2.War Haed Robot(Doc)

download 2.War Haed Robot(Doc)

of 94

Transcript of 2.War Haed Robot(Doc)

  • 7/28/2019 2.War Haed Robot(Doc)

    1/94

  • 7/28/2019 2.War Haed Robot(Doc)

    2/94

    DPH High byte

    P0 Port0

    P1 Port1

    P2 Port2

    P3 Port3

    IP Interrupt priority control

    IE Interrupt enable control

    TMOD Timer/counter mode controlTCON Timer/counter control

    T2CON Timer/counter 2 control

    T2MOD Timer/counter mode2 control

    TH0 Timer/counter 0high byte

    TL0 Timer/counter 0 low byte

    TH1 Timer/counter 1 high byte

    TL1 Timer/counter 1 low byte

    TH2 Timer/counter 2 high byte

    TL2 Timer/counter 2 low byte

    SCON Serial controlSBUF Serial data buffer

    RFID Radio Frequency IDentification

    MAX MAXIM (IC manufacturer )

    TTL Transistor to Transistor Logic

    ATM Automatic Teller Machine

    RS 232 Recommended Standard

    AC Alternating Current

    DC Direct Current

    LCD Liquid Crystal Display

    PC Personal Computer

    RPS Regulated Power Supply

    RMS Root Mean Square

    EEPROM Electrically Erasable Programmable ROM

    ROM Read Only Memory

    RAM Random Access Memory

    BIOS Basic Input Output System

    SRAM Static RAM

    EPROM Erasable Programmable ROM

    DRAM Dynamic Random Access Memory

    ISR Interrupt Service Routine

    I2C Inter Intergrated ChipTWI Two Wire Interface

  • 7/28/2019 2.War Haed Robot(Doc)

    3/94

    Figure Locations

    S.No. Figure Page No.

    1Components of Typical Linear PowerSupply

    2 An Electrical Transformer 3 Bridge Rectifier

    4 Bridge Rectifier Positive Cycle5 Bridge Rectifier Negative Cycle6 Three terminal voltage Regulator 7 Functional Diagram of Microcontroller8 Pin Diagram of Microcontroller 9 Oscillator connections

    10 External clock drive connections11 A register 12 B register 13 RAM14 RAM Allocation

    15 Register Banks16 PSW17 DPTR 18 SP19 PORT 020 TL0 and TH021 DB9222324

    25262728293031323334353637383940

    4. INTRODUCTION

    The aim of the project is design an unmanned robotic war head vehicle which can be used in the war

    fields which is remotely controlled via zig bee technology.

    This projects employees a tactual wheeled vehicle which is driven by two gear motor making it move

  • 7/28/2019 2.War Haed Robot(Doc)

    4/94

    The vechile is provided with a bomb detector which can detect land mine with war crafts safety guiding the

    robotic system .a voiding to walk through such hazardous conditions.

    The whole system which is explained above gets the commands from the base station through zig bee

    wireless technology

    5. Block Diagram

    TRNAMITTER SECTION:

    RECEIVER SECTION:

    MICRO

    CONTROLLE

    R

    Zig bee

    transmitter

    Buzzer

    LCD

    Power

    supply

    Keypad

    Microcontroller H Bridge

    H Bridge

    zigbee

    Bombdetector

    M1

    M2

    M3

  • 7/28/2019 2.War Haed Robot(Doc)

    5/94

    5.1Block Diagram Description

    Power Supply Section: This section is meant for supplying Power to all the sections mentioned above.It

    basically consists of a Transformer to step down the 230V ac to 9V ac followed by diodes. Here diodes are

    used to rectify the ac to dc. After rectification the obtained rippled dc is filtered using a capacitor Filter. A

    positive voltage regulator is used to regulate the obtained dc voltage.

    Microcontroller Section: This section forms the control unit of the whole project. This section basically

    consists of a Microcontroller with its associated circuitry like Crystal with capacitors, Reset circuitry, Pull

    up resistors (if needed) and so on. The Microcontroller forms the heart of the project because it controls the

    devices being interfaced and communicates with the devices according to the program being written.

    Keypad Section: This section consists of a Linear Keypad. This keypad is used to enter the no. of liters of

    petrol required. The keypad is interfaced to microcontroller which continuously scans the keypad.

    LCD Display Section: This section is basically meant to show up the status of the project. This project

    makes use of Liquid Crystal Display to display / prompt for necessary information.

    Buzzer: buzzer is used for the indication purpose .so here the buzzer is used for detection of bomb in the

    middle of the path.

    H Bridge: h bridge is used for the driving of the two motors at a time. So that we can move the robot in the

    required direction.

    Dc Motor: dc motor is mainly used for the motion of the robot so here we use four motor .two motors forthe motion of the robot, one motor for the rotation of the gun toward the target and fourth motor is used

    functioning of the gun.

    Metal Detector: metal detector is used for thedetection of the bomb in the path of the vechile in the war

    field.

    Zig bee: zig bee is a wireless technology used for the distance of 20 to 80 meters. Here we can transfer thedata from transmitter part to the receiver part beyond the distance using the different topology types.

  • 7/28/2019 2.War Haed Robot(Doc)

    6/94

    6. SCHEMATIC

    Schematic Description

    7.HARDWARE Components

    The Hardware components used in this project are

    Regulated Power Supply

    Microcontroller

    Keypad

    LCD

    Buzzer

    H Bridge

    Dc Motor

    Metal Detector

    ZIG BEE

    7.1 REGULATED POWER SUPPLY

    The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage

    supply for electronic circuits and other devices. A RPS (Regulated Power Supply) is the Power Supply

    with Rectification, Filtering and Regulation being done on the AC mains to get a Regulated power supply

    for Microcontroller and for the other devices being interfaced to it.

    A power supply can by broken down into a series of blocks, each of which performs a particular function. A

    d.c power supply which maintains the output voltage constant irrespective of a.c mains fluctuations or load

    variations is known as Regulated D.C Power Supply

    For example a 5V regulated power supply system as shown below:

  • 7/28/2019 2.War Haed Robot(Doc)

    7/94

    Transformer:

    A transformer is an electrical device which is used to convert electrical power from one

    Electrical circuit to another without change in frequency.

    Transformers convert AC electricity from one voltage to another with little loss of power. Transformers

    work only with AC and this is one of the reasons why mains electricity is AC. Step-up transformers

    increase in output voltage, step-down transformers decrease in output voltage. Most power supplies use a

    step-down transformer to reduce the dangerously high mains voltage to a safer low voltage. The input coil

    is called the primary and the output coil is called the secondary. There is no electrical connection between

    the two coils; instead they are linked by an alternating magnetic field created in the soft-iron core of the

    transformer. The two lines in the middle of the circuit symbol represent the core. Transformers waste very

    little power so the power out is (almost) equal to the power in. Note that as voltage is stepped down current

    is stepped up. The ratio of the number of turns on each coil, called the turns ratio, determines the ratio of

    the voltages. A step-down transformer has a large number of turns on its primary (input) coil which is

    connected to the high voltage mains supply, and a small number of turns on its secondary (output) coil to

    give a low output voltage.

  • 7/28/2019 2.War Haed Robot(Doc)

    8/94

    An Electrical Transformer

    Turns ratio = Vp/ VS = Np/NS

    Power Out= Power In

    VS X IS=VP X IP

    Vp = primary (input) voltage

    Np = number of turns on primary coil

    Ip = primary (input) current

    RECTIFIER:

    A circuit which is used to convert a.c to dc is known as RECTIFIER. The process of conversion a.cto d.c is called rectification

    TYPES OF RECTIFIERS:

    Half wave Rectifier Full wave rectifier

    1. Centre tap full wave rectifier.2. Bridge type full bridge rectifier.

    Comparison of rectifier circuits:

    arameterType of Rectifier

    Half wave Full wave Bridge

    Number of diodes 1

    2

    4

    IV of diodes Vm

    2Vm Vm

    .C output voltage

    Vm/

    2Vm/

    2Vm/

    Vdc,at

    o-load

    0.318Vm0.636Vm 0.636Vm

    i l f t

    1 21

    0 482

    0 482

  • 7/28/2019 2.War Haed Robot(Doc)

    9/94

    frequency f 2f 2fRectificationefficiency

    0.406

    0.812

    0.812TransformerUtilizationFactor(TUF)

    0.287 0.693 0.812

    MS voltage Vrms Vm/2 Vm/2 Vm/2

    Full-wave Rectifier:

    From the above comparison we came to know that full wave bridge rectifier as more advantages than the

    other two rectifiers. So, in our project we are using full wave bridge rectifier circuit.

    Bridge Rectifier: A bridge rectifier makes use of four diodes in a bridge arrangement to achieve full-wave

    rectification. This is a widely used configuration, both with individual diodes wired as shown and with

    single component bridges where the diode bridge is wired internally.

    A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig (a) to achieve

    full-wave rectification. This is a widely used configuration, both with individual diodes wired as shown and

    with single component bridges where the diode bridge is wired internally.

    Fig (A)

    Operation:

    During positive half cycle of secondary, the diodes D2 and D3 are in forward biased while D1 and D4 are in

    reverse biased as shown in the fig(b). The current flow direction is shown in the fig (b) with dotted arrows.

  • 7/28/2019 2.War Haed Robot(Doc)

    10/94

    Fig (B)

    During negative half cycle of secondary voltage, the diodes D1 and D4 are in forward biased while D2 and

    D3 are in reverse biased as shown in the fig(c). The current flow direction is shown in the fig (c) with dotted

    arrows.

    Fig(C)

    Filter:

    A Filter is a device which removes the a.c component of rectifier output but allows the d.c

    component to reach the load

    Capacitor Filter:

    We have seen that the ripple content in the rectified output of half wave rectifier is 121% or that of full-

    wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most

    of the applications. Ripples can be removed by one of the following methods of filtering.

    (a) A capacitor, in parallel to the load, provides an easier by pass for the ripples voltage though it due to

    low impedance. At ripple frequency and leave the D.C. to appear at the load.

    (b) An inductor, in series with the load, prevents the passage of the ripple current (due to high impedance at

    ripple frequency) while allowing the d.c (due to low resistance to d.c)

  • 7/28/2019 2.War Haed Robot(Doc)

    11/94

    (c) Various combinations of capacitor and inductor, such as L-section filter section filter, multiple

    section filter etc. which make use of both the properties mentioned in (a) and (b) above. Two cases of

    capacitor filter, one applied on half wave rectifier and another with full wave rectifier.

    Filtering is performed by a large value electrolytic capacitor connected across the DC supply to act

    as a reservoir, supplying current to the output when the varying DC voltage from the rectifier is falling. Thecapacitor charges quickly near the peak of the varying DC, and then discharges as it supplies current to the

    output. Filtering significantly increases the average DC voltage to almost the peak value (1.4 RMS value).

    To calculate the value of capacitor(C),

    C = *3*f*r*Rl

    Where,

    f = supply frequency,

    r = ripple factor,

    Rl = load resistance

    Note: In our circuit we are using 1000F hence large value of capacitor is placed to reduce ripples

    and to improve the DC component.

    Regulator:

    Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output voltages. The

    maximum current they can pass also rates them. Negative voltage regulators are available, mainly for use in

    dual supplies. Most regulators include some automatic protection from excessive current ('overload

    protection') and overheating ('thermal protection'). Many of the fixed voltage regulators ICs have 3 leads

    and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is

    simple to use. You simply connect the positive lead of your unregulated DC power supply (anything from

    9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on

    the power, you get a 5 volt supply from the output pin.

    Fig 6.1.6 A Three Terminal Voltage Regulator

    78XX:

    The Bay Linear LM78XX is integrated linear positive regulator with three terminals. The LM78XX

    offer several fixed output voltages making them useful in wide range of applications When used as a zener

  • 7/28/2019 2.War Haed Robot(Doc)

    12/94

    improvement of two orders of magnitude, lower quiescent current. The LM78XX is available in the TO-252,

    TO-220 & TO-263packages,

    Features:

    Output Current of 1.5A

    Output Voltage Tolerance of 5%

    Internal thermal overload protection Internal Short-Circuit Limited

    Output Voltage 5.0V, 6V, 8V, 9V, 10V, 12V, 15V, 18V, 24V.

    7.2 MICRO CONTROLLER 89S52

    Introduction

    A Micro controller consists of a powerful CPU tightly coupled with memory, various I/O interfaces

    such as serial port, parallel port timer or counter, interrupt controller, data acquisition interfaces-Analog toDigital converter, Digital to Analog converter, integrated on to a single silicon chip.

    If a system is developed with a microprocessor, the designer has to go for external memory such as

    RAM, ROM, EPROM and peripherals. But controller is provided all these facilities on a single chip.

    Development of a Micro controller reduces PCB size and cost of design.

    One of the major differences between a Microprocessor and a Micro controller is that a controller often

    deals with bits not bytes as in the real world application.

    Intel has introduced a family of Micro controllers called the MCS-51.

    The Major Features:

    Compatible with MCS-51 products

    4k Bytes of in-system Reprogrammable flash memory

    Fully static operation: 0HZ to 24MHZ

    Three level programmable clock

    128 * 8 bit timer/counters Six interrupt sources

    Programmable serial channel

    Low power idle power-down modes

    Why AT 89S52

    The system requirements and control specifications clearly rule out the use of 16, 32 or 64 bit micro

    controllers or microprocessors Systems using these may be earlier to implement due to large number of

  • 7/28/2019 2.War Haed Robot(Doc)

    13/94

    above application. Using an inexpensive 8-bit Microcontroller will doom the 32-bit product failure in any

    competitive market place.

    Coming to the question of why to use AT89S52 of all the 8-bit microcontroller available in the

    market the main answer would be because it has 4 Kb on chip flash memory which is just sufficient for our

    application. The on-chip Flash ROM allows the program memory to be reprogrammed in system or by

    conventional non-volatile memory Programmer. Moreover ATMEL is the leader in flash technology intodays market place and hence using AT 89S52 is the optimal solution.

    AT89S52 MICROCONTROLLER ARCHITECTURE

    The 89S52 architecture consists of these specific features:

    Eight bit CPU with registers A (the accumulator) and B Sixteen-bit program counter (PC) and data pointer (DPTR)

    Eight- bit stack pointer (PSW)

    Eight-bit stack pointer (Sp)

    Internal ROM or EPROM (8751) of 0(8031) to 64K (89S52)

    Internal RAM of 128 bytes:

    1. Four register banks, each containing eight registers

    2. Sixteen bytes, which may be addressed at the bit level

    3. Eighty bytes of general- purpose data memory

    Thirty two input/output pins arranged as four 8-bit ports:p0-p3

    Two 16-bit timer/counters: T0 and T1

    Full duplex serial data receiver/transmitter: SBUF

    Control registers: TCON, TMOD, SCON, PCON, IP, and IE

    Two external and three internal interrupts sources. Oscillator and clock circuits.

  • 7/28/2019 2.War Haed Robot(Doc)

    14/94

    Functional block diagram of micro controller

    The 89S52 oscillator and clock:

    The heart of the 89S52 circuitry that generates the clock pulses by which all the internal all internal

    operations are synchronized. Pins XTAL1 And XTAL2 is provided for connecting a resonant network toform an oscillator. Typically a quartz crystal and capacitors are employed. The crystal frequency is the basic

    internal clock frequency of the microcontroller. The manufacturers make 89S52 designs that run at specific

    minimum and maximum frequencies typically 1 to 16 MHz.

  • 7/28/2019 2.War Haed Robot(Doc)

    15/94

    Fig 3.7.2: - Oscillator and timing circuit

    Types of memory:

    The 89C51 have three general types of memory. They are on-chip memory, external Code memory

    and external Ram. On-Chip memory refers to physically existing memory on the micro controller itself.

    External code memory is the code memory that resides off chip. This is often in the form of an external

    EPROM. External RAM is the Ram that resides off chip. This often is in the form of standard static RAM

    or flash RAM.

    a) Code memory

    Code memory is the memory that holds the actual 89S52 programs that is to be run. This memory is

    limited to 64K. Code memory may be found on-chip or off-chip. It is possible to have 4K of code memory

    on-chip and 60K off chip memory simultaneously. If only off-chip memory is available then there can be

    64K of off chip ROM. This is controlled by pin provided as EA

    b) Internal RAM

  • 7/28/2019 2.War Haed Robot(Doc)

    16/94

    The 89S52 have a bank of 128 of internal RAM. The internal RAM is found on-chip. So it is the

    fastest Ram available. And also it is most flexible in terms of reading and writing. Internal Ram is volatile,

    so when 89C51 is reset, this memory is cleared. 128 bytes of internal memory are subdivided. The first 32

    bytes are divided into 4 register banks. Each bank contains 8 registers. Internal RAM also contains 128 bits,

    which are addressed from 20h to 2Fh. These bits are bit addressed i.e. each individual bit of a byte can be

    addressed by the user. They are numbered 00h to 7Fh. The user may make use of these variables withcommands such as SETB and CLR.

    FLASH MEMORY:

    Flash memory (sometimes called "flash RAM") is a type of constantly-powered non volatile that can

    be erased and reprogrammed in units of memory called blocks. It is a variation of electrically erasable

    programmable read-only memory (EEPROM) which, unlike flash memory, is erased and rewritten at thebyte level, which is slower than flash memory updating. Flash memory is often used to hold control code

    such as the basic input/output system (BIOS) in a personal computer. When BIOS needs to be changed

    (rewritten), the flash memory can be written to in block (rather than byte) sizes, making it easy to update. On

    the other hand, flash memory is not useful as random access memory (RAM) because RAM needs to be

    addressable at the byte (not the block) level.

    Flash memory gets its name because the microchip is organized so that a section of memory cells are

    erased in a single action or "flash." The erasure is caused by Fowler-Nordheim tunneling in which electrons

    pierce through a thin dielectric material to remove an electronic charge from afloating gate associated with

    each memory cell. Intel offers a form of flash memory that holds two bits (rather than one) in each memory

    cell, thus doubling the capacity of memory without a corresponding increase in price.

    Flash memory is used in digital cellular phones, digital cameras, LAN switches, PC Cards for

    notebook computers, digital set-up boxes, embedded controllers, and other devices.

    Memory Type

    Features

    FLASH Low-cost, high-density, high-speed

    architecture; low power; high reliability

    ROM

    Read-Only Memory

    Mature, high-density, reliable, low cost;

    time-consuming mask required, suitable

    for high production with stable code

    SRAM Hi h t d hi h l d it

  • 7/28/2019 2.War Haed Robot(Doc)

    17/94

    EPROM

    Electrically Programmable Read-Only

    Memory

    High-density memory; must be exposed

    to ultraviolet light for erasure

    EEPROMorE2PROM

    Electrically Erasable Programmable

    Read-Only Memory

    Electrically byte-erasable; lower

    reliability, higher cost, lowest density

    DRAM

    Dynamic Random Access Memory

    High-density, low-cost, high-speed,

    high-power

    Technical Overview of Flash Memory

    Flash memory is a nonvolatile memory using NOR technology, which allows the user to electrically

    program and erase information. Intel Flash memory uses memory cells similar to an EPROM, but with a

    much thinner, precisely grown oxide between the floating gate and the source (see Figure 2). Flash

    programming occurs when electrons are placed on the floating gate. The charge is stored on the floating

    gate, with the oxide layer allowing the cell to be electrically erased through the source. Intel Flash memory

    is an extremely reliable nonvolatile memory architecture.

  • 7/28/2019 2.War Haed Robot(Doc)

    18/94

    Fig 3.7.3: - Pin diagram of AT89S52

    Pin Description:

    VCC: Supply voltage.

    GND: Ground.Port 0:

    Port 0 is an 8-bit open-drain bi-directional I/O port. As an output port, each pin can sink eight TTL

    inputs. When ones are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 may also

    be configured to be the multiplexed low order address/data bus during accesses to external program and data

    memory. In this mode P0 has internal pull-ups. Port 0 also receives the code bytes during Flash

    programming, and outputs the code bytes during program verification. External pull-ups are required during

    program verification.

    Port 1:

    Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1 output buffers can

    sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled high by the internal pull-ups

    and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current

    (IIL) because of the internal pull-ups. Port 1 also receives the low-order address bytes during Flash

    programming and verification.

    Port 2:

    Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output buffers can

    sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled high by the internal pull-ups

    and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current

    (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external

    program memory and during accesses to external data memories that use 16-bit addresses (MOVX

    @DPTR). In this application, it uses strong internal pull-ups when emitting 1s. During accesses to external

    data memories that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function

    Register. Port 2 also receives the high-order address bits and some control signals during Flash

    programming and verification.

    Port 3:

    Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output buffers can

    sink/source four TTL inputs. When 1s are written to Port 3 pins they are pulled high by the internal pull-ups

    and can be used as inputs As inputs Port 3 pins that are externally being pulled low will source current

  • 7/28/2019 2.War Haed Robot(Doc)

    19/94

    Port 3 also serves the functions of various special features of the AT89C51 as listed below:

    Port 3 also receives some control signals for Flash programming and verification

    Tab 6.2.1 Port pins and their alternate functions

    RST:

    Reset input. A high on this pin for two machine cycles while the oscillator is running resets the

    device.

    ALE/PROG:

    Address Latch Enable output pulse for latching the low byte of the address during accesses to

    external memory. This pin is also the program pulse input (PROG) during Flash programming. In normal

    operation ALE is emitted at a constant rate of 1/6the oscillator frequency, and may be used for external

    timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external

    Data Memory.

    If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is

    active only during a MOVX or MOVC instruction. Otherwise, the pin is pulled high. Setting the ALE-

    disable bit has no effect if the microcontroller is in external execution mode.

    PSEN:

    Program Store Enable is the read strobe to external program memory. When the AT89C51 is

    executing code from external program memory, PSEN is activated twice each machine cycle, except that

    two PSEN activations are skipped during each access to external data memory.

    EA/VPP:

    External Access Enable EA must be strapped to GND in order to enable the device to fetch code

  • 7/28/2019 2.War Haed Robot(Doc)

    20/94

    Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset.

    EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt

    programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP.

    XTAL1:

    Input to the inverting oscillator amplifier and input to the internal clock operating circuit.

    XTAL2:

    It is the Output from the inverting oscillator amplifier.

    Oscillator Characteristics:

    XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can beconfigured for use as an on-chip oscillator, as shown in Figs 6.2.3. Either a quartz crystal or ceramic

    resonator may be used. To drive the device from an external clock source, XTAL2 should be left

    unconnected while XTAL1 is driven as shown in Figure 6.2.4.There are no requirements on the duty cycle

    of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-

    flop, but minimum and maximum voltage high and low time specifications must be observed.

    Fig 6.2.3 Oscillator Connections Fig 6.2.4 External Clock Drive Configuration

    Notes:

    1. Under steady state (non-transient) conditions, IOL must be externally

    limited as follows:

    Maximum IOL per port pin: 10 mA

    Maximum IOL per 8-bit port: Port 0: 26 mA

    Ports 1, 2, 3: 15 mA Maximum total IOL for all output pins: 71 mA

  • 7/28/2019 2.War Haed Robot(Doc)

    21/94

    If IOL exceeds the test condition, VOL may exceed the related specification. Pins are not

    guaranteed to sink current greater than the listed test conditions.

    2. Minimum VCC for Power-down is 2V.

    REGISTERS:

    In the CPU, registers are used to store information temporarily. That information could be a byte ofdata to be processed, or an address pointing to the data to be fetched. The vast majority of 8051 registers are

    8bit registers. In the 8051 there is only one data type: 8bits. The 8bits of a register are shown in the

    diagram from the MSB (most significant bit) D7 to the LSB (least significant bit) D0. With an 8-bit data

    type, any data larger than 8bits must be broken into 8-bit chunks before it is processed. Since there are a

    large number of registers in the 8051, we will concentrate on some of the widely used general-purpose

    registers and cover special registers in future chapters.

    D7 D6 D5 D4 D3 D2 D1 D0

    The most widely used registers of the 8051 are A (accumulator), B, R0, R1, R2, R3, R4, R5, R6, R7,

    DPTR (data pointer), and PC (program counter). All of the above registers are 8-bits, except DPTR and the

    program counter. The accumulator, register A, is used for all arithmetic and logic instructions.

    SFRs (Special Function Registers)

    Among the registers R0-R7 is part of the 128 bytes of RAM memory. What about registers A, B,

    PSW, and DPTR? Do they also have addresses? The answer is yes. In the 8051, registers A, B, PSW and

    DPTR are part of the group of registers commonly referred to as SFR (special function registers). There are

    many special function registers and they are widely used. The SFR can be accessed by the names (which is

    much easier) or by their addresses. For example, register A has address E0h, and register B has been ignited

    the address F0H, as shown in table.

    The following two points should noted about the SFR addresses.

    1. The Special function registers have addresses between 80H and FFH. These addresses are above

    80H, since the addresses 00 to 7FH are addresses of RAM memory inside the 8051.

    2. Not all the address space of 80H to FFH is used by the SFR. The unused locations 80H to FFH

    are reserved and must not be used by the 8051 programmer.

    Regarding direct addressing mode, notice the following two points: (a) the address value is limited to

    one byte 00 FFH which means this addressing mode is limited to accessing RAM locations and registers

  • 7/28/2019 2.War Haed Robot(Doc)

    22/94

    located inside the 8051. (b) If you examine the l st file for an assembly language program, you will see that

    the SFR registers names are replaced with their addresses as listed in table.

    Symbol Name Address

    ACC Accumulator 0E0HB B register 0F0HPSW Program status word 0D0HSP Stack pointer 81HDPTR Data pointer 2 bytesDPL Low byte 82HDPH High byte 83HP0 Port0 80HP1 Port1 90HP2 Port2 0A0HP3 Port3 0B0HIP Interrupt priority control 0B8HIE Interrupt enable control 0A8H

    TMOD Timer/counter mode control 89HTCON Timer/counter control 88HT2CON Timer/counter 2 control 0C8HT2MOD Timer/counter mode2 control 0C9HTH0 Timer/counter 0high byte 8CHTL0 Timer/counter 0 low byte 8AHTH1 Timer/counter 1 high byte 8DHTL1 Timer/counter 1 low byte 8BHTH2 Timer/counter 2 high byte 0CDHTL2 Timer/counter 2 low byte 0CCH

    RCAP2H T/C 2 capture register high byte 0CBHRCAP2L T/C 2 capture register low byte 0CAHSCON Serial control 98HSBUF Serial data buffer 99HPCON Power control 87H

    Table: 8051 Special function register Address

    A Register (Accumulator)

    This is a general-purpose register which serves for storing intermediate results during operating. A number

    (an operand) should be added to the accumulator prior to execute an instruction upon it. Once an

    arithmetical operation is preformed by the ALU, the result is placed into the accumulator. If a data should be

    transferred from one register to another, it must go through accumulator. For such universal purpose, this is

    th t l d i t th t i t ll b i i d ith t ( th h lf 8051

  • 7/28/2019 2.War Haed Robot(Doc)

    23/94

    B Register

    B register is used during multiply and divide operations which can be performed only upon numbers stored

    in the A and B registers. All other instructions in the program can use this register as a spare accumulator

    (A).

    During programming, each of registers is called by name so that their exact address is

    not so important for the user. During compiling into machine code (series of hexadecimal numbers

    recognized as instructions by the microcontroller), PC will automatically, instead of registers name, write

    necessary addresses into the microcontroller.

    R Registers (R0-R7)

    This is a common name for the total 8 general purpose registers (R0, R1, and R2 ...R7). Even they are not

    true SFRs, they deserve to be discussed here because of their purpose. The bank is active when the R

    registers it includes are in use. Similar to the accumulator, they are used for temporary storing variables and

    intermediate results. Which of the banks will be active depends on two bits included in the PSW Register.

    These registers are stored in four banks in the scope of RAM.

    The following example best illustrates the useful purpose of these registers. Suppose that mathematical

    operations on numbers previously stored in the R registers should be performed: (R1+R2) - (R3+R4).

    Ob io sl a register for temporar storing res lts of addition is needed E er thing is q ite simple and the

  • 7/28/2019 2.War Haed Robot(Doc)

    24/94

    MOV A, R3; Means: move number from R3 into accumulator

    ADD A, R4; Means: add number from R4 to accumulator (result remains in accumulator)

    MOV R5, A; Means: temporarily moves the result from accumulator into R5

    MOV A, R1; Means: move number from R1 into accumulatorADD A, R2; Means: add number from R2 to accumulator

    SUBB A, R5; Means: subtract number from R5 (there are R3+R4)

    8051 Register Banks and Stack

    RAM memory space allocation in the 8052

    There are 128 bytes of RAM in the 8051. The 128 bytes of RAM inside the 8051 are assignedaddresses 00 to7FH. These 128 bytes are divided into three different groups as follows:

    1. A total of 32 bytes from locations 00 to 1FH hex are set aside for register banks and the stack.

    2. A total of 16 bytes from locations 20 to 2FH hex are set aside for bit-addressable read/write

    memory.

    3. A total of 80 bytes from locations 30H to 7FH are used for read and write storage, or what is

    normally called Scratch pad. These 80 locations of RAM are widely used for the purpose of

    storing data and parameters nu 8051 programmers.

    Register banks in the 8052

    A total of 32bytes of RAM are set aside for the register banks and stack. These 32 bytes are

    divided into 4 banks of registers in which each bank has registers, R0-R7. RAM locations 0 to 7 are set

    aside for bank 0 of R0-R7 where R0 is RAM location 0, R1 is RAM location 1, and R2 is location 2, and so

    on, until memory location7, which belongs to R7 of bank0. The second bank of registers R0-R7 starts at

    RAM location 08 and goes to location 0FH. The third bank of R0-R7 starts at memory location 10H and

    goes to location 17H. Finally, RAM locations 18H to 1FH are set aside for the fourth bank of R0-R7. Fig

    shows how the 32 bytes are allocated into 4 banks.

    As we can see from fig 1, the bank 1 uses the same RAM space as the stack. This is a major

    problem in programming the 8052. we must either not use register bank1, or allocate another area of RAM

    for the stack.

    Default register bank

    If RAM locations 00-1F are set aside for the four register banks, which register bank of R0-R7 do

    we have access to when the 8051 is powered up? The answer is register bank 0; that is , RAM locations 0,

    1 2 3 4 5 6 and 7 are accessed with the names R0 R1 R2 R3 R4 R5 R6 and R7 when programming the

  • 7/28/2019 2.War Haed Robot(Doc)

    25/94

    8051. It is much easier to refer to these RAM locations with names such as R0, R1 and so on, than by their

    memory locations as shown in fig 2.

    The register banks are switched by using the D3 & D4 bits of register PSW.

    FIG: RAM Allocation in the 8052

    Fig: 8052 Register Banks and their RAM Addresses

    PSW Register (Program Status Word)

  • 7/28/2019 2.War Haed Robot(Doc)

    26/94

    This is one of the most important SFRs. The Program Status Word (PSW) contains several status bits that

    reflect the current state of the CPU. This register contains: Carry bit, Auxiliary Carry, two register bank

    select bits, Overflow flag, parity bit, and user-definable status flag. The ALU automatically changes some of

    registers bits, which is usually used in regulation of the program performing.

    P - Parity bit. If a number in accumulator is even then this bit will be automatically set (1), otherwise it will

    be cleared (0). It is mainly used during data transmission and receiving via serial communication.

    - Bit 1. This bit is intended for the future versions of the microcontrollers, so it is not supposed to be here.

    OV Overflow occurs when the result of arithmetical operation is greater than 255 (decimal), so that it cannot be stored in one register. In that case, this bit will be set (1). If there is no overflow, this bit will be

    cleared (0).

    RS0, RS1 - Register bank selects bits. These two bits are used to select one of the four register banks in

    RAM. By writing zeroes and ones to these bits, a group of registers R0-R7 is stored in one of four banks in

    RAM.

    RS1 RS2 Space in RAM

    0 0 Bank0 00h-07h

    0 1 Bank1 08h-0Fh

    1 0 Bank2 10h-17h

    1 1 Bank3 18h-1Fh

    F0 - Flag 0. This is a general-purpose bit available to the user.

    AC - Auxiliary Carry Flag is used for BCD operations only.

    CY - Carry Flag is the (ninth) auxiliary bit used for all arithmetical operations and shift instructions.

    DPTR Register (Data Pointer)

    These registers are not true ones because they do not physically exist. They consist of two separate registers:

    DPH (Data Pointer High) and (Data Pointer Low). Their 16 bits are used for external memory addressing.

    They may be handled as a 16-bit register or as two independent 8-bit registers. Besides, the DPTR Register

    i ll d f i d d i di l hi h h hi d i h l i

  • 7/28/2019 2.War Haed Robot(Doc)

    27/94

    SP Register (Stack Pointer)

    The stack is a section of RAM used by the CPU to store information temporarily. This information

    could be data or an address. The CPU needs this storage area since there are only a limited number of

    registers.

    How stacks are accessed in the 8052

    If the stack is a section of RAM, there must be registers inside the CPU to point to it. The registerused to access the stack is called the SP (Stack point) Register. The stack pointer in the 8052 is only 8 bits

    wide; which means that it can take values of 00 to FFH. When the 8052 is powered up, the SP register

    contains value 07. This means that RAM location 08 is the first location used for the stack by the 8051. The

    storing of a CPU register in the stack is called a PUSH, and pulling the contents off the stack back into a

    CPU register is called a POP. In other words, a register is pushed onto the stack to save it and popped off

    the stack to retrieve it. The job of the SP is very critical when push and pop actions are performed.

    Pushing onto the stack

    In the 8051 the stack pointer (SP) points to the last used location of the stack. As we push data onto

    the stack, the stack pointer is incremented by one. Notice that this different from many microprocessors,

    notably x86 processors in which the SP is decremented when data is pushed onto the stack. As each PUSH

    is executed, the contents of the register are saved on the stack and SP is incremented by 1. Notice that for

    every byte of data saved on the stack and then SP is incremented only once. Notice also that to push the

    registers onto the stack we must use their RAM addresses. For example, the instruction PUSH pushesregister R1 onto the stack.

  • 7/28/2019 2.War Haed Robot(Doc)

    28/94

    Popping the contents of the stack back into a given register is the opposite process of pushing. With

    every pop, the top byte of the stack is copied to the register specified by the instruction and the stack pointer

    is decremented once.

    The upper limit of the stack

    As, mentioned earlier, locations 08 to 1FH in the 8051 RAM can be used for the stack. This is

    because locations 20-2FH of RAM are reserved for bit-addressable memory and must not be used by the

    stack. If in a program we need more than 24 bytes (08 to 1FH=24bytes) of stack, we can change the SP to

    point to RAM locations 30-7FH. This is done with the instruction MOV SP, #XX.

    P0, P1, P2, P3 - Input/Output Registers

    In case that external memory and serial communication system are not in use then, 4 ports with in total of 32

    input-output lines are available to the user for connection to peripheral environment. Each bit inside these

    ports corresponds to the appropriate pin on the microcontroller. This means that logic state written to these

    ports appears as a voltage on the pin (0 or 5 V). Naturally, while reading, the opposite occurs voltage on

    some input pins is reflected in the appropriate port bit.

    The state of a port bit, besides being reflected in the pin, determines at the same time whether it will be

    configured as input or output. If a bit is cleared (0), the pin will be configured as output. In the same manner,

    if a bit is set to 1 the pin will be configured as input. After reset, as well as when turning the microcontroller

    ON, all bits on these ports are set to one (1). This means that the appropriate pins will be configured as

    inputs.

    Program counter:

    The important register in the 8051 is the PC (Program counter). The program counter points to the

    address of the next instruction to be executed. As the CPU fetches the OPCODE from the program ROM,

    the program counter is incremented to point to the next instruction. The program counter in the 8051 is

    16bits wide. This means that the 8051 can access program addresses 0000 to FFFFH, a total of 64k bytes of

    code. However, not all members of the 8051 have the entire 64K bytes of on-chip ROM installed, as we

    will see soon.

  • 7/28/2019 2.War Haed Robot(Doc)

    29/94

    Types of instructions

    Depending on operation they perform, all instructions are divided in several groups:

    Arithmetic Instructions

    Branch Instructions

    Data Transfer Instructions

    Logical Instructions

    Logical Instructions with bits

    The first part of each instruction, called MNEMONIC refers to the operation an instruction performs

    (copying, addition, logical operation etc.). Mnemonics commonly are shortened form of name of operation

    being executed. For example:

    INC R1; Increment R1 (increment register R1)

    LJMP LAB5 ;Long Jump LAB5 (long jump to address specified as LAB5)

    JNZ LOOP ;Jump if Not Zero LOOP (if the number in the accumulator is not 0, jump to address specified

    as LOOP)

    Another part of instruction, called OPERAND is separated from mnemonic at least by one empty space and

    defines data being processed by instructions. Some instructions have no operand; some have one, two or

    three. If there is more than one operand in instruction, they are separated by comma. For example:

    RET - (return from sub-routine)

    JZ TEMP - (if the number in the accumulator is not 0, jump to address specified as TEMP)

    ADD A,R3 - (add R3 and accumulator)

    CJNE A,#20,LOOP - (compare accumulator with 20. If they are not equal, jump to address specified as

    LOOP)

    Arithmetic instructions

    These instructions perform several basic operations (addition, subtraction, division, multiplication etc.) After

    execution, the result is stored in the first operand. For example:

    ADD A, R1 - The result of addition (A+R1) will be stored in the accumulator.

    Arithmetical Instructions

    M i D i tiByte Oscillator

  • 7/28/2019 2.War Haed Robot(Doc)

    30/94

    ADD A,Rn Add R Register to accumulator 1 1

    ADD A,RxAdd directly addressed Rx Register to

    accumulator2 2

    ADD A,@RiAdd indirectly addressed Register to

    accumulator1 1

    ADD A,#X Add number X to accumulator 2 2ADDC A,Rn Add R Register with Carry bit to accumulator 1 1

    Branch Instructions

    There are two kinds of these instructions:

    Unconditional jump instructions: After their execution a jump to a new location from where the program

    continues execution is executed.

    Conditional jump instructions: If some condition is met - a jump is executed. Otherwise, the program

    normally proceeds with the next instruction.

    Branch Instruction

    Mnemonic Description Byte NumberOscillator

    Period

    ACALL adr11Call subroutine located at address within 2 K byte Program

    Memory space2 3

    LCALL adr16Call subroutine located at any address within 64 K byte

    Program Memory space3 4

    RET Return from subroutine 1 4

    RETI Return from interrupt routine 1 4

    AJMP adr11Jump to address located within 2 K byte Program Memory

    space2 3

    LJMP adr16Jump to any address located within 64 K byte Program

    Memory space3 4

    Data Transfer Instructions

    Th i i h f i h Th i hi h i d

  • 7/28/2019 2.War Haed Robot(Doc)

    31/94

    Data Transfer Instruction

    Mnemonic DescriptionByte

    Number

    Cycle

    Number

    MOV A,Rn Move R register to accumulator 1 1

    MOV A,RxMove directly addressed Rx register to

    accumulator2 2

    MOV A,@RiMove indirectly addressed register to

    accumulator1 1

    MOV A,#X Move number X to accumulator 2 2

    Logical Instructions

    These instructions perform logical operations between corresponding bits of two registers. After execution,

    the result is stored in the first operand.

    Logical Instructions

    Mnemonic Description Byte NumberCycle

    Number

    ANL A,Rn Logical AND between accumulator and R register 1 1

    ANL A,RxLogical AND between accumulator and directly addressed

    register Rx

    2 2

    ANL A,@RiLogical AND between accumulator and indirectly addressed

    register1 1

    ANL A,#X Logical AND between accumulator and number X 2 2

    Logical Operations on Bits

    Similar to logical instructions, these instructions perform logical operations. The difference is that these

    operations are performed on single bits.

    Logical operations on bits

    Mnemonic Description Byte NumberCycle

    Number

    CLR C Clear Carry bit 1 1

    CLR bit Clear directly addressed bit 2 2

    SETB C Set Carry bit 1 1SETB bit Set directly addressed bit 2 2

  • 7/28/2019 2.War Haed Robot(Doc)

    32/94

    CPL bit Complement directly addressed bit 2 2

    TIMERS

    On-chip timing/counting facility has proved the capabilities of the microcontroller for implementing

    the real time application. These includes pulse counting, frequency measurement, pulse width measurement,

    baud rate generation, etc,. Having sufficient number of timer/counters may be a need in a certain design

    application. The 8051 has two timers/counters. They can be used either as timers to generate a time delay or

    as counters to count events happening outside the microcontroller. Let discuss how these timers are used to

    generate time delays and we will also discuss how they are been used as event counters.

    PROGRAMMING 8052 TIMERS

    The 8051 has timers: Timer 0 and Timer1.they can be used either as timers or as event counters. Let us

    first discuss about the timers registers and how to program the timers to generate time delays.

    BASIC RIGISTERS OF THE TIMER

    Both Timer 0 and Timer 1 are 16 bits wide. Since the 8051 has an 8-bit architecture, each 16-bit

    timer is accessed as two separate registers of low byte and high byte.

    TIMER 0 REGISTERS

    The 16-bit register of Timer 0 is accessed as low byte and high byte. the low byte register is called

    TL0(Timer 0 low byte)and the high byte register is referred to as TH0(Timer 0 high byte).These register can

    be accessed like any other register, such as A,B,R0,R1,R2,etc.for example, the instruction MOV TL0,#4Fmoves the value 4FH into TL0,the low byte of Timer 0.These registers can also be read like any other

    register.

  • 7/28/2019 2.War Haed Robot(Doc)

    33/94

  • 7/28/2019 2.War Haed Robot(Doc)

    34/94

    8-bit timer/counter THx with TLx as

    5 - Bit pre-scaler.

    0 1 1 16-bit timer mode

    16-bit timer/counters THx with TLx are

    Cascaded; there is no prescaler

    1 0 2 8-bit auto reload8-bit auto reload timer/counter;THx

    Holds a value that is to be reloaded into

    TLx each time it overflows.

    1 1 3 Split timer mode.

    C/T (clock/timer)

    This bit in the TMOD register is used to decide whether the timer is used as a delay generator or an event

    counter. If C/T=0, it is used as a timer for time delay generation. The clock source for the time delay is the

    crystal frequency of the 8051.this section is concerned with this choice. The timers use as an event counter

    is discussed in the next section.

    Serial Communication:

    Computers can transfer data in two ways: parallel and serial. In parallel data transfers, often 8 or

    more lines (wire conductors) are used to transfer data to a device that is only a few feet away. Examples of

    parallel data transfer are printers and hard disks; each uses cables with many wire strips. Although in such

    cases a lot of data can be transferred in a short amount of time by using many wires in parallel, the distance

    cannot be great. To transfer to a device located many meters away, the serial method is used. In serial

    communication, the data is sent one bit at a time, in contrast to parallel communication, in which the data is

    sent a byte or more at a time. Serial communication of the 8051 is the topic of this chapter. The 8052 has

    serial communication capability built into it, there by making possible fast data transfer using only a few

    wires.

    If data is to be transferred on the telephone line, it must be converted from 0s and 1s to audio

    tones, which are sinusoidal-shaped signals. A peripheral device called a modem, which stands for

    modulator/demodulator, performs this conversion.

    Serial data communication uses two methods, asynchronous and synchronous. The synchronous

    method transfers a block of data at a time, while the asynchronous method transfers a single byte at a time.

    In data transmission if the data can be transmitted and received, it is a duplex transmission. This is

    in contrast to simplex transmissions such as with printers, in which the computer only sends data. Duplex

    transmissions can be half or full duplex depending on whether or not the data transfer can be simultaneous

  • 7/28/2019 2.War Haed Robot(Doc)

    35/94

    same time, it is full duplex. Of course, full duplex requires two wire conductors for the data lines, one for

    transmission and one for reception, in order to transfer and receive data simultaneously.

    Asynchronous serial communication and data framing

    The data coming in at the receiving end of the data line in a serial data transfer is all 0s and 1s; it is

    difficult to make sense of the data unless the sender and receiver agree on a set of rules, a protocol, on how

    the data is packed, how many bits constitute a character, and when the data begins and ends.Start and stop bits

    Asynchronous serial data communication is widely used for character-oriented transmissions,

    while block-oriented data transfers use the synchronous method. In the asynchronous method, each

    character is placed between start and stop bits. This is called framing. In the data framing for asynchronous

    communications, the data, such as ASCII characters, are packed between a start bit and a stop bit. The start

    bit is always one bit, but the stop bit can be one or two bits. The start bit is always a 0 (low) and the stop bit

    (s) is 1 (high).Data transfer rate

    The rate of data transfer in serial data communication is stated in bps (bits per second). Another

    widely used terminology for bps is baud rate. However, the baud and bps rates are not necessarily equal

    This is due to the fact that baud rate is the modem terminology and is defined as the number of signal

    changes per second. In modems a single change of signal, sometimes transfers several bits of data. As far

    as the conductor wire is concerned, the baud rate and bps are the same, and for this reason we use the bps

    and baud interchangeably.

    The data transfer rate of given computer system depends on communication ports incorporated into

    that system. For example, the early IBMPC/XT could transfer data at the rate of 100 to 9600 bps. In recent

    years, however, Pentium based PCS transfer data at rates as high as 56K bps. It must be noted that in

    asynchronous serial data communication, the baud rate is generally limited to 100,000bps.

    RS232 Standards

    To allow compatibility among data communication equipment made by various manufacturers, an

    interfacing standard called RS232 was set by the Electronics Industries Association (EIA) in 1960. In 1963

    it was modified and called RS232A. RS232B AND RS232C were issued in 1965 and 1969, respectively.

    Today, RS232 is the most widely used serial I/O interfacing standard. This standard is used in PCs and

    numerous types of equipment. However, since the standard was set long before the advert of the TTL logic

    family, its input and output voltage levels are not TTL compatible. In RS232, a 1 is represented by -3 to

    -25V, while a 0 bit is +3 to +25V, making -3 to +3 undefined. For this reason, to connect any RS232 to a

    microcontroller system we must use voltage converters such as MAX232 to convert the TTL logic levels to

    the RS232 voltage levels, and vice versa. MAX232 IC chips are commonly referred to as line drivers.

    RS232 pins

    RS232 cable is commonly referred to as the DB-25 connector In labeling DB-25P refers to the plug

  • 7/28/2019 2.War Haed Robot(Doc)

    36/94

    cables, IBM introduced the DB-9 Version of the serial I/O standard, which uses 9 pins only, as shown in

    table.

    DB-9 pin connector

    1 2 3 4 5

    6 7 8 9

    (Out of computer and exposed end of cable)

    Pin Functions:

    Pin Description1 Data carrier detect (DCD)2 Received data (RXD)

    3 Transmitted data (TXD)4 Data terminal ready(DTR)5 Signal ground (GND)6 Data set ready (DSR)7 Request to send (RTS)8 Clear to send (CTS)9 Ring indicator (RI)

    Note: DCD, DSR, RTS and CTS are active low pins.

    The method used by RS-232 for communication allows for a simple connection of three lines: Tx, Rx, and

    Ground. The three essential signals for 2-way RS-232

    Communications are these:

    TXD: carries data from DTE to the DCE.

    RXD: carries data from DCE to the DTE

    SG: signal ground

    8051 connection to RS232

    The RS232 standard is not TTL compatible; therefore, it requires a line driver such as the

    MAX232 chip to convert RS232 voltage levels to TTL levels, and vice versa. The interfacing of 8051 with

    RS232 connectors via the MAX232 chip is the main topic.

    The 8051 has two pins that are used specifically for transferring and receiving data serially.

    These two pins are called TXD and RXD and a part of the port 3 group (P3.0 and P3.1). Pin 11 of the 8051

    is assigned to TXD and pin 10 is designated as RXD. These pins are TTL compatible; therefore, theyrequire a line driver to make them RS232 compatible. One such line driver is the MAX232 chip.

  • 7/28/2019 2.War Haed Robot(Doc)

    37/94

    MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice

    versa. One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the

    source voltage for the 8051. In the other words, with a single +5V power supply we can power both the

    8051 and MAX232, with no need for the power supplies that are common in many older systems. The

    MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are

    called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In many applications onlyone of each is used.

    Embedded

    Controller

    RXD

    TXD

    TXD

    RXD2

    3

    5

    GND

    MAX 232

    CONNECTING C to PC using MAX 232

    INTERRUPTS

    A single microcontroller can serve several devices. There are two ways to do that: INTERRUPTS or

    POLLING.

    POLLING:

    In polling the microcontroller continuously monitors the status of a given device; when the status condition

    is met, it performs the service .After that, it moves on to monitor the next device until each one is serviced.

    Although polling can monitor the status of several devices and serve each of them as certain condition are

    met.

    INTERRUPTS:

    I th i t t th d h d i d it i th d i tifi

  • 7/28/2019 2.War Haed Robot(Doc)

    38/94

    interrupts whatever it is doing and serves the device. The program associated with the interrupts is called the

    interrupt service routine (ISR).or interrupt handler.

    INTERRUPTS Vs POLLING:

    The advantage of interrupts is that the microcontroller can serve many devices (not all the same time, of

    course); each device can get the attention of the microcontroller based on the priority assigned to it. The

    polling method cannot assign priority since it checks all devices in round-robin fashion. More

    importantly, in the interrupt method the microcontroller can also ignore (mask) a device request for

    service. This is again not possible with the polling method. The most important reason that the interrupt

    method is preferable is that the polling method wastes much of the microcontrollers time by polling

    devices that do not need service. So, in order to avoid tying down the microcontroller, interrupts are

    used.

    INTERRUPT SERVICE ROUTINE

    For every interrupt, there must be an interrupt service routine (ISR), or interrupt handler. When an interrupt

    is invoked, the microcontroller runs the interrupts service routine. For every interrupt, there is a fixed

    location in memory that holds the address of its ISR. The group of memory location set aside to hold the

    addresses of ISR and is called the Interrupt Vector Table. Shown below:

    Interrupt Vector Table for the 8051:

    S.No. INTERRUPT ROM

    LOCATION

    (HEX)

    PIN FLAG

    CLEARING

    1. Reset 0000 9 Auto

    2. External

    hardware

    Interrupt 0

    0003 P3.2 (12) Auto

    3 Timers 0 000B Auto

  • 7/28/2019 2.War Haed Robot(Doc)

    39/94

  • 7/28/2019 2.War Haed Robot(Doc)

    40/94

    1. It finishes the instruction it is executing and saves the address of the next instruction (PC) on the

    stack.

    2. It also saves the current status of all the interrupts internally (i.e., not on the stack).

    3. It jumps to a fixed location in memory called the interrupt vector table that holds the address of the

    interrupts service routine.4. The microcontroller gets the address of the ISR from the interrupt vector table and jumps to it. It

    starts to execute the interrupt service subroutine until it reaches the last instruction of the subroutine,

    which is RETI (return from interrupt).

    5. Upon executing the RETI instruction, the microcontroller returns to the place where it was

    interrupted. First, it gets the program counter (PC) address from the stack by popping the top two

    bytes of the stack into the PC. Then it starts to execute from that address.

    Notice from step 5 the critical role of the stack. For this reason, we must be careful in manipulating thestack contents in the ISR. Specifically, in the ISR, just as in any CALL subroutine, the number of pushes

    and pops must be equal.

    Enabling and disabling an interrupt:

    Upon reset, all interrupt are disabled (masked), meaning that none will be responded to by the

    microcontroller if they are activated. The interrupt must be enabled by software in order for the

    microcontroller to respond to them. There is a register called IE (interrupt enable) that is responsible for

    enabling (unmasking) and disabling (masking) the interrupts.

    Notice that IE is a bit-addressable register.

    Steps in enabling an interrupt:

    To enable an interrupt, we take the following steps:

    1. Bit D7 of the IE register (EA) must be set to high to allow the reset to take effect.

    If EA=1, interrupts are enabled and will be responded to if their corresponding bit in IE are high. If EA=0,

    no interrupt will be responded to, even if the associated bit in the IE register is high.

    Interrupt Enable Register

    D7 D6 D5 D4 D3 D2 D1 D0

  • 7/28/2019 2.War Haed Robot(Doc)

    41/94

    EA IE.7 disables all interrupts. If EA=0, no interrupts is acknowledged.

    If EA=1, each interrupt source is individually enabled disabled

    By setting or clearing its enable bit.

    -- IE.6 Not implemented, reserved for future use.*

    ET2 IE.5 Enables or disables Timer 2 overflow or capture interrupt (8052

    Only)

    ES IE.4 Enables or disables the serial port interrupts.

    ET1 IE.3 Enables or disables Timers 1 overflow interrupt

    EX1 IE.2 Enables or disables external interrupt 1.

    ET0 IE.1 Enables or disables Timer 0 overflow interrupt.

    EX0 IE.0 Enables or disables external interrupt.

    7.3 LCD Display

    Liquid crystal displays (LCDs) have materials which combine the properties of both liquids and crystals.Rather than having a melting point, they have a temperature range within which the molecules are almost as

    mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal.

    An LCD consists of two glass panels, with the liquid crystal material sand witched in between them.

    The inner surface of the glass plates are coated with transparent electrodes which define the character,

    symbols or patterns to be displayed polymeric layers are present in between the electrodes and the liquid

    crystal, which makes the liquid crystal molecules to maintain a defined orientation angle.

    One each polarisers are pasted outside the two glass panels. These polarisers would rotate the lightrays passing through them to a definite angle, in a particular direction

    When the LCD is in the off state, light rays are rotated by the two polarisers and the liquid crystal,

    such that the light rays come out of the LCD without any orientation, and hence the LCD appears

    transparent.

    When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in

    a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would

    result in activating / highlighting the desired characters.

    The LCDs are lightweight with only a few millimeters thickness. Since the LCDs consume less

    h ibl i h l l i i i d b d f l d i

  • 7/28/2019 2.War Haed Robot(Doc)

    42/94

    The LCD s doesnt generate light and so light is needed to read the display. By using backlighting,

    reading is possible in the dark. The LCDs have long life and a wide operating temperature range.

    Changing the display size or the layout size is relatively simple which makes the LCDs more

    customer friendly.

    The LCDs used exclusively in watches, calculators and measuring instruments are the simple seven-

    segment displays, having a limited amount of numeric data. The recent advances in technology have resultedin better legibility, more information displaying capability and a wider temperature range. These have

    resulted in the LCDs being extensively used in telecommunications and entertainment electronics. The

    LCDs have even started replacing the cathode ray tubes (CRTs) used for the display of text and graphics,

    and also in small TV applications.

    This section describes the operation modes of LCDs then describe how to program

    and interface an LCD to 8051 using Assembly and C.

    LCD operation:

    In recent years the LCD is finding widespread use replacing LED s (seven-

    segment LED s or other multi-segment LED s).This is due to the following reasons:

    1. The declining prices of LCDs.

    2. The ability to display numbers, characters and graphics. This is in contrast to LED which is limited

    to numbers and a few characters.

    3. Incorporation of a refreshing controller into the LCD, there by relieving the CPU of the task of

    refreshing the LCD. In the case of LED s, they must be refreshed by the CPU to keep on displaying

    the data.

    4. Ease of programming for characters and graphics.

    LCD pin description:

    The LCD discussed in this section has 14 pins. The function of each pin is given in

    table.

  • 7/28/2019 2.War Haed Robot(Doc)

    43/94

    TABLE 1: Pin description for LCD

    Pin symbol I/O Description

    1 Vss -- Ground2 Vcc -- +5V power supply3 VEE -- Power supply to

    control contrast4 RS I RS=0 to select

    command register

    RS=1 to select

    data register5 R/W I R/W=0 for write

    R/W=1 for read6 E I/O Enable7 DB0 I/O The 8-bit data bus8 DB1 I/O The 8-bit data bus9 DB2 I/O The 8-bit data bus10 DB3 I/O The 8-bit data bus11 DB4 I/O The 8-bit data bus12 DB5 I/O The 8-bit data bus13 DB6 I/O The 8-bit data bus

    14 DB7 I/O The 8-bit data bus

    Th LCD di l h t f ll b l i th

  • 7/28/2019 2.War Haed Robot(Doc)

    44/94

  • 7/28/2019 2.War Haed Robot(Doc)

    45/94

    1. Matrix Keypad.

    2. Linear Keypad.

    1. Matrix Keypad: This Keypad got keys arranged in the form of Rows and Columns. That is why the

    name Matrix Keypad. According to this keypad, In order to find the key being pressed the keypadneed to be scanned by making rows as i/p and columns as output or vice versa.

    This Keypad is used in places where one needs to connect more no. of keys with less

    no. of data lines.

    2. Linear Keypad: This Keypad got n no. of keys connected to n data lines of microcontroller.

    This Keypad is used in places where one needs to connect less no. of keys.

    In this project, Linear Keypad is used with 3 switches being connected because the no. of switches is less(less than 8).

    Generally, in Linear Keypads one end of the switch is connected to Microcontroller

    (Configured as i/p) and other end of the switch is connected to the common ground. So whenever a key

    of Linear Keypad is pressed the logic on the microcontroller pin will go LOW.

    Here in this project, a linear keypad is used with switches connected in a serial manner. Linear

    keypad is used in this project because it takes less no. of port pins. The Linear Keypad with 4 Keys is

    shown below.

    7.5 BUZZER:

    A buzzer orbeeper is an audio signaling device, which may bemechanical,electromechanical,

    orelectronic. Typical uses of buzzers and beepers includealarms,timers and confirmation of user input suchas a mouse click or keystroke.

    http://en.wikipedia.org/wiki/Soundhttp://en.wikipedia.org/wiki/Machinehttp://en.wikipedia.org/wiki/Machinehttp://en.wikipedia.org/wiki/Machinehttp://en.wikipedia.org/wiki/Electromechanicshttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Alarmhttp://en.wikipedia.org/wiki/Alarmhttp://en.wikipedia.org/wiki/Timerhttp://en.wikipedia.org/wiki/Timerhttp://en.wikipedia.org/wiki/Machinehttp://en.wikipedia.org/wiki/Electromechanicshttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Alarmhttp://en.wikipedia.org/wiki/Timerhttp://en.wikipedia.org/wiki/Sound
  • 7/28/2019 2.War Haed Robot(Doc)

    46/94

    Ajoy buzzeris an example of a purely mechanical buzzer.

    Electromechanical

    Early devices were based on an electromechanical system identical to anelectric bell without the metal

    gong. Similarly, a relay may be connected to interrupt its own actuating current, causing thecontacts to

    buzz. Often these units were anchored to a wall or ceiling to use it as a sounding board. The word "buzzer"comes from the rasping noise that electromechanical buzzers made.

    Electronic

    Piezoelectric disk beeper

    Apiezoelectric element may be driven by an oscillating electronic circuit or other audio signal source.

    Sounds commonly used to indicate that a button has been pressed are a click, a ring or a beep.

    Uses

    Annunciator panels

    Electronic metronomes

    Game shows :In game shows it is also known as a "lockout system" because when one person signals

    ("buzzes in"), all others are locked out from signalling. Several game shows have large buzzer buttons

    which are identified as "plungers". The buzzer is also used to signal wrong answers and when time

    expires on many game shows.

    Microwave ovens and otherhousehold appliances Sporting events such asbasketball games

    Symbol

    http://en.wikipedia.org/wiki/Joy_buzzerhttp://en.wikipedia.org/wiki/Electric_bellhttp://en.wikipedia.org/wiki/Electric_bellhttp://en.wikipedia.org/wiki/Relayhttp://en.wikipedia.org/wiki/Electric_currenthttp://en.wikipedia.org/wiki/Electric_currenthttp://en.wikipedia.org/wiki/Switchhttp://en.wikipedia.org/wiki/Switchhttp://en.wikipedia.org/wiki/Piezoelectrichttp://en.wikipedia.org/wiki/Oscillationhttp://en.wikipedia.org/wiki/Annunciator_panelhttp://en.wikipedia.org/wiki/Metronomehttp://en.wikipedia.org/wiki/Game_showhttp://en.wikipedia.org/wiki/Microwave_ovenhttp://en.wikipedia.org/wiki/Major_appliancehttp://en.wikipedia.org/wiki/Sporthttp://en.wikipedia.org/wiki/Basketballhttp://en.wikipedia.org/wiki/File:2007-07-24_Piezoelectric_buzzer.jpghttp://en.wikipedia.org/wiki/Joy_buzzerhttp://en.wikipedia.org/wiki/Electric_bellhttp://en.wikipedia.org/wiki/Relayhttp://en.wikipedia.org/wiki/Electric_currenthttp://en.wikipedia.org/wiki/Switchhttp://en.wikipedia.org/wiki/Piezoelectrichttp://en.wikipedia.org/wiki/Oscillationhttp://en.wikipedia.org/wiki/Annunciator_panelhttp://en.wikipedia.org/wiki/Metronomehttp://en.wikipedia.org/wiki/Game_showhttp://en.wikipedia.org/wiki/Microwave_ovenhttp://en.wikipedia.org/wiki/Major_appliancehttp://en.wikipedia.org/wiki/Sporthttp://en.wikipedia.org/wiki/Basketball
  • 7/28/2019 2.War Haed Robot(Doc)

    47/94

    Advanced Acoustic Technology Corp. professionally manufactures and sells all kinds of buzzers. We have twproduction lines: piezo buzzer and magnetic buzzer, both include the self drive type, external drive type and type.(Magnetic Buzzer, Transducer, Mechancial Buzzer, Beeper, Piezo Element, Buzzer, Transducer, Piezo SirenAlarm.)

    There are over one thousand specifications now, the complete dimensions for you to choose, we can modify length of the pins and the wires, or even customize for your unique project.

    Introduction of Piezo Buzzer- How to choose a buzzer

    7.6Metal detector

    http://www.buzzer-speaker.com/manufacturer/introduction%20of%20piezo%20buzzer.htmhttp://www.buzzer-speaker.com/faq/buzzer%20choose.htmhttp://en.wikipedia.org/wiki/File:Metal_Detector.jpghttp://www.buzzer-speaker.com/manufacturer/introduction%20of%20piezo%20buzzer.htmhttp://www.buzzer-speaker.com/faq/buzzer%20choose.htm
  • 7/28/2019 2.War Haed Robot(Doc)

    48/94

    The simplest form of a metal detector consists of an oscillatorproducing an alternating current that passes

    through a coil producing an alternating magnetic field. If a piece of electrically conductive metal is close to

    the coil, eddy currentswill be induced in the metal, and this produces an alternating magnetic field of its

    own. If another coil is used to measure the magnetic field (acting as amagnetometer), the change in the

    magnetic field due to the metallic object can be detected.

    The first industrial metal detectors were developed in the 1960s and were used extensively for mining andother industrial applications. Uses include de-mining(the detection ofland mines), the detection of weapons

    such as knives and guns, especially in airport security, geophysical prospecting, archaeology and treasure

    hunting. Metal detectors are also used to detect foreign bodies in food, and in theconstruction industry to

    detect steel reinforcing bars in concrete and pipes and wires buried in walls and floors.

    History and development

    Toward the end of the 19th century, many scientists and engineers used their growing knowledge of

    electrical theory in an attempt to devise a machine which would pinpoint metal. The use of such a device to

    find ore-bearing rocks would give a huge advantage to any miner who employed it. The German

    physicist Heinrich Wilhelm Dove invented the induction balance system, which was incorporated into metal

    detectors a hundred years later. Early machines were crude, used a lot of battery power, and worked only to

    a very limited degree.Alexander Graham Bell used such a device to attempt to locate a bullet lodged in the

    chest of American President James Garfield in 1881; the attempt was unsuccessful because the metal coil

    spring bed Garfield was lying on confused the detector.

    Modern developments

    The modern development of the metal detector began in the 1930s. Gerhard Fisherhad developed a systemof radio direction-finding, which was to be used for accurate navigation. The system worked extremely well,

    but Fisher noticed that there were anomalies in areas where the terrain contained ore-bearing rocks. He

    reasoned that if a radio beam could be distorted by metal, then it should be possible to design a machine

    which would detect metal using a search coil resonating at a radio frequency. In 1937 he applied for, and

    was granted, the first patent for a metal detector. However, it was one Lieutenant Jozef Stanislaw Kosacki, a

    Polish officer attached to a unit stationed in St Andrews,Fife, Scotland during the early years ofWorld War

    II, that refined the design into a practical Polish mine detector. They were heavy, ran on vacuum tubes, and

    needed separate battery packs.

    The design invented by Kosacki was used extensively during the clearance of the German mine fields during

    the Second Battle of El Alamein when 500 units were shipped to Field Marshal Montgomery to clear the

    minefields of the retreating Germans, and later used during the Allied invasion of Sicily, the Allied invasion

    of Italy and the Invasion of Normandy. As it was a wartime research operation to create and refine the

    design of the detector, the knowledge that Stanislaw created the first practical metal detector was kept secret

    for over 50 years.

    After the war, there were plenty of surplus mine detectors on the market; they were bought up by relic

    hunters who used them for fun and profit. This helped to form metal detecting into a hobby.

    http://en.wikipedia.org/wiki/Oscillatorhttp://en.wikipedia.org/wiki/Magnetic_fieldhttp://en.wikipedia.org/wiki/Eddy_currentshttp://en.wikipedia.org/wiki/Magnetometerhttp://en.wikipedia.org/wiki/De-mininghttp://en.wikipedia.org/wiki/Land_minehttp://en.wikipedia.org/wiki/Airport_securityhttp://en.wikipedia.org/wiki/Geophysicshttp://en.wikipedia.org/wiki/Treasure_huntinghttp://en.wikipedia.org/wiki/Treasure_huntinghttp://en.wikipedia.org/wiki/Construction_industryhttp://en.wikipedia.org/wiki/Rebarhttp://en.wikipedia.org/wiki/Heinrich_Wilhelm_Dovehttp://en.wikipedia.org/wiki/Alexander_Graham_Bellhttp://en.wikipedia.org/wiki/James_Garfieldhttp://en.wikipedia.org/w/index.php?title=Gerhard_Fisher&action=edit&redlink=1http://en.wikipedia.org/wiki/Lieutenanthttp://en.wikipedia.org/wiki/J%C3%B3zef_Kosackihttp://en.wikipedia.org/wiki/St_Andrewshttp://en.wikipedia.org/wiki/Fifehttp://en.wikipedia.org/wiki/Scotlandhttp://en.wikipedia.org/wiki/World_War_IIhttp://en.wikipedia.org/wiki/World_War_IIhttp://en.wikipedia.org/wiki/Polish_mine_detectorhttp://en.wikipedia.org/wiki/Second_Battle_of_El_Alameinhttp://en.wikipedia.org/wiki/Bernard_Montgomery,_1st_Viscount_Montgomery_of_Alameinhttp://en.wikipedia.org/wiki/Allied_invasion_of_Sicilyhttp://en.wikipedia.org/wiki/Allied_invasion_of_Italyhttp://en.wikipedia.org/wiki/Allied_invasion_of_Italyhttp://en.wikipedia.org/wiki/Invasion_of_Normandyhttp://en.wikipedia.org/wiki/Oscillatorhttp://en.wikipedia.org/wiki/Magnetic_fieldhttp://en.wikipedia.org/wiki/Eddy_currentshttp://en.wikipedia.org/wiki/Magnetometerhttp://en.wikipedia.org/wiki/De-mininghttp://en.wikipedia.org/wiki/Land_minehttp://en.wikipedia.org/wiki/Airport_securityhttp://en.wikipedia.org/wiki/Geophysicshttp://en.wikipedia.org/wiki/Treasure_huntinghttp://en.wikipedia.org/wiki/Treasure_huntinghttp://en.wikipedia.org/wiki/Construction_industryhttp://en.wikipedia.org/wiki/Rebarhttp://en.wikipedia.org/wiki/Heinrich_Wilhelm_Dovehttp://en.wikipedia.org/wiki/Alexander_Graham_Bellhttp://en.wikipedia.org/wiki/James_Garfieldhttp://en.wikipedia.org/w/index.php?title=Gerhard_Fisher&action=edit&redlink=1http://en.wikipedia.org/wiki/Lieutenanthttp://en.wikipedia.org/wiki/J%C3%B3zef_Kosackihttp://en.wikipedia.org/wiki/St_Andrewshttp://en.wikipedia.org/wiki/Fifehttp://en.wikipedia.org/wiki/Scotlandhttp://en.wikipedia.org/wiki/World_War_IIhttp://en.wikipedia.org/wiki/World_War_IIhttp://en.wikipedia.org/wiki/Polish_mine_detectorhttp://en.wikipedia.org/wiki/Second_Battle_of_El_Alameinhttp://en.wikipedia.org/wiki/Bernard_Montgomery,_1st_Viscount_Montgomery_of_Alameinhttp://en.wikipedia.org/wiki/Allied_invasion_of_Sicilyhttp://en.wikipedia.org/wiki/Allied_invasion_of_Italyhttp://en.wikipedia.org/wiki/Allied_invasion_of_Italyhttp://en.wikipedia.org/wiki/Invasion_of_Normandy
  • 7/28/2019 2.War Haed Robot(Doc)

    49/94

    Further refinements

    Many manufacturers of these new devices brought their own ideas to the market. Whites Electronics of

    Oregon began in the 50's by building a machine called the Oremaster Geiger Counter. Another leader in

    detector technology was Charles Garrett, who pioneered the BFO (Beat Frequency Oscillator) machine.

    With the invention and development of the transistor in the 50's and 60's, metal detector manufacturers and

    designers made smaller lighter machines with improved circuitry, running on small battery packs.Companies sprang up all over the USA and Britain to supply the growing demand.

    Modern top models are fully computerized, using integrated circuit technology to allow the user to set

    sensitivity, discrimination, track speed, threshold volume, notch filters, etc., and hold these parameters in

    memory for future use. Compared to just a decade ago, detectors are lighter, deeper-seeking, use less battery

    power, and discriminate better.

    Larger portable metal detectors are used by archaeologists and treasure hunters to locate metallic items, such

    asjewelry, coins, bullets, and other various artifactsburied shallowly underground.

    Discriminators

    The biggest technical change in detectors was the development of the induction-balance system. This system

    involved two coils that were electrically balanced. When metal was introduced to their vicinity, they would

    become unbalanced. What allowed detectors to discriminate between metals was the fact that every metal

    has a differentphase response when exposed to alternating current. Scientists had long known of this fact by

    the time detectors were developed that could selectively detect desirable metals, while ignoring undesirable

    ones.

    Even with discriminators, it was still a challenge to avoid undesirable metals, because some of them havesimilar phase responses e.g. tinfoil and gold, particularly in alloy form. Thus, improperly tuning out certain

    metals increased the risk of passing over a valuable find. Another disadvantage of discriminators was that

    they reduced the sensitivity of the machines.

    New coil designs

    Coil designers also tried out innovative designs. The original Induction Balance coil system consisted of two

    identical coils placed on top of one another. Compass Electronics produced a new design; the two coils were

    made in a D shape, and were mounted back-to-back to form a circle. This system was widely used in the

    1970s, and both concentric and D type (or Widescan as they became known) had their fans. Anotherdevelopment was the invention of detectors which could cancel out the effect of mineralization in the

    ground. This gave greater depth, but was a non-discriminate mode. It worked best at lower frequencies than

    those used before, and frequencies of 3 to 20 kHz were found to produce the best results. Many detectors in

    the 1970s had a switch which enabled the user to switch between the discriminate mode and the non-

    discriminate mode. Later developments switched electronically between both modes. The development of

    the Induction Balance detector would ultimately result in the Motion detector, which constantly checked and

    balanced the background mineralization.

    http://en.wikipedia.org/wiki/Archaeologisthttp://en.wikipedia.org/wiki/Treasure_huntershttp://en.wikipedia.org/wiki/Jewelryhttp://en.wikipedia.org/wiki/Coinshttp://en.wikipedia.org/wiki/Bulletshttp://en.wikipedia.org/wiki/Artifact_(archaeology)http://en.wikipedia.org/wiki/Phase_responsehttp://en.wikipedia.org/wiki/Archaeologisthttp://en.wikipedia.org/wiki/Treasure_huntershttp://en.wikipedia.org/wiki/Jewelryhttp://en.wikipedia.org/wiki/Coinshttp://en.wikipedia.org/wiki/Bulletshttp://en.wikipedia.org/wiki/Artifact_(archaeology)http://en.wikipedia.org/wiki/Phase_response
  • 7/28/2019 2.War Haed Robot(Doc)

    50/94

    Pulse induction

    A pulse induction metal detector with an array of coils

    At the same time, developers were looking at using a different technique in metal detection called Pulse

    Induction. Unlike the Beat Frequency Oscillator or the Induction Balance machines which both used a

    uniform alternating current at a low frequency, the pulse induction machine simply fired a high-voltage

    pulse of signal into the ground. In the absence of metal, the 'spike' decayed at a uniform rate, and the time it

    took to fall to zero volts could be accurately measured. However, if metal was present when the machine

    fired, a small current would flow in the metal, and the time for the voltage to drop to zero would be

    increased. These time differences were minute, but the improvement in electronics made it possible to

    measure them accurately and identify the presence of metal at a reasonable distance. These new machineshad one major advantage: they were completely impervious to the effects of mineralization, and rings and

    other jewellery could now be located even under highly-mineralizedblack sand.

    Uses

    Archaeology

    In England and Wales metal detecting is legal provided that permission is granted by the landowner, and that

    the area is not a Scheduled Ancient Monument a site of special scientific interest (SSSI) or covered by

    elements of the Countryside Stewardship Scheme. Items discovered which fall within the definition ofTreasure must be reported to the Coroner or a place designated by the Coroner for Treasure. The voluntary

    reporting of finds which do not qualify as Treasure to the Portable Antiquities Scheme or the UK Detector

    Finds Database is encouraged.

    The situation in Scotland is very different. Under the Scots law principle ofbona vacantia, the Crown has

    claim over any object of any material value where the original owner cannot be traced.There is also no 300

    year limit to Scottish finds. Any artifact found, whether by metal detector survey or from an archaeological

    excavation, must be reported to the Crown through the Treasure Trove Advisory Panel at the NationalMuseums of Scotland. The Panel then determines what will happen to the artifacts. Reporting is not

    http://en.wikipedia.org/wiki/Black_sandhttp://en.wikipedia.org/wiki/England_and_Waleshttp://en.wikipedia.org/wiki/Scheduled_Ancient_Monumenthttp://en.wikipedia.org/wiki/Countryside_Stewardship_Schemehttp://en.wikipedia.org/wiki/Bona_vacantiahttp://en.wikipedia.org/wiki/File:SD2100.jpghttp://en.wikipedia.org/wiki/Black_sandhttp://en.wikipedia.org/wiki/England_and_Waleshttp://en.wikipedia.org/wiki/Scheduled_Ancient_Monumenthttp://en.wikipedia.org/wiki/Countryside_Stewardship_Schemehttp://en.wikipedia.org/wiki/Bona_vacantia
  • 7/28/2019 2.War Haed Robot(Doc)

    51/94

    As a hobby

    This 156 ounce nugget was found by an individual prospector in the Southern California Desert using ametal detector

    There are six major types of hobbyist activities involving metal detectors:

    Coin shooting is looking for coins after an event involving many people, like a baseball game, orsimply looking for any old coins. Serious coin shooters will spend hours, days and months doing

    historical research to locate long lost sites that have the potential to give up historical and collectible

    coins.

    Prospecting is looking for valuable metals like gold and silver in their natural forms, such as nuggets

    or flakes.

    Relic hunting is very similar to coin shooting except that the relic hunter is after any type of

    historical artifact. Relic hunters are usually very determined and dedicated not only to the research and

    hunting that they do but also to preserving historical artifacts. Coins, bullets, buttons, axe heads, and

    buckles are just a few of the items that are commonly found by relic hunters.

    Treasure hunting is looking for valuable items in general.

    Beach combing is hunting for lost coins or jewelry on a beach. Beach hunting can be as simple or as

    complicated as one wishes to make it. Many dedicated beach hunters also familiarize themselves with

    tide movements and beach erosion.

    Metal detecting clubs across the United States, United Kingdom and Canada exist for hobbyists to

    learn from others, show off finds from their hunts and to learn more about the hobby.

    Security screening

    Metal detectors at an airport

    http://en.wikipedia.org/wiki/Prospectinghttp://en.wikipedia.org/wiki/Relic_huntinghttp://en.wikipedia.org/wiki/Treasure_huntinghttp://en.wikipedia.org/wiki/Beach_combinghttp://en.wikipedia.org/wiki/File:Flughafenkontrolle.jpghttp://en.wikipedia.org/wiki/File:Stringer156_nugget.jpghttp://en.wikipedia.org/wiki/Prospectinghttp://en.wikipedia.org/wiki/Relic_huntinghttp://en.wikipedia.org/wiki/Treasure_huntinghttp://en.wikipedia.org/wiki/Beach_combinghttp://en.wikipedia.org/wiki/Aircraft_hijackinghttp://en.wikipedia.org/wiki/Outokumpu
  • 7/28/2019 2.War Haed Robot(Doc)

    52/94

    The development of these systems continued in a spin off company and systems branded as Metor Metal

    Detectors evolved in the form of the rectangular gantry now standard in airports. In common with the

    developments in other uses of metal detectors both alternating current and pulse systems are used, and the

    design of the coils and the electronics has moved forward to improve the discrimination of these systems. In

    1995 systems such as the Metor 200 appeared with the ability to indicate the approximate