Professional Documents
Culture Documents
Rfid (GRP101-105)
Rfid (GRP101-105)
1.0 INTRODUCTION
Any system that controls the entrance and exit to those who have been authorized
may be called an access control system. The most common methods of access
control which all of us are familiar with is the traditional lock and key
arrangement. It is fine for small applications but has a number of pitfalls,
especially in application where there is a large number of a user or common door.
A properly selected access control system can overcome these problems and can be
integrated with other systems to provide a more rounded overall security solution.
Microcontroller based door control using RFID is a combination of electrical,
electronics, and mechanical technology. In our project we will like to use AT89c51
or AT89c52 microcontroller. The purpose of using this microcontroller is because
its cheaper and further upgrading is possible without changing the processing of
the chip.
This simple circuit can be used at residential places to ensure better safety. It can
be used at organizations to ensure authorized access to highly secured places. With
1
a slight modification this Project can be used to control the switching of loads
through RFID.
RFID cards have been advertised as suitable for personal identification tasks
because they are engineered to be tamper resistant. The chip usually implements
some cryptographic algorithm. There are, however, several methods for recovering
some of the algorithm's internal state. Differential power analysis involves
measuring the precise time and electrical current required for certain encryption or
decryption operations. This can deduce the on-chip private key used by public key
algorithms such as RSA. Some implementations of symmetric ciphers can be
vulnerable to timing or power attacks as well. RFID cards can be physically
disassembled by using acid, abrasives, or some other technique to obtain
unrestricted access to the onboard microprocessor. Although such techniques
obviously involve a fairly high risk of permanent damage to the chip, they permit
much more detailed information (e.g. photomicrographs of encryption hardware) to
be extracted.
2
1.6 FUTURE SCOPE OF THE PROJECT
Health Services: The card can be used to store information such as administrative,
medical, biological and pharmaceutical records. The card simplifies the
administrative process and enables doctors to have access to a more complete and
comprehensive healthcare information. Education: The card has the function of
identifying the student and also acts as an electronic purse and can be used
purchase products from stores or tickets to public transportation. Transportation:
Rechargeable contactless cards allow ticketless and cashless travels. Parking and
telecommunications can also be paid using the smart card. This will simplify the
passenger boarding process. Welfare: Card can be used to identify the holder using
a series of personal keys and fingerprint. The card holder then uses the card to
access government databases and receive the welfare payment. The security will
help eliminate fraud.
3
CHAPTER TWO
2.0LITERATURE REVIEW
The security situation in many parts of the world today leaves much to be desired.
In Nigeria particularly, the prevalence of armed robbers and other groups that
constitute nuisance to the society has led to the loss of lives and properties worth
millions of dollars. Many of the attacks that led to the loss have occurred in the
homes or in guarded compounds and the attacks took place in spite of the existence
of seemingly impregnable security gates that were designed to ward off intruders.
The needs for electronically controlled gates that have superior security features to
those operated manually thus exist and have been on the increase in recent times.
Many attempts have been made to design such gates with various types of security
features.
In the work by D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding (2009, pp.
2330-2334) a microprocessor was used to monitor two gates which sense the
approach of a vehicle. The gates automatically open, wait for a specified time and
then close. It is clear that the features of these gates do not provide adequate
security since any vehicle can gain entry into the compound. A system that
provides efficient gate access and an estate control to perform the job of the gate
security guard is discussed in the work by G. Ostojic, S. Stankovski, and M.
Lazarevic. The main pitfall of this system is that it uses a telephone to identify
visitors; the telephone can be used by anyone who approaches the gate.
According to F. Lourenco and C. Almeida (2009) a low-cost private office access
control system permits a user with the correct password entered on a keypad to
gain entry by controlling an electromagnetic door lock. The fact that passwords
belonging to one individual can be learned by another without the owner’s
permission is a major drawback of the system: the rogue can use the stolen
password to gain entry into the system. Radio frequency (RF) has been used in
conjunction with microcontrollers to control gates to enable vehicles to pass
through (R. Weinstein,X. L. Meng, Z. W. Song, & X. Y. Li, 2006)
D. L. Wu, Wing W. Y. NG, Patrick P. K. Chan, H. L. Ding, B. Z. Jin& D. S.
Yeung (2010, pp. 675-680.) have described a system in which swing gates are
controlled electronically using microcontrollers and infrared transmitters. This
system is only required to close and open gates and has a very limited security
feature.
4
According to M. A. Mazidi, J. C. Mazidi, & R. D. Mckinaly (2006) surveillance
cameras are used to capture and recapture the face of the driver as well as vehicle
plate numbers. These data are stored in a databank for future comparison with
visitors who will only be able to gain entry into a compound through gates if the
data match. The system has the disadvantage that users must have been properly
documented to enable them pass through the gate. The system that has been
designed in this work uses microcontrollers and radiofrequency
transmitter/receiver pair as major components. A microcontroller is programmed to
decode a given sequence of keys that is entered on a keypad; the microcontroller
commands a transmitter module to send out this code as signal at a given radio
frequency. Upon reception of this RF signal by the receiver module, another
microcontroller activates a circuitry to operate the gate automatically. And after all
challenges faced by the past developers they were not all that able to come up with
a standard system that server for security purpose and that while our group decided
to embark on this project to develop a system that will serve more than the past
once and we deiced to use a module called RFID (RADIO FREQUENCY
IDENTIFICATION).
Radio frequency identification has been around for decades. Let see how it evolved
from its roots in World War II radar systems to today's hottest supply chain
technology.
What is RFID?
First stands for Radio Frequency Identification. Any method of identifying unique
items using radio waves. Typically, a reader (also called an interrogator)
communicates with a transponder, which holds digital information in a microchip.
But there are chipless forms of RFID tags that use material to reflect back a portion
of the radio waves beamed at them.
It’s generally said that the roots of radio frequency identification technology can be
traced back to World War II. The Germans, Japanese, Americans and British
were all using radar—which had been discovered in 1935 by Scottish physicist Sir
Robert Alexander Watson-Watt—to warn of approaching planes while they were
still miles away. The problem was there was no way to identify which planes
5
belonged to the enemy and which were a country’s own pilots returning from a
mission. The Germans discovered that if pilots rolled their planes as they returned
to base, it would change the radio signal reflected back. This crude method alerted
the radar crew on the ground that these were German planes and not Allied aircraft
(this is, essentially, the first passive RFID system). Under Watson-Watt, who
headed a secret project, the British developed the first active identify friend or foe
(IFF) system. They put a transmitter on each British plane. When it received
signals from radar stations on the ground, it began broadcasting a signal back that
identified the aircraft as friendly. RFID works on this same basic concept. A signal
is sent to a transponder, which wakes up and either reflects back a signal (passive
system) or broadcasts a signal (active system).
Retrieved from https://www.rfidjournal.com/articles/view?1338
7
2.2 CLASSIFICATION OF RFID TAGS
Before we continue with our report let look at the concept of the project
A RFID based Door Lock or Access Control System is based on some simple
concepts. We store a set of RFID card data in our system, say 3 or 10 RFID card
data. When the person with the right RFID card (compatible to data preloaded in
our program/system) come and swipes his RFID tag, access will be granted. When
the person with the wrong RFID card (whose data is not loaded in our system)
swipes his RFID tag, access will be denied. I hope you understand the system
concept of RFID based Door Lock.
So, from Ohm’s Law, the current that the capacitor allows is given by I = V/R.
Hence, the current through the capacitor is = 230/1447.59 = 0.158 Amperes =
158mA.
This is the total current that enters the bridge rectifier. Now, output of the Bridge
Rectifier is filtered using a Capacitor. It is important to select an appropriated
voltage rating for this capacitor.
The input to the Bridge Rectifier is 230V AC, which is the RMS Voltage. But the
maximum voltage at the input of the Bridge Rectifier is given by
VMAX = VRMS x √2 = 230 x 1.414 = 325.26 V.
Hence, you need to use a 400V rated filter capacitor. The Rectified DC voltage is
around 305V. This must be brought down to a usable range for lighting up the
LED. Hence, LM78xx series regulator is used in the project.
An LM7805 is used for this purpose. There are three important factors associated
with the LM7805 that is acting as a regulator: A Series Resistor, Power rating of
10
that Resistor and the Power Rating of the regulator first, and the Series Resistor.
This resistor will limit the current flowing through the regulator. The following
formula can be used in selecting the series resistor.
RS – VIN – VR/IL + IR
Here, VIN is the input voltage to the Zener Diode and is = 305V.
VR is the Regulator Voltage (which is same as the load voltage VL) = 5V.
IL is the load current i.e. the current through the LED and is = 5mA.
IZ is the current through the Regulator and is = 1000mA.
Therefore, the value of the Series Resistor RS can be calculated as follows.
RS = 305 – 5/ 5*10-3+10*10-3 = 20,000/ approx. 20k
Now, the Power rating of this Resistor. The Power Rating of the series resistor is
very important as it determines the amount of power the resistor can dissipate. To
calculate the power rating of the Series Resistor R S, you can use the following
formula.
Power Rating of Rs = (VIN – VR)2/ RS = (305 – 5)2 / 20000 = 4.5W
Finally, the Power Rating of the Regulator. You can use the following formula to
calculate the Power Rating of the Zener Diode.
Power Rating Of Regulator = (VIN-VR)*VR/RS = (305-5)*5/20000 = 0.08W
Based on the above calculations, we have chosen the series resistor of 20KΩ
Resistance rated at 5W and a 5V regulator rated at 1W (actually, a quarter Watt
regulator would suffice).
Power module:
The power module unit consist of a step down transformer of a value 240-12volt
were connected to the four diodes which were connected back to back and front to
front to the capacitor(100nf/50volt) and the diode convert the alternative current
of 12V which is the output from the transformer to direct current. The rectified
output passes through an electrolytic capacitor to filter out the ripples. The resistor
in this power module unit was used as a current limiter (i.e. current limiting
resistor) also an indicator which is a light emitting diode (LED) was used to
indicate the presence of alternative current in the circuit.
RFID module:
The RFID module unit is consist of passive smart card reader that is connected to
the micro-controller (AT89S52) through the serial port of the controller, A Passive
type RFID Card is used in this project. When this card is placed near the RFID
Reader Module, the antenna coil in the Reader energies the coil in the RFID card
through mutual induction. As a result, the microchip in the reader also gets enough
power to turn it on. Now the coil in the reader acts as an antenna and transfers the
data in the microchip to the reader module through radio communication. The
reader module, then communicates with the microcontroller through UART
protocol to transfer the data received from the card.
DISPLAY UNIT
12
In this display unit an 2x16 LCD is used to display massage for the user weather
he/she is using the correct card, if using correct card it will display access granted
but in a situation where by the user is with a wrong card it will display access
denied.
LOAD UNIT
This unit consist of a high power motor driver that is build around LM293 IC that
is used to drive a dc motor, so when the user swipe a correct card on the module it
activate the motor through the IC.
AT89S52 UNIT
8052 microcontroller is used for controlling the complete process of this RFID
based door control system. Here by using 8052 we are receiving RFID data and
sending status or messages to LCD and also controlling the load that is connected
to the load driving unit.
13
Fig 3.03 The power supply diagram of RIFD based door control
14
3.5 PROGRAM FLOW CHART
START
INITIALIZEING
NO
IS CARD
CLOSE TO READER
YES
IS CODE NO
ACCESS DENIED
OK
YES
ACCESS GRANTED
STOP
15
CHAPTER FOUR
Circuit Construction
The main components of our project are Microcontroller, RFID Reader, RFID
Cards or Tags, an LCD display, L293D Motor Driver IC and a Motor. For the
microcontroller to function properly, we need to connect an 11.0592 MHz
oscillator along with two ceramic capacitors of capacitance 33pF to the
microcontroller. Pin 31 of the microcontroller i.e. EA Pin is connected to 5V using
a current limiting resistor of resistance 10KΩ.In order to reset the microcontroller,
the RST pin (Pin 9) must be momentarily connected to 5V. Hence, a combination
of push button, 10KΩ resistor and 10µF capacitor is used in the reset circuit. An
LCD Display is used in this project to display the details of the card. The data pins
of the LCD are connected to PORT1.The control pins are connected to P3.6, GND
and P3.7 and a 10KΩ potentiometer is connected to adjust the contrast. The next
component we need to connect to the microcontroller is the RFID reader module.
The communication between the Reader and the microcontroller is using UART
protocol. Hence, we need to use the TX and RX pins for communication. Connect
the RXD pin (Pin 3.0) of the microcontroller to the TX pin of the RFID Reader
module. Similarly, connect the TXD pin (P3.1) of the microcontroller to the RX
pin of the RFID Reader module. Finally, we need to connect the motor driver IC to
the PORT0 of the microcontroller. An important note is that Port 2 pins must be
externally pulled high in order to use them as input / output pins. Connect the two
input pins of the motor driver i.e. IN1 and IN2 (Pins 2 and 7) to Port 2 pins i.e.
P2.0 and P2.1 of the microcontroller. A motor is connected to output pins of the
motor driver. And the hole circuit is power with AC supply rectifying circuit that is
used to convert AC to DC.
16
4.1COMPOMENT DESCRIPTION
Features
• Output Current up to 1A
• Output Voltages of 5, 6, 8, 9, 10, 12, 15, 18, 24V
• Thermal Overload Protection
• Short Circuit Protection
• Output Transistor Safe Operating Area Protection
17
Microcontroller
FEATURES
• 4 KB Reprogrammable flash.
• 32 Programmable I/O lines.
• 16 bit Timer/Counter 2.
18
• 8 Interrupt sources.
• Power range: 4V – 5.5V
• Endurance : 1000 Writes / Erase cycles
• Fully static operation: 0 Hz to 33 MHz
• Three level program memory lock
• Full duplex UART serial channel
• Low power idle and power down modes
• Interrupt recovery from power down modes
• 128 B internal RAM.
Pin description
VCC
The VCC pin if for the supply voltage. The microcontroller supply voltage is 5
volts. The VCC is applied at pin no.40 of the microcontroller as shown in figure-
3.02.
GND
The GND is for ground. In microcontroller ground is at pin no.20 as shown in
figure-3.02.
19
OSCILLATOR (XTAL1 AND XTAL2)
The XTAL1 and XTAL2 are provided for connecting a resonant network to form
an oscillator. Crystal frequency ranges from 1MHz to 16MHz. the oscillator
formed by the crystal, capacitor and an on-chip inverter generates a pulse train at
frequency of the crystal.
Port 0
Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can
sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as
high impedance inputs. Port 0 can also be configured to be the multiplexed low-
order address/data bus during accesses to external program and data memory. In
this mode, P0 has internal pull-ups. Port 0 also receives the code bytes during
Flash programming and outputs the code bytes during program verification.
External pull-ups are required during program verification.
Port 1
Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output
buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they
are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1
pins that are externally being pulled low will source current (IIL) because of the
internal pull-ups. In addition, P1.0 and P1.1 can be configured to be the
timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger input
(P1.1/T2EX), respectively, as shown in the following table. Port 1 also receives the
low-order address bytes during Flash programming and verification.
Port 2
Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output
buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they
are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2
pins that are externally being pulled low will source current (IIL) because of the
internal pull-ups. Port 2 emits the high-order address byte during fetches from
external program memory and during accesses to external data memory that uses
16-bit addresses (MOVX @DPTR). In this application, Port 2 uses strong internal
pull-ups when emitting 1s. During accesses to external data memory that uses 8-bit
addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function
Register. Port 2 also receives the high-order address bits and some control signals
during Flash programming and verification.
20
Port 3
Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output
buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they
are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3
pins that are externally being pulled low will source current (IIL) because of the
pull-ups.
RST
Reset input high on this pin no.9 as shown in figure-3.3 for two machine cycles
while the oscillator is running resets the device. This pin drives high for 98
oscillator periods after the Watchdog times out. The DISRTO bit in SFR AUXR
(address 8EH) can be used to disable this feature. In the default state of bit
DISRTO, the RESET HIGH out feature is enabled.
ALE/PROG
Address Latch Enable (ALE) is an output pulse for latching the low byte of the
address during accesses to external memory. The ALE pin is pin no.30 in the
microcontroller chip as shown in figure-3.06. This pin is also the program pulse
input (PROG) during Flash programming. In normal operation, ALE is emitted at a
constant rate of 1/6 the oscillator frequency and may be used for external timing or
21
clocking purposes. Note, however, that one ALE pulse is skipped during each
access to external data memory. If desired, ALE operation can be disabled by
setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a
MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the
ALE-disable bit has no effect if the microcontroller is in external execution mode.
PSEN
Program Store Enable (PSEN) is the read strobe to external program memory. The
PSEN pin is pin no.29 in the microcontroller chip. When the PV89V51RD2 is
executing code from external program memory, PSEN is activated twice each
machine cycle, except that two PSEN activations are skipped during each access to
external data memory.
EA/VPP
External Access Enable. The EA/VPP is pin no.31 in microcontroller. EA must be
strapped to GND in order to enable the device to fetch code from external program
memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1
is programmed, EA will be internally latched on reset. EA should be strapped to
VCC for internal program executions. This pin also receives the 12-volt
programming enable voltage (VPP) during Flash programming.
Resistor:
23
Capacitor
Types of capacitor
24
When there is a potential difference (voltage) across the conductors, a static
electric field develops across the dielectric, causing positive charge to collect on
one plate and negative charge on the other plate. Energy is stored in the
electrostatic field. An ideal capacitor is characterized by a single constant value,
capacitance, measured in farads. This is the ratio of the electric charge on each
conductor to the potential difference between them.
The capacitance is greatest when there is a narrow separation between large areas
of conductor; hence capacitor conductors are often called "plates," referring to an
early means of construction. In practice, the dielectric between the plates passes a
small amount of leakage current and also has an electric field strength limit,
resulting in a breakdown voltage, while the conductors and leads introduce an
undesired inductance and resistance. Capacitors are widely used in electronic
circuits for blocking direct current while allowing alternating current to pass, in
filter networks, for smoothing the output of power supplies, in the resonant circuits
that tune radios to particular frequencies and for many other purposes.
The simplest capacitor consists of two parallel conductive plates separated by a
dielectric with permittivity ε (such as air). The model may also be used to make
qualitative predictions for other device geometries. The plates are considered to
extend uniformly over an area A and a charge density ±ρ = ±Q/A exists on their
surface. Assuming that the width of the plates is much greater than their separation
d, the electric field near the centre of the device will be uniform with the
magnitude E = ρ/ε. The voltage is defined as the line integral of the electric field
between the plates. Solving this for C = Q/V reveals that capacitance increases
with area and decreases with separation
εA
C=
d
.
The capacitance is therefore greatest in devices made from materials with a high
permittivity, large plate area, and small distance between plates.
These LCD screens are limited to monochrome text and are often used
in copiers, fax machines, laser printers, industrial test equipment, networking
equipment such as routers and storage devices.
The screens come in a small number of standard configurations. Common sizes are
8x1 (one row of eight characters), 16×2, 20×2 and 20×4. Larger custom sizes are
made with 32, 40 and 80 characters and with 1, 2, 4 or 8 lines. The most commonly
manufactured larger configuration is 40×4 characters, which requires two
individually addressable HD44780 controllers with expansion chips as a single
HD44780 chip can only address up to 80 characters. A common smaller size is
27
16×2, and this size is readily available as surplus stock for hobbyist and
prototyping work.
Character LCDs can come with or without backlights, which may
be LED, fluorescent, or electroluminescent. Character LCDs use a standard 16
contact interface, commonly using pins or card edge connections on 0.1 inch /
2.54mm centers. Those without backlights may have only 14 pins, omitting the
final two pins powering the light.
The pin out is as follows:
• Ground
• VCC (+3.3 to +5V)
• Contrast adjustment (VO)
• Register Select (RS). RS=0: Command, RS=1: Data
• Read/Write (R/W). R/W=0: Write, R/W=1: Read
• Clock (Enable). Falling edge triggered
• Bit 0 (Not used in 4-bit operation)
• Bit 1 (Not used in 4-bit operation)
• Bit 2 (Not used in 4-bit operation)
• Bit 3 (Not used in 4-bit operation)
• Bit 4
• Bit 5
• Bit 6
• Bit 7
• Backlight Anode (+)
• Backlight Cathode (-)
The nominal operating voltage for LED backlights is 5V at full brightness, with
dimming at lower voltages dependent on the details such as LED color. Non-LED
backlights often require higher voltages.
The LCD interface allows for two modes of operation, 8-bit and 4-bit. Using the 4
bit mode is more complex, but reduces the number of active connections needed.
The chip starts in 8 bit mode, with the instruction set designed to allow switching
without requiring the lower four data pins. Once in 4 bit mode, character and
control data is transferred as pairs of 4 bit "nibbles" on the upper data pins, D4-D7.
28
L293D IC
29
Fig. 4.10 L293D Pin Diagram
Working of L293D
There are 4 input pins for l293d, pin 2,7 on the left and pin 15 ,10 on the right as
shown on the pin diagram. Left input pins will regulate the rotation of motor
connected across left side and right input for motor on the right hand side. The
motors are rotated on the basis of the inputs provided across the input pins as
LOGIC 0 or LOGIC 1.
In simple you need to provide Logic 0 or 1 across the input pins for rotating the
motor.
30
Crystal oscillator
Electronic symbol
31
Fig. 4.11 Crystal oscillator
32
The crystal oscillator circuit sustains oscillation by taking a voltage signal from the
quartz resonator, amplifying it, and feeding it back to the resonator. The rate of
expansion and contraction of the quartz is the resonant frequency, and is
determined by the cut and size of the crystal. When the energy of the generated
output frequencies matches the losses in the circuit, an oscillation can be sustained.
An oscillator crystal has two electrically conductive plates, with a slice or tuning
fork of quartz crystal sandwiched between them. During startup, the controlling
circuit places the crystal into an unstable equilibrium, and due to the positive
feedback in the system, any tiny fraction of noise is amplified, ramping up the
oscillation. The crystal resonator can also be seen as a highly frequency-selective
filter in this system: it only passes a very narrow sub band of frequencies around
the resonant one, attenuating everything else. Eventually, only the resonant
frequency is active. As the oscillator amplifies the signals coming out of the
crystal, the signals in the crystal's frequency band becomes stronger, eventually
dominating the output of the oscillator. The narrow resonance band of the quartz
crystal filters out all the unwanted frequencies. The output frequency of a quartz
oscillator can be either that of the fundamental resonance or of a multiple of that
resonance, called a harmonic frequency. Harmonics are an exact integer multiple
of the fundamental frequency. But, like many other mechanical resonators, crystals
exhibit several modes of oscillation, usually at approximately odd integer multiples
of the fundamental frequency. These are termed "overtone modes", and oscillator
circuits can be designed to excite them. The overtone modes are at frequencies
which are approximate, but not exact odd integer multiples of that of the
fundamental mode, and overtone frequencies are therefore not exact harmonics of
the fundamental. High frequency crystals are often designed to operate at third,
fifth, or seventh overtones. Manufacturers have difficulty producing crystals thin
enough to produce fundamental frequencies over 30MHz. To produce higher
frequencies, manufacturers make overtone crystals tuned to put the 3rd, 5th, or 7th
overtone at the desired frequency, because they are thicker and therefore easier to
manufacture than a fundamental crystal that would produce the same frequency—
although exciting the desired overtone frequency requires a slightly more
complicated oscillator circuit. A fundamental crystal oscillator circuit is simpler
and more efficient and has more pull ability than a third overtone circuit.
Depending on the manufacturer, the highest available fundamental frequency may
be 25 MHz to 66MHz. A major reason for the wide use of crystal oscillators is
their high Q factor. A typical Q value for a quartz oscillator ranges from 104 to 106,
compared to perhaps 102 for an LC oscillator. The maximum Q for a high stability
33
quartz oscillator can be estimated as Q = 1.6 × 107/f, where f is the resonant
frequency in megahertz.
One of the most important traits of quartz crystal oscillators is that they can exhibit
very low phase noise. In many oscillators, any spectral energy at the resonant
frequency is amplified by the oscillator, resulting in a collection of tones at
different phases. In a crystal oscillator, the crystal mostly vibrates in one axis;
therefore only one phase is dominant. This property of low phase noise makes
them particularly useful in telecommunications where stable signals are needed
and in scientific equipment where very precise time references are needed.
Environmental changes of temperature, humidity, pressure, and vibration can
change the resonant frequency of a quartz crystal, but there are several designs that
reduce these environmental effects. These include the TCXO, MCXO, and OCXO
which are defined below. These designs, particularly the OCXO, often produce
devices with excellent short-term stability. The limitations in short-term stability
are due mainly to noise from electronic components in the oscillator circuits. Long-
term stability is limited by aging of the crystal.
Due to aging and environmental factors (such as temperature and vibration), it is
difficult to keep even the best quartz oscillators within one part in 10 10 of their
nominal frequency without constant adjustment. For this reason, atomic oscillators
are used for applications requiring better long-term stability and accuracy.
34
The relay driver uln2003 IC is a high voltage and current Darlington array IC, it
comprises of 7-open collector Darlington pairs with common emitters. A pair of
Darlington is an arrangement of two bipolar transistors. This IC belongs to the
family of ULN200x ICs and various types of this family interface to various logic
families. This ULN2003 IC is for 5V TTL and CMOS logic devices. These ICs are
used as relay drivers as well as to drive a wide range of loads, line drivers, display
drivers etc. This IC is also normally used while driving Stepper Motors. The pairs
of Darlington in ULN2003 is esteemed at 500mA and can withstand peak current
of 600mA.In the pin layout, the i/ps & o/ps are provided reverse to each other.
Each driver also has a suppression diode to dissipate voltage spikes while driving
inductive loads
The ULN2003 IC consists of eight NPN Darlington pair which provides the proper
current amplification required by the loads. We all know that the transistors are
used to amplify the current but here Darlington transistor pairs are used inside the
IC to make the required amplification.
A Darlington pair is two transistors that act as a single transistor providing high
current gain. In this pair the current amplified by the first transistor is further
amplified by the next transistor providing high current to the output
terminal. When no base voltage is applied that when no signal is is given to the
input pins of the IC, there will be no base current and transistor remains in off
state. When high logic is fed to the input both the transistors begin to conduct
providing a path to ground for the external load that the output is connected. Thus
35
when an input is applied corresponding output pin drops down to zero there by
enabling the load connected to complete its path.
Transformers
36
Transformation Ratio.
Basic Transformer operation can be described by two formulae relating the
transformation ratio to the turns ratio of the transformer windings.
VP = the primary voltage.
IP = the primary current.
VS = the secondary voltage.
IS = the secondary current.
NP = the number of turns in the primary winding.
NS = the number of turns in the secondary winding.
Multi-meter
37
Multi-meters are Analog and consists of a pointing needle. Modern Multi-meters
are Digital and are often called as Digital Multi-meters or DMMs.
38
CHAPTER FIVE
S/N Description Qty Price per rate (N) Total price (N)
1 IN40007 6 30 180
2 Resistor 6 20 120
39
CHAPTER SIX
6.0 CONCLUSION
In conclusion, the aim of this project is to design an RFID based security access
control system using 8051 microcontroller, in which only authorized personnel are
allowed access to a secure area. The working of the project is explained here.
When the circuit is powered ON, the microcontroller will initially display a
message as “Swipe the Card” on the LCD display. When the RFID Card or Tag is
swiped against the RFID reader, it will detect the ID card and sends the unique
card no. to the microcontroller via serial terminal. With the help of suitable
programming, we need to compare the received card no. with the numbers that are
already stored in the microcontroller or any database like external memory unit. If
the received number is matched with the already stored number, then the
microcontroller will display the name of the card holder on the LCD and activates
the motor driver IC. As a result, the door is opened for a predefined duration after
which the door is automatically closed. If there is no match for the received
numbers with the stored numbers, then the microcontroller will not open the door
and displays a message as “Access Denied” on the LCD display.
40
6.1 RECOMMENDATION
We are recommending this project to industries, house and organization that needs
a security system that will prevent unauthorized personnel to enter some areas in
the office, if they have been using other types of security gadget and is not serving
them well, we recommend they try this our new project because it will serve them
better in the area of security.
41
6.2 REFERENCE
1. B. Yan and D. Y. Lee, “Design of spot ticket management system based on
RFID,” in Proc. International Conference on Networks Security, Wireless
Communications and Trusted Computing, 2009, pp. 496-499.
2. D. L. Wu, Wing W. Y. NG, Patrick P. K. Chan, H. L. Ding, B. Z. Jing, and
D. S. Yeung, “Access control by RFID and face recognition based on neural
network,” in Proc. International Conference on Machine Learning and
Cybernatics, July 11-14, 2010, pp. 675-680.
3. D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding, “A brief survey on
current RFID applications,” in Proc. International Conference on Machine
Learning and Cybernatics, Baoding, July 12-15, 2009, pp. 2330-2334.
4. F. Lourenco and C. Almeida, “RFID based monitoring and access control
system,” in Proc. INFORUM, 2009.
5. G. Ostojic, S. Stankovski, and M. Lazarevic, “Implementation of RFID
technology in parking lot access control system,” in Proc. Annual RFID
Eurasia Conference, 2007, pp. 1-5.
6. K. S. Huang and S. M. Tang, “RFID applications strategy and deployment in
bike renting system,” in Proc. ICACT 2008, pp. 660-663.
7. L. Meng, Z. W. Song, and X. Y. Li, “RFID-Based security authentication
system based on a novel face-recognition structure,” in Proc. WASE
International Conference on Information Engineering, 2010, pp. 97-100.
8. N. Ahmad, S. Butler, and U. Ramachandran, “GuardianAngel: An RFID
based indoor guidance and monitoring system,” 2010, pp. 546-551.
9. M. A. Mazidi, J. C. Mazidi, and R. D. Mckinaly, The 8051 Microcontroller
and Embedded Systems, Pearson Education, 2006.
10. R. Weinstein, “RFID: A technical overview and its application to the
enterprise,” IT Professional, 2006, vol. 7.
11. S. Lahiri, RFID sourcebook, IBM Press, Westford, Massachusetts, 2006.
12. en.m.wikipedia.org/wiki/blockdiagram/
13. https://www.rfidjournal.com/articles/view?1338
14. https://www.rfidjournal.com/articles/view?1338/2
15. https://www.electronicshub.org/rfid-security-access-control-system/
42