anti rigging voting ieee
TRANSCRIPT
DEVELOPMENT OF ANTI-RIGGING VOTING SYSTEM USING SMART CARD TECHNOLOGY
A
Project Report
Submitted in the Partial Fulfillment of the
Requirements
for the Award of the Degree of
BACHELOR OF TECHNOLOGY
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
SUBMITTED
BY
NAME OF THE STUDENT(s)
ROLL NO(s)
(Font metrics:14pt Weight: Bold Type: Times New Roman)
Department of Electronics and Communication Engineering
QIS INSTITUTE OF TECHNOLOGY
( Affiliated to JNTU, Kakinada )
2011
QIS INSTITUTE OF TECHNOLOGY
(address of clg)
CERTIFICATE
This is to certify that the project work entitled “Title of the project” done by “Name
of the student” bearing Reg.No. _________________, student of Department of Electronics
and Communication Engineering , is a record of bonafide work carried out by him/her. This
project is done as a partial fulfillment of obtaining Bachelor of Technology Degree to be
awarded by Jawaharlal Nehru Technological University, Kakinada.
The matter embodied in this project report has not been submitted to any other university
for the award of any other degree.
<NAME >
<DESIGNATION > Head, Department of E.C.E
( INTERNAL GUIDE)
INDEX
CONTENTS:
1. Abbreviations
2. Introduction
3. Block Diagram
4. Block Diagram Description
5. Schematic
6. Schematic Description
7. Hardware Components
Microcontroller
SMART CARD
BUZZER
LCD
POWER SUPPLY
LINEAR KEYPAD
EEPROM
8. Circuit Description
9. software
10. Conclusion (or) Synopsis
11. Future Aspects
12. Bibliography
ABBREVIATIONS
SYMBOL NAME
ACC Accumulator
B B register
PSW Program status word
SP Stack pointer
DPTR Data pointer 2 bytes
DPL Low byte
DPH High byte
P0 Port0
P1 Port1
P2 Port2
P3 Port3
IP Interrupt priority control
IE Interrupt enable control
TMOD Timer/counter mode control
TCON Timer/counter control
T2CON Timer/counter 2 control
T2MOD Timer/counter mode2 control
TH0 Timer/counter 0high byte
TL0 Timer/counter 0 low byte
TH1 Timer/counter 1 high byte
TL1 Timer/counter 1 low byte
TH2 Timer/counter 2 high byte
TL2 Timer/counter 2 low byte
SCON Serial control
SBUF Serial data buffer
INTRODUCTION
EMBEDDED SYSTEM:
An embedded system is a
special-purpose system in which the
computer is completely encapsulated by
or dedicated to the device or system it
controls. Unlike a general-purpose
computer, such as a personal computer,
an embedded system performs one or a
few predefined tasks, usually with very
specific requirements. Since the system
is dedicated to specific tasks, design
engineers can optimize it, reducing the
size and cost of the product. Embedded
systems are often mass-produced,
benefiting from economies of scale.
Personal digital assistants
(PDAs) or handheld computers are
generally considered embedded devices
because of the nature of their hardware
design, even though they are more
expandable in software terms. This line
of definition continues to blur as devices
expand. With the introduction of the
OQO Model 2 with the Windows XP
operating system and ports such as a
USB port — both features usually
belong to "general purpose computers",
— the line of nomenclature blurs even
more.
Physically, embedded systems
ranges from portable devices such as
digital watches and MP3 players, to
large stationary installations like traffic
lights, factory controllers, or the systems
controlling nuclear power plants.
In terms of complexity embedded
systems can range from very simple with
a single microcontroller chip, to very
complex with multiple units, peripherals
and networks mounted inside a large
chassis or enclosure.
Examples of Embedded Systems:
Avionics, such as inertial
guidance systems, flight control
hardware/software and other
integrated systems in aircraft and
missiles
Cellular telephones and
telephone switches
Engine controllers and antilock
brake controllers for automobiles
Home automation products, such
as thermostats, air conditioners,
sprinklers, and security
monitoring systems
Handheld calculators
Handheld computers
Household appliances, including
microwave ovens, washing
machines, television sets, DVD
players and recorders
Medical equipment
Personal digital assistant
Videogame consoles
Computer peripherals such as
routers and printers.
Industrial controllers for remote
machine operation.
The Smart Card Reader is an
electronic device that reads smart cards.
Communication is done via protocols
and you can read and write to a fixed
address on the card.
The main objective of this
project is anti-rigging voting system
which is implemented using smart card
technology. A smart card is used as a
voter id card which provides
authentication and identification for a
person. In this project microcontroller is
used which forms the control unit. Every
citizen of India is given with a smart
card. Whenever user wants to vote he
needs to insert his smart card in smart
card reader while voting. Then the voter
is asked to vote for his favorite candidate
through keypad. So, user need to press
the key corresponding to his favorite
candidate. This system even allows the
election commission to see the no. of
votes given for each candidate and is
displayed in LCD which got interfaced
to microcontroller.
Block diagram:
Block diagram explanation:
The application of the project is to
access the different provided to vote
using the smart cards. Whenever we
insert the smartcard into card driver it
reads the data and send it to the
microcontroller. The microcontroller is
used to monitor all the control
operations. When the smart card is read
successfully the keys will be activated
and permission to vote will be given. So
rigging is eliminated using the
smartcards.
Micro controller
Power supply
smart card reader
Buzzer
Keypad
LCD
EEPROM
Schematic:
Schematic explanation:
Power Supply:
The main aim of this power
supply is to convert the 230V AC into
5V DC in order to give supply for the
TTL or CMOS devices. In this process
we are using a step down transformer, a
bridge rectifier, a smoothing circuit and
the RPS.
At the primary of the transformer
we are giving the 230V AC supply. The
secondary is connected to the opposite
terminals of the Bridge rectifier as the
input. From other set of opposite
terminals we are taking the output to the
rectifier.
The bridge rectifier converts the
AC coming from the secondary of the
transformer into pulsating DC. The
output of this rectifier is further given to
the smoother circuit which is capacitor
in our project. The smoothing circuit
eliminates the ripples from the pulsating
DC and gives the pure DC to the RPS to
get a constant output DC voltage. The
RPS regulates the voltage as per our
requirement.
Microcontroller:
Port 1 is used to interface the keypad as
shown in the diagram.p3.0 and p3.1 are
connected to the transmit and receive pin
are max 232(12.11)
MAX232:
This is used to convert the
voltage levels from TTL/CMOS to RS
level and vice versa. It consists of
TTL/CMOS input and output pins to
TTL devices and RS input and output
pins to connect smartcard .MAX232
TTL input pin (i.e. pin11) is connected
to pin11 namely TX of microcontroller
and RS output pin (i.e. pin12) is
connected to pin10 namely RX of
microcontroller.
And the supply connections are
given from the Power supply output
7805 to the VCC and VSS pins of the
MAX232.
EEPROM:
EEPROM will be connected to
the port P2.0,P2.1.
DB-9 connector:
It is a 9-pin connector consists of
transmit and receive pins along with
some hand-shaking lines.
LCD:
The data pins(pin no 7 to 14) are
connected to the port 0 through the pull
up resistances respectively as shown in
the figure.Now the command
pins(4,5,6)pin n1 and 3 of LCD are
connected to preset. are connected to the
port p2.5,p2.6,p2.7 respectively.
KEYS:
KEYS are connected to the port
P1.0 to P1.7 &P3.5 to P3.7.
BUZZER:
Buzzer is connected to the port P2.4.
HARDWARE COMPONENTS
MICROCONTROLLER
Features:
• Compatible with MCS-51® Products
• 4K Bytes of In-System Programmable
(ISP) Flash Memory
• 4.0V to 5.5V Operating Range
• 128 x 8-bit Internal RAM
• 32 Programmable I/O Lines
• Two 16-bit Timer/Counters
• Six Interrupt Sources
• Full Duplex UART Serial Channel
• Low-power Idle and Power-down
Modes
Description:
The AT89S51 is a low-power,
high-performance CMOS 8-bit
microcontroller with 4K bytes of in-
system programmable Flash memory.
The device is manufactured using
Atmel’s high-density nonvolatile
memory technology and is compatible
with the industry- standard 80C51
instruction set and pinout. The on-chip
Flash allows the program memory to be
reprogrammed in-system or by a
conventional nonvolatile memory
programmer. By combining a versatile
8-bit CPU with in-system programmable
Flash on a monolithic chip, the Atmel
AT89S51 is a powerful microcontroller
which provides a highly-flexible and
cost-effective solution to many
embedded control applications.
The AT89S51 provides the following
standard features:
4K bytes of Flash, 128 bytes of
RAM, 32 I/O lines, Watchdog timer, two
data pointers, two 16-bit timer/counters,
a five vector two-level interrupt
architecture, a full duplex serial port, on-
chip oscillator, and clock circuitry. In
addition, the AT89S51 is designed with
static logic for operation down to zero
frequency and supports two software
selectable power saving modes. The Idle
Mode stops the CPU while allowing the
RAM, timer/counters, serial port, and
interrupt system to continue functioning.
The Power-down mode saves the RAM
contents but freezes the oscillator,
disabling all other chip functions until
the next external interrupt or hardware
reset.
Pin Description:
VCC: Supply voltage.
GND: Ground.
Port 0: Port 0 is an 8-bit open drain
bidirectional I/O port. As an output port,
each pin can sink eight TTL inputs.
When 1s are written to port 0 pins, the
pins can be used as high-impedance
inputs. Port 0 can also be configured to
be the multiplexed low-order
address/data bus during accesses to
external program and data memory. In
this mode, P0 has internal pull-ups. Port
0 also receives the code bytes during
Flash programming and outputs the code
bytes during program verification.
External pull-ups are required during
program verification.
Port 1: Port 1 is an 8-bit bidirectional
I/O port with internal pull-ups. The Port
1 output buffers can sink/source four
TTL inputs. When 1s are written to Port
1 pins, they are pulled high by the
internal pull-ups and can be used as
inputs. As inputs, Port 1 pins that are
externally being pulled low will source
current (IIL) because of the internal pull-
ups. Port 1 also receives the low-order
address bytes during Flash programming
and verification.
Port 2: Port 2 is an 8-bit bidirectional
I/O port with internal pull-ups. The Port
2 output buffers cansink/source four
TTL inputs. When 1s are written to Port
2 pins, they are pulled high by the
internal pull-ups and can be used as
inputs. As inputs, Port 2 pins that are
externally being pulled low will source
current (IIL) because of the internal pull-
ups. Port 2 emits the high-order address
byte during fetches from external
program memory and during accesses to
external data memory that use 16-bit
addresses (MOVX @ DPTR). In this
application, Port 2 uses strong internal
pull-ups when emitting 1s. During
accesses to external data memory that
use 8-bit addresses (MOVX @ RI), Port
2 emits the contents of the P2 Special
Function Register. Port 2 also receives
the high-order address bits and some
control signals during Flash
programming and verification.
Port 3: Port 3 is an 8-bit bidirectional
I/O port with internal pull-ups. The Port
3 output buffers can sink/source four
TTL inputs. When 1s are written to Port
3 pins, they are pulled high by the
internal pull-ups and can be used as
inputs. As inputs, Port 3 pins that are
externally being pulled low will source
current (IIL) because of the pull-ups.
Port 3 receives some control signals for
Flash programming and verification.
Port 3 also serves the functions of
various special features of the AT89S51,
as shown in the following table.
RST: Reset input. A high on this pin for
two machine cycles while the oscillator
is running resets the device. This pin
drives High for 98 oscillator periods
after the Watchdog times out. The
DISRTO bit in SFR AUXR (address
8EH) can be used to disable this feature.
In the default state of bit DISRTO, the
RESET HIGH out feature is enabled.
ALE/PROG: Address Latch Enable
(ALE) is an output pulse for latching the
low byte of the address during accesses
to external memory. This pin is also the
program pulse input (PROG) during
Flash programming. In normal
operation, ALE is emitted at a constant
rate of 1/6 the oscillator frequency and
may be used for external timing or
clocking purposes. Note, however, that
one ALE pulse is skipped during each
access to external data memory. If
desired, ALE operation can be disabled
by setting bit 0 of SFR location 8EH.
With the bit set, ALE is active only
during a MOVX or MOVC instruction.
Otherwise, the pin is weakly pulled high.
Setting the ALE-disable bit has no effect
if the microcontroller is in external
execution mode.
PSEN: Program Store Enable (PSEN) is
the read strobe to external program
memory. When the AT89S51 is
executing code from external program
memory, PSEN is activated twice each
machine cycle, except that two PSEN
activations are skipped during each
access to external data memory.
EA/VPP: External Access Enable. EA
must be strapped to GND in order to
enable the device to fetch code from
external program memory locations
starting at 0000H up to FFFFH. Note,
however, that if lock bit 1 is
programmed, EA will be internally
latched on reset. EA should be strapped
to VCC for internal program executions.
This pin also receives the 12-volt
programming enable voltage (VPP)
during Flash programming.
XTAL1: Input to the inverting oscillator
amplifier and input to the internal clock
operating circuit.
XTAL2: Output from the inverting
oscillator amplifier
Special Function Registers:
A map of the on-chip memory
area called the Special Function Register
(SFR) space is shown in Table 1.
Note that not all of the addresses are
occupied, and unoccupied addresses may
not be implemented on the chip. Read
accesses to these addresses will in
general return random data, and write
accesses will have an indeterminate
effect.
User software should not write 1s to
these unlisted locations, since they may
be used in future products to invoke new
features. In that case, the reset or
inactive values of the new bits will
always be 0.
Interrupt Registers:
The individual interrupt enable
bits are in the IE register. Two priorities
can be set for each of the five interrupt
sources in the IP register.
Dual Data Pointer Registers:
To facilitate accessing both
internal and external data memory, two
banks of 16-bit Data Pointer Registers
are provided: DP0 at SFR address
locations 82H- 83H and DP1 at 84H-
85H. Bit DPS = 0 in SFR AUXR1
selects DP0 and DPS = 1 selects DP1.
The user should always initialize the
DPS bit to the appropriate value before
accessing the respective Data Pointer
Register.
Power off Flag:
The Power Off Flag (POF) is
located at bit 4 (PCON.4) in the PCON
SFR. POF is set to “1” during power up.
It can be set and rest under software
control and is not affected by reset.
Memory Organization:
MCS-51 devices have a separate
address space for Program and Data
Memory. Up to 64K bytes each of
external Program and Data Memory can
be addressed.
Program Memory:
If the EA pin is connected to
GND, all program fetches are directed to
external memory. On the AT89S51, if
EA is connected to VCC, program
fetches to addresses 0000H through
FFFH are directed to internal memory
and fetches to addresses 1000H through
FFFFH are directed to external memory.
Data Memory:
The AT89S51 implements 128
bytes of on-chip RAM. The 128 bytes
are accessible via direct and indirect
addressing modes. Stack operations are
examples of indirect addressing, so the
128 bytes of data RAM are available as
stack space.
Watchdog Timer (One-time Enabled
with Reset-out):
The WDT is intended as a
recovery method in situations where the
CPU may be subjected to software
upsets. The WDT consists of a 14-bit
counter and the Watchdog Timer Reset
(WDTRST) SFR. The WDT is defaulted
to disable from exiting reset. To enable
the WDT, a user must write 01EH and
0E1H in sequence to the WDTRST
register (SFR location 0A6H). When the
WDT is enabled, it will increment every
machine cycle while the oscillator is
running. The WDT timeout period is
dependent on the external clock
frequency. There is no way to disable the
WDT except through reset (either
hardware reset or WDT overflow reset).
When WDT overflows, it will drive an
output RESET HIGH pulse at the RST
pin.
Using the WDT:
To enable the WDT, a user must
write 01EH and 0E1H in sequence to the
DTRST register (SFR location 0A6H).
When the WDT is enabled, the user
needs to service it by writing 01EH
and 0E1H to WDTRST to avoid a WDT
overflow. The 14-bit counter overflows
when it reaches 16383 (3FFFH), and this
will reset the device. When the WDT is
enabled, it will increment every machine
cycle while the oscillator is running.
This means the user must reset the WDT
at least every 16383 machine cycles. To
reset the WDT the user must write 01EH
and 0E1H to WDTRST. WDTRST is a
write-only register. The WDT counter
cannot be read or written. When WDT
overflows, it will generate an output
RESET pulse at the RST pin. The
RESET pulse duration is 98xTOSC,
where TOSC=1/FOSC. To make the best
use of the WDT, it should be serviced in
those sections of code that will
periodically be executed within the time
required to prevent a WDT reset.
WDT During Power-down and Idle:
In Power-down mode the
oscillator stops, which means the WDT
also stops. While in Power down mode,
the user does not need to service the
WDT. There are two methods of exiting
Power-down mode: by a hardware reset
or via a level-activated external
interrupt, which is enabled prior to
entering Power-down mode. When
Power-down is exited with hardware
reset, servicing the WDT should occur
as it normally does whenever the
AT89S51 is reset. Exiting Power-down
with an interrupt is significantly
different. The interrupt is held low long
enough for the oscillator to stabilize.
When the interrupt is brought high, the
interrupt is serviced. To prevent the
WDT from resetting the device while the
interrupt pin is held low, the WDT is not
started until the interrupt is pulled high.
It is suggested that the WDT be reset
during the interrupt service for the
interrupt used to exit Power-down mode.
To ensure that the WDT does not
overflow within a few states of exiting
Power-down, it is best to reset the WDT
just before entering Power-down mode.
Before going into the IDLE mode, the
WDIDLE bit in SFR AUXR is used to
determine whether the WDT continues
to count if enabled. The WDT keeps
counting during IDLE (WDIDLE bit =
0) as the default state. To prevent the
WDT from resetting the AT89S51 while
in IDLE mode, the user should always
set up a timer that will periodically exit
IDLE, service the WDT, and reenter
IDLE mode.
With WDIDLE bit enabled, the WDT
will stop to count in IDLE mode and
resumes the count upon exit from IDLE.
UART:
The UART in the AT89S51 operates the
same way as the UART in the AT89C51.
Timer 0 and 1:
Timer 0 and Timer 1 in the
AT89S51 operate the same way as
Timer 0 and Timer 1 in the AT89C51.
Interrupts:
The AT89S51 has a total of five
interrupt vectors: two external interrupts
(INT0 and INT1), two timer interrupts
(Timers 0 and 1), and the serial port
interrupt. These interrupts are all shown
in
Figure 1. Each of these interrupt sources
can be individually enabled or disabled
by setting or clearing a
bit in Special Function Register IE. IE
also contains a global disable bit, EA,
which disables all interrupts at once.
Note that Table 4 shows that bit position
IE.6 is unimplemented. In the AT89S51,
bit position IE.5 is also unimplemented.
User software should not write 1s to
these bit positions, since they may be
used in future AT89 products. The
Timer 0 and Timer 1 flags, TF0 and
TF1, are set at S5P2 of the cycle in
which the timers overflow. The values
are then polled by the circuitry in the
next cycle.
Oscillator Characteristics:
XTAL1 and XTAL2 are the input and
output, respectively, of an inverting
amplifier that can be configured for use
as an on-chip oscillator, as shown in
Figure 2. Either a quartz crystal or
ceramic resonator may be used. To drive
the device from an external clock source,
XTAL2 should be left unconnected
while XTAL1 is driven, as shown in
Figure 3. There are no requirements on
the duty cycle of the external clock
signal, since the input to the internal
clocking circuitry is through a divide-by-
two flip-flop, but minimum and
maximum voltage high and low time
specifications must be observed.
Idle Mode:
In idle mode, the CPU puts itself
to sleep while all the on-chip peripherals
remain active. The mode is invoked by
software. The content of the on-chip
RAM and all the special function
registers remain unchanged during this
mode. The idle mode can be terminated
by any enabled interrupt or by a
hardware reset. Note that when idle
mode is terminated by a hardware reset,
the device normally resumes program
execution from where it left off, up to
two machine cycles before the internal
reset algorithm takes control. On-chip
hardware inhibits access to internal
RAM in this event, but access to the port
pins is not inhibited. To eliminate the
possibility of an unexpected write to a
port pin when idle mode is terminated by
a reset, the instruction following the one
that invokes idle mode should not write
to a port pin or to external memory.
Power-down Mode:
In the Power-down mode, the
oscillator is stopped, and the instruction
that invokes Powerdown is the last
instruction executed. The on-chip RAM
and Special Function Registers retain
their values until the Power-down mode
is terminated. Exit from Power-down
mode can be initiated either by a
hardware reset or by activation of an
enabled external interrupt into INT0 or
INT1. Reset redefines the SFRs but does
not change the on-chip RAM. The reset
should not be activated before VCC is
restored to its normal operating level and
must be held active long enough to allow
the oscillator to restart and stabilize.
Program Memory Lock Bits:
The AT89S51 has three lock bits
that can be left unprogrammed (U) or
can be programmed (P) to obtain the
additional features listed in the following
table.
When lock bit 1 is programmed, the
logic level at the EA pin is sampled and
latched during reset. If the device is
powered up without a reset, the latch
initializes to a random value and holds
that value until reset is activated. The
latched value of EA must agree with the
current logic level at that pin in order for
the device to function properly.
Programming the Flash – Parallel
Mode:
The AT89S51 is shipped with the
on-chip Flash memory array ready to be
programmed. The programming
interface needs a high-voltage (12-volt)
program enable signal and is compatible
with conventional third-party Flash or
EPROM programmers. The AT89S51
code memory array is programmed byte-
by-byte.
Programming Algorithm:
Before programming the
AT89S51, the address, data, and control
signals should be set up according to the
Flash programming mode table and
Figures 13 and 14. To program the
AT89S51, take the following steps:
1. Input the desired memory location on
the address lines.
2. Input the appropriate data byte on the
data lines.
3. Activate the correct combination of
control signals.
4. Raise EA/VPP to 12V.
5. Pulse ALE/PROG once to program a
byte in the Flash array or the lock bits.
The bytewrite cycle is self-timed and
typically takes no more than 50 μs.
Repeat steps 1 through 5, changing the
address and data for the entire array or
until the end of the object file is reached.
Data Polling:
The AT89S51 features Data
Polling to indicate the end of a byte
write cycle. During a write cycle, an
attempted read of the last byte written
will result in the complement of the
written data on P0.7. Once the write
cycle has been completed, true data is
valid on all outputs, and the next cycle
may begin. Data Polling may begin any
time after a write cycle has been
initiated.
Ready/Busy:
The progress of byte
programming can also be monitored by
the RDY/BSY output signal. P3.0 is
pulled low after ALE goes high during
programming to indicate BUSY. P3.0 is
pulled high again when programming is
done to indicate READY.
Program Verify:
If lock bits LB1 and LB2 have
not been programmed, the programmed
code data can be read back via the
address and data lines for verification.
The status of the individual lock bits can
be verified directly by reading them
back.
Reading the Signature Bytes:
The signature bytes are read by
the same procedure as a normal
verification of locations 000H, 100H,
and 200H, except that P3.6 and P3.7
must be pulled to a logic low. The values
returned are as follows.
(000H) = 1EH indicates manufactured
by Atmel
(100H) = 51H indicates 89S51
(200H) = 06H
Chip Erase:
In the parallel programming
mode, a chip erase operation is initiated
by using the proper combination of
control signals and by pulsing
ALE/PROG low for a duration of 200 ns
- 500 ns. In the serial programming
mode, a chip erase operation is initiated
by issuing the Chip Erase instruction. In
this mode, chip erase is self-timed and
takes about 500 ms. During chip erase, a
serial read from any address location
will return 00H at the data output.
Programming the Flash – Serial
Mode:
The Code memory array can be
programmed using the serial ISP
interface while RST is pulled to VCC.
The serial interface consists of pins
SCK, MOSI (input) and MISO (output).
After RST is set high, the Programming
Enable instruction needs to be executed
first before other operations can be
executed. Before a reprogramming
sequence can occur, a Chip Erase
operation is required.
The Chip Erase operation turns the
content of every memory location in the
Code array into FFH. Either an external
system clock can be supplied at pin
XTAL1 or a crystal needs to be
connected across pins XTAL1 and
XTAL2. The maximum serial clock
(SCK) frequency should be less than
1/16 of the crystal frequency. With a 33
MHz oscillator clock, the maximum
SCK frequency is 2 MHz.
Serial Programming Algorithm:
To program and verify the
AT89S51 in the serial programming
mode, the following sequence is
recommended:
1. Power-up sequence:
Apply power between VCC and GND
pins.
Set RST pin to “H”.
If a crystal is not connected across pins
XTAL1 and XTAL2, apply a 3 MHz to
33 MHz clock to XTAL1 pin and wait
for at least 10 milliseconds.
2. Enable serial programming by sending
the Programming Enable serial
instruction to pin MOSI/P1.5. The
frequency of the shift clock supplied at
pin SCK/P1.7 needs to be less than the
CPU clock at XTAL1 Divided by 16.
3. The Code array is programmed one
byte at a time in either the Byte or Page
mode. The write cycle is self-timed and
typically takes less than 0.5 ms at 5V.
4. Any memory location can be verified
by using the Read instruction that returns
the content at the selected address at
serial output MISO/P1.6.
5. At the end of a programming session,
RST can be set low to commence normal
device operation.
Power-off sequence (if needed):
Set XTAL1 to “L” (if a crystal is not
used).
Set RST to “L”.
Turn VCC power off.
Data Polling:
The Data Polling feature is also
available in the serial mode. In this
mode, during a write cycle an attempted
read of the last byte written will result in
the complement of the MSB of the serial
output byte on MISO.
Serial Programming Instruction Set:
The Instruction Set for Serial
Programming follows a 4-byte protocol
and is shown in Table 8 on page 18.
Programming Interface – Parallel
Mode:
Every code byte in the Flash array can
be programmed by using the appropriate
combination of control signals. The
write operation cycle is self-timed and
once initiated, will automatically time
itself to Completion.
All major programming vendors offer
worldwide support for the Atmel
microcontroller series.
Please contact your local programming
vendor for the appropriate software
revision.
After Reset signal is high, SCK should
be low for at least 64 system clocks
before it goes high to clock in the enable
data bytes. No pulsing of Reset signal is
necessary. SCK should be no faster than
1/16 of the system clock at XTAL1.
For Page Read/Write, the data always
starts from byte 0 to 255. After the
command byte and upper address byte
are
latched, each byte thereafter is treated as
data until all 256 bytes are shifted in/out.
Then the next instruction will be ready
to be decoded.
*NOTICE: Stresses beyond those listed
under “Absolute Maximum Ratings”
may cause permanent damage to the
device. This is a stress rating only and
functional operation of the device at
these or any other conditions beyond
those indicated in the operational
sections of this specification is not
implied. Exposure to absolute maximum
rating
conditions for extended periods may
affect device reliability.
Liquid Crystal Display
Introduction to LCD:
In recent years the LCD is finding
widespread use replacing LED s (seven-
segment LED or other multi segment
LED s). This is due to the following
reasons:
1. The declining prices of LCD s.
2. The ability to display numbers,
characters and graphics. This is
in contract
to LED s, which are limited to
numbers and a few characters.
3. Incorporation of a refreshing
controller into the LCD, there by
relieving the CPU of the task of
refreshing the LCD. In the
contrast, the LED must be
refreshed by the CPU to keep
displaying the data.
4. Ease of programming for
characters and graphics.
5.
USES:
The LCD s used exclusively in
watches, calculators and measuring
instruments is the simple seven-segment
displays, having a limited amount of
numeric data. The recent advances in
technology have resulted in better
legibility, more information displaying
capability and a wider temperature
range. These have resulted in the LCD s
being extensively used in
telecommunications and entertainment
electronics. The LCD s has even started
replacing the cathode ray tubes (CRTs)
used for the display of text and graphics,
and also in small TV applications.
S p e c i f i c a t i o n s :
Number of Characters: 16
characters x 2 Lines
Character Table: English-
European (RS in Datasheet)
Module dimension: 80.0mm x
36.0mm x 13.2mm(MAX)
View area: 66.0 x 16.0 mm
Active area: 56.2 x 11.5 mm
Dot size: 0.56 x 0.66 mm
Dot pitch: 0.60 x 0.70 mm
Character size: 2.96 x 5.46 mm
Character pitch: 3.55 x 5.94
mm
LCD type: STN, Positive,
Transflective, Yellow/Green
Duty: 1/16
View direction: Wide viewing
angle
Backlight Type: yellow/green
LED
RoHS Compliant: lead free
Operating Temperature: -20°C
to + 70°C
LCD PIN DIAGRAM:
LCD pin description:
The LCD discussed in this section has
14 pins. The
function of each pin is given in table.
TABLE 1: Pin description for LCD:
Pin Symbol I/O Description
1 Vss -- Ground
2 Vcc -- +5V power supply
3 VEE -- Power supply to
control contrast
4 RS I RS=0 to select
command register
RS=1 to select
data register
5 R/W I R/W=0 for write
R/W=1 for read
6 E I/O Enable
7 DB0 I/O The 8-bit data bus
8 DB1 I/O The 8-bit data bus
9 DB2 I/O The 8-bit data bus
10 DB3 I/O The 8-bit data bus
11 DB4 I/O The 8-bit data bus
12 DB5 I/O The 8-bit data bus
13 DB6 I/O The 8-bit data bus
14 DB7 I/O The 8-bit data bus
TABLE 2: LCD Command Codes
Code
(hex)
Command to LCD Instruction
Register
1 Clear display screen
2 Return home
4 Decrement cursor
6 Increment cursor
5 Shift display right
7 Shift display left
8 Display off, cursor off
A Display off, cursor on
C Display on, cursor off
E Display on, cursor on
F Display on, cursor blinking
10 Shift cursor position to left
14 Shift cursor position to right
18 Shift the entire display to the left
1C Shift the entire display to the right
80 Force cursor to beginning of 1st line
C0 Force cursor to beginning of 2nd line
38 2 lines and 5x7 matrix
LCD INTERFACING:
Sending commands and data to LCDs with a time delay:
To send any command from table 2 to
the LCD, make pin RS=0. For data,
make RS=1.Then place a high to low
pulse on the E pin to enable the internal
latch of the LCD.
In this project we are using LCD to
display the number of votes gained by
the each party.
MAX-232:
Introduction:
Logic Signal Voltage
Serial RS-232 (V.24) communication
works with voltages (between -15V ... -
3V and used to transmit a binary '1' and
+3V ... +15V to transmit a binary '0')
which are not compatible with today's
computer logic voltages. On the other
hand, classic TTL computer logic
operates between 0V ... +5V (roughly
0V ... +0.8V referred to as low for binary
'0', +2V ... +5V for high binary '1' ).
Modern low-power logic operates in the
range of 0V ... +3.3V or even lower.
So, the maximum RS-232 signal levels
are far too high for today's computer
logic electronics, and the negative RS-
232 voltage can't be grokked at all by the
computer logic. Therefore, to receive
serial data from an RS-232 interface the
voltage has to be reduced, and the 0 and
1 voltage levels inverted. In the other
direction (sending data from some logic
over RS-232) the low logic voltage has
to be "bumped up", and a negative
voltage has to be generated, too.
RS-232 TTL Logic:
-------------------------------------------------
-15V...-3V <-> +2V ... +5V <-> 1
+3V...+15V <-> 0V ... +0.8V <-> 0
All this can be done with conventional
analog electronics, e.g. a particular
power supply and a couple of transistors
or the once popular 1488 (transmitter)
and 1489 (receiver) ICs. However, since
more than a decade it has become
standard in amateur electronics to do the
necessary signal level conversion with
an integrated circuit (IC) from the
MAX232 family (typically a MAX232A
or some clone). In fact, it is hard to find
some RS-232 circuitry in amateur
electronics without a MAX232A or
some clone.
The MAX232 & MAX232A:
A MAX232 integrated circuit
The MAX232 from Maxim was the first
IC which in one package contains the
necessary drivers (two) and receivers
(also two), to adapt the RS-232 signal
voltage levels to TTL logic. It became
popular, because it just needs one
voltage (+5V) and generates the
necessary RS-232 voltage levels
(approx. -10V and +10V) internally.
This greatly simplified the design of
circuitry. Circuitry designers no longer
need to design and build a power supply
with three voltages (e.g. -12V, +5V, and
+12V), but could just provide one +5V
power supply, e.g. with the help of a
simple 78x05 voltage converter.
The MAX232 has a successor, the
MAX232A. The ICs are almost
identical, however, the MAX232A is
much more often used than the original
MAX232, and the MAX232A only
needs external capacitors 1/10th the
capacity of what the original MAX232
needs.
It should be noted that the MAX232 (A)
is just a driver/receiver. It does not
generate the necessary RS-232 sequence
of marks and spaces with the right
timing, it does not decode the RS-232
signal, it does not provide a
serial/parallel conversion. All it does is
to convert signal voltage levels.
Generating serial data with the right
timing and decoding serial data has to be
done by additional circuitry, e.g. by a
16550 UART or one of these small
micro controllers (e.g. Atmel AVR,
Microchip PIC) getting more and more
popular.
The MAX232 and MAX232A were once
rather expensive ICs, but today they are
cheap. It has also helped that many
companies now produce clones (ie.
Sipex). These clones sometimes need
different external circuitry, e.g. the
capacities of the external capacitors
vary. It is recommended to check the
data sheet of the particular manufacturer
of an IC instead of relying on Maxim's
original data sheet.
The original manufacturer (and now
some clone manufacturers, too) offers a
large series of similar ICs, with different
numbers of receivers and drivers,
voltages, built-in or external capacitors,
etc. E.g. The MAX232 and MAX232A
need external capacitors for the internal
voltage pump, while the MAX233 has
these capacitors built-in. The MAX233
is also between three and ten times more
expensive in electronic shops than the
MAX232A because of its internal
capacitors. It is also more difficult to get
the MAX233 than the garden variety
MAX232A.
A similar IC, the MAX3232 is nowadays
available for low-power 3V logic.
MAX232(A) DIP Package:
MAX232(A) DIP Package Pin Layout:
Nbr Name Purpose Signal Voltage
Capacitor
Value
MAX232
Capacitor
Value
MAX232A
1 C1++ connector for
capacitor C1
capacitor should
stand at least 16V1µF 100nF
2 V+ output of voltage
pump
+10V, capacitor
should stand at
1µF to VCC 100nF to VCC
least 16V
3 C1-- connector for
capacitor C1
capacitor should
stand at least 16V1µF 100nF
4 C2++ connector for
capacitor C2
capacitor should
stand at least 16V1µF 100nF
5 C2-- connector for
capacitor C2
capacitor should
stand at least 16V1µF 100nF
6 V-output of voltage
pump / inverter
-10V, capacitor
should stand at
least 16V
1µF to GND 100nF to GND
7 T2out Driver 2 output RS-232
8 R2in Receiver 2 input RS-232
9 R2outReceiver 2
outputTTL
10 T2in Driver 2 input TTL
11 T1in Driver 1 input TTL
12 R1outReceiver 1
outputTTL
13 R1in Receiver 1 input RS-232
14 T1out Driver 1 output RS-232
15 GND Ground 0V 1µF to VCC 100nF to VCC
16 VCC Power supply +5V see above see above
V+(2) is also connected to VCC via a
capacitor (C3). V-(6) is connected to
GND via a capacitor (C4). And
GND(16) and VCC(15) are also
connected by a capacitor (C5), as close
as possible to the pins.
A Typical Application:
The MAX232 (A) has two receivers
(converts from RS-232 to TTL voltage
levels) and two drivers (converts from
TTL logic to RS-232 voltage levels).
This means only two of the RS-232
signals can be converted in each
direction. The old MC1488/1498 combo
provided four drivers and receivers.
Typically a pair of a driver/receiver of
the MAX232 is used for
TX and RX
and the second one for
CTS and RTS.
There are not enough drivers/receivers in
the MAX232 to also connect the DTR,
DSR, and DCD signals. Usually these
signals can be omitted when e.g.
communicating with a PC's serial
interface. If the DTE really requires
these signals either a second MAX232 is
needed, or some other IC from the
MAX232 family can be used (if it can be
found in consumer electronic shops at
all). An alternative for DTR/DSR is also
given below.
The circuitry is completed by connecting
five capacitors to the IC as it follows.
The MAX232 needs 1.0µF capacitors,
the MAX232A needs 0.1µF capacitors.
MAX232 clones show similar
differences. It is recommended to
consult the corresponding data sheet. At
least 16V capacitor types should be
used. If electrolytic or tantalic capacitors
are used, the polarity has to be observed.
The first pin as listed in the following
table is always where the plus pole of the
capacitor should be connected to.
Capacitor + Pin - Pin Remark
C1 1 3
C2 4 5
C3 2 16
C4 GND 6This looks non-intuitive, but because pin 6 is
on -10V, GND gets the + connector, and not the -
C5 16 GND
The 5V power supply is connected to +5V: Pin 16
GND: Pin 15
EEPROM:
EEPROM (also written
E2PROM and pronounced e-e-prom or
simply e-squared), which stands for
Electrically Erasable Programmable
Read-Only Memory, is a type of non-
volatile memory used in computers and
other electronic devices to store small
amounts of data that must be saved when
power is removed, e.g., calibration tables
or device configuration.
When larger amounts of more
static data are to be stored (such as in
USB flash drives) other memory types
like flash memory are more economical.
EEPROMs are realized as arrays of
floating-gate transistors.
History:
In 1983, Greek American George
Perlegos at Intel developed the Intel
2816, which was built on earlier
EPROM technology, but used a thin gate
oxide layer so that the chip could erase
its own bits without requiring a UV
source. Perlegos and others later left
Intel to form Seeq Technology, which
used on-device charge pumps to supply
the high voltages necessary for
programming EEPROMs.[1]
Functions of EEPROM:
There are different types of electrical
interfaces to EEPROM devices. Main
categories of these interface types are :
Serial bus
Parallel bus
How the device is operated depends on
the electrical interface.
Serial bus devices:
Most common serial interface
types are SPI, I²C and 1-Wire. These
three interfaces require between 2 and 4
controls signals for operation, resulting
in a memory device in an 8 pin (or less)
package.
The serial EEPROM typically
operates in three phases: OP-Code
Phase, Address Phase and Data Phase.
The OP-Code is usually the first 8-bits
input to the serial input pin of the
EEPROM device (or with most I²C
devices, is implicit); followed by 8 to 24
bits of addressing depending on the
depth of the device, then data to be read
or written.
Each EEPROM device typically has its
own set of OP-Code instructions to map
to different functions. Some of the
common operations on SPI EEPROM
devices are:
Write Enable (WREN)
Write Disable (WRDI)
Read Status Register (RDSR)
Write Status Register (WRSR)
Read Data (READ)
Write Data (WRITE)
Other operations supported by some
EEPROM devices are:
Program
Sector Erase
Chip Erase commands
Parallel bus devices:
Parallel EEPROM devices
typically have an 8-bit data bus and an
address bus wide enough to cover the
complete memory. Most devices have
chip select and write protect pins. Some
microcontrollers also have integrated
parallel EEPROM.
Operation of a parallel EEPROM is
simple and fast when compared to serial
EEPROM, but these devices are larger
due to the higher pin count (up to 32
pins or more) and have been decreasing
in popularity in favor of serial EEPROM
or Flash.
Failure modes:
There are two limitations of
stored information; endurance, and data
retention.
During rewrites, the gate oxide in the
floating-gate transistors gradually
accumulates trapped electrons. The
electric field of the trapped electrons
adds to the electrons in the floating gate,
lowering the window between threshold
voltages for zeros vs ones. After
sufficient number of rewrite cycles, the
difference becomes too small to be
recognizable, the cell is stuck in
programmed state, and endurance failure
occurs. The manufacturers usually
specify minimal number of rewrites
being 106 or more.
During storage, the electrons injected
into the floating gate may drift through
the insulator, especially at increased
temperature, and cause charge loss,
reverting the cell into erased state. The
manufacturers usually guarantee data
retention of 10 years or more.[2]
Related types
Flash memory is a later form of
EEPROM. In the industry, there is a
convention to reserve the term EEPROM
to byte-wise writeable memories
compared to block-wise writable flash
memories. EEPROM takes more die area
than flash memory for the same capacity
because each cell usually needs both a
read, write and erase transistor, while in
flash memory the erase circuits are
shared by large blocks of cells (often
512×8).
Newer non-volatile memory
technologies such as FeRAM and
MRAM are slowly replacing EEPROMs
in some applications, but are expected to
remain a small fraction of the EEPROM
market for the foreseeable future.
Comparison with EPROM and
EEPROM/Flash
The difference between EPROM
and EEPROM lies in the way that the
memory programs and erases. EEPROM
can be programmed and erased
electrically using field emission (more
commonly known in the industry as
"Fowler-Nordheim tunneling").
EPROMs can't be erased electrically,
and are programmed via hot carrier
injection onto the floating gate. Erase is
via an ultraviolet light source, although
in practice many EPROMs are
encapsulated in plastic that is opaque to
UV light, and are "one-time
programmable".
Most NOR Flash memory is a hybrid
style—programming is through Hot
carrier injection and erase is through
Fowler-Nordheim tunneling.
LINEAR KEYPAD:
This section basically consists of
a Linear keypad. Basically a keypad can
be classified in to two categories.
1. Linear keypad
2. Matrix keypad
Linear keypad:
This keypad has ‘n’ no. of key
connected to ‘n’ data lines of
microcontroller. This keypad is used
where one needs to connect less no. of
keys. In this project, a Linear keypad is
used with three switches being
connected because the no. of switches
used is less (less than 8).
Generally, in linear keypads, one
end of the switch is connected to
microcontroller (configured as i/p) and
other end of the switch is connected to
the common ground. So whenever a key
of Linear keypad is pressed, the logic on
the microcontroller pin will go LOW.
Matrix keypad:
This keypad has keys arranged in
the form of rows and columns. That is
why the name Matrix keypad. According
to this keypad, in order to find the key
being pressed the keypad need to be
scanned by making rows as input or
columns as output or vice versa.
This keypad is used in the places where
one needs to connect more no. of keys
with less no. of data lines.
SMART CARD
Introduction:
A smart card, chip card, or
integrated circuit card (ICC), is any
pocket-sized card with embedded
integrated circuits which can process
data or Memory. This implies that it can
receive input which is processed — by
way of the ICC applications — and
delivered as an output.
A smart card resembles a credit
card in size and shape, but inside it is
completely different. First of all, it has
an inside -- a normal credit card is a
simple piece of plastic. The inside of a
smart card usually contains an
Embedded Microprocessor or
EEPROM (memory) or some times
both. The microprocessor is under a
gold contact pad on one side of the card.
Think of the microprocessor as
replacing the usual magnetic stripe on a
credit card or debit card.
BASICS:
A smart card is a plastic card
with a microprocessor chip embedded in
it. The card looks like a normal credit
card except for its metal contact (in
contact card only), but applications
performed could be totally different.
Other than normal credit card and
bankcard functions, a smart card could
act as an electronic wallet where
electronic cash is kept. With the
appropriate software, it could also be
used as a secure access control token
ranging from door access control to
computer authentication.
The term “smart card”
has different meanings in different books
[Guthery1998, Rankl1997] because
smart cards have been used in different
applications.
SMART CARD:
The smart card is defined as a
“Credit Card” with a “Brain” on it, the
brain being a small Embedded
Computer Chip. Because of this
“Embedded Brain”, smart card is also
known as chip or integrated circuit (IC)
card. Some types of smart card may have
a microprocessor embedded, while
others may only have a non-volatile
memory content included. In general, a
plastic card with a chip embedded inside
can be considered as a smart card.
In either type of smart card, the
storage capacity of its memory content is
much larger than that in magnetic stripe
cards. The total storage capacity of a
magnetic stripe card is 125 bytes while
the typical storage capacity of a smart
card ranges from 1K bytes to 64K bytes.
In other words, the memory content of a
large capacity smart card can hold the
data content of more than 500 magnetic
stripe cards.
Obviously, large storage capacity
is one of the advantages in using smart
card, but the single-most important
feature of smart card consists of the fact
that their stored data can be protected
against unauthorized access and
tampering. Inside a smart card, access to
the memory content is controlled by a
secure logic circuit within the chip. As
access to data can only is performed via
a serial interface supervised by the
operating system and the secure logic
system, confidential data written onto
the card is prevented from unauthorized
external access. This secret data can only
be processed internally by the
microprocessor.
Due to the high security level of
smart cards and its off-line nature, it is
extremely difficult to "hack" the value
off a card, or otherwise put unauthorized
information on the card. Because it is
hard to get the data without
authorization, and because it fits in one’s
pocket, a smart card is uniquely
appropriate for secure and convenient
data storage. Without permission of the
card holder, data could not be captured
or modified. Therefore, smart card could
further enhance the data privacy of user.
Therefore, smart card is not only
a data store, but also programmable,
portable, tamper-resistant memory
storage.
SMART CARD READER:
Smart Card Readers are also
known as Card Programmers (because
they can write to a card), card terminals,
card acceptance device (CAD) or an
interface device (IFD). When the smart
card and the card reader come into
contact, each identifies itself to the other
by sending and receiving information. If
the messages exchanged do not match,
no further processing takes place.
Working of Smart Card Reader:
Smart Card Readers are also known
as card programmers (because they can
write to a card), card terminals, card
acceptance device (CAD) or an interface
device (IFD). There is a slight difference
between the card reader and the terminal.
The term 'reader' is generally used to
describe a unit that interfaces with a PC for
the majority of its processing requirements.
In contrast, a 'terminal' is a self-contained
processing device.
The reader provides a path for your
application to send and receive commands
from the card. There are many types of
readers available, such as serial, PC Card,
and standard keyboard models.
Unfortunately, the ISO group was unable to
provide a standard for communicating with
the readers so there is no one-size-fits-all
approach to smart card communication.
Each manufacturer provides a different
protocol for communication with the
reader.
First you have to communicate
with the reader.
Second, the reader communicates
with the card, acting as the
intermediary before sending the data
to the card.
Third, communication with a
smart card is based on the APDU
format. The card will process the
data and return it to the reader, which
will then return the data to its
originating source.
The following classes are used for
communicating with the reader:
ISO command classes for
communicating with 7816 protocol
Classes for communicating with
the reader
Classes for converting data to a
manufacturer-specific format
An application for testing and
using the cards for an intended and
specific purpose
Communicating with a Smart Card
Reader:
The reader provides a path for
your application to send and receive
commands from the card. There are
many types of readers available, such as
serial, PC Card, and standard keyboard
models. Unfortunately, the ISO group
was unable to provide a standard for
communicating with the readers so there
is no one-size-fits-all approach to smart
card communication.
Each manufacturer provides a different
protocol for communication with the
reader.
First you have to communicate
with the reader.
Second, the reader communicates
with the card, acting as the
intermediary before sending the
data to the card.
Third, communication with a
smart card is based on the APDU
format. The card will process the
data and return it to the reader,
which will then return the data to
its originating source.
HISTORY:
A Card embedded with a
microprocessor was first invented by 2
German engineers in 1967. It was not
publicized until Roland Moreno, a
French journalist, announced the Smart
Card patent in France in 1974
[Rankl1997]. With the advances in
microprocessor manufacturing
technology, the development cost of the
smart card has been greatly reduced. In
1984, a breakthrough was achieved
when French Postal and
Telecommunications services (PTT)
successfully carried out a field trial with
telephone cards. Since then, smart cards
are no longer tied to the traditional
bankcard market even though the phone
card market is still the largest market of
smart cards in 1997.
Due to the establishment of the ISO-
7816 specification in 1987 (a worldwide
smart card interface standard), the smart
card format is now standardized.
Nowadays, smart cards from different
vendors could communicate with the
host machine using a common set of
language.
TYPES:
According to the definitions of “smart
card” in the Smart card technology], the
word smart card has three different
meanings:
IC card with ISO 7816 interface
Processor IC card
Personal identity token containing ICs
Basically, based on their physical
characteristics, IC cards can be
categorized into 4 main types, memory
card, contact CPU card, contact-less
card and combi card.
Memory Cards:
A memory card is a card with
only memory and access logic onboard.
Similar to the magnetic stripe card, a
memory card can only be used for data
storage. No data processing capability
should be expected. Without the on-
board CPU, memory cards use a
synchronous communication mechanism
between the reader and the card where
the communication channel is always
under the direct control of the card
reader. Data stored on the card can be
retrieved with an appropriate command
to the card.
In traditional memory cards, no
security control logic is included.
Therefore, unauthorized access to the
memory content on the card could not be
prevented. While in current memory
cards, with the security control logic
programmed on the card, access to the
protection zone is restricted to users with
the proper password only.
Contact CPU Cards:
A more sophisticated version of
smart card is the contact CPU card. A
microprocessor is embedded in the card.
With this real “brain”, program stored
inside the chip can be executed. Inside
the same chip, there are four other
functional blocks: the mask-ROM, Non-
volatile memory, RAM and I/O port
[HKSAR1997, Rankl1997].
Except for the microprocessor unit, a
memory card contains almost all
components that are included in a
contact CPU card. Both of them consist
of Non-volatile memory, RAM, ROM
and I/O unit. Based on ISO 7816
specifications, the external appearance
of these contact smart cards is exactly
the same. The only difference is the
existence of the CPU and the use of
ROM. In the CPU card, ROM is masked
with the chip’s operating system which
executes the commands issued by the
terminal, and returns the corresponding
results. Data and application program
codes are stored in the non-volatile
memory, usually EEPROM, which could
be modified after the card manufacturing
stage.
One of the main features of a CPU
card is security. In fact, contact CPU
card has been mainly adopted for secure
data transaction. If a user could not
successfully authenticate him/herself to
the CPU, data kept on the card could not
be retrieved. Therefore, even when a
smart card is lost, the data stored inside
the card will not be exposed if the data is
properly stored. Also, as a secure
portable computer, a CPU card can
process any internal data securely and
outputs the calculated result to the
terminal.
Contact less Cards:
Contact less smart card is the one in
which the chip communicates with the
card reader through RFID induction
technology (at data rates of 106 - 848
Kbits/sec). These cards require only
close proximity to an antenna to
complete transaction. They are often
used when transactions must be
processed quickly or hands-free, such as
on mass transit systems, where smart
cards can be used without even
removing them from a wallet.
Even though contact
CPU smart card is more secure than
memory card, it may not be suitable for
all kinds of applications, especially
where massive transactions are involved,
such as transportation uses. Because in
public transport uses, personal data must
be captured by the reader within a short
period of time, contact smart card which
requires the user to insert the card to the
reader before the data can be captured
from the card would not be a suitable
choice. With the use of radio frequency,
the contact-less smart card can transmit
user data from a fairly long distance
within a short activation period. The
card holder would not have to insert the
card into the reader. The whole
transaction process could be performed
without removing the card from the
user’s wallet.
Contact-less smart cards use a
technology that enables card readers to
provide power for transactions and
communications without making
physical contact with the cards. Usually
electromagnetic signal is used for
communication between the card and the
reader. The power necessary to run the
chip on the card could either be supplied
by the battery embedded in the card or
transmitted at microwave frequencies
from the reader onto the card.
Contact-less card is highly suitable
for large quantity of card access and data
transaction. However, contact-less smart
card has not been standardized. There
are about 16 different contacts-less card
technologies and card types in the
market [ADE]. Each of these cards has
its specific advantages, but they may not
be compatible with each other.
Nevertheless, because of its high
production cost and the technology is
relatively new, this type of cards has not
been widely adopted.
Combi - Card:
At the current stage, contact and
contact-less smart card are using two
different communication protocols and
development processes. Both cards have
their advantages and disadvantages.
Contact smart cards have higher level of
security and readily-available
infrastructure, while contact-less smart
card provide a more efficient and
convenient transaction environment. In
order to provide customers with the
advantages of these two cards, two
methods could be employed. The first
method is to build a hybrid card reader,
which could understand the protocols of
both types of cards. The second method
is to create a card that combines the
contact functions with the contactless
functions. Because the manufacturing
cost of the hybrid reader is very
expensive, the later solution is usually
chosen.
Sometimes, the term “combi
card” is being misused by
manufacturers. In general, there are two
types of combine contact-contactless
smart cards, namely the hybrid card and
the combi card. Both cards have contact
and contactless parts embedded together
in the plastic card. However, in the
hybrid card, the contact IC chip and
contactless chip are separate modules.
No electrical connections have been
included for communications between
the two chips. These two modules can be
considered as separate but co-existing
chips on the same card. While in the
combi card, the contact and contactless
chips could communicate between
themselves, thus giving the combi card
the capability to talk with external
environment via either the contact or
contactless method.
As the combi cards possess the
advantages of both contact and
contactless cards, the only reason that is
hindering its acceptance is cost. When
the cost and technical obstacles are
overcome, combi cards will become a
popular smart card solution.
In our project the Smart Card used is of
the type Contact type cards. Basically
this type of Smart Cards got SIM like
Structure Embedded on a Plastic card for
Physical Structure and Strength. There
exist different types of SIM structures
according to the type of Application,
Memory and features involved in the
Smart Card. Some of them are shown
below.
Types of SIM Structures
These Contact type Smart cards have a
contact area, comprising several gold-
plated contact pads, that is about 1cm
square. When inserted into a reader, the
chip makes contact with electrical
connectors that can read information
from the chip and write information
back.
Electrical signal description:
Smart Card pin-out
VCC: Power supply input
RST: Either used it (reset signal supplied
from the interface device) or in
combination with an internal reset
control circuit (optional use by the card).
If internal reset is implemented, the
voltage supply on Vcc is mandatory.
CLK: Clocking or timing signal
(optional use by the card).
GND: Ground (reference voltage).
VPP: Programming voltage input
(deprecated / optional use by the card).
I/O: Input or Output for serial data to the
integrated circuit inside the card.
Contact type Smart Card Reader:
Contact smart card readers are
used as a communications medium
between the smart card and a host, e.g. a
computer, a point of sale terminal, or a
mobile telephone.
Since the chips in the financial
cards are the same as those used for
mobile phone Subscriber Identity
Module (SIM) cards, just programmed
differently and embedded in a different
shaped piece of PVC, the chip
manufacturers are building to the more
demanding GSM/3G standards. So, for
instance, although EMV allows a chip
card to draw 50 mA from its terminal,
cards are normally well inside the
telephone industry's 6mA limit. This is
allowing financial card terminals to
become smaller and cheaper.
The reader provides a path for
your application to send and receive
commands from the card. There are
many types of readers available, such as
serial, PC-Card, and standard keyboard
models. Unfortunately, the ISO group
was unable to provide a standard for
communicating with the readers so there
is no one-size-fits-all approach to smart
card communication.
Each manufacturer provides a different
protocol for communication with the
reader.
First you have to communicate
with the reader.
Second, the reader communicates
with the card, acting as the intermediary
before sending the data to the card.
Third, communication with a
smart card is based on the APDU format.
The card will process the data and return
it to the reader, which will then return
the data to its originating source.
The following classes are used for
communicating with the reader:
ISO command classes for
communicating with 7816 protocol
Classes for communicating with
the reader
Classes for converting data to a
manufacturer-specific format
An application for testing and
using the cards for an intended and
specific purpose
Readers come in many forms, factors
and capabilities. The easiest way to
describe a reader is by the method of its
interface to a PC. Smart card readers are
available that interface to RS232 serial
ports, USB ports, PCMCIA slots, floppy
disk slots, parallel ports, infrared IRDA
ports and keyboards and keyboard
wedge readers. Card readers are used to
read data from - and write data to - the
smart card. Readers can easily be
integrated into a PC utilizing Windows
98/Me, 2000, or XP platforms. However,
some computer systems already come
equipped with a built-in smart card
reader. Some card readers come with
advanced security features such as
secure PIN entry, secure display and an
integrated fingerprint scanners for the
next-generation of multi-layer security
and three-factor authentication.
Another difference in reader types is on-
board intelligence and capabilities. An
extensive price and performance
difference exists between an industrial
strength reader that supports a wide
variety of card protocols and the less
expensive win-card reader that only
works with microprocessor cards and
performs all processing of the data in the
PC.
The options in terminal choices are just
as varied. Most units have their own
operating systems and development
tools. They typically support other
functions such as magnetic-stripe
reading, modem functions and
transaction printing.
To process a smart card the computer
has to be equipped with a smart card
reader possessing the following
mandatory features:
Smart Card Interface Standard -
ISO 7816 is an international standard
that describes the interface requirements
for contact-type smart cards. These
standards have multiple parts. For
instance, part 1, 2 and 3 are applicable to
card readers. Part 1 defines the physical
characteristics of the card. Part 2 defines
dimension and location of smart card
chip contacts. Part 3 defines the
electronic signals and transmission
protocols of the card. Card readers may
be referred to as conforming to ISO
7816 1/2/3, or in its simplified term, ISO
7816.
Driver - This refers to the
software used by the operating system
(OS) of a PC for managing a smart card
and applicable card reader. To read a
smart ID card, the driver of the card
reader must be PC/SC compliant which
is supported by most card reader
products currently available. It should be
noted that different OS would require
different drivers. In acquiring card
readers, the compatibility between the
driver and the OS has to be determined
and ensured.
Desirable Features in a Smart Card
Reader:
Card Contact Types refers to how the
contact between a card reader and a
smart card is physically made. There are
two primary types of contact: landing
contact and friction contact (also known
as sliding or wiping). For card readers
featuring friction contact, the contact
part is fixed. The contact wipes on the
card surface and the chip when a card is
inserted. For card readers featuring the
landing type, the contact part is movable.
The contact "lands" on the chip after a
card is wholly inserted. In general, card
readers of the landing type provide better
protection to the card than that of the
friction type.
Smart card readers are also used as smart
card programmers to configure and
personalize integrated circuit cards.
These programmers not only read data,
but also put data into the card memory.
This means that not only CPU based
smart cards, but also simple memory
cards can be programmed using a smart
card reader. Of course the card reader
must support the appropriate protocol
such as the asynchronous T=0, T=1 or
synchronous I2C protocols.
COMMUNICATION PROTOCOLS
Name Description
T=0 Asynchronous half-duplex byte-level transmission protocol.
T=1 Asynchronous half-duplex block-level transmission protocol.
T=2 Reserved for future full-duplex operations.
T=3 Reserved for future full-duplex operations.
T=CL APDU transmission via contactless interface ISO 14443.
The smart card reader here in this project
used is the supports the T=0, T=1
protocols. The smart card here used is of
256 bytes of memory (SLE 4442). The
following section gives the some sort of
information about the smart card
memory and its interfacing commands.
Features:
256´8-bitEEPROM organization
Byte-wise addressing
Irreversible byte-wise write
protection of lowest 32 addresses (Byte
0 ... 31)
32 ´ 1-bit organization of
protection memory
Two-wire link protocol
End of processing indicated at
data output
Answer-to-Reset acc. to ISO
standard 7816-3
Programming time 2.5 ms per
byte for both erasing and writing
Minimum of 104 write/erase
cycles1)
Data retention for minimum of
ten years1)
Contact configuration and serial
interface in accordance with ISO
standard 7816 (synchronous
transmission)
Pin configuration:
Pin description:
COMMAND SET FOR SLE4442– 256 bytes Memory
Steps Command Comd to SR90 Prompt from SR90 Reader
1. Set Device Type #0203! #83! (Positive Ack)
#8A! (Invalid Device Type set)
2. Send Card Status #01! #80! (Card Present)
#81! (Card Absent)
3. ATR #03! #88A2131091!
4. Read Data #10AANN! #87AANNDDD…D!
(DDD = Data)
#86! (Invalid Command)
#82! (No Device Type set)
#8D! (Memory Over Flow)
5. Write Data #11AANNFFFFFF
DD..D! #82! (No Device Type set )
#83! (Positive Ack)
#89! (Invalid Security Code)
#86! (Invalid Command)
#85! (Invalid Parameters
#8D! (Memory over Flow)
#90!(Already Protected)
6. Protect Data #12AANNFFFFFF
DD! #83! (Positive Ack)
#82! (No Device Type)
#89! (Invalid Security Code)
#86! (Invalid Command)
#85! (Invalid Parameters
#8D! (Memory Over Flow)
7. Change Security Code #53FFFFFF555555 #83! (Positive Ack)
#89! (Invalid Security Code)
#86! (Invalid Command)
#85! (Invalid Parameters
8. Locations Which can’t write : 0,1,2,3,6,7
9. Communication Protocol: Baud Rate :9,600 bps
Parity :None
Stop Bit :1
Start Bit :0
Data :8 bits
AA = Address location of the chip in Hex
NN = Number of bytes to read or to write
FFFFFF = Security Code
DD = Data to read /write or protect in BCD format
Note: Please give correct security code
while writing your cards other wise they
will damage. This card will allow 3
times of writing false security code later
it won’t accept to write the card but you
can read.
In our project, the Smart Card Reader
communicates with microcontroller
through 2 pins namely RX and TX with
the help of a Serial Driver. These 2 pins
are pin 2, 3 of the 9-pin connector of
Smart Card Reader.
SMART CARD READER
APPLICATIONS:
With the rapid expansion of
Internet technology and electronic
commerce, smart cards are now more
widely accepted in the commercial
market as stored-value and secure
storage cards. Moreover, it has also been
widely used as an identity card.
The smart card has also been
used in transportation such as the
Octopus card which has been adopted by
the MTRC and KCRC to replace of the
old Magnetic stripe card. Medical record
can also be stored in the smart card. This
enables critical information of the
patient to be retrieved whenever it is
required. With the help of smart card
technology, many secure data such as
the computer login name and password
can also be kept, so user need not
remember a large number of passwords.
The applications can be classified into 6
main categories: Electronic Payment,
Security and Authentication,
Transportation, Telecommunications,
Loyalty Program and Health Care
Applications.
1. ELECTRONIC PAYMENT:
Electronic Purse:
The Electronic Purse is also known as
electronic cash. Funds can be loaded
onto a card for use as cash. The
electronic cash can be used for small
purchases without necessarily requiring
the authorization of a PIN. The card is
credited from the cardholder’s bank
account or some other ways. When it is
used to purchase goods or services,
electronic value is deducted from the
card and transferred to the retailer’s
account. Similar to a real wallet, the
cardholder could credit his/her card at
the bank any time when required.
Stored Value Cards:
Another use of smart cards in electronic
commerce is Electronic token. It is an
example of the stored-value card. The
principle is that some memory in the
smart card is set aside to store electronic
tokens or electronic tickets. A smart card
can store tokens for different services
and each of the tokens can be refilled,
depending on the types of the memory
card. This allows the cost to be
distributed over a number of services
and over a much longer life span.
For example, the card could be used to
pay for gas and instead of putting coins
in a parking meter. Consumers load up
the card from a vending machine.
2. SECURITY AND
AUTHENTICATION:
Cryptographic uses:
From the point-of-view of the supplier
and system operator, the main
requirement of almost all machine-
readable card systems is to ensure that
the card presented is valid and the
cardholder is indeed the person entitled
to use that particular card. To verify the
cardholder’s identity, users are required
to enter their PIN code (personal
identification number). This PIN code is
kept in the card rather than on the
terminals or host machines.
Identification and authentication
procedures take place at the card
terminal.
Identity card:
The identification of an individual is one
of the most complex processes in the
field of Information Technology. It
requires both the individual to identify
himself and for the system to recognize
the incoming connection is generated by
a legal user. The system then accepts
responsibility for allowing all
subsequent actions, sage in the
knowledge that the user has
authorization to do whatever he is asking
of the system.
If a smart card is used, the information
stored on the card can be verified locally
against a ‘password’ or PIN before
connection is made to the host. This
prevents the password from being
eavesdropped by perpetrators on the
Internet.
Some of the smart cards will have
personal data stored on the card. For
example, the cardholder’s name, ID
number, and date of birth
Access control card:
The most common devices used to
control access to private areas where
sensitive work is being carried out or
where data is held, are keys, badges and
magnetic cards. These all have the same
basic disadvantages: they can easily be
duplicated and when stolen or passed on,
they can allow entry by an unauthorized
person. The smart card overcomes these
weaknesses by being very difficult to be
reproduced and capable of storing
digitized personal characteristics. With
suitable verification equipment, this data
can be used at the point of entry to
identify whether the user is the
authorized cardholder. The card can also
be individually personalized to allow
access to limited facilities, depending on
the holder’s security clearance. A log of
the holder’s movements, through a
security system, can be stored on the
card as a security audit trail
Digital certificate:
The most important security measures
we encounter in our daily business have
nothing to do with locks and guards. A
combination of a signed message and the
use of public key cryptosystem, so called
digital signature, are typically used.
A digitally signed message containing a
public key is called a certificate. In
addition to a public key, a certificate
typically contains a name, address, and
other information describing the holder
of the corresponding secret key. All of
these carry the digital signature of a
registry service that records public keys
for all members of the community. To
become a member of this community, a
subscriber must do two things:
Provide the directory service with a
public key and the associated
identification information so that
other people will be able to verify
his/her signature.
Obtain the public key of the
directory service so that he/she can
verify other people’s signatures.
Because certificates are extremely
tamper resistant, the authenticity of a
certificate is a property of the certificate
itself, rather than of the authenticity of
the channel over which it was received.
Computer login:
Access to the Computer room and its
services can be controlled by the smart
card. In terms of network access, smart
card can authenticate the user to the host.
Furthermore, depending on the
environment being protected the network
access card can also perform the
following functions:
Manipulation of different
authentication codes for different
levels of security.
Use of biometric techniques as an
added security measure.
Maintaining an audit trail of failures
and attempted violations.
Meanwhile, in terms of access to the
computer room itself, PIN checking can
be done on the card without the need for
hard wiring the access points to a central
computer.
The identification of a user is usually
done by means of a (Personal
Identification Number) PIN. The PIN is
verified by the microcomputer of the
card with the PIN stored in its RAM. If
the comparison is negative, the CPU will
refuse to work. The chip also keeps tack
of the number of consecutive wrong PIN
entries. If this number reaches a pre-set
threshold, the card blocks itself against
any further use.
TRANSPORTATION
APPLICATIONS:
The smart card can act as
electronic money for car drivers who
would need to pay a fee before being
able to use a road or tunnel. It would
then contain a balance that can be
increased at payment stations or in the
pre-paid process, and is decreased for
each use.
TELECOMMUNICATION
APPLICATIONS:
Since 1988, smart card has
become an essential component in
cellular phone systems. Network data,
subscriber’s information and all mobile
network critical data are kept inside the
card. With this card, subscribers could
make calls from any portable telephone.
Moreover, through the IC card, any calls
through the mobile phone could be
encrypted, and thus ensure privacy. In
the future, more and more value-added
services, such as electronic banking,
could be supported by using this
microprocessor card.
HEALTH CARE APPLICATIONS:
Due to the level of security
provided for data storage, IC cards offer
a new perspective for healthcare
applications. Medical applications of
smart cards can be used for storing
information including personal data,
insurance policy, emergency medical
information, hospital admission data and
recent medical records.
LOYALTY APPLICATIONS:
Loyalty program is another
important application of smart cards in
the shopping model. The preferred
customer status together with detailed
information on shopping habits is stored
and processed on the smart card. With
this information, merchants could derive
better shopping model or tailor-make
personalized customer shopping profiles.
In addition, this shopping habit profile is
kept in the customer’s card; therefore,
his/her shopping record could be kept
confidential from unauthorized access.
REGULATED POWER SUPPLY
The power supplies are
designed to convert high voltage AC
mains electricity to a suitable low
voltage supply for electronics circuits
and other devices. A RPS (Regulated
Power Supply) is the Power Supply
with Rectification, Filtering and
Regulation being done on the AC mains
to get a Regulated power supply for
Microcontroller and for the other devices
being interfaced to it.
A power supply can by broken down
into a series of blocks, each of which
performs a particular function. A d.c
power supply which maintains the
output voltage constant irrespective of
a.c mains fluctuations or load variations
is known as “Regulated D.C Power
Supply”
For example a 5V regulated power
supply system as shown below:
Transformer:
A transformer is an electrical
device which is used to convert electrical
power from one Electrical circuit to
another without change in frequency.
Transformers convert AC
electricity from one voltage to another
with little loss of power. Transformers
work only with AC and this is one of the
reasons why mains electricity is AC.
Step-up transformers increase in output
voltage, step-down transformers
decrease in output voltage. Most power
supplies use a step-down transformer to
reduce the dangerously high mains
voltage to a safer low voltage. The
input coil is called the primary and the
output coil is called the secondary. There
is no electrical connection between the
two coils; instead they are linked by an
alternating magnetic field created in the
soft-iron core of the transformer. The
two lines in the middle of the circuit
symbol represent the core.
Transformers waste very little power so
the power out is (almost) equal to the
power in. Note that as voltage is stepped
down current is stepped up. The ratio of
the number of turns on each coil, called
the turn’s ratio, determines the ratio of
the voltages. A step-down transformer
has a large number of turns on its
primary (input) coil which is connected
to the high voltage mains supply, and a
small number of turns on its secondary
(output) coil to give a low output
voltage.
An Electrical Transformer
Turns ratio = Vp/ VS = Np/NS
Power Out= Power In
VS X IS=VP X IP
Vp = primary (input) voltage
Np = number of turns on primary coil
Ip = primary (input) current
RECTIFIER:
A circuit which is used to
convert a.c to dc is known as
RECTIFIER. The process of conversion
a.c to d.c is called “rectification”.
TYPES OF RECTIFIERS:
Half wave Rectifier
Full wave rectifier
1. Centre tap full wave
rectifier.
2. Bridge type full bridge
rectifier.
Comparison of rectifier circuits:
Type of Rectifier
Parameter Half wave Full wave Bridge
Number of diodes
1
2
4
PIV of diodes
Vm
2Vm
Vm
D.C output voltage
Vm/
2Vm/
2Vm/
Vdc,at
no-load
0.318Vm
0.636Vm 0.636Vm
Ripple factor
1.21
0.482
0.482
Ripple
frequency
f
2f
2f
Rectification
efficiency
0.406
0.812
0.812
Transformer
Utilization
Factor(TUF)
0.287 0.693 0.812
RMS voltage Vrms Vm/2 Vm/√2 Vm/√2Full-wave Rectifier: From the above comparison we
came to know that full wave bridge
rectifier as more advantages than the
other two rectifiers. So, in our project we
are using full wave bridge rectifier
circuit.
Bridge Rectifier:
A bridge rectifier makes use of
four diodes in a bridge arrangement to
achieve full-wave rectification. This is a
widely used configuration, both with
individual diodes wired as shown and
with single component bridges where the
diode bridge is wired internally.
A bridge rectifier makes use of
four diodes in a bridge arrangement as
shown in fig (a) to achieve full-wave
rectification. This is a widely used
configuration, both with individual
diodes wired as shown and with single
component bridges where the diode
bridge is wired internally.
Fig (A)
Operation: During positive half cycle of
secondary, the diodes D2 and D3 are in
forward biased while D1 and D4 are in
reverse biased as shown in the fig(b).
The current flow direction is shown in the fig (b) with dotted arrows.
Fig (B)
During negative half cycle of secondary voltage, the diodes D1 and D4 are in forward
biased while D2 and D3 are in reverse biased as shown in the fig(c). The current flow
direction is shown in the fig (c) with dotted arrows.
Fig(C)
Filter:
A Filter is a device which
removes the a.c component of rectifier
output but allows the d.c component to
reach the load
Capacitor Filter:
We have seen that the ripple content
in the rectified output of half wave
rectifier is 121% or that of full-wave or
bridge rectifier or bridge rectifier is 48%
such high percentages of ripples is not
acceptable for most of the applications.
Ripples can be removed by one of the
following methods of filtering.
(a) A capacitor, in parallel to the load,
provides an easier by –pass for the
ripples voltage though it due to low
impedance. At ripple frequency and
leave the D.C. to appear at the load.
(b) An inductor, in series with the load,
prevents the passage of the ripple current
(due to high impedance at ripple
frequency) while allowing the d.c (due
to low resistance to d.c)
(c) Various combinations of capacitor
and inductor, such as L-section filter
section filter, multiple section filter etc.
which make use of both the properties
mentioned in (a) and (b) above. Two
cases of capacitor filter, one applied on
half wave rectifier and another with full
wave rectifier.
Filtering is performed by a
large value electrolytic capacitor
connected across the DC supply to act as
a reservoir, supplying current to the
output when the varying DC voltage
from the rectifier is falling. The
capacitor charges quickly near the peak
of the varying DC, and then discharges
as it supplies current to the output.
Filtering significantly increases the
average DC voltage to almost the peak
value (1.4 × RMS value).
To calculate the value of capacitor(C),
C = ¼*√3*f*r*Rl
Where,
f = supply frequency,
r = ripple factor,
Rl = load resistance.
Note: In our circuit we are using 1000µF
hence large value of capacitor is placed
to reduce ripples and to improve the DC
component.
Regulator:
Voltage regulator ICs is
available with fixed (typically 5, 12 and
15V) or variable output voltages. The
maximum current they can pass also
rates them. Negative voltage regulators
are available, mainly for use in dual
supplies. Most regulators include some
automatic protection from excessive
current ('overload protection') and
overheating ('thermal protection'). Many
of the fixed voltage regulators ICs have
3 leads and look like power transistors,
such as the 7805 +5V 1A regulator
shown on the right. The LM7805 is
simple to use. You simply connect the
positive lead of your unregulated DC
power supply (anything from 9VDC to
24VDC) to the Input pin, connect the
negative lead to the Common pin and
then when you turn on the power, you
get a 5 volt supply from the output pin.
Fig 6.1.6 A Three Terminal Voltage
Regulator
78XX:
The Bay Linear LM78XX is
integrated linear positive regulator with
three terminals. The LM78XX offer
several fixed output voltages making
them useful in wide range of
applications. When used as a zener
diode/resistor combination replacement,
the LM78XX usually results in an
effective output impedance improvement
of two orders of magnitude, lower
quiescent current. The LM78XX is
available in the TO-252, TO-220 & TO-
263packages.
Features:
• Output Current of 1.5A.
• Output Voltage Tolerance of 5%.
• Internal thermal overload protection.
• Internal Short-Circuit Limited.
• Output Voltage 5.0V, 6V, 8V, 9V,
10V, 12V, 15V, 18V, 24V.
Buzzer:
The "Piezoelectric sound
components" introduced herein operate on
an innovative principle utilizing natural
oscillation of piezoelectric ceramics. These
buzzers are offered in lightweight compact
sizes from the smallest diameter of 12mm to
large Piezo electric sounders. Today,
piezoelectric sound components are used in
many ways such as home appliances, OA
equipment, audio equipment telephones, etc.
And they are applied widely, for example, in
alarms, speakers, telephone ringers,
receivers, transmitters, beep sounds, etc.
FIG: Types of Buzzers
Oscillating System:
Basically, the sound source of a
piezoelectric sound component is a
piezoelectric diaphragm. A piezoelectric
diaphragm consists of a piezoelectric
ceramic plate which has electrodes on both
sides and a metal plate (brass or stainless
steel, etc.). A piezoelectric ceramic plate is
attached to a metal plate with adhesives.
Fig. 2 shows the oscillating system
of a piezoelectric diaphragm. Applying D.C.
voltage between electrodes of a piezoelectric
diaphragm causes mechanical distortion due
to the piezoelectric effect. For a misshaped
piezoelectric element, the distortion of the
piezoelectric element expands in a radial
direction. And the piezoelectric diaphragm
bends toward the direction shown in Fig.2
(a).
The metal plate bonded to the
piezoelectric element does not expand.
Conversely, when the piezoelectric element
shrinks, the piezoelectric diaphragm bends
in the direction shown in Fig.2 (b). Thus,
when AC voltage is applied across
electrodes, the bending shown in Fig.2 (a)
and Fig.2 (b) is repeated as shown in Fig.2
(c), producing sound waves in the air.
DESIGN PROCEDURES:
In general, man's audible frequency
range is about 20 Hz to 20kHz. Frequency
ranges of 2kHz to 4kHz are most easily
heard. For this reason, most piezoelectric
sound components are used in this frequency
range, and the resonant frequency (f0) is
generally selected in the same range too. As
shown in Fig. 3, the resonant frequency
depends on methods used to support the
piezoelectric diaphragm. If piezoelectric
diaphragms are of the same shape, their
values will become smaller in the order of
(a), (b) and (c).
In general, the piezoelectric
diaphragm is installed in a cavity to produce
high sound pressure. The resonant frequency
(fcav) of the cavity in is obtained from
Formula (1) (Helmholtz's Formula). Since
the piezoelectric diaphragm and cavity have
proper resonant frequencies, (f0) and (fcav)
respectively, sound pressure in specific
frequencies can be increased and a specific
bandwidth can be provided by controlling
both positions.
Circuit Description:
The Smart Card Reader is an
electronic device that reads smart cards.
Communication is done via protocols
and you can read and write to a fixed
address on the card.
The main objective of this
project is anti-rigging voting system
which is implemented using smart card
technology. A smart card is used as a
voter id card which provides
authentication and identification for a
person. In this project microcontroller is
used which forms the control unit. Every
citizen of India is given with a smart
card. Whenever user wants to vote he
needs to insert his smart card in smart
card reader while voting. Then the voter
is asked to vote for his favorite candidate
through keypad. So, user need to press
the key corresponding to his favorite
candidate. This system even allows the
election commission to see the no. of
votes given for each candidate and is
displayed in LCD which got interfaced
to microcontroller.
This project finds its place in
places where one wants to provide
authentication with great security.
SOFTWARE:
Software components:
About Keil:
1. Click on the Keil u Vision Icon on Desktop
2. The following fig will appear
3. Click on the Project menu from the title bar
4. Then Click on New Project
5. Save the Project by typing suitable project name with no extension in u r own
folder sited in either C:\ or D:\
6. Then Click on Save button above.
7. Select the component for u r project. i.e. Atmel……
8. Click on the + Symbol beside of Atmel
9. Select AT89C51 as shown below
10. Then Click on “OK”
11. The Following fig will appear
12. Then Click either YES or NO………mostly “NO”.
13. Now your project is ready to USE.
14. Now double click on the Target1, you would get another option “Source
group 1” as shown in next page.
15. Click on the file option from menu bar and select “new”.
16. The next screen will be as shown in next page, and just maximize it by double
clicking on its blue boarder.
17. Now start writing program in either in “C” or “ASM”
18. For a program written in Assembly, then save it with extension “. asm” and
for “C” based program save it with extension “ .C”
19. Now right click on Source group 1 and click on “Add files to Group Source”
20. Now you will get another window, on which by default “C” files will appear.
21. Now select as per your file extension given while saving the file
22. Click only one time on option “ADD”
23. Now Press function key F7 to compile. Any error will appear if so happen.
24. If the file contains no error, then press Control+F5 simultaneously.
25. The new window is as follows
26. Then Click “OK”
27. Now Click on the Peripherals from menu bar, and check your required port as
shown in fig below
28. Drag the port a side and click in the program file.
29. Now keep Pressing function key “F11” slowly and observe.
30. You are running your program successfully
CONCLUSION
The project “DEVELOPMENT OF ANTI-RIGGING VOTING SYSTEM”
has been successfully designed and tested.
It has been developed by integrating features of all the hardware components used.
Presence of every module has been reasoned out and placed carefully thus contributing to
the best working of the unit.
Secondly, using highly advanced IC’s and with the help of growing technology the
project has been successfully implemented.
Finally we conclude that “DEVELOPMENT OF ANTI-RIGGING VOTING
SYSTEM” is an emerging field and there is a huge scope for research and development.
FUTURE ENHANCEMENT:
The present project can be further enhanced by providing more security like with finger
print module, IRIS etc,
Bibliography
The 8051 Micro controller and Embedded Systems -Muhammad Ali Mazidi Janice
Gillispie Mazidi
The 8051 Micro controller Architecture, Programming & Applications-Kenneth J.Ayala
Fundamentals Of Micro processors and Micro computers -B.Ram
Micro processor Architecture, Programming & Applications-Ramesh S. Gaonkar
Electronic Components-D.V. Prasad
Wireless Communications- Theodore S. Rappaport
Mobile Tele Communications-William C.Y. Lee
References on the Web:
www.national.com
www.atmel.com
www.microsoftsearch.com
www.geocities.com