CHAPTER ONE: INTRODUCTION
1. Introduction 2. Methodology 3. Scope of Work 4. Aims of the GSM Electronic Notice Board 5. Objectives of the GSM Home Appliance Control Device
CHAPTER TWO: THEORETICAL BACKGROUND AND LITERATURE REVIEW
2.0 Theoretical Background
2.1 GSM Architecture
2.2 Technical Details
2.3 Main Cellular Standards
2.4 GSM Frequencies
2.5 Network Structure
2.6 Subscriber Identity Module (SIM)
2.7 Literature Review
2.8 GSM Security
2.9 Circuit Diagram of the GSM Electronic Home Appliance Device and Power Supply
2.10 Components list of gsm based home appliance device
CHAPTER THREE: DESIGN AND CONSTRUCTION
3.1 GSM Modem
3.1.1 Accessing GSM MODEM using Microsoft HyperTerminal
3.2 Testing of GSM Modem
3.3 List of Important AT Commands
3.4 Microcontroller – MODEM Interfacing
3.4.1. DTE and DCE
3.4.2. RS-232
3.4.3. RTS/CTS Handshaking
3.4.4. Specifying Baud Rate, Parity & Stop bits
3.4.5 DCE Baud Rates
CHAPTER FOUR: TESTS, RESULTS, AND DISCUSSION
4.1 Testing a DB-9 RS-232 serial port in HyperTerminal
4.2 Testing and Observations
4.3 Operational Flowchart
4.4 Initializations
4.4.1 Serial transfer using TI and RI flags
4.4.2 Validity Check
4.4.3 Display
4.5 Programmer
4.6 Simulator
4.6 Burner
CHAPTER FIVE: RECOMMENDATION AND CONCLUSION
5.1 Conclusion
5.2 Problems Encountered
5.2 Future Improvement
5.3 Recommendation
REFERENCES
APPENDIX A: USER’S MANUAL
APPENDIX B: TROUBLESHOOTING MANUAL
APPENDIX C: PROGRAM FLOWCODE
APPENDIX D: CONSTRUCTION STAGES
CHAPTER ONE 1. Introduction
GSM and GPRS based Designs have developed another innovative and Public utility product for mass communication [1]. This is a Home Appliance Control Device which control the home appliances through messages
References: 6. Introduction to Robotics – P.J.Mc Kerrow, Addisson Wesley, USA, 1991 Bernard Sklar, Digital Communications: Fundamentals and Applications, Prentice Hall, 2001. 13. Jörg Eberspächer and Hans-Jörg Vögel. GSM switching, services and Protocols. John Wiley and Sons, 1999. 14. Klaus Vedder GSM: Security, Services, and SIM. State of the art in Applied Cryptography. Course on Computer Security and Industrial Cryptography. Leuven, Belgium, June 3-6, 1997.