Professional Documents
Culture Documents
Manually Controlled Surveillance System Using Zigbee Communication
Manually Controlled Surveillance System Using Zigbee Communication
ABSTRACT
The wireless communication technologies are rapidly spreading to new areas, including automation, data acquisition, building
control, monitoring systems and many more. Over the years, there has been a prolific increase in the security systems
developed to counter-attack intruders. The traditional surveillance systems give protection to the situation but still have some
dead zones that cannot be monitored. Therefore, I propose a Zigbee Network System which is centered on a rover that provides
security. The mobile surveillance is done by a wireless IP Camera mounted on the robot, which is in turn controlled through
Zigbee IEEE802.15.4 standard.The control is with the user while the service is rendered by the robot. Thus, the proposed robot
serves as a simple, yet powerful, low cost alternative to the standard security systems. This paper discusses about the desired
system, its sub-systems and shows the CAD model of the proposed system.
Keywords: Zigbee IEEE802.15.4, IPCamera, Mobile surveillance,ATmega 16, Motor Driving Circuit
1. INTRODUCTION
The development of intelligent surveillance systems is an active research area. In this context, mobile and multifunctional robots are generally adopted as means to reduce the environment structuring and the number of devices
needed to cover a given area. Nevertheless, the number of different sensors mounted on the robot, and the number of
complex tasks related to exploration, monitoring and surveillance make the design of the overall system extremely
challenging. The proposed robotic surveillance scheme successfully addresses a number of basic problems related to
environment mapping, localization and autonomous navigation. The increasing need for automated surveillance in
indoor environments such as airports, production plants, warehouses etc has stimulated the development of intelligent
systems based on sensors. The use of robots significantly expands the potential of surveillance systems, which can
evolve from the traditional passive role, in which the system can only detect events and trigger alarms, to active
surveillance, in which a robot can be used to interact with the environment, with humans or other robots for more
complex cooperative actions. The entire design is composed of 4 main sub-systems Design of robotic cover, interfacing
of transceiver circuit for transmitting the controls to the robot, processing and rectifying the captured images in PC.
This is a semi-autonomous mobile surveillance system which would transmit pictures or video streams to the human
watch guards with the help of a wireless IP camera [9]. In this paper, the system components and the system is
discussed.
2. SYSTEM OVERVIEW
The system has three-layered architecture developed for the surveillance. I propose a reconfigurable component based
approach in which the three main components can be viewed as containers of dynamic libraries that can be configured
for the particular scenario. More specifically we can select primitive behaviours (e.g. avoid obstacles, wandering, go
forward, etc), complex tasks (control algorithm, detect any suspicious activity). The whole system is controlled by
Zigbee module [3]-[7] which enables transmission of data over long distances, passing data through intermediate
devices to reach more distant ones. The Zigbee protocol uses the Ad-hoc On-Demand Distance Vector routing
algorithm [8] to execute its transmission. The Controller performs the control functions at the behaviour level. The
component contains all the behaviours needed to accomplish all possible tasks. Multiple behaviours can be executed at
the same time, in case different tasks are active. Moreover, the controller interacts with the upper component in two
ways: receive information about the activation and configuration of the behaviours to be performed; it sends the
information about the behaviours that are currently being executed. The Executor handles the execution of the tasks as
commanded by the upper level. Similarly to the controller, this component is considered as a continuous state controller
container. Each task can be viewed as a procedure to achieve a result. At the end of the task, the result is sent to the
Page 66
upper level. Two different classes of tasks are considered: Basic tasks (primitive movements that are common for the
manually controlled robots) and surveillance tasks (capturing images or video streams of particular entities like people
detection or areas). For each class of tasks, the Executor sends the corresponding commands to the Controller.The
Supervisor implements the high level functionalities, monitoring the mission execution and generating events through
the evaluation of data. More specifically this module controls the execution of missions in progress, sends the
configuration information about the tasks that must be started to the Executer module and receives the information
about completed tasks.
Fig 1. Three layered architecture of the proposed modelFig 2. Flow of Control of the System
3.ZIGBEE PROTOCOL
Zigbee is the name of a specification for a suite of high levelcommunication protocols using small, low power digital
radio based on IEEE 802.15.4[4]standard for wireless personal area networks (WPANs), such as wireless headphones
connecting with cell phones via short range radio. The technology is intended to be simpler and cheaper than other
WPANs, such as Bluetooth. Zigbee is targeted at radio frequency (RF) applications that require a low data rate, long
battery life, and secure networking. Incidentally, the term Zigbee originates from the silent, but powerful method of
communication used by honeybees to report information about food sources. This communication system is known as
Zigbee Principle. Zigbee devices are often used in mesh network form to transmit data over longer distances, passing
data through intermediate devices to reach more distant ones. This allows Zigbee networks to be formed ad hoc, with
no centralized control or high power transmitter/receiver able to reach all of the devices. Any Zigbee device can be
tasked with running the network. Zigbee uses Ad-Hoc On-Demand Distance Vector routing algorithm. Zigbee nodes
may be attached to movable objects. This means that theres no guarantee that a node in the network may not be in the
same place whenever a transmitter seeks a route. For this reason, theres no point in maintaining a database of routes.
The routing method in Zigbee protocol requires a transmitter to broadcast a need for a route to a destination. This is
received by all nodes within the range and passed on by them to all nodes within range of them. This process ripples
through until the required node is contacted, thereby going around any blocking object or dead spots. Messages then
chain back to the originator of the request. The transmitter then chooses the route with the least number of hops. The
protocol is built on recent Ad-Hoc On-Demand Distance Vector routing algorithm to automatically construct a low
speed ad hoc network of nodes. In most large network instances, the network will be a cluster of clusters. The current
profiles derived from the Zigbee protocols support both beacon and non-beacon enabled networks.In non-beaconenabled networks (those whose beacon order is 15), an unslotted CSMA/CA channel access mechanism is used. In this
Page 67
type of network, Zigbee Routers typically have their receivers continuously active, requiring a more robust power
supply. However, this allows forheterogeneous networks in which some devices receive continuously, while others only
transmit when an external stimulus is detected. The best example for this kind of network is a wireless light switch: the
Zigbee node on the light may receive constantly while the node at the switch would remain asleep until it wakes up,
sends communication to the lamp, receives acknowledgement, and goes back to sleep again.In beacon-enabled
networks, the special network nodes called Zigbee routers transmit periodic beacons to confirm their presence to other
network nodes. Nodes may sleep between beacons, thus lowering their duty cycle and extending their battery life.
Zigbee devices are required to conform to the IEEE 802.15.4 Low-Rate Wireless Personal Area Network (WPAN)
standard. This standard specifies operation in the unlicensed 2.4 GHz, 915 MHz and 868 MHz ISM bands. The basic
channel access mode is "carrier sense, multiple access/collision avoidance" (CSMA/CA). That is, the nodes talk in the
same way that people converse; they briefly check to see that no one is talking before they start.
Page 68
oscillator, I/O ports, interrupt request signals, reset and control. In contrast, the pins exposed by a microprocessor are
most often memory bus signals (rather than I/O ports). AT - It stands for the company that produced the
microcontroller, ATMEL. Mega - Stands for the family of Microcontroller. The other families from Atmel are Tiny &
X-Mega. 16 - Stands for the 16KB flash memory that is present in the microcontroller. Figure 4 gives the pin
configuration of ATmega 16 microcontroller [10].
Page 69
Page 70
Digital Image resolution is measured in pixels. The more detailed an image is, the more pixels it is made up of, and
therefore the more data it contains. Detailed images require more space on a hard disk and more bandwidth for
transmission. To transmit images over a network, data must be compressed to avoid consuming too much bandwidth. If
bandwidth is limited, lowering the frame rate or accepting a lower image quality canradically reduce the size of video
files. A number of compression standards exist that deal with the trade-off between frame rate and image quality in
different ways, but the most common has become h.264/MPEG-4, otherwise known as AVC (Advanced Video Coding).
8.CONCLUSION
Comparing Zigbee technology with the present Bluetooth and the future Z-wave technology it is evident that Zigbee can
have a safe future in this effervescent world of technology. Looking at the various facts discussed above, it can be stated
that for Zigbee can surely fill the requirements of applications having low power consumption along with low and
secured data transfers. It works well for the industrial automation because of its high number of nodes that can tie an
entire factory for security and monitoring purposes. However, Zigbee have low data rate which can be considered as one
Page 71
of the drawbacks. It is likely that Zigbee will increasingly play an important role in the future of computer and
communication technology. In terms of protocol stack size necessary in other wireless technologies (for limited
capability end devices, the stack size is as low as 4KB). The IEEE 802.15.4-based Zigbee is designed for remote
controls and sensors, which are very many in number, but need only small data packets and, mainly extremely low
power consumption for long life. Unwired applications are highly sought after in many networks that are characterized
by numerous nodes consuming minimum power and enjoying long battery lives. Zigbee technology is designed to best
suit these applications, for the reason that it enables reduced costs of development and very fast market adoption.
9.ACKNOWLEDGEMENT
The authors are grateful to Prof. M.S. Prasad, Director General of Amity Institute of Space Science and Technology,
Amity University, Noida for providing motivation and guidance to complete this research work and giving positive
feedbacks for the generated idea.
REFERENCES
[1]Behrouz A Frouzan, Data Communication and Networking, Third Edition, Tata McGraw-Hill Publications, 2006.
[2] Andrew S Tenenbaum, Computer Networks. Fifth Edition, Pearson Publications, 2012.
[3]
Zigbee
Alliance,
Zigbee
Specification
data
sheet,
zigbee.org.
Available:
http://www.zigbee.org/Standards/Downloads.aspx.
[4] 802.15.4, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer Specifications for low rate
wireless PANs. Available: profsite.um.ac.ir/~hyaghmae/ACN/WSNMAC1.pdf.
[5] Rozecha A Rashid, Hong Ling Zhen, Wireless Monitoring System using Zigbee 802.12.4 Standard, Intl Wireless
Telecommunications Symposium, 2006.
[6] Dr.S.S. Riaz Ahamed, Role of Zigbee Technology in Future Data Communication System, Journal of Theoretical
and Applied Information Technology, pp.129-135, 2009.
[7] P.Rohitha1 ,P. Ranjeet Kumar, Prof.N.Adinarayana, Prof.T.Venkat Narayana Rao,Wireless Networking Through
Zigbee Technology, IJARCSSE, pp.49-54, Volume 2, Issue 7, July 2012.
[8] Charles E. Perkins, Elizabeth M. Royer, Ad-hoc On-Demand Distance Vector routing algorithm, In second
proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, pp.1-11, 1999.
[9] M.Chaitanya Suman, K.Prathyusha, Wireless Camera based Online Examination Security, International Journal
of Engineering Research andApplications, pp.1432-1435, 2012.
[10] Atmel Corporations, ATmega 16, atmel.com. Available: www.atmel.com/Images/doc2466.pdf
[11] H- Bridge, H-Bridge on breadboard, instuctables.com. Available: http://www.instructables.com/id/H-Bridge-ona-Breadboard.
[12] Rohm Semiconductor, Controlling DC Brush Motors with H-Bridge Driver ICs, rohm.com. Available:
www.rohm.com/documents/11405/.../100260.H-BRDG_WP_Jan09.pdf
AUTHOR
Navuday Sharma is currenty in the final year of B-Tech Aerospace + M-Tech Avionics (Dual Degree)
in Amity University Noida, India. He did a project on creating a Manually Controlled Surveillance
Model using Zigbee communicaion.
Page 72