GSM BASED POWER THEFT SUBSTATION 1 ABSTRACT Science and technology with all its miraculous advancements has fascinated human life to a great extent that imagining a world without these innovations is hardly possible. While technology is on the raising slope, we should also note the increasing immoral activities. With a technical view, "Power Theft" is a non-ignorable crime that is highly prevalent, and at the same time it directly affects the economy of a nation. Detecting and eradicating such crimes with the assistance of the developing scientific field is the "Need of the Hour". With these views was this paper conceived and designed. Our paper provides a complete and comprehensive tool to prevent power theft which is very simple to understand and easy to implement. It includes three sections - transmitting, receiving, and processing sections. The IR transmitter transmits the IR rays (which are invisible) to the photo diode continuously at that time microcontroller does not perform any operation when the signal breaks, immediately IC555 sends a negative pulse to the microcontroller now it process and send a signals to the GSM modem using serial communication, the modem sends a message (address of that house) to the substation using GSM technology. Then they immediately take an action that to stops the power to the house and take further actions on them. Here the microcontroller performs the function of indication and identification of power theft. Pin details, features, connections and software employed for uc89c51 are described in detail. We believe our implementation ideas are a boon to the electricity board offering them a chance to detect accurately the location and amount of power theft.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
GSM BASED POWER THEFT SUBSTATION
1
ABSTRACT
Science and technology with all its miraculous
advancements has fascinated human life to a great extent that
imagining a world without these innovations is hardly possible.
While technology is on the raising slope, we should also note the
increasing immoral activities. With a technical view, "Power Theft" is
a non-ignorable crime that is highly prevalent, and at the same time
it directly affects the economy of a nation.
Detecting and eradicating such crimes with the
assistance of the developing scientific field is the "Need of the
Hour". With these views was this paper conceived and designed.
Our paper provides a complete and comprehensive tool to prevent
power theft which is very simple to understand and easy to
implement. It includes three sections - transmitting, receiving, and
processing sections.
The IR transmitter transmits the IR rays (which are
invisible) to the photo diode continuously at that time
microcontroller does not perform any operation when the signal
breaks, immediately IC555 sends a negative pulse to the
microcontroller now it process and send a signals to the GSM
modem using serial communication, the modem sends a message
(address of that house) to the substation using GSM technology.
Then they immediately take an action that to stops the power to the
house and take further actions on them. Here the microcontroller
performs the function of indication and identification of power theft.
Pin details, features, connections and software employed for
uc89c51 are described in detail.
We believe our implementation ideas are a boon to the
electricity board offering them a chance to detect accurately the
location and amount of power theft.
GSM BASED POWER THEFT SUBSTATION
2
CHAPTER - 1
CHAPTER 1
GSM BASED POWER THEFT SUBSTATION
3
INTRODUCTION
1.1. OVERVIEW: "TODAY'S TECHNICIANS ARE SO FOCUSSED ON THE TREES OF TECHNOLOGICAL CHANGE THAT THEY FAIL TO SEE THE FOREST; THE UNDERLYING ECONOMIC FORCES THAT DETERMINE SUCCESS AND FAILURE..."
"TECHNOLOGY CHANGES ECONOMY LAWS DO NOT"
Electricity is the modern man's most convenient and
useful form of energy without which the present social infrastructure
would not be feasible. The increase in per capita production is the
reflection of the increase in the living standard of people. When
importance of electricity is on the increasing side, then how much
should theft of this energy or illegal consumption of power from the
transmission lines is averted? Power theft has become a great
challenge to the electricity board. The dailies report that Electricity
Board suffers a total loss of 8 % in revenue due to power theft
every year, which has to control. Our paper identifies the Power
theft and indicates it to the Electricity board through Power line. We
had also dealt about the remote monitoring of an energy meter.
MICROCONTROLLER BASED AUTOMATION:
Embedded systems - a combination of software,
hardware and additional mechanical parts that together forms a
component of a larger system, to perform a specific function. It's a
technology, characterized by high reliability, restricted memory
footprint and real time operation associated with a narrowly defined
group of functions. Automation has made the art of living
comfortable and easy. Embedded systems have made the process of
automation a most successful one. Here, we have focused on
automotive, an area of embedded controllers, in which we have
dealt with the Power theft identification and also about the remote
monitoring of an energy meter.
"Technology have taken the world by storm performance
ratings and exceptionally value for money prices"
GSM BASED POWER THEFT SUBSTATION
4
The microcontroller chip is preprogrammed to perform a dedicated
or a narrow range of functions as a part of a larger system, usually
with minimal end user or operator intervention. Our paper throws
light on automated monitoring of theft identification, which is an
application of embedded controllers.
MODES OF THEFT:
It has been seen that there are 4 common methods of
power theft as given below:-
Bogus seals and tampering of seals.
Meter tampering, meter tilting, meter interface
and
Meter bypassing.
Changing connection.
Direct tapping from line. Due to introduction of modern
electronic metering equipments, power thieves are utilizing more
technological methods. Recent cases of power theft discovered by
British inspectors included customers tunneling out to roadside
mains cables and splicing into the supply, a garage taking its night
time power supply from the nearest lamp post and domestic
customers drilling holes into meter boxes and attempting to stop the
counter wheels from turning. Another method of Power theft is by
keeping a strong magnet in front of the disc in the energy meter
and thus arresting the rotation of the disc, connecting the load
directly to the power line bypassing the energy meter. But, it can be
avoided easily by providing a non magnetic enclosure.
MODERN DETECTING TOOLS:
There are many modern tools that assist in power theft
identification. Some of them are:-
Tamper proof seals and labels. Meter leaders. Tamper resistant
screws / locks. Check meter and remote meter readers. Tamper
alarms and sensors. This paper undertakes the Check meter and
remote meter readers for power theft identification. In our case, the
GSM BASED POWER THEFT SUBSTATION
5
consumption recurred by the check meter is compared with the
revenue meters consumption. If there is a difference, then it
indicates either there is a theft or revenue meter malfunction. The
check meter can also be used to monitor the energy used on the
secondary of a distribution transformer serving several customers
and compared to the sum of all the meter usage. Besides spotting
out the line where power theft is suspected to occur, it also detects
the amount of energy stolen. Compact size, lightweight for quick
and high accuracy make the system more effective.
1.2. REQUIREMENTS AND SPECIFICATIONS:
The functional units of our project are
1. 89s52 Microcontroller
2. MAX-232
3. 555
4. DB9 connector
5. IR Sensor
6. Photo Diode
89s52 Microcontroller:
The device also has four 8-bit I/O ports, three 16-bit
timer/event counters, a multi-source, a four-priority-level, nested
interrupt structure, an enhanced UART on-chip oscillator and timing
circuits. The added features of 89c51 make it a powerful
microcontroller for applications that require pulse width modulation,
high-speed I/O and up/down counting capabilities such as motor
control.
GSM BASED POWER THEFT SUBSTATION
6
MAX-232:
The MAX232 is a dual driver/receiver that includes a capacitive
voltage generator to supply 232 voltage levels from a single 5-V
supply. Each receiver converts 232 inputs to 5-V TTL/CMOS levels.
These receivers have a typical threshold of 1.3 V and a typical
hysteresis of 0.5 V, and can accept ±30-V inputs. Each driver
converts TTL/CMOS input levels into 232 levels.
555:
The LM555 is a highly stable device for generating accurate
time delays or oscillation. Additional terminals are provided for
triggering or resetting if desired. In the time delay mode of
operation, the time is precisely controlled by one external resistor
and capacitor. For astable operation as an oscillator, the free
running frequency and duty cycle are accurately controlled with two
external resistors and one capacitor. The circuit may be triggered
and reset on falling waveforms, and the output circuit can source or
sink up to 200mA or drive TTL circuits.
IR Sensor:
The MAX232 is a dual driver/receiver that includes a capacitive
voltage generator to supply EIA-232 voltage levels from a single 5-V
supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS
levels. These receivers have a typical threshold of 1.3 V and a
typical hysteresis of 0.5 V, and can accept ±30-V inputs. Each
driver converts TTL/CMOS input levels into EIA-232 levels.
Photo Diode:
A photodiode consists of an active p-n junction which is
operated in reverse bias. When light falls on the junction, reverse
current flows which is proportional to the illuminance. The linear
response to light makes it an element in useful photo detectors for
receiving end by the intermediate frequency transformer.
DESIGN LAYOUT:
Sensor
Circuit
89s52
microcontroller
GSM
modem
GSM BASED POWER THEFT SUBSTATION
8
1.4. COMPONENTS USED:
Semiconductors:
IC1 - 89s52 Microcontroller IC2 - MAX-232
IC3 - 555
Resistors:
R1 - 8.2-kilo-ohm
R2, R3 - 1-kilo-ohm
R4, R5 - 100-ohm R6-R9 - 10K-Preset
Capacitors:
C1 - 10µF Electrolytic
C2-C5 - 1µF Electrolytic
C6, C7 - 33PF Ceramic Disk
Miscellaneous:
XTAL - 11.0592MHz
Modem - GSM-300MHz
D1, D2 - IR Diode D3, D4 - Photo Diode
Connector - DB9
Battery - 5V
GSM BASED POWER THEFT SUBSTATION
9
1.5. Circuit Diagram:
GSM BASED POWER THEFT SUBSTATION
10
CHAPTER - 2
CHAPTER 2
GSM BASED POWER THEFT SUBSTATION
11
INTRODUCTION TO MICROCONTROLLER’S
2.1 Definition:
Microprocessors and microcontrollers stems from the same
basic idea, microprocessor is a general purpose digital computer
central processing unit popularly known as memory usually
ROM,RAM, “computer on chip ’’ .To make a complete microcomputer
, one must add memory, usually ROM, RAM Memory decoders, an
isolator and a number of I/O devices, such as parallel and serial
data ports. The design of microcontroller added all these features
along with ALU, PC, SP and registers.
2.2 History:
The past three decades have seen the introduction that has radically
changed the way in which we analyze and control the world around us.
Born of parallel developments in computer on chip first becomes a
commercial reality in 1971 with the introduction of the 4-bit 4004 by a
small, unknown company by the name of Intel corporation other, well
GSM BASED POWER THEFT SUBSTATION
12
established, semiconductor firms soon followed Intel’s pioneering
technology so that by the late 1970’s we could choose from half-a-
dozen or micro processor types. A bi-product of microprocessor development was the microcontroller.
The same fabrication techniques and programming concepts that make
possible general-purpose microprocessor also yield the microcontroller.
The criteria in choosing micro controller are as follows: • Meeting the computing needs of the task at hand efficiently
and cost effectively. • Availability of software development tools such as
compilers, assemblers and debuggers. • With availability and reliable sources of the microcontroller. • The number of I/O pins and the timer on the chip.
Speed and packaging
Power consumption
• The amount of RAM and ROM on chip. • The number of I/O pins and the timer on the chip. • It is easy to upgrade to higher performance or lower power
consumption versions.
• Cost per unit. Microprocessor and microcontroller systems form the same basic idea,
microprocessor is a general-purpose digital computer central
processing unit (CPU) popularly known as “computer pm chip”. To
make a complete microcomputer, one must add memory usually ROM,
RAM, Memory decoders as isolator and number of I/O devices such as
parallel and serial data ports. The design of microcontroller added all
these features along with ALU, PC, SP and registers.
The primary use of microprocessor is to read data, perform extensive
GSM BASED POWER THEFT SUBSTATION
13
calculations on that data and store those calculations on a mass
storage device or display the results for human use. Like the
microprocessor, a microcontroller is general purpose device, but one
that is meant to read data, perform limited calculations on that data
and control its environment based on those calculations the primary
use of microcontroller is to control the operation of a machine using a
fixed program that is stored in ROM and that does not change over the
life time of the system.
2.3 Use of a Micro Controller:
The time use of microprocessor is to read data, perform extensive
calculations on that data and store those calculations on that data and
store those calculations on a mass storage device or display the results
for human use. Like the microprocessor, a microcontroller is a general
purpose device, but one that is meant to read data, performs limited
calculations on that data and control its environment based on those
calculations. The prime use of micro controller is to control the
operation of a machine using a fixed program that is stored in ROM
and that does not change over the lifetime of the system.
2.4 Comparing With Microprocessor:
The contrast between a microcontroller and a microprocessor is that
most processors have many operational codes for moving data from
external memory to C.P.U; Microcontrollers may have one or two.
Processor may have one or two types of bit handling instructions,
micro controllers will have many. The microprocessor is concerned with
rapid movement of code and data from external address to the chip
whereas the microcontroller is concerned with the rapid movements of
bits within the chip. The microcontroller can function as a computer of
GSM BASED POWER THEFT SUBSTATION
14
no external digital parts and the microprocessor must have many
additional parts to be operational.
2.5 Memory Unit:
Memory is part of the microcontroller whose function is to store data.
The easiest way to explain it is to describe it as one big closet with lots
of drawers. If we suppose that we marked the drawers in such a way
that they cannot be confused, any of their contents will then be easily
accessible. It is enough to know the designation of the drawer and so
its contents will be known to us for sure.
Figure2.2: Simplified model of a memory unit
Memory components are exactly like that. For a certain input we get
the contents of a certain addressed memory location and that's all.
Two new concepts are brought to us: addressing and memory location.
Memory consists of all memory locations, and addressing is nothing
but selecting one of them. This means that we need to select the
desired memory location on one hand, and on the other hand we need
to wait for the contents of that location. Besides reading from a
memory location, memory must also provide for writing onto it. This is
GSM BASED POWER THEFT SUBSTATION
15
done by supplying an additional line called control line. We will
designate this line as R/W (read/write). Control line is used in the
following way: if r/w=1, reading is done, and if opposite is true then
writing is done on the memory location.
Memory is the first element, and we need a few operation of our
microcontroller. The amount of memory contained within a
microcontroller varies between different microcontrollers. Some may
not even have any integrated memory (e.g. Hitachi 6503, now
discontinued). However, most modern microcontrollers will have
integrated memory. The memory will be divided up into ROM and RAM,
with typically more ROM than RAM.
Typically, the amount of ROM type memory will vary between around
512 bytes and 4096 bytes, although some 16 bit microcontrollers such
as the Hitachi H8/3048 can have as much as 128 Kbytes of ROM type
memory.
ROM type memory, as has already been mentioned, is used to store
the program code. ROM memory can be ROM (as in One Time
Programmable memory), EPROM, or EEPROM.
The amount of RAM memory is usually somewhat smaller, typically
ranging between 25 bytes to 4 Kbytes.
RAM is used for data storage and stack management tasks. It is also
used for register stacks (as in the microchip PIC range of
microcontrollers).
2.6 Central processing Unit:
GSM BASED POWER THEFT SUBSTATION
16
Let add 3 more memory locations to a specific block that will have a
built in capability to multiply, divide, subtract, and move its contents
from one memory location onto another. The part we just added in is
called "central processing unit" (CPU). Its memory locations are called
registers.
Figure2.3: Simplified central processing unit with three registers
Registers are therefore memory locations whose role is to help with
performing various mathematical operations or any other operations
with data wherever data can be found. Look at the current situation.
We have two independent entities (memory and CPU) which are
interconnected, and thus any exchange of data is hindered, as well
as its functionality. If, for example, we wish to add the contents of
two memory locations and return the result again back to memory,
we would need a connection between memory and CPU. Simply
stated, we must have some "way" through data goes from one block
to another.
2.7 EEPROM:
EEPROM means Electrical Erasable Programmable Read Only Memory
and also referred to as E²PROM chip or i2c.
As the name suggest, an EEPROM can be both erased and
GSM BASED POWER THEFT SUBSTATION
17
programmed with electrical pulses from a programmer kit, burner or
the equipment itself. Since it can be both electrically written into and
electrically erased, the EEPROM IC can be quickly programmed and
erased in circuit for reprogramming without taking them out from the
main board.
EEPROM IC is also called a non-volatile memory because when the
power is switched off, the stored data (information) in the EEPROM IC
will not be erased or corrupt and the data is still intact. New EEPROM
IC have no data (blank) inside and normally have to program it first
with a programmer tools before it can be use on electron IC circuit.
Figure3.1: Showing EEPROM of Atmel If you just installed a new or blank EEPROM IC into a main board, even
though with the same part number, I can say that the equipment will
surely not going to work because the CPU or microprocessor do not
know how to function. Information or data stored in this type of
memory can be retained for many years even without a continuous dc
power supply to the IC.
Application/ Operation of EEPROM: EEPROM’s mainly store user programmable information such as: - • VCR programming information or data • CD programming information or data
GSM BASED POWER THEFT SUBSTATION
18
• Digital satellite receiver control data or information • User information on various consumer products such as in
T.V.
The EEPROM IC in Computer Monitor performs two tasks: -
• When a monitor is turn on it will copies all the data or information
from the EEPROM to the microprocessor or CPU. For instance, the
EEPROM will let the CPU know the frequencies at which the monitor is
going to run.
• The EEPROM IC is used to store the current settings of the
Monitor. The current settings of the monitor will not be erased even
when the monitor is switched off. Anytime when a change is made in
the monitor settings, the CPU updates the setting in the EEPROM
(store data in EEPROM). When the monitor is switch on again, the
stored settings in EEPROM IC are used to set up the monitor for
operation.
Assuming the data file in MONITOR or TV’s EEPROM are
corrupted damaged and failure detected, what would be the display symptoms
like?
• There would be no high voltage (no display) because the CPU
don’t activate the 12 volt line supply to the horizontal and vertical
oscillator IC. • The IC will not save (store) the current setting of the equipment • Some control functions like sound, brightness, horizontal size and
contrast control will not work. • The On Screen Display (OSD) would not work or the OSD will
have a corrupted or erratic display.
GSM BASED POWER THEFT SUBSTATION
19
CHAPTER - 3
CHAPTER – 3
GSM BASED POWER THEFT SUBSTATION
20
HARDWARE DISCRIPTION
3.1. 89S52:
Features • Compatible with MCS-51® Products • 8K Bytes of In-System Programmable
(ISP) Flash Memory – Endurance: 1000
Write/Erase Cycles • 4.0V to 5.5V Operating Range • Fully Static Operation: 0 Hz to 33 MHz • Three-level Program Memory Lock • 256 x 8-bit Internal RAM • 32 Programmable I/O Lines • Three 16-bit Timer/Counters • Eight Interrupt Sources • Full Duplex UART Serial Channel • Low-power Idle and Power-down Modes • Interrupt Recovery from Power-down Mode • Watchdog Timer • Dual Data Pointer • Power-off Flag Description:
The AT89S52 is a low-power, high-performance CMOS 8-bit
microcontroller with 8K bytes of in-system programmable Flash
memory. The device is manufactured using Atmel’s high-density
nonvolatile memory technology and is compatible with the indus-
try-standard 80C51 instruction set and pinout. The on-chip Flash
allows the program memory to be reprogrammed in-system or by a
conventional nonvolatile memory pro-grammer. By combining a
versatile 8-bit CPU with in-system programmable Flash on a
monolithic chip, the Atmel AT89S52 is a powerful microcontroller
which provides a highly-flexible and cost-effective solution to many
embedded control applications. The AT89S52 provides the following standard features: 8K bytes of
Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data
pointers, three 16-bit timer/counters, a six-vector two-level
interrupt architecture, a full duplex serial port, on-chip oscillator,
and clock circuitry. In addition, the AT89S52 is designed with static
logic for operation down to zero frequency and supports two
software selectable power saving modes. The Idle Mode stops the
CPU while allowing the RAM, timer/counters, serial port, and
GSM BASED POWER THEFT SUBSTATION
21
interrupt system to continue functioning. The Power-down mode
saves the RAM con-tents but freezes the oscillator, disabling all
other chip functions until the next interrupt or hardware reset.
3.2. GSM Module:
GSM has been the backbone of the phenomenal success in
mobile telecom over the last decade. Now, at the dawn of the era of
true broadband services, GSM continues to evolve to meet new
demands. GSM is an open, non-proprietary system that is
constantly evolving. One of its great strengths is the international
roaming capability. This gives consumers seamless and same
standardized same number contact ability in more than 212
countries. This has been a vital driver in growth, with around 300
million GSM subscribers currently in Europe and Asia. In the
Americas, today's 7 million subscribers are set to grow rapidly, with
market potential of 500 million in population, due to the introduction
of GSM 800, which allows operators using the 800 MHz band to
have access to GSM technology too. GSM satellite roaming has
extended service access to areas where terrestrial coverage is not
available.
GSM differs from first generation wireless systems in that it
uses digital technology and time division multiple access
transmission methods. Voice is digitally encoded via a unique
encoder, which emulates the characteristics of human speech. This
method of transmission permits a very efficient data
rate/information content ratio.
Cellular mobile communication is based on the concept of
frequency reuse. That is, the limited spectrum allocated to the
service is partitioned into, for example, N non-overlapping channel
sets, which are then assigned in a regular repeated pattern to a
hexagonal cell grid. The hexagon is just a convenient idealization
GSM BASED POWER THEFT SUBSTATION
22
that approximates the shape of a circle (the constant signal level
contour from an omni directional antenna placed at the center) but
forms a grid with no gaps or overlaps. The choice of N is dependent
on many tradeoffs involving the local propagation environment,
traffic distribution, and costs. The propagation environment
determines the interference received from neighboring co-channel
cells, which in turn governs the reuse distance, that is, the distance
allowed between co-channel cells (cells using the same set of
frequency channels).
The cell size determination is usually based on the local traffic
distribution and demand. The more the concentration of traffic
demand in the area, the smaller the cell has to be sized in order to
avail the frequency set to a smaller number of roaming subscribers
and thus limit the call blocking probability within the cell. On the
other hand, the smaller the cell is sized, the more equipment will be
needed in the system as each cell requires the necessary
transceiver and switching equipment, known as the base station
subsystem (BSS), through which the mobile users access the
network over radio links. The degree to which the allocated
frequency spectrum is reused over the cellular service area,
however, determines the spectrum efficiency in cellular systems.
That means the smaller the cell size, and the smaller the number of
cells in the reuse geometry, the higher will be the spectrum usage
efficiency. Since digital modulation systems can operate with a
smaller signal to noise (i.e., signal to interference) ratio for the
same service quality, they, in one respect, would allow smaller
reuse distance and thus provide higher spectrum efficiency. This is
one advantage the digital cellular provides over the older analogue
cellular radio communication systems. It is worth mentioning that
the digital systems have commonly used sectored cells with 120-
GSM BASED POWER THEFT SUBSTATION
23
degree or smaller directional antennas to further lower the effective
reuse distance. This allows a smaller number of cells in the reuse
pattern and makes a larger fraction of the total frequency spectrum
available within each cell. Currently, research is being done on
implementing other enhancements such as the use of dynamic
channel assignment strategies for raising the spectrum efficiency in
certain cases, such as high uneven traffic distribution over cells.
3.2.1. GSM SPECIFICATION
Device Name : Vegarobo
ROM (Flash) : 16Mb
RAM : 2Mb
Operating Voltage : 3.1 – 4.5 V
Receiving Frequency : 925 – 960 MHz
Transmitting Frequency : 880 – 915 MHz
3.2.2. GSM BLOCK DIAGRAM
GSM BASED POWER THEFT SUBSTATION
24
3.2.3. GSM NETWORK:
A GSM network is composed of several functional entities,
whose functions and interfaces are specified. The GSM network can
be divided into three broad parts. The Mobile Station is carried by
the subscriber. The Base Station Subsystem controls the radio link
with the Mobile Station. The Network Subsystem, the main part of
which is the Mobile services Switching Center (MSC), performs the
switching of calls between the mobile users, and between mobile
and fixed network users.
The MSC also handles the mobility management operations. Not
shown is the Operations and Maintenance Center, which oversees
the proper operation and setup of the network. The Mobile Station
and the Base Station Subsystem communicate across the Um
interface, also known as the air interface or radio link. The Base
GSM BASED POWER THEFT SUBSTATION
25
Station Subsystem communicates with the Mobile services Switching
Center across the A interface.
3.2.3.1. Mobile Station:
Mobile Equipment (ME) such as hand portable and vehicle
mounted unit. Subscriber Identity Module (SIM), which contains the
entire customer related information (identification, secret key for
authentication, etc.). The SIM is a small smart card, which contains
both programming and information. The A3 and A8 algorithms are
implemented in the Subscriber Identity Module (SIM). Subscriber
information, such as the IMSI (International Mobile Subscriber
Identity), is stored in the Subscriber Identity Module (SIM). The
Subscriber Identity Module (SIM) can be used to store user-defined
information such as phonebook entries. One of the advantages of
the GSM architecture is that the SIM may be moved from one
Mobile Station to another. This makes upgrades very simple for the
GSM telephone user. The use of SIM card is mandatory in the GSM
world, whereas the SIM (RUIM) is not very popular in the CDMA
world.
3.2.3.2. Base Station Subsystem (BSS):
GSM BASED POWER THEFT SUBSTATION
26
All radio-related functions are performed in the BSS, which
consists of base Station controllers (BSCs) and the base transceiver
stations (BTSs).
3.2.3.3. Base Transceiver Station (BTS):
The Base Transceiver Station (BTS) contains the equipment for
transmitting and receiving of radio signals (transceivers), antennas,
and equipment for encrypting and decrypting communications with
the Base Station Controller (BSC). A group of BTSs are controlled by
a BSC. Typically a BTS for anything other than a picocell will have
several transceivers (TRXs), which allow it to serve several different
frequencies and different sectors of the cell (in the case of
sectorised base stations). A BTS is controlled by a parent BSC via
the Base Station Control Function (BCF). The BCF is implemented as
a discrete unit or even incorporated in a TRX in compact base
stations. The BCF provides an Operations and Maintenance (O&M)
connection to the Network Management System (NMS), and
manages operational states of each TRX, as well as software
handling and alarm collection.
3.2.3.4. Base Station Controller (BSC):
The BSC controls multiple BTSs and manages radio channel
setup, and handovers. The BSC is the connection between the
Mobile Station and Mobile Switching Center. The Base Station
Controller (BSC) provides, classically, the intelligence behind the
BTSs. Typically a BSC has 10s or even 100s of BTSs under its
control. The BSC handles allocation of radio channels, receives
measurements from the mobile phones, controls handovers from
BTS to BTS. A key function of the BSC is to act as a concentrator
where many different low capacity connections to BTSs become
GSM BASED POWER THEFT SUBSTATION
27
reduced to a smaller number of connections towards the Mobile
Switching Center (MSC) (with a high level of utilization). Overall,
this means that networks are often structured to have many BSCs
distributed into regions near their BTSs which are then connected to
large centralized MSC sites.
The BSC is undoubtedly the most robust element in the BSS as
it is not only a BTS controller but, for some vendors, a full switching
center, as well as an SS7 node with connections to the MSC and
SGSN. It also provides all the required data to the Operation
Support Subsystem (OSS) as well as to the performance measuring
centers. A BSC is often based on a distributed computing
architecture, with redundancy applied to critical functional units to
ensure availability in the event of fault conditions. Redundancy often
extends beyond the BSC equipment itself and is commonly used in
the power supplies and in the transmission equipment providing the
A-ter interface to PCU.
The databases for all the sites, including information such as carrier
frequencies, frequency hopping lists, power reduction levels,
receiving levels for cell border calculation, are stored in the BSC.
3.2.3.5. Network Switching Subsystem (NSS):
Network Switching Subsystem is the component of a GSM
system that carries out switching functions and manages the
communications between mobile phones and the Public Switched
Telephone Network. It is owned and deployed by mobile phone
operators and allows mobile phones to communicate with each
other and telephones in the wider telecommunications network. The
architecture closely resembles a telephone exchange, but there are
additional functions which are needed because the phones are not
fixed in one location. There is also an overlay architecture on the
GSM BASED POWER THEFT SUBSTATION
28
GSM core network to provide packet-switched data services and is
known as the GPRS core network. This allows mobile phones to
have access to services such as WAP, MMS, and Internet access. All
mobile phones manufactured today have both circuit and packet
based services, so most operators have a GPRS network in addition
to the standard GSM core network.
3.2.3.6. Mobile Switching Centre (MSC):
The Mobile Switching Centre or MSC is a sophisticated
telephone exchange, which provides circuit-switched calling,
mobility management, and GSM services to the mobile phones
roaming within the area that it serves. This means voice, data and
fax services, as well as SMS and call divert. In the GSM mobile
phone system, in contrast with earlier analogue services, fax and
data information is sent directly digitally encoded to the MSC. Only
at the MSC is this re-coded into an "analogue" signal. There are
various different names for MSCs in different context, which reflects
their complex role in the network, all of these terms though could
refer to the same MSC, but doing different things at different times.
A Gateway MSC is the MSC that determines which visited MSC
the subscriber who is being called is currently located. It also
interfaces with the Public Switched Telephone Network. All mobile to
mobile calls and PSTN to mobile calls are routed through a GMSC.
The term is only valid in the context of one call since any MSC may
provide both the gateway function and the Visited MSC function,
however, some manufacturers design dedicated high capacity MSCs
which do not have any BSCs connected to them. These MSCs will
then be the Gateway MSC for many of the calls they handle.
GSM BASED POWER THEFT SUBSTATION
29
The Visited MSC is the MSC where a customer is currently
located. The VLR associated with this MSC will have the subscriber's
data in it. The Anchor MSC is the MSC from which a handover has
been initiated. The Target MSC is the MSC toward which a Handover
should take place. An MSC Server is a part of the redesigned MSC
concept starting from 3GPP Release 5.
3.2.4. FREQUENCY BAND USAGE:
Since radio spectrum is a limited resource shared by all users,
a method must be devised to divide up the bandwidth among as
many users as possible. The method chosen by GSM is a
combination of Time- and Frequency-Division Multiple Access
(TDMA/FDMA). The FDMA part involves the division by frequency of
the (maximum) 25 MHz bandwidth into 124 carrier frequencies
spaced 200 kHz apart. One or more carrier frequencies are assigned
to each base station. Each of these carrier frequencies is then
divided in time, using a TDMA scheme. The fundamental unit of time
in this TDMA scheme is called a burst period and it lasts 15/26 ms
(or approx. 0.577 ms). Eight burst periods are grouped into a TDMA
frame (120/26 ms, or approx. 4.615 ms), which forms the basic unit
for the definition of logical channels. One physical channel is one
burst period per TDMA frame.
Channels are defined by the number and position of their
corresponding burst periods. All these definitions are cyclic, and the
entire pattern repeats approximately every 3 hours. Channels can
be divided into dedicated channels, which are allocated to a mobile
station, and common channels, which are used by mobile stations in
idle mode. A traffic channel (TCH) is used to carry speech and
data traffic. Traffic channels are defined using a 26-frame
multiframe, or group of 26 TDMA frames. The length of a 26-frame
GSM BASED POWER THEFT SUBSTATION
30
multiframe is 120 ms, which is how the length of a burst period is
defined (120 ms divided by 26 frames divided by 8 burst periods per
frame). Out of the 26 frames, 24 are used for traffic, 1 is used for
the Slow Associated Control Channel (SACCH) and 1 is currently
unused. TCHs for the uplink and downlink are separated in time by
3 burst periods, so that the mobile station does not have to transmit
and receive simultaneously, thus simplifying the electronics. In
addition to these full-rate TCHs, there are also half-rate TCHs
defined, although they are not yet implemented. Half-rate TCHs will
effectively double the capacity of a system once half-rate speech
coders are specified (i.e., speech coding at around 7 kbps, instead
of 13 kbps). Eighth-rate TCHs are also specified, and are used for
signaling. In the recommendations, they are called Stand-alone
Dedicated Control Channels (SDCCH).
Organization of bursts, TDMA frames, and multiframes for speech
and data GSM is a digital system, so speech which is inherently
analog, has to be digitized. The method employed by ISDN, and by
current telephone systems for multiplexing voice lines over high
speed trunks and optical fiber lines, is Pulse Coded Modulation
(PCM). The output stream from PCM is 64 kbps, too high a rate to
GSM BASED POWER THEFT SUBSTATION
31
be feasible over a radio link. The 64 kbps signal, although simple to
implement, contains much redundancy. The GSM group studied
several speech coding algorithms on the basis of subjective speech
quality and complexity (which is related to cost, processing delay,
and power consumption once implemented) before arriving at the
choice of a Regular Pulse Excited -- Linear Predictive Coder (RPE--
LPC) with a Long Term Predictor loop. Basically, information from
previous samples, which does not change very quickly, is used to
predict the current sample. The coefficients of the linear
combination of the previous samples, plus an encoded form of the
residual, the difference between the predicted and actual sample,
represent the signal. Speech is divided into 20 millisecond samples,
each of which is encoded as 260 bits, giving a total bit rate of 13
kbps. This is the so-called Full-Rate speech coding. Recently, an
Enhanced Full-Rate (EFR) speech-coding algorithm has been
implemented by some North American GSM1900 operators. This is
said to provide improved speech quality using the existing 13 kbps
bit rate.
3.2.5. WORKING:
The GSM module is connected with the controller. As the
controller is keeping on monitoring the door when the door gets
opened, the microcontroller sends the command “AT” to initiate the
module. Now the module sends a sms as “Theft Occurred” to the
already fed mobile number. Thus the information is passed from the
module to the Authorized person.
3.2.6. FEATURES:
Performance - Fast with high real throughput
Integrity - Secure controlled data transfer
GSM BASED POWER THEFT SUBSTATION
32
Network Access - Quick and consistent
Contention Control - Avoid conflicts and collisions
Installation - Simple quick installation
Frequency Choice - Choice of RF bands to suit different terrains
Network Diagnostics - For ease of maintenance and cost saving
3.3. MAX-232:
3.3.1. Logic Signal Voltage:
Serial RS-232 (V.24) communication works with voltages (between
-15V ... -3V are used to transmit a binary '1' and +3V ... +15V to
transmit a binary '0') which are not compatible with today's
computer logic voltages. On the other hand, classic TTL computer
logic operates between 0V ... +5V (roughly 0V ... +0.8V referred to
as low for binary '0', +2V ... +5V for high binary '1' ). Modern low-
power logic operates in the range of 0V ... +3.3V or even lower.
So, the maximum RS-232 signal levels are far too high for today's
computer logic electronics, and the negative RS-232 voltage can't
be rocked at all by the computer logic. Therefore, to receive serial
data from an RS-232 interface the voltage has to be reduced, and
the 0 and 1 voltage levels inverted. In the other direction (sending
data from some logic over RS-232) the low logic voltage has to be
"bumped up", and a negative voltage has to be generated, too.
RS-232 TTL Logic
-----------------------------------------------
-15V ... -3V <-> +2V ... +5V <-> 1
+3V ... +15V <-> 0V ... +0.8V <-> 0
GSM BASED POWER THEFT SUBSTATION
33
All this can be done with conventional analog electronics, e.g. a
particular power supply and a couple of transistors or the once
popular 1488 (transmitter) and 1489 (receiver) ICs. However, since
more than a decade it has become standard in amateur electronics
to do the necessary signal level conversion with an integrated circuit
(IC) from the MAX232 family (typically a MAX232A or some clone).
In fact, it is hard to find some RS-232 circuitry in amateur
electronics without a MAX232A or some clone.
3.3.2. The MAX232 & MAX232A:
The MAX232 from Maxim was the first IC which in one package
contains the necessary drivers (two) and receivers (also two), to
adapt the RS-232 signal voltage levels to TTL logic. It became
popular, because it just needs one voltage (+5V) and generates the
necessary RS-232 voltage levels (approx. -10V and +10V)
internally. This greatly simplified the design of circuitry. Circuitry
designers no longer need to design and build a power supply with
three voltages (e.g. -12V, +5V, and +12V), but could just provide
one +5V power supply, e.g. with the help of a simple 78x05 voltage
converter. The MAX232 has a successor, the MAX232A. The ICs are
almost identical, however, the MAX232A is much more often used
(and easier to get) than the original MAX232, and the MAX232A
only needs external capacitors 1/10th the capacity of what the
original MAX232 needs.
It should be noted that the MAX232 (A) is just a driver/receiver. It
does not generate the necessary RS-232 sequence of marks and
spaces with the right timing, it does not decode the RS-232 signal,
and it does not provide a serial/parallel conversion. All it does is to
convert signal voltage levels. Generating serial data with the