Вы находитесь на странице: 1из 7

Device Monitoring and Controlling using Mobile

Telephony
Akash D.K.
Email: dk.akash191@gmail.com
IV Semester, Department of Electronics and Communication Engineering, JNNCE,
Shivamogga , India

digital information or sending and receiving messages or


Abstract: Nowadays, the communications becomes very phone calls is increasingly under individual control. If
simple, fast, interactive and more compact, that makes one can conduct business from anywhere, then one can be
the globe as a small village. So it is very easy for anyone anywhere when conducting business. For example,
to subscribe in the local or global telecommunication mobile phones may not reveal one's location to the party
networks with individual mobile phone as they are at the other end of the line as readily as stationary ones.
becoming multipurpose devices. These devices are
capable of storing data as well as running custom With todays and tomorrows wireless
application. As more people adopt these devices and technologies, such as IEEE 802.11, Blue tooth and 3G,
begin to use them for personal or business tasks, the mobile devices will frequently be in close and interactive
need for controlling access to the data stored within the communication. Many environments including offices,
devices will become vital. In this white paper we will meeting rooms, automobiles and class rooms already
describe how mobile phones can be used for remote contains many computers and computerized applications,
monitoring and control by augmenting an existing or and the smart homes of the nearest future will have
new product with an embedded information-server, the ubiquitous embedded computation. Remote control with
product can be remotely controlled in a very cost small mobile device is a challenge for mobile/ubiquitous
effective way. We will describe the many different computing. Enabling users to use data and functions
benefits of using mobile communication by a set of stored in/served by their home/office PCs from anywhere
example scenarios in various fields of applications. with small mobile devices is beneficial because users can
access the data/functions at any time they want without
Keywords: GSM, Information Server, DTMF, TOBE, carrying heavy notebook PCs. Further more, users can
Code controlled lock. control applications they want to keep running even while
they are absent.

1. Introduction In the next section we will take a look at some


Controlling devices using switches are common. different scenarios where mobile communication with
From a few decades controlling devices using remote embedding information servers implemented into devices
control switches like infrared remote control witch, have benefits for both the end user and the producer.
wireless remote control switches, light activated
switches are becoming popular. But these technologies 2. Modes of Operations
have their own limitations of range. Laser beams are First its necessary to clearly identify two different
harmful to mankind. Some technologies like IR remote modes of operation, based on the distance between
control are used for short distance applications. In such the user and the controlled device.
case if we have system which does not require any
radiations and not harmful which can be used from any 1). Short distance: Typically no longer than 10 or 100
distance from meters to thousand kilometers using a meters distance is allowed. In this mode the users
simple mobile phone. As mobile devices for terminal can connect directly to the device, e.g. via a
communication and computation gain more widespread radio link such as Bluetooth. This incurs no connection or
acceptance, where a person is located when processing traffic-fee. One important aspect of the short distance
mode is that only a limited number of information servers The device is to be located where wired networks
are available at any instant. This, in turn, makes features are not available (e.g. houses, rural areas, etc.).
like service discovery and service activation possible. In
section 2.3 we will discuss these features more Ease of connection is important.
thoroughly.
3.1.1 GSM
2. Long distance: When the distance is too long to The most widespread, wide area, wireless, digital
establish a direct connection. In this mode the terminal network is the GSM (Global System for Mobile
need to connect to the device via a network, typically this Telephony) Network. GSM is a digital cellular network,
will be a digital cellular network (e.g. GSM or UMTS) or originally indented for voice telephony. GSM is available
the internet (or a combination of the two). In this case the allover the world and is also a digital network for mobile
communication with the device will be associated with a telephony. In addition to voice telephony, GSM provides
traffic fee. In this mode the number of information servers a circuit switched data bearer. The widespread availability
available are tremendous, thus there can be no automatic of digital cellular networks makes them ideal bearers for
service discovery or service activation. Instead, the user some embedded information-servers. For instance, in the
must explicitly request information from a particular service and support scenario, to an international vendor/
information server, e.g. by placing a data call directly to a manufacturer of devices, the semi-global coverage of
modem connected to the information server. GSM is a great advantage. The bandwidth (i.e. data
transfer-rate) in GSM is relatively low, which limits the
3. Enabling Technology how interfaces are designed (e.g. large, colourful images
An embedded information-server will rely on at may take too long to download).
least two technologies,
1) First, there is a need for an information bearer. That 3.1.2 GPRS and UMTS
is, a communications medium, like a GSM mobile phones The present generations of digital cellular
network or a LAN (Local Area Network). networks, e.g. GPRS and UMTS (so called 2.5G and 3G
networks) will support packet switched data connectivity.
2) Second, the information needs to be encoded in a way In these systems, the fees will be based on the amount of
that the users terminal can understand and present to the traffic sent or received. An even more important aspect of
user. Also, the users terminal need a mechanism to the connection less nature of GPRS and UMTS is the fact
retrieve information from the server (e.g. like HTML and that accessibility to services is improved with virtually no
HTTP for the WWW). connection delay. Instead the terminal will behave as if
was always connected. Also the next generation networks
3.1 Information Bearers will deliver higher bandwidth(4G network), hence
For information bearers we will here only enabling new types of services having the requirement of
consider wireless alternatives. The rationale for this is higher bandwidths. For the embedded information-server,
that for most embedded information-servers, either the
device it is embedded in, or the user of the device, will
the next generation networks will have yet an advantage.
be mobile (or at least non-stationary). Thus, wired The fact that the terminal is always connected means that
bearers, such as LANs, have a more limited number of the server can send data to the terminal, without the user
scenarios where they are useful. A wireless bearer is initiating a session (i.e. establishing a data phone call).
generally the preference when either, This means that the server can send out, so called, push
data for important events. For the alarm systems, this
The device is moved around a lot (keeping it gives a way to send out alarms to users and initiate a
connected to a wired network becomes dialog with the user to decide how the alarm situation
troublesome). should be resolved. GPRS is currently being rolled out by
major GSM operators and is widely available where
The user is expected to move around while using GSM is available. UMTS, the successor to not only GSM
the device. but also to TDMA, have been deployed successively
staring in urban areas.
3) Scalability: Parallel processing technology ensures that
3.1.3 Bluetooth enormous volumes of information can be processed very
Bluetooth is short distance, low power, digital, quickly. It further ensures that processing capacity is
radio communications technology. It is standardized by never an inhibitor to achieving project results, allowing
Bluetooth SIG, which is supported by most silicon, solutions to easily expand to new hardware, and to fully
computer and wireless phone vendors. Bluetooth has been leverage the processing power of all available hardware.
designed to enable cordless connectivity between a
multitude of devices and user terminals. Bluetooth SIG 4)Reuse: By enabling integration logic to be packaged
envisions being used to connect: keyboards with and deployed as a service, technical teams using a service
computers, handsfree ear-pieces to phones laptops to oriented architecture (SOA) can leverage work done more
printers and to the internet. Another important usage for efficiently to build their solutions while ensuring that
Bluetooth is to connect wireless user terminals, like consistent rules are applied to information integration,
phones or PDAs (Personal Digital Assistants) to different improving data governance.
information servers. Naturally, some of these information
servers could embedded, hence allowing the user to In the next few section we will describe some
access information. In addition to connectivity, Bluetooth existing technologies that can be used when building
offers automatic service discovery Service discovery is embedded information servers.
the process of finding out which services are available at
a certain location. Bluetooth have several properties that 3.2.1 SMS
makes it attractive for embedded systems. The (relatively) SMS (Short Message Service) is provided by
low power-consumption makes it suitable for battery most digital cellular networks (including GSM and
driven (portable or handheld) devices. TDMA).Using SMS a GSM modem equipped
information server can send and receive message to a user
3.2 Information Servers with a mobile phone. The messages are limited in size
An information server is an integrated software (usually 160 characters) and the delay from sending a
platform consisting of a set of core functional modules message until it is received is typically around 10-20
that enables end users to integrate data from disparate seconds, but delays in the order of hours could sometimes
sources and deliver trusted and complete information at be experienced. This limitation (size and delay) obviously
the time it is required and in the format it is needed. put some constraint on what services could be
Similar to how an application server is a software engine implemented with SMS. However, SMS strength is its
that delivers applications to client computers, an wide availability. Currently, the number of mobile phone
information server deliver consistent information to subscribers is sky rocketing and have in some areas
consuming applications, business processes and portals. surpassed the number of fixed-line phone subscribers.
Since almost all mobile phones have the ability to send
The advantages of an Information Server are and receive SMS, an information server that uses SMS
1) Trust: An information server can be deployed to could be accessed by a large part of the potential users
continuously validate the consistency, accuracy and (without the need for upgrading any Phones).
quality of information as it flows from data sources and
across applications and business processes. Data quality is Also, SMS could be used in conjunction with the
ensured throughout the information lifecycle. server types described below. In this case, SMS can be
used to notify the users of events in the server (like an
2) Productivity: A unified platform with roll-based user alarm in a building going of, or a service engineer could
interfaces reduces training costs and learning curves receive the last few lines of an error log). Alternatively,
previously required to learn and manage different data SMS can be used to send a confirmation that some action
integration tools from multiple vendors. Technical teams was successfully performed, e.g. a service technician
get up to speed quickly and deliver projects faster. could request a system to perform some (time consuming)
self check, and when the system completes the check an
SMS is sent with the result.
located symmetrically at endpoints, as well as proxies and
registrars, operated by a third party. The protocol enables
users to be reachable regardless of their location or
terminals in use. The address of the user may either be a
SIP URL similar to an e-mail address, or a phone number.
The SIP infrastructure can be utilized in various
applications, such as Instant Messaging (IM).

3.2.4 Wireless Applications Protocol (WAP)


It was designed to remedy the problems with
using web servers in wireless networks and embedded
environments. It builds on the same concepts as the Web
and reuses much of techniques and standards for the Web.
The WAP standard calls for three different servers to be
Fig. 1 Matrix arrangement of DTMF involved in WAP communication. An ISP (Internet
Service Provider), a WAP gateway, and a web server.
3.2.2 DTMF: However, when building embedded information servers,
Dual-tone multi-frequency signaling (DTMF) these three can be efficiently combined into a single
entity, thus reducing the complexity of implementing
is used for telecommunication signaling over analog
WAP, but still gaining its benefits. We call such a
telephone lines in the voice-frequency band between combination a WAP server.
telephone handsets and other communications
devices and the switching center. The version of 5. Applying Technology
DTMF used for telephone tone dialing is known by
the trademarked term Touch-Tone, and is 5.1 Home Appliance Control System (HACS)
standardized by ITU-T recommendation .Other Home security has been a major issue where
multi-frequency systems are used for signaling crime is increasing and everybody wants to take proper
internal to the telephone network. It is a method for measures to prevent intrusion. In addition there was a
instructing a telephone switching system of the need to automate home so that user can take advantage of
telephone number to be dialed, or to issue commands the technological advancement in a system that allows
to switching systems or related telephony equipment. user to control home appliances ubiquitously and also
DTMF tones are simply two frequencies played provide security on detection of intrusion via SMS using
GSM technology. The architecture of HACS is as
simultaneously by a standard home phone/fax or
depicted in Fig.2.
mobile phone. Each key on your telephones keypad
has a unique frequency assigned to it. When any key Working:
is pressed on your telephones keypad (as shown in The working of HACS model (shown in Figure 2)
Fig.1) the circuit plays the corresponding DTMF is explained:
tone and sends it to your local exchange for
processing. 1). Home server: PC being the main module has HACS
system installed on it. The two subsystems; one being
appliances control is responsible for ubiquitous access of
3.2.3 Session Initiation Protocol (SIP) appliances and the second subsystem being security alert
It is a mechanism for setting up multimedia is responsible for security intrusion detection. Both
connections in fixed and broadband mobile IP networks, subsystems work on GSM technology for transmission of
e.g. in the all-IP release of UMTS (Universal Mobile instructions from sender to receiver.
Telecommunication System). The SIP architecture
consists of functional elements, which are user agents,
Fig.2 Trial Architecture of HACS

Fig. 3 The GUI developed on mobile phones Fig.4 TOBE Architecture for Smart Cars

2). Adapter: GSM modem acting as a terminal adapter is expensive, specialized diagnostic equipment need to be
a plug and play device and is attached to the PC which produced and the information-server will bridge the gap
then communicates with the PC via RS232 port. GSM between the aging technology in the vehicle and modern
modem is a bridge responsible for enabling/disabling of information browsers and newly produced maintenance
SMS capability. equipment. Cars are designed to move. The functions and
value a car create should be built upon the base of
3). Cell Phone: Mobile device communicates with the moving. Thanks to the advances of mobile information
GSM Modem via radio waves. The mode of and telecommunication technology, the mobile commerce
communication is wireless and mechanism works on the is now not impossible. The mobile technologies including
GSM technology. Cell phone has a SIM card and a GSM Global Positioning System (GPS), Global System for
subscription. This cell phone number is configured on the Mobile Communications (GSM), Short Messages Service
system. User transmits instructions via SMS and the (SMS) of GSM mobile phone, in-car computer, database,
system takes action against those instructions and also and other information technology are the key enable the
multimedia image captured by cameras can be viewed concept of the TOBE service.Yulon Nissan, a car
remotely as depicted below in Fig.3. manufacturer in Taiwan, launched the TOBE service in
June 2002. This TOBE service provides car
5.2 Automotive industry owners/drivers diversify information and services,
It is an industry where long lived, expensive products including real-time information, news, weather reports,
have to be maintained and upgraded throughout a discounts messages, valet order service, in-car online
product-lifespan of decades. Here, a standardized inform- shopping for souvenirs, flight and hotel reservation,
ation server could be the perfect maintenance tool. Not scenic spot messages, roadway guide, roadside assistance,
exceeding the speed limit alarms, tow-away alarms,
integrated GSM module, anti-theft notices, and collision
reports as shown in Fig.4.

5.3 Agricultural Area


Mobile Operators in India is testing a technology
that allows farmers to use their mobile phones to remotely
monitor and switch on irrigation pump sets in far flung
locations. In India, where the electricity supply is erratic,
farmers often walk several kilometers to where their
irrigation pumps are located, only to find that there is no
electricity available. By dialing a code number from his
mobile phone to a wireless device attached to the pump, Fig.5 Irrigation Control using Mobile Phone
farmers can now remotely monitor the electricity supply,
and also switch the pump on and off. The mobile phone system is composed of monitoring center, data
can be used by the farmer for other communications as transmission channel and data detection terminal.
well.
Many times over irrigation may erode the top
soil. In order to maintain the fertility of top soil the water 5.4 Security Systems
potential must be continuously monitored. For this This system relates to code controlled lock and
purpose a Remote real-time monitoring soil water particularly to a DTMF (Dual Tone Multi
potential system based on GSM is implemented in Frequency)code controlled lock device by which the
agriculture fields. Managing irrigation water needs to unlocking operation is carried out through the
combine a method of measuring soil moisture with some transmission of prearranged DTMF codes so as to ensure
methods of irrigation scheduling. The measuring soil complete security against unauthorized unlocking actions.
moisture requires timely application of the right state of Conventional locks such as key operated locks,
water . The state of water in soil is described in terms of combinational locks, push button locks etc suffer
the amount of water and the energy associated with the common problems like the unlocking portions of locks
forces which hold the water in the soil. The amount of are all exposed on an outside surface of the door. These
water is defined by water content and the energy state of exposed portions of the locks are susceptible to
the water is the water potential. In order to measure unauthorized unlocking actions and to being wrecked by
precisely soil water potential, many kinds of sensor were burglars. Therefore, security of the conventional locks
invented and applied in the agriculture production, With cannot be ensured
the development of information technology, it is possible
to remote measure soil water potential by mobile A DTMF-code controlled lock device mainly
communication system. Testified by practice, the composed of tow units: a key control unit(mobile phone)
information system successfully real-time monitors soil and a lock-body control unit. The key control unit,
water potential further guides farmer to precise irrigate adapted to be carried by a user includes a Dual-Tone
the crop. Multi Frequency (DTMF) sequence for inputting and
getting an unlocking DTMF code. The lock-body control
5.3.1 Basic structure of an information system unit, adapted to be installed in a security chest, door etc
The information system (Fig. 5) may realize a together with a security/door lock, includes a
series of functions including collecting, transporting, transducer(microphone) for transferring the DTMF code
storing, centralization, management, statistical analysis, signals received from the key control unit, a pair of
forecast and browning of soil water potential data. amplifying circuits connected in series with the
Making the classification according to the function, the transducer, a decoder with its input connected to the
amplifying circuits for decoding the DTMF signals into a
BCD code, a CPU with a pair of memory units coupled
with the output of the decoder for comparing the BCD
code with pre-stored one therein, and a relay circuit
coupled with the CPU in connection with the lock bolt for
effecting unlocking operations upon being energized by
the CPU if the comparison finds the two identical.

6. Conclusion
In this paper the concept of embedded information -
servers has been described. The question is only how to
tap the devices information or how to update it, thus
levering on existing technologies and devices for
accessing information.
A set of enabling technologies readily available
today, like DTMF, DECT, Bluetooth, GSM or GPRS and
3G networks are the best choice for monitoring and
controlling many systems. From the multitude of
available technologies, of which the most important once
where covered in this paper, we have concluded that
wireless communications will provide a robust, cost
effective, realistic alternative. Also, since these
technologies are based on standards that are supported by
all major communications vendors, they are the most
future-proof technologies available today.

References
[1]. Dr. Mikael Sjodin, Embedded Wireless Information
Servers,2001.
[2]. Kuang-Hui Chiu National Taipei University, Using Mobile
Communication Technology to Improve Automobile Consumers
Values,2005.
[3]. Yongming Zhao, Xin Lu* and Haijiang Wang, Remote real-time
monitoring soil water potential system based on GSM, 2007.
[4]. Jan Lucenius, Jani Suomalainen and Piia Ventola, Implementing
Mobile Access to Heterogeneous Home Environment.
[5].http:// ieeexplore.ieee.org/

Вам также может понравиться