zigbee based mapping and position tracking
DESCRIPTION
Project Overview of. Zigbee based Mapping and Position Tracking. By :-. G.Srikanth N.Sri Naga Nikhil M.Sandeep Kumar G.Mahesh. Under the guidance of Miss V.Veena. INDEX. INTRODUCTION BLOCK DIAGRAM ARM CONTROLLER LPC 2148 ZIGBEE MODULE RFID MODULE LCD INTERFACING. - PowerPoint PPT PresentationTRANSCRIPT
Zigbee based Mapping and Position Tracking
Project Overview of
By :-
G.SrikanthN.Sri Naga NikhilM.Sandeep KumarG.Mahesh
Under the guidance of Miss V.Veena
INTRODUCTION
Aim: To identify person details and information transfer using zigbee technology
Consists of three sections Server,
Department-1 and Department-2.
ARM (Advanced RISC Machine)
RISC FEATURES:
Reduced instructions
Pipelining
Load store architecture
Registers
Reduced instructions :
Utilizes a small, highly-optimized set of instructions.
Pipeline organization :
• 3-stage pipeline: Fetch – Decode - Execute
• Three-cycle latency, one instruction per cycle throughput
cycle
Fetch Decode Execute
Fetch Decode Execute
Fetch Decode Execute
instruction
t t+1 t+2 t+3 t+4
i
i+1
i+2
Does not support memory to memory data processing
Must move to registers before using them.
Process becomes much faster due to register access to
process data.
Load store architecture :
Registers :
Large general purpose register set.
Contains either data or address.
ARM FEATURES:
Low power consumption
High code density
Hardware debugging technology
Reduced area of die.
Low cost memory device.
ARM 7TDMI-S
ARM –Acron Risc Machine (Now Advanced Risc Machine)
T – The Thumb 16 bit instruction set.
D – On chip Debug support.
M – Enhanced Multiplier
I – Embedded ICE hardware to give break point and
watch point support.
S- Synthesizable
User USR Normal application execution environment*
Fast Interrupt FIQ Response-time critical interrupt
Interrupt IRQ General purpose interrupt
Supervisor SVC Protected mode for operating system
Abort ABT Virtual memory protection & management
Undefined UND Undefined Instruction (reserved for coprocessor)
System SYS Privileged user mode for operating system
ARM7 Operational Modes :
15
ARM REGISTERS :
R0R1R2R3R4R5R6R7R8R9R10R11R12R13R14R15 (PC)
CPSR
System & UserR0R1R2R3R4R5R6R7_fiqR8_fiqR9_fiqR10_fiqR11_fiqR12_fiqR13_fiqR14_fiqR15 (PC)
CPSRSPSR_fiq
FIQR0R1R2R3R4R5R6R7R8R9R10R11R12R13_irqR14_irqR15 (PC)
CPSRSPSR_irq
IRQR0R1R2R3R4R5R6R7R8R9R10R11R12R13_svcR14_svcR15 (PC)
CPSRSPSR_svc
SupervisorR0R1R2R3R4R5R6R7R8R9R10R11R12R13_abtR14_abtR15 (PC)
CPSRSPSR_abt
AbortR0R1R2R3R4R5R6R7R8R9R10R11R12R13_undR14_undR15 (PC)
CPSRSPSR_und
Undefined
ZIGBEE MODULE
Created by Zigbee alliance based on IEEE 802.15.4 standard.
Designed for control and automation.
Allows wireless two way communication
Low cost, low power consuming technology for WPAN’s.
SPECIFICATIONS
Typical range 50m
Data rates of 250 kbps (@2.4 GHz), 40 kbps (@ 915
MHz), and 20 kbps (@868 MHz).
Fully hand-shaking protocol.
Multiple topologies
Addressing space of up to: 65,535 networks
PHY868MHz / 915MHz / 2.4GHz
MAC
NetworkStar / Mesh / Cluster-Tree
Security32- / 64- / 128-bit encryption
Application
API
ZigBeeAlliance
IEEE 802.15.4
Customer
Silicon Stack App
ARCHITECTURE
KEY BENEFITS
Ultra-low power consumption
MAC sub layer specifies four security services:
1. maintains a list of trusted devices.
2. Data encryption.
3. Frame integrity.
4. sequential freshness.
APPLICATIONS
Industrial and Commercial Monitors Movement Sensors Automation
Personal Healthcare Patient monitors Remote Diagnosis Data loggers
Building Automation Security Lighting Fire and Safety systems
Automotive Service controls Inventory tracking
RFID MODULE
•RFID MODULE convert radio waves returned from the RFID tag into a form that can be passed on to Controllers.
•RFID read range of this module will vary from approx10mm to 30mm
•This Firmware has the following Functions: • Read Tag-ID• Send Tag-ID in ASCII Format through the
Serial Interface
•To enable wireless identification, the RF subsystem consists of two components: • RFID tags which are small electronic devices that are affixed to objects or embedded in them.• RFID readers, which are devices that wirelessly communicate with tags to identify the item connected to each tag.
TAG CHARACTERISTICS
•Major characteristics of tags include:
Identifier format,
Power source1.Passive2.Active
Operating frequencies,
TAG READER COMMUNICATION
Tag-reader communication is achieved by using a common communications protocol between the tag and the reader.
Communication Initiation :
Tags and readers can initiate RF transactions in two general ways: a. Reader Talks First (RTF).b. Tag Talks First (TTF).
LCD INTERFACING :
D0D1D2D4D4D5D6D7
P0.16P0.17P0.18P0.19P0.20P0.21P0.22P.023
P0.4
P0.5
P0.6
RS R / W EN
HELLO WORLD
DATAPINS
CONTROL PINS
LPC 2148
VCC
VSS
VBE