1 / 24

S U I I T

S U I I T . Sambalpur University Institute of Information Technology. Dept. of Electronics & Communication Engineering. PROJECT PRESENTATION:2012. PROJECT PRESENTATION:2012. RFID BASED ACCESS CONTROL SYSTEM . S U I I T. Done By: Barada Pr. Biswal Suvendu Ku. Dash

tuvya
Download Presentation

S U I I T

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. S U I I T Sambalpur University Institute of Information Technology Dept. of Electronics & Communication Engineering PROJECT PRESENTATION:2012

  2. PROJECT PRESENTATION:2012 RFID BASED ACCESS CONTROL SYSTEM S U I I T Done By: Barada Pr. Biswal Suvendu Ku. Dash Prabhanjan Ku. Sahoo AninditaNayak Sharmistha Nayak

  3. PROJECT PRESENTATION:2012 • OVERVIEW: • INTRODUCTION • BLOCK DIAGRAM • TOOL & RESOURCE • CONCEPT USED • CIRCUIT DIAGRAM • WORKING • VIDEO • APPLICATION • ADVANTAGES • DISADVANTAGES • FUTURE ASPECTS/CONCLUSION • REFERENCE RFID BASED ACCESS CONTROL SYSTEM

  4. PROJECT PRESENTATION:2012 • INTRODUCTION: • RFID Access Control use in three different places • Residential Access Control: • Un-manned access control at all entry points • •Restrict access by user and by entry point • •Audit trail of entry point and time • •Audit trail of exit point and time • •Manage vehicle and people entry points RFID BASED ACCESS CONTROL SYSTEM

  5. PROJECT PRESENTATION:2012 2.Commercial Access Control: •Un-manned access control at all entry points •Control access by company, employee and visitor •Restrict access by user and by entry point •Audit trail of entry point and time •Audit trail of exit point and time •Manage vehicle and people entry points RFID BASED ACCESS CONTROL SYSTEM

  6. PROJECT PRESENTATION:2012 3.Security Access and Control: •Restricted access by user, location and time of day. •Exception report for access to sensitive areas RFID BASED ACCESS CONTROL SYSTEM

  7. PROJECT PRESENTATION:2012 Block Diagram: RFID BASED ACCESS CONTROL SYSTEM

  8. PROJECT PRESENTATION:2012 • Tool & Resource : • SOFTWARES: • PROTEUS VERSION 7.0 • KEIL version 4.0 • TOPWIN 6.0 • EXPRESS PCB • HARDWARES: • Breadboard • Power supply • 8051 microcontroller • L293D IC • MAX232 IC • RS232 ports • RFID transmitter and receiver • motor • printed circuit board • Wires and Solder RFID BASED ACCESS CONTROL SYSTEM

  9. PROJECT PRESENTATION:2012 • Concept used : • 8051 Microcontroller: • A 8051 microcontroller have • 4 ports and each ports • Having 8 pins. • It is 40 pins IC • 4k ROM(on chip program • Space in bytes) • 128 bytes RAM • 2 Timers • 32 I/O pins • 1 serial ports • 6 Interrupts sources RFID BASED ACCESS CONTROL SYSTEM

  10. PROJECT PRESENTATION:2012 • RS232: • To allow compatibility among data communication equipment. • It is in DB 25 and DB 9. • It is most widely used in serial I/O Interfacing standard. • The I/O are not TTL compatible, In RS232 1 is represented by • -3 to-25v ,While a 0 bit is +3 to +25v ,making -3 to +3 undefined we must use a voltage converter such ac MAX232. RFID BASED ACCESS CONTROL SYSTEM

  11. PROJECT PRESENTATION:2012 • MAX232 IC: • It is 14 pin IC. • A line driver such as the MAX232 chip is required to convert RS232 voltage levels to TTL levels, and vice versa • 8051 has two pins that are used specifically for transferring and receiving data serially. • These two pins are called TxD and RxD and are part of the port 3 group (P3.0 and P3.1). • These pins are TTL compatible; therefore, they require a line driver to make themRS232 compatible. RFID BASED ACCESS CONTROL SYSTEM

  12. PROJECT PRESENTATION:2012 • L293D: • It is 16 pin IC. • The L293D device is a monolithic integrated high voltage, high current four channel driver designed to accept standard DTL & TTL logic levels & drive inductive loads(such as relays solenoids, DC and stepping motors) and switching power transistors. • It is use as a motor driver. RFID BASED ACCESS CONTROL SYSTEM

  13. PROJECT PRESENTATION:2012 • LCD: • It able to display numbers characters, and graphics. • It has 14 pin RFID BASED ACCESS CONTROL SYSTEM

  14. PROJECT PRESENTATION:2012 Circuit Diagram : RFID BASED ACCESS CONTROL SYSTEM

  15. PROJECT PRESENTATION:2012 • Working : • Low frequency RFID works on the principle of radio waves and at the frequency of 125 KHz. • There is a coil inside the RFID tag and when it is influenced by magnetic field, it sends an identity code to a device for further processing. • The RFID tag is used as an identity for a particular user. If the identity (serial number of the tag) of the user is matched with the one already stored in this system, he gets immediate access through it. • In beginning, the user is prompted to scan his tag or ID. The serial code of the tag is identified by the reader module and is sent to AT89C51 for checking. RFID BASED ACCESS CONTROL SYSTEM

  16. PROJECT PRESENTATION:2012 • If the ID is matched by the microcontroller, the user gets the access. On the contrary, if the tag is not identified, a message (‘Access Denied’) is displayed on LCD screen. RFID BASED ACCESS CONTROL SYSTEM

  17. PROJECT PRESENTATION:2012 Video: RFID BASED ACCESS CONTROL SYSTEM

  18. PROJECT PRESENTATION:2012 • Application: • Security Purpose • Unauthorized Access Control • Automated database updation RFID BASED ACCESS CONTROL SYSTEM

  19. PROJECT PRESENTATION:2012 • Advantages: • An RFID smart card-based system may reduce operation costs in the long run. • RFID equipment damage occurs much less frequently than is the case with magnetic strips or bar codes present on Charlie Tickets. RFID BASED ACCESS CONTROL SYSTEM

  20. PROJECT PRESENTATION:2012 • Disadvantage: • In the short run, costs of diffusion and implementation for an RFID access control system is more. • Poor read rate can occur if the reader and receiver are not properly aligned. RFID BASED ACCESS CONTROL SYSTEM

  21. PROJECT PRESENTATION:2012 • Future aspects: • Fpga based access control system • Vision control access systems RFID BASED ACCESS CONTROL SYSTEM

  22. PROJECT PRESENTATION:2012 REFERENCE… • www.google.com • www.efy.com • www.wikipedia.com • www.datasheetcatalog.com • www.EngineersGarage.com • Muhammad Ali Mazidi-The 8051 Microcontroller and Embedded Systems Using Assembly and C language S U I I T

More Related