L.Fones.
-. 1IC (icrocontroller (anual (icrochip.
. )mbedded C (ichael.F.1ont.
Department of E.C.E && S.K.DEngineering College, ooty.
http://www.wikipedia.com/http://www.allaboutcircuits.com/http://www.microchip.com/http://www.howstuffworks.com/http://www.wikipedia.com/http://www.allaboutcircuits.com/http://www.microchip.com/http://www.howstuffworks.com/8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
78/79
BlueStooth based security enabled powered devices control system
APPENDI
Prora' Code:
The program code which is dumped in the microcontroller of our project is
shown below.
include *234,.hX ;;microcontroller used
use delay
8/11/2019 Blue Tooth Based Security Enabled Powered Devices Control System
79/79
BlueStooth based security enabled powered devices control systembreakK
case ?+?7
outputlow