Beruflich Dokumente
Kultur Dokumente
Chapter 1 Introduction
Page 1-1
1.1 IMPORTANCE OF PROJECT:Nowadays in airport use a fully wired system so here the cost of system is increased
due to using a wire or cable because of that the system complexity is also increased
and here have a fear of leaked a data which we have transmitted or received. The
security is not maintained here and this is the main purpose of our project, so that we
can overcome this drawback of current system using Zigbee wireless technology.
Our second main goal of the project is to decrease the processing time for passport
verification and increase the efficiency of airport management system and utilization
of time of passenger for better performance. Network in this paper the organization of
the paper is as follows. At first, the objectives, main concepts and the tools used are
mentioned. Then the system design is explained using flowcharts and later simulation
results are given along with the problems faced. Next, hardware implementation is
dealt with. Lastly, further developments are mentioned.
Page 1-2
1.3 MAIN CONCEPT:The objectives of the system will be achieved by employing the following concepts.
1.3.1. Data command center
The device basically a central server managed by the government which issues
the passports to the peoples having all the information of passports. This command
centre managed in airport by the official who verifies the passports and gives pass
codes to the passengers for verification purpose which is used at every counter for
verification. This have zigbee module for wireless communication.
1.3.2. Mobile verification device
The code for verification is input at this device by using the keyboard which is
transmitted through the zigbee to data command center which verifies the code and
displays verification status on LCD display.
1.3.3. Software program
The pass code received by the receiver is verified by this program using the central
data base. This program is written in the C language.
1.3.4. Buzzer
When passport is verified using the pass-code provided by the passenger and if that is
wrong then at mobile device side the buzzer buzzes to tell the security officer that
something is wrong happening at particular gate . This maintains the security of the
airport which is frequently under threat now a day.
Page 1-3
Page 1-4
Page 2-5
2.1 INTRODUCTION:ZigBee is a specification for a suite of high level communication protocols used to create
personal area networks built from small, low-power digital radios. ZigBee is based on an
IEEE 802.15 standard. Though low-powered, ZigBee devices can transmit data over long
distances by passing data through intermediate devices to reach more distant ones,
creating a mesh network; i.e., a network with no centralized control or high-power
transmitter/receiver able to reach all of the networked devices. The decentralized nature
of such wireless ad hoc networks makes them suitable for applications where a central
node can't be relied upon.
ZigBee is used in applications that require only a low data rate, long battery life, and
secure networking. ZigBee has a defined rate of 250 Kbit/s, best suited for periodic or
intermittent data or a single signal transmission from a sensor or input device.
Applications include wireless light switches, electrical meters with in-home-displays,
traffic management systems, and other consumer and industrial equipment that requires
short-range wireless transfer of data at relatively low rates. The technology defined by
the ZigBee specification is intended to be simpler and less expensive than other WPANs,
such as Bluetooth or Wi-Fi.
ZigBee networks are secured by 128 bit symmetric encryption keys. In home automation
applications, transmission distances range from 10 to 100 meters line-of-sight, depending
on power output and environmental characteristics.
2.2 OVERVIEW:ZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows
the technology to be widely deployed in wireless control and monitoring applications.
Low power usage allows longer life with smaller batteries. Mesh networking provides
high reliability and more extensive range. ZigBee chip vendors typically sell integrated
radios and microcontrollers with between 60 KB and 256 KB flash memory.
ZigBee operates in the industrial, scientific and medical (ISM) radio bands: 868 MHz in
Europe, 915 MHz in the USA and Australia and 2.4 GHz in most jurisdictions
worldwide. Data transmission rates vary from 20 kilobits/second in the 868 MHz
frequency band to 250 kilobits/second in the 2.4 GHz frequency band.
The ZigBee network layer natively supports both star and tree typical networks, and
generic mesh networks. Every network must have one coordinator device, tasked with its
creation, the control of its parameters and basic maintenance. Within star networks, the
coordinator must be the central node. Both trees and meshes allow the use of
ZigBeerouters to extend communication at the network level.
Page 2-6
Released specifications
o ZigBee Home Automation 1.2
o ZigBee Smart Energy 1.1b
o ZigBee Telecommunication Services 1.0
o ZigBee Health Care 1.0
o ZigBee RF4CE Remote Control 1.0
o ZigBee RF4CE Input Device 1.0
o ZigBee Light Link 1.0
o ZigBee IP 1.0
o ZigBee Building Automation 1.0
o ZigBee Gateway 1.0
o ZigBee Green Power 1.0 as optional feature of ZigBee 2012
Page 2-7
ZigBee Coordinator (ZC): The most capable device, the Coordinator forms the root of
the network tree and might bridge to other networks. There is exactly one ZigBee
Coordinator in each network since it is the device that started the network originally
(the ZigBeeLight Link specification also allows operation without a ZigBee
Coordinator, making it more usable for over-the-shelf home products). It stores
information about the network, including acting as the Trust Center& repository for
security keys.
ZigBee Router (ZR): As well as running an application function, a Router can act as
an intermediate router, passing on data from other devices.
ZigBee End Device (ZED): Contains just enough functionality to talk to the parent
node (either the Coordinator or a Router); it cannot relay data from other devices.
This relationship allows the node to be asleep a significant amount of the time thereby
giving long battery life. A ZED requires the least amount of memory, and therefore
can be less expensive to manufacture than a ZR or ZC.
Page 2-8
Page 2-9
2.5 SOFTWARE
2.5.1 Network layer
The main functions of the network layer are to enable the correct use of the MAC
sublayer and provide a suitable interface for use by the next upper layer, namely the
application layer. Its capabilities and structure are those typically associated to such
network layers, including routing.
On the one hand, the data entity creates and manages network layer data units from the
payload of the application layer and performs routing according to the current topology.
On the other hand, there is the layer control, which is used to handle configuration of
new devices and establish new networks: it can determine whether a neighboring device
belongs to the network and discovers new neighbors and routers. The control can also
detect the presence of a receiver, which allows direct communication and MAC
synchronization.
The routing protocol used by the network layer is AODV. In order to find the destination
device, it broadcasts out a route request to all of its neighbors. The neighbors then
broadcast the request to their neighbors, etc. until the destination is reached. Once the
destination is reached, it sends its route reply via unicast transmission following the
lowest cost path back to the source. Once the source receives the reply, it will update its
routing table for the destination address with the next hop in the path and the path cost.
Page 2-10
The key-value pair service (KVP) is meant for configuration purposes. It enables
description, request and modification of object attributes through a simple interface
based on get/set and event primitives, some allowing a request for response.
Configuration uses compressed XML (full XML can be used) to provide an adaptable
and elegant solution.
The message service is designed to offer a general approach to information treatment,
avoiding the necessity to adapt application protocols and potential overhead incurred
on by KVP. It allows arbitrary payloads to be transmitted over APS frames.
Addressing is also part of the application layer. A network node consists of an 802.15.4conformant radio transceiver and one or more device descriptions (basically collections
of attributes which can be polled or set, or which can be monitored through events). The
transceiver is the base for addressing, and devices within a node are specified by an
endpoint identifier in the range 1-240.
Page 2-11
Page 2-12
Page 2-13
The application layer offers key establishment and transport services to both ZDO and
applications. It is also responsible for the propagation across the network of changes
in devices within it, which may originate in the devices themselves (for instance, a
simple status change) or in the trust manager (which may inform the network that a
certain device is to be eliminated from it). It also routes requests from devices to the
trust center and network key renewals from the trust center to all devices. Besides
this, the ZDO maintains the security policies of the device.
The security levels infrastructure is based on CCM*, which adds encryption- and
integrity-only features to CCM.
Page 2-14
Page 3-15
3.1 ZIGBEE:ZigBee is a specification for a suite of high level communication protocols using
small, low-power digital radios based on the IEEE 802.15.4-2003 standard for LowRate Wireless Personal Area Networks (LR-WPANs), such as wireless light switches
with lamps, electrical meters with in-home-displays, consumer electronics equipment
via short-range radio. The technology defined by the ZigBee specification is intended
to be simpler and less expensive than other WPANs, such as Bluetooth. ZigBee is
targeted at radio-frequency (RF) applications that require a low data rate, long battery
life, and secure networking
Page 3-16
Page 3-17
Advantages:
Serial Cables can be longer than Parallel cables. The serial port transmits a '1' as -3 to
-25 volts and a '0' as +3 to +25 volts where as a parallel port transmits a '0' as 0v and a
'1' as 5v. Therefore the serial port can have a maximum swing of 50V compared to the
parallel port which has a maximum swing of 5 Volts. Therefore cable loss is not going
to be as much of a problem for serial cables as they are for parallel.
Wires are less than parallel transmission.
Serial transmission is used where one bit is sent at a time.
Microcontrollers have also proven to be quite popular recently. Many of these have in
built SCI (Serial Communications Interfaces) which can be used to talk to the outside world.
Serial Communication reduces the pin count of these MPU's.
3.1.3 BUZZER:-
A buzzer or beeper is an audio signalling device, which may be mechanical, electromechanical or piezoelectric .typical uses of buzzers and beepers include alarm
devices, timers and confirmation of user input such as a mouse click or keystroke.
Page 3-18
One by One we make each Column LOW (from high Z state) and read state of R0 to R3.
VIVA INSTITUTE OF TECHNOLOGY
Page 3-19
As you can see in the image above C0 is made LOW while all other Columns are in
HIGH Z State. We can read the Value of R0 to R3 to get their pressed status. If they are
high the button is NOT pressed. As we have enabled internal pullups on them, these
pullups keep their value high when they are floating (that means NOT connected to
anything). But when a key is pressed it is connected to LOW line from the column thus
making it LOW.
After that we make the C0 High Z again and make C1 LOW. And read R0 to R3 again.
This gives us status of the second column of keys. Similarly we scan all columns.
3.1.5MICROCONTROLLER PIC16F887:-
Page 3-20
Introduction:
Page 3-21
3.2BLOCK DIAGRAM:-
Explanation:
Microcontroller takes the data and check the status according to the program
(Program in Embedded C language).
Microcontroller gives the first out put on LCD display (162 +5V). On LCD display
it shows the status.
Thus system verifies the passport and monitors the security of airport.
Page 3-22
BLOCK DIAGRAM DESCRIPTION:3.2.1 INPUT SECTION:The Input section consists of threeparts. Mainly the input section consist of followingparts ,
PC s/w
RS232
ZigBee transmitter
PC S/W
The program which required to verify the passport is written in C language and
run in VISUAL BASIC 6 with the help of vb forms.
We used VB forms in our program for simplicity and convenience.
RS 232:
This zigbee kit is uses rs232 for serial communication to connect with the
personal computer
Zigbee transceiver:
Step down transformer is the first part of regulated power supply. To step down the
mains 230V A.C. we require step down transformer. Following are the main
characteristic of electronic transformer.
1) Power transformers are usually designed to operate from source of low impedance
at a single freq.
2) It is required to construct with sufficient insulation of necessary dielectric
strength.
3) Transformer ratings are expressed in voltamp. The volt-amp of each secondary
winding or windings are added for the total secondary VA. To this are added the
load losses.
4) Temperature rise of a transformer is decided on two well-known factors i.e. losses
on transformer and heat dissipating or cooling facility provided unit.
Page 3-23
A liquid crystal display (LCD) is a thin, flat panel used for electronically displaying
information such as text, images, and moving pictures.
Its uses include monitors for computers, televisions, instrument panels, and other
devices ranging from aircraft cockpit displays, to every-day consumer devices such as
video players, gaming
devices,
clocks,
watches, calculators,
and telephones. Among its major features are its lightweight construction, its
portability, and its ability to be produced in much larger screen sizes than are practical
for the construction of cathode ray tube (CRT) display technology.
Its low electrical power consumption enables it to be used in battery-powered
electronic equipment.
It is an electronically-modulated optical device made up of any number of pixels
filled with liquid crystals and arrayed in front of a light source (backlight) or reflector
to produce images in color or monochrome.
Page 3-24
The earliest discovery leading to the development of LCD technology, the discovery
of liquid crystals, dates from 1888.[1] By 2008, worldwide sales of televisions with
LCD screens had surpassed the sale of CRT units.
GENERAL SPECIFICATION:
Page 3-25
Page 4-26
4.1 Introduction:In our project, we are using both the software & hardware tools. Software is based on the
Embedded C with compiler BASCOM.In hardware we are using microcontroller, microchips,
transformer, wireless zigbee kit, display etc
Advantages:
Page 4-27
4.2.2KEY FEATURES:Visual Basic was designed to be easily learned and used by beginner programmers. The
language not only allows programmers to create simple GUI applications, but can also
develop complex applications. Programming in VB is a combination of visually arranging
components or controls on a form, specifying attributes and actions of those components, and
writing additional lines of code for more functionality. Since default attributes and actions are
defined for the components, a simple program can be created without the programmer having
to write many lines of code. Performance problems were experienced by earlier versions, but
with faster computers and native code compilation this has become less of an issue.
Forms are created using drag-and-drop techniques. A tool is used to place controls (e.g., text
boxes, buttons, etc.) on the form (window). Controls have attributes and event handlers
associated with them. Default values are provided when the control is created, but may be
changed by the programmer. Many attribute values can be modified during run time based on
user actions or changes in the environment, providing a dynamic application The Visual
Basic compiler is shared with other Visual Studio languages (C, C++), but restrictions in the
IDE do not allow the creation of some targets (Windows model DLLs) and threading models.
VISUAL BASIC6:
With VB 6, you can create any program depending on your objective. For example, if you are
a college or university lecturer, you can create educational programs to teach business,
economics, engineering, computer science, accountancy, financial management, information
system and more to make teaching more effective and interesting. If you are in business, you
can also create business programs such as inventory management system,point-of-sale
system, payroll system, financial program as well as accounting program to help manage
your business and increase productivity. For those of you who like games and working as
VIVA INSTITUTE OF TECHNOLOGY
Page 4-28
The Development Environment or Form Window :Learning the ins and outs of the
Development Environment before you learn visual basic is somewhat like learning for
a test you must know where all the functions belong and what their purpose is. First we
will start with labeling the development environment.
Page 4-29
The above diagram shows the development environment with all the important points
labeled. Many of Visual basic functions work similar to Microsoft word e.g. the Tool
Barand the tool box is similar to other products on the market which work off a single
click then drag the width of the object required. The Tool Boxcontains the control you
placed on the form window. All of the controls that appear on the Tool Boxcontrols on
the above picture never runs out of controls as soon as you place one on the form another
awaits you on the Tool Boxready to be placed as needed.
Page 4-30
CORRECT
CORRECT
PASS-CODE
OR
WRONG
PASS-CODE
WRONG?
BUZZER
Page 4-31
START
RECEIVE PASS-CODE
VERIFY PASS-CODE
ZigBee TRANSEIVER
Receive the entered pass-code through ZigBee from the mobile data command centre.
Verify using the program.
Display the verified result as a status on the monitor.
Send back this verified result back to the mobile data command centre for the the
display purpose using ZigBee transceiver.
Page 4-32
ZigBee
TRANSCIVER
Page 4-33
4.4 HARDWARE:1.
2.
Microcontroller PIC16F887
3.
Matrix keyboard
4.
Buzzer
5.
2- 6V batteries.
6.
7.
8.
Transformer
Page 4-34
The main components of the circuit diagram shown above are Microcontroller
PIC16F887, ZigBee kit, MAX232 chip, 4*4 matrix keyboard and 2*16 LCD display.
The numerical values entered at the keyboard are in analog form, they are given as an
input to the microcontroller which convertss it into equivalent digital form.
The microcontrollers basically need clock, power supply to function properly ,
pic16f887 is a 40 pin microcontroller in which pin no 11,32 are connected to power
supply and pin no 1is connected to +5v power supply by 10k resistor.
Pin no 12 & 31 both are ground pins connected to the ground. Pin no 13 and 14 are
clock i/p pins, which are connected to 4 MHz crystal oscillator and through 22pf
capacitor to ground.
We connect 16*2 LCD display ports 4, 5, 6, 11,12and 13 are connected to port B of
microcontroller pic16f887 at port 34 to 40.
Port 1 and 16 of LCD display are connected to ground and at port 3, there is a 1k
variable resistor and port 2 is connected to +5v power supply.
Page 4-35
Working:
Objective:
The main objective of the device is to simplify and reduce the time required
for passport verification with additional security features provided in it with
power consumption using 2.4 GHz wireless ZigBee kit.
The basic idea behind the project is that we are removes wires in the airport
and we use ZigBee for wireless implementation.
At the various counters, we provided the wireless kits at which passenger
have to input the pass-code which is verified by using the data base and status
is displayed.
If the pass-code or passport is wrong then automatically buzzes the buzzer for
reminding about the security threat.
In this mode when the passenger enters the pass-code provided by the passport
verification officials by using the keyboard provided at the wireless kit.
This code is verified by the data command centre by using its database.
At this mode the code is correct and status is displayed at the both side as a
verified passport
In this mode when the passenger enters the pass-code provided by the passport
verification officials by using the keyboard provided at the wireless kit.
Page 4-2
Pass-code is verified and that is wrong then status displayed on both side as a
wrong passport
Then automatically buzzes the buzzer for reminding the security officers.
2. Power Supply:-
Page 4-3
Page 5-4
This ZBRS system provides efficient wireless system for passport verification on
airports,
This system has top priority for security.
On the various counters on airport passengers just have to enter the pass code
provided by the official which reduces the considerable time for verification , which is
very important issue for airport neat functioning and for passengers.
The two modes that are:
i.
On mobile device which is placed at the gate assume and has the keyboard,
passenger enters the code which verified by data command centre and
status displayed on the command centre and mobile device for further
action.
ii.
ii. when passenger enter the code and that is unauthorized then status
displayed on the mobile that is passenger is unauthorized and buzzes alarm
at mobile device for further action by security authorities.
ADVANTAGES:
1. Simple and user-friendly interface.
2. Reduces processing time for passenger and airport authorities.
3. displays status.
4. Alarm when status is not verified.
5. Secure.
6. Longer battery life.
OBSTACLES FOR THE SYSTEM:1. This system can communicate in the range of zigbee transceiver only.
2. pass-code can be stolen by others.
3. One person has to look-out data command centre for possible errors.
4. Batteries will have to change after discharging.
Page 5-5
DISCUSSION:
Passport verified :
As we see in this figure the pass code entered by the passenger is accepted by the
system and shown status as ACCEPTED
Page 5-6
FAKE PASSPORT :
As we see in this figure the pass code entered by the passenger is not accepted by
the system and shown status as NOT ACCEPTED
Page 5-7
Page 6-8
This focuses on ways to designing the wireless and secure system for passport
verification.
Thus, it may replace the existing electrical wired system in the airports for
considerable reduction in the time for verification.
The time saved by this system passengers can use for shopping at the airports which
increases the revenue of the airport.
Secure transmission through encryption by using the using zigbee wireless system.
Reduction in power requirements.
FUTURE SCOPE:-
This system can be integrated with the face detection technology and finger prints
scanning for further secure the airport.
We can also use this system for other purposes also in the airport which further
improves the airport functioning.
For the battery charging purpose we can use solar power, it reduces the global
warming.
In future when the zigbee available in the mobiles we can give updates to the
passengers outside the airport premises about the current status of the flight.
Page 6-9
Chapter 7 References
Page 7-10
Reference :
1) IEEE Std 802.15.14: MAC and PHY Specifications for Low-Rate Wireless Personal
Area Networks (LR-WPANs), 2003
2) ZigBee Alliance, ZigBee Specification v1.0, 2004
1) www.wikepedia.com\zigbee
Page 7-11
Chapter 8 Appendix A
Page 7-12
Price
Rs.200.00
MAX232 ic
Rs.22.00
Rs.10.00
1R to 1M Resistor 1/4 W
(10Pcs)
1N4007
1.0A general purpose rectifier diode.
Rs.2.00
Rs.1.00
Rs.8.00
Rs.15.00
Page 7-13
Rs.2.00
Rs.240.00
40 Pin IC Base
RS232 cable
Rs.400.00
BUZZER
Rs.25
push to on switch
Rs.20.00
Rs.20.00
Page 7-14
Rs.180.00
230v/6v Transformer
Rs.120.00
Rs.20.00
8.2 Program:#include<pic.h>
#define _XTAL_FREQ 4000000
__CONFIG(0x2034);
__CONFIG(0x3fff);
#include<delay1.h>
#include<hextobcd.h>
#define rs RB0
#define rw RB1
#define en RB2
#define lcdport PORTB
#include<lcd4bit.h>
#define row1 RD0
#define row2 RD1
#define row3 RD2
#define row4 RD3
#define col1 RD4
#define col2 RD5
VIVA INSTITUTE OF TECHNOLOGY
Page 7-15
// PORTA is input
// PORTD is input
// PORTC is output
// PORTB is output
Page 7-16
");
command(0xc0);
key();
digit1=keyvalue;
display(convert[keyvalue]);
key();
digit2=keyvalue;
display(convert[keyvalue]);
key();
digit3=keyvalue;
display(convert[keyvalue]);
key();
digit4=keyvalue;
display(convert[keyvalue]);
key();
if(keyvalue==0x0b)
{
TXREG='F';
delay(50);
TXREG=(convert[digit1]);
delay(50);
TXREG=(convert[digit2]);
delay(50);
TXREG=(convert[digit3]);
delay(50);
TXREG=(convert[digit4]);
delay(50);
}
}
}
/////////////////////////////////////////////////////////////////////////////////////////////////////////////
void key()
{
Page 7-17
if(col1==0)
{
keyvalue=0x04;
goto exit;
}
else if(col2==0)
{
VIVA INSTITUTE OF TECHNOLOGY
Page 7-18
Page 7-19
Page 7-20
Page 7-21
Chapter 8 Appendix B
Page 8-22
DATASHEET OF PIC16F887 :
Block diagram :
Page 8-23
Pin description :
Page 8-24
I/O PORTS :
There are as many as thirty-five general purpose I/O pins available. Depending on
which peripherals are enabled, some or all of the pins may not be available as general
purpose I/O. In general, when a peripheral is enabled, the associated pin may not be
used as a general purpose I/O pin.
Page 8-25
PORTC is a 8-bit wide, bidirectional port. The corresponding data direction register is
TRISC Setting a TRISC bit (= 1) will make the bcorresponding PORTC pin an input
(i.e., put the corresponding output driver in a High-Impedance mode). Clearing a
VIVA INSTITUTE OF TECHNOLOGY
Page 8-26
PORTE(1) is a 4-bit wide, bidirectional port. The corresponding data direction register is
TRISE. Setting a
TRISE bit (= 1) will make the corresponding PORTE pin an input (i.e., put the corresponding
output driver in a High-Impedance mode). Clearing a TRISE bit (= 0) will make the
corresponding PORTE pin an output (i.e., enable the output driver and put the contents of the
output latch on the selected pin). The exception is RE3,
VIVA INSTITUTE OF TECHNOLOGY
Page 8-27
Page 8-28
Oscillator Control :
The Oscillator Control (OSCCON) register controls the system clock and
frequency selection options. The OSCCON register contains the following
bits:
Frequency selection bits (IRCF)
Frequency Status bits (HTS, LTS)
System clock control bits (OSTS, SCS)
Page 8-29
TIMER0 MODULE :
The Timer0 module is an 8-bit timer/counter with the following features:
8-bit timer/counter register (TMR0)
8-bit prescaler (shared with Watchdog Timer)
Programmable internal or external clock source
Programmable external clock edge selection
Interrupt on overflow Figure 5-1 is a block diagram of the Timer0 module
Timer0 Operation
When used as a timer, the Timer0 module can be used as either an 8-bit timer or an 8bit counter
When used as a timer, the Timer0 module will increment every instruction
cycle (without prescaler). Timer mode is selected by clearing the T0CS bit of
the OPTION register to 0. When TMR0 is written, the increment is inhibited
for two instruction cycles immediately following the write.
When used as a counter, the Timer0 module will increment on every rising or
falling edge of the T0CKI pin. The incrementing edge is determined by the
T0SE bit of the OPTION register. Counter mode is selected by setting the
T0CS bit of the OPTION register to 1.
Page 8-30
TIMER2 MODULE :
The Timer2 module is an eight-bit timer with the following features:
8-bit timer register (TMR2)
8-bit period register (PR2)
Interrupt on TMR2 match with PR2
Software programmable prescaler (1:1, 1:4, 1:16)
Software programmable postscaler (1:1 to 1:16)
Timer2 Operation:
Page 8-31
COMPARATOR MODULE :
Comparators are used to interface analog circuits to a digital circuit by
comparing two analog voltages and providing a digital indication of their
relative magnitudes. The comparators are very useful mixed signal building
blocks because they provide analog functionality independent of the program
execution. The analog Comparator module includes the following features:
Independent comparator control
Programmable input selection
Comparator output is available internally/externally
Programmable output polarity
Interrupt-on-change
Wake-up from Sleep
PWM shutdown
Timer1 gate (count enable)
Output synchronization to Timer1 clock input
SR Latch
Programmable and fixed voltage reference
Page 8-32
MAX232:
description/ordering information
The MAX232 is a dual driver/receiver that includes a capacitive voltage
generator to supply TIA/EIA-232-F
voltage levels from a single 5-V supply. Each receiver converts TIA/EIA-232F inputs to 5-V TTL/CMOS levels.
These receivers have a typical threshold of 1.3 V, a typical hysteresis of 0.5 V,
and can accept 30-V inputs.
Each driver converts TTL/CMOS input levels into TIA/EIA-232-F levels. The
driver, receiver, and
Page 8-33
Page 8-34
Page 8-35