Home Automation3
Home Automation3
ABSTRACT
CHAPTER 1
INTRODUCTION
Embedded systems:
Embedded systems are classified into four categories based on their performance and functional
requirements:
Embedded Systems are classified into three types based on the performance of
the microcontroller such as
Stand alone embedded systems do not require a host system like a computer, it works by
itself. It takes the input from the input ports either analog or digital and processes, calculates
and converts the data and gives the resulting data through the connected device-Which either
controls, drives and displays the connected devices. Examples for the stand alone embedded
systems are mp3 players, digital cameras, video game consoles, microwave ovens and
temperature measurement systems.
2. Real Time Embedded Systems
A real time embedded system is defined as, a system which gives a required o/p in a particular
time. These types of embedded systems follow the time deadlines for completion of a task. Real
time embedded systems are classified into two types such as soft and hard real time systems.
These types of embedded systems are related to a network to access the resources. The
connected network can be LAN, WAN or the internet. The connection can be any wired or
wireless. This type of embedded system is the fastest growing area in embedded system
applications. The embedded web server is a type of system wherein all embedded devices are
connected to a web server and accessed and controlled by a web browser. Example for the LAN
networked embedded system is a home security system wherein all sensors are connected and
run on the protocol TCP/IP
Mobile embedded systems are used in portable embedded devices like cell phones,
mobiles, digital cameras, mp3 players and personal digital assistants, etc. The basic limitation of
these devices is the other resources and limitation of memory.
These types of embedded systems are designed with a single 8 or 16-bit microcontroller,
that may even be activated by a battery. For developing embedded software for small scale
embedded systems, the main programming tools are an editor, assembler, cross assembler and
integrated development environment (IDE).
2. Medium Scale Embedded Systems
These types of embedded systems have enormous hardware and software complexities,
that may need ASIPs, IPs, PLAs, scalable or configurable processors. They are used for cutting-
edge applications that need hardware and software Co-design and components which have to
assemble in the final system.
Embedded systems are used in different applications like automobiles, telecommunications, smart cards,
missiles, satellites, computer networking and digital consumer electronics.
Digital Cameras
Set top Boxes
High Definition TVs
DVDs
This is all about the embedded systems, types of embedded systems with their applications. We all know that
these systems are extremely fabulous systems that play a vital role in many devices, equipments, industrial
control systems, industrial instrumentation and home appliances irrespective of circuit complexity. Considering
the huge significance of embedded systems, this embedded systems article deserves readers’ feedback, queries,
suggestions and comments. Furthermore, for any queries regarding electronics project kits, readers can post
their comments in the comment section below.
Microcontroller
It’s like a small computer on a single IC. It contains a processor core, ROM, RAM and I/O pins
dedicated to perform various tasks. Microcontrollers are generally used in projects and applications that require
direct control of user. As it has all the components needed in its single chip, it does not need any external
circuits to do its task so microcontrollers are heavily used in embedded systems and major microcontroller
manufacturing companies are making them to be used in embedded market. A microcontroller can be called the
heart of embedded system. Some examples of popular microcontrollers are 8051, AVR, PIC series of
microcontrollers,.
Microprocessor
Microprocessor has only a CPU inside them in one or few Integrated Circuits. Like microcontrollers it
does not have RAM, ROM and other peripherals. They are dependent on external circuits of peripherals to
work. But microprocessors are not made for specific task but they are required where tasks are complex and
tricky like development of software’s, games and other applications that require high memory and where input
and output are not defined. It may be called heart of a computer system. Some examples of microprocessor are
Pentium, I3, and I5 etc.
As now you are basically aware of what is a microcontroller and microprocessor, it would be easy to identify
the major differences between a microcontroller and microprocessor.
1. Key difference in both of them is presence of external peripheral, where microcontrollers have RAM, ROM,
EEPROM embedded in it while we have to use external circuits in case of microprocessors.
2. As all the peripheral of microcontroller are on single chip it is compact while microprocessor is bulky.
3. Microcontrollers are made by using complementary metal oxide semiconductor technology so they are
far cheaper than microprocessors. In addition the applications made with microcontrollers are cheaper because
they need lesser external components, while the overall cost of systems made with microprocessors are high
because of the high number of external components required for such systems.
4. Processing speed of microcontrollers is about 8 MHz to 50 MHz, but in contrary processing speed of general
microprocessors is above 1 GHz so it works much faster than microcontrollers.
5. Generally microcontrollers have power saving system, like idle mode or power saving mode so overall it
uses less power and also since external components are low overall consumption of power is less. While in
microprocessors
generally there is no power saving system and also many external components are used with it, so its power
consumption is high in comparison with microcontrollers.
6. Microcontrollers are compact so it makes them favorable and efficient system for small products and
applications while microprocessors are bulky so they are preferred for larger applications.
7. Tasks performed by microcontrollers are limited and generally less complex. While task performed by
microprocessors are software development, Game development, website, documents making etc. which are
generally more complex so require more memory and speed so that’s why external ROM, RAM are used with
it.
8. Microcontrollers are based on Harvard architecture where program memory and data memory are separate
while microprocessors are based on von Neumann model where program and data are stored in same memory
module.
CHAPTER2
BLOCK DIAGRAM
RELAY 1 LOAD 1
RASPBERRY PI
RASPBERRY
RELAY 2 LOAD 2
PI
LOAD 3
RELAY 3
DOOR
L293D IC
CHAPTER3
HARDWARE COMPONENTS
REGULATED POWER SUPPLY
In mains-supplied electronic systems the AC input voltage must be converted into a DC voltage with the
right value and degree of stabilization. In these basic configurations the peak voltage across the load is equal to
the peak value of the AC voltage supplied by the transformer’s secondary winding. For most applications the
output ripple produced by these circuits is too high. However, for some applications - driving small motors or
lamps, for example - they are satisfactory. If a filter capacitor is added after the rectifier diodes the output
voltage waveform is improved considerably. The section b-c is a straight line. During this time it is the filter
capacitor that supplies the load current.
The slope of this line increases as the current increases, bringing point c lower. Consequently the diode
conduction time (c-d) increases, increasing ripple. With zero load current the DC output voltage is equal to the
peak value of the rectified AC voltage. Figure shows how to obtain positive and negative outputs referred to a
common ground. In particular they are helpful in determining the voltage ripple for a given load current and
filter capacitor value. The value of the voltage ripple obtained is directly proportional to the load current and
inversely proportional to the filter capacitor value. The performance of a supply commonly used in consumer
applications – in audio amplifiers.
Often the degree of stability provided by the circuits described above is insufficient and a stabilizer circuit
is needed. This circuit is often used as a reference voltage to apply to the base of a transistor of to the input of an
op amp to obtain higher output current. The simplest example of a series regulator is shown in Figure. In this
circuit the transistor is connected as a voltage follower and the output voltage is about 600 - 700mV lower than
the zener voltage.
The resistor R must be dimensioned so that the zener is correctly biased and that sufficient base current is
supplied to the base of Q1. For high load currents the base current of Q1 is no longer negligible. To avoid that
the current in the zener drops to the point where effective regulation is not possible a Darlington may be used in
place of the transistor. When better performance is required the op amp circuit shown in Figure is
recommended. In this circuit the output voltage is equal to the reference voltage applied to the input of the op
amp. With a suitable output buffer higher currents can be obtained. The output voltage of the Figure 14 circuit
can be varied by adding a variable divider in parallel with the zener diode and with its wiper connected to the op
amp’s input.
The design of stabilized supplies has been simplified dramatically by the introduction of voltage regulator
ICs such as the L78xx and L79xx - three-terminal series regulators which provide a very stable output and
include current limiter and thermal protection functions. Regulated power supply is mainly used to providing
power to this project because it is providing regulated dc power and it converts 220v ac supply into regulated dc
power of 5v, 9v, 12v, 15v etc. Regulated power supply consists of step down transformer, bridge rectifier which
is combination of 4 diodes connected in bridge shape. Bridge rectifier has the maximum efficiency and it is best
than other rectifiers that’s why we prefer it. This rectifier converts ac into pulsating dc. After rectifier filter
circuit is employed, usually capacitor in parallel is used as filter or we can use number of capacitors in parallel
and number of inductors in series. All these filters are low pass filters as we required dc at the o/p. Then after
capacitor voltage regulator is used for observing the pure dc o/p. We can use various voltage regulators for
obtaining pure dc o/p but we prefer 78xx series voltage regulators as they are simpler, cheaper and easier than
others.
(2) Step down transformer: It steps down the AC supply into 5v on the secondary side. It is therefore a 230/5
v transformer. Any change in the primary reflects in the secondary of the transformer. So any fluctuations in
the input are also reflected as a fluctuation in the output.
(3) Rectifier: A center tapped transformer, with four diodes for full wave rectification is used to convert the ac
voltage to a pulsating dc voltage followed by a filter, comprising of a capacitor to filter out (smooth) the
pulsation. After the rectification and smoothening, a sample of the output voltage is fed to the micro controller.
This voltage is unregulated and therefore varies as the input mains voltage varies. Since the system is to prevent
against over voltage, the transformer was designed and the windings were so selected for the device to be able
to sense and withstand input mains voltage up to 600Vac.
MODULES
1. Diode
In electronics, a diode is a component that restricts the direction of movement of charge carriers.
Essentially, it allows an electric current to flow in one direction, but blocks it in the opposite direction. Today
the most common diodes are made from semiconductor materials such as silicon or germanium.
Fig. : Diode
2. Semiconductor Diodes
Most modern diodes are based on semiconductor P-N junctions. In a P-N diode,
conventional current can flow from the P-type side (the anode) to the N-type side (the cathode),
but not in the opposite direction. A semiconductor diode s current-voltage, or I-V, characteristic
curve is ascribed to the behavior of the so-called depletion layer or depletion zone which exists at
the P-N junction between the differing semiconductors.
When a P-N junction is first created, conduction band (mobile) electrons from the N-doped
region diffuse into the P-doped region where there is a large population of holes (places for
electrons in which no electron is present) with which the electrons recombine. When a mobile
electron recombines with a hole, the hole vanishes and the electron is no longer mobile. Thus,
two charge carriers have vanished. The region around the P-N junction becomes depleted of
charge carriers and thus behaves as an insulator.
The 1N4001 series (or 1N4000 series) is a family of popular 1.0 amp general purpose
silicon rectifier diodes commonly used in AC adapters for common household appliances.
Blocking voltage varies from 50 to 1000 volts. This diode is made in an axial-lead DO-41 plastic
package. The 1N5400 series is a similarly popular series for higher current applications, up to
3 A. These diodes come in the larger DO-201 axial package.
These are fairly low-speed rectifier diodes, being inefficient for square waves of more than
15 kHz. The series was second sourced by many manufacturers. The 1N4000 series were in the
Motorola Silicon Rectifier Handbook in 1966, as replacements for 1N2609 through 1N2617. The
1N5400 series were announced in Electrical Design News in 1968, along with the now lesser
known 1.5-ampere 1N5391 series. These devices are widely used and recommended. The table
below shows the maximum repetitive reverse blocking voltages of each of the members of the
1N4000 and 1N5400 series.
TABLE .1. Diode part Numbers for different currents and voltages
300V _ 1N5403
500V _ 1N5405
3. Voltage regulator
Encapsulated in a single chip/package (IC), the 7805 is a positive voltage DC regulator that
has only 3 terminals. They are: Input voltage, Ground, Output Voltage. Although the 7805 were
primarily designed for a fixed-voltage output (5V). 7812 Voltage regulator 12V DC Voltage
Regulator Data Sheet / Specs. The 78012 provides circuit designers with an easy way to regulate
DC voltages to 12v.
Encapsulated in a single chip/package (IC), the 78012 is a positive voltage DC regulator that
has only 3 terminals. They are: Input voltage, Ground, Output Voltage. Although the 78012 were
primarily designed for a fixed-voltage output (12V). 7812 Voltage regulator. It is indeed possible
to use external components in order to obtain DC output voltages of: 5V, 6V, 8V, 9V, 10V, 12V,
15V, 18V, 20V, 24V. Note that the input voltage must, of course, be greater than the required
output voltage, so that it can be regulated downwards.
4. Capacitor
In the Regulated power supply the rating of the chosen capacitor filter is 1000µF.A capacitor
(originally known as condenser) is a passive two-terminal electrical component used to store
energy in an electric field. The forms of practical capacitors vary widely, but all contain at least
two electrical conductors separated by a dielectric (insulator); for example, one common
construction consists of metal foils separated by a thin layer of insulating film. Capacitors are
widely used as parts of electrical circuits in many common electrical devices. When there is a
potential difference (voltage) across the conductors, a static electric field develops across the
dielectric, causing positive charge to collect on one plate and negative charge on the other plate.
Energy is stored in the electrostatic field. An ideal capacitor is characterized by a single constant
value, capacitance, measured in farads. This is the ratio of the electric charge on each conductor
to the potential difference between them.
Fig. : Capacitor
The capacitance is greatest when there is a narrow separation between large areas of
conductor, hence capacitor conductors are often called "plates," referring to an early means of
construction. In practice, the dielectric between the plates passes a small amount of leakage
current and also has an electric field strength limit, resulting in a breakdown voltage, while the
conductors and leads introduce an undesired inductance and resistance. Capacitors are widely
used in electronic circuits for blocking direct current while allowing alternating current to pass,
in filter networks, for smoothing the output of power supplies, in the resonant circuits that tune
radios to particular frequencies, in electric power transmission systems for stabilizing voltage
and power flow, and for many other purposes.
5. Resistors
Fig. : Resistor
LED is an acronym for Light Emitting Diode. Well, you ask, what on earth is a diode. A
diode is a device that, in simplest terms, allows electricity to flow through one way but not the
other. Those of you who are knowledgeable about mechanical things could think of it as sort of
a check valve. If you have no mechanical knowledge, disregard that last sentence. Now that you
know what a diode is, an LED is just one that emits light (But you could probably figure that out
just from reading the name).
Another important thing about all LED's (and all diodes) is that every one of them has
exactly two electrodes. These are important to know when you are wiring an LED into a circuit.
Cathode - Which is the n-side and shorter leg. Since you know these terms you can remember
that electricity flows easily from the anode to the cathode but not the other way around.
LED's are great for many reasons. First of all, they don't heat up like regular light bulbs do.
This is great because, well, you don't burn yourself. They are also smaller than a light bulb.
Another important thing about LED's is that they run on very low amounts of electricity, which
is helpful because it makes them safer to work with (you don't electrocute yourself). Most run on
about 20mA.
Just like with everything, there are some tips that are helpful to make sure your LED's work
well.
Clip the leads - Simple, I know, but people forget to. This is important because it prevents them
from bumping into other parts and messing up your circuit.
Remember which electrode is which - This is a big one because if you don't it won't work at
all. It's a diode; current only flows through it one way.
Read the package - Simple again, but each LED requires slightly different voltage and ampere.
It always helps to wire a resistor into your circuit. It will make the LED last longer by dropping
the voltage. There are some sites that make it easy to find which resistor you need. LEDs come
in all sorts of sizes as well. Here is a photo showing a 3mm, 5mm and 10mm LED. The
"millimeter" size refers to the diameter of the LED. For example, if you need to drill a hole in a
box for your 5mm blink LED, the hole-size should be 5mm, and you'd need a 5mm drill bit to
make it. 5mm are the most common size you'll see, and they can be extremely bright! Green
3mm, Red 5mm and White 10mm LEDs
5mm LEDs can be so bright, they are often used as illumination (lighting something up,
like a flashlight, we'll talk about this next).
3mm LEDs are not as bright but are smaller, and are good for indication (like an LED
that tells you something is on). They're not as good for illumination because they have a
smaller area that is lit.
10mm LEDs are a little rarer, they are huge and chunky but are usually just 5mm LEDs
with a bigger case so they aren't any brighter. They can be good indicators but we rarely
see them as illuminators.
There are always a chance of suffering an electrical power system from abnormal over
voltages. These abnormal over voltages may be caused due to various reason such as, sudden
interruption of heavy load, lightening impulses, switching impulses etc. These over voltage
stresses may damage insulation of various equipments, all the over voltage stresses are not strong
enough to damage insulation of system, but still these over voltages also to be avoided to ensure
the smooth operation of electrical power system.
TYPES OF OVER VOLTAGE RELAY
The below are the types of over voltage relay:
Define Time Overvoltage Relay
L293D is a typical Motor driver or Motor Driver IC which allows DC motor to drive on
either direction. L293D is a 16-pin IC which can control a set of two DC motors simultaneously
in any direction. It means that you can control two DC motor with a single L293D IC. Dual H-
bridge Motor Driver integrated circuit (IC).
The l293d can drive small and quiet big motors as well, check the Voltage Specification at the
end of this page for more info.
Concept:
It works on the concept of H-bridge. H-bridge is a circuit which allows the voltage to be
flown in either direction. As you know voltage need to change its direction for being able to
rotate the motor in clockwise or anticlockwise direction, hence H-bridge IC are ideal for driving
a DC motor.
In a single L293D chip there are two h-Bridge circuit inside the IC which can rotate two
dc motor independently. Due its size it is very much used in robotic application for controlling
DC motors. Given below is the pin diagram of a L293D motor controller.
There are two Enable pins on l293d. Pin 1 and pin 9, for being able to drive the motor,
the pin 1 and 9 need to be high. For driving the motor with left H-bridge you need to enable pin 1
to high. And for right H-Bridge you need to make the pin 9 to high. If anyone of the either pin1
or pin9 goes low then the motor in the corresponding section will suspend working. It’s like a
switch.
TIP: you can simply connect the pin16 VCC (5v) to pin 1 and pin 9 to make them high.
Working of L293D
There are 4 input pins for l293d, pin 2,7 on the left and pin 15 ,10 on the right as shown
on the pin diagram. Left input pins will regulate the rotation of motor connected across left side
and right input for motor on the right hand side. The motors are rotated on the basis of the inputs
provided across the input pins as LOGIC 0 or LOGIC 1.
In simple you need to provide Logic 0 or 1 across the input pins for rotating the motor.
Let’s consider a Motor connected on left side output pins (pin 3,6). For rotating the motor
in clockwise direction the input pins has to be provided with Logic 1 and Logic 0.
In a very similar way the motor can also operate across input pin 15, 10 for motor on the right
hand side.
Voltage Specification
VCC is the voltage that it needs for its own internal operation 5v; L293D will not use this
voltage for driving the motor. For driving the motors it has a separate provision to provide motor
supply VSS (V supply). L293d will use this to drive the motor. It means if you want to operate a
motor at 9V then you need to provide a Supply of 9V across VSS Motor supply.
The maximum voltage for VSS motor supply is 36V. It can supply a max current of 600mA per
channel. Since it can drive motors Up to 36v hence you can drive pretty big motors with this
l293d.
VCC pin 16 is the voltage for its own internal Operation. The maximum voltage ranges from 5v
and upto 36v.
RASPBERRY PI 3
MODEL B
Technical Specification:
Processor
Dual Core Video Core IV® Multimedia Co-Processor. Provides Open GL ES 2.0,
hardware-accelerated Open VG, and 1080p30 H.264 high-profile decode.
Capable of 1Gpixel/s, 1.5Gtexel/s or 24GFLOPs with texture filtering and DMA
infrastructure
Memory
1GB LPDDR2
Operating System
Boots from Micro SD card, running a version of the Linux operating system or Windows
10 IoT
Dimensions
85 x 56 x 17mm
Power
Connectors:
Ethernet
Video Output
Display Serial Interface (DSI) 15 way flat flex cable connector with two data lanes and a
clock lane
Memory Card Slot
The GPU provides Open GL ES 2.0, hardware-accelerated Open VG, and 1080p30
H.264 high-profile decode and is capable of 1Gpixel/s, 1.5Gtexel/s or 24 GFLOPs of
general purpose compute. What’s that all mean? It means that if you plug the Raspberry Pi
3 into your HDTV, you could watch BluRay quality video, using H.264 at 40MBits/s
The biggest change that has been enacted with the Raspberry Pi 3 is an upgrade to
a next generation main processor and improved connectivity with Bluetooth Low Energy
(BLE) and BCM43143 Wi-Fi on board. Additionally, the Raspberry Pi 3 has improved
power management, with an upgraded switched power source up to 2.5 Amps, to support
more powerful external USB devices.
The Raspberry Pi 3’s four built-in USB ports provide enough connectivity for a
mouse, keyboard, or anything else that you feel the RPi needs, but if you want to add even
more you can still use a USB hub. Keep in mind, it is recommended that you use a powered
hub so as not to overtax the on-board voltage regulator. Powering the Raspberry Pi 3 is
easy, just plug any USB power supply into the micro-USB port. There’s no power button so
the Pi will begin to boot as soon as power is applied, to turn it off simply remove power.
The four built-in USB ports can even output up to 1.2A enabling you to connect more
power hungry USB devices (This does require a 2Amp micro USB Power Supply)
On top of all that, the low-level peripherals on the Pi make it great for hardware hacking.
The 0.1" spaced 40-pin GPIO header on the Pi gives you access to 27 GPIO, UART, I2C,
SPI as well as 3.3 and 5V sources. Each pin on the GPIO header is identical to its
predecessor the Model B+.
SoC
Built specifically for the new Pi 3, the Broadcom BCM2837 system-on-chip (SoC) includes
four high-performance ARM Cortex-A53 processing cores running at 1.2GHz with 32kB Level 1 and
512kB Level 2 cache memory, a VideoCore IV graphics processor, and is linked to a 1GB LPDDR2
memory module on the rear of the board.
GPIO
The Raspberry Pi 3 features the same 40-pin general-purpose input-output (GPIO) header as all the Pis
going back to the Model B+ and Model A+. Any existing GPIO hardware will work without
modification; the only change is a switch to which UART is exposed on the GPIO’s pins, but that’s
handled internally by the operating system.
USB chip
The Raspberry Pi 3 shares the same SMSC LAN9514 chip as its predecessor, the Raspberry Pi 2, adding
10/100 Ethernet connectivity and four USB channels to the board. As before, the SMSC chip connects
to the SoC via a single USB channel, acting as a USB-to-Ethernet adaptor and USB hub.
Antenna
There’s no need to connect an external antenna to the Raspberry Pi 3. Its radios are connected to
this chip antenna soldered directly to the board, in order to keep the size of the device to a minimum.
Despite its diminutive stature, this antenna should be more than capable of picking up wireless LAN
and Bluetooth signals – even through walls.
For Raspberry Pi 3, Broadcom have supported us with a new SoC, BCM2837. This
retains the same basic architecture as its predecessors BCM2835 and BCM2836, so all
those projects and tutorials which rely on the precise details of the Raspberry Pi hardware
will continue to work. The 900MHz 32-bit quad-core ARM Cortex- A7 CPU complex has
been replaced by a custom-hardened 1.2GHz 64-bit quad-core ARM Cortex-A53
In terms of size it is identical to the B+ and Pi 2. All the connectors and mounting holes
are in the same place so all existing add-ons, HATs and cases should fit just fine although
the power and activity LEDs have moved to make room for the WiFi antenna.
The performance of the Pi 3 is roughly 50-60% faster than the Pi 2 which means it is
ten times faster than the original Pi.
All of the connectors are in the same place and have the same functionality, and the
board can still be run from a 5V micro-USB power adapter. This time round, we’re
recommending a 2.5A adapter if you want to connect power-hungry USB devices to
the Raspberry Pi.
The main differences are the quad core 64-bit CPU and on-board Wi-Fi and Bluetooth.
The RAM remains 1GB and there is no change to the USB or Ethernet ports. However,
the upgraded power management should mean the Pi 3 can make use of more power
hungry USB devices
For Raspberry Pi 3, Broadcom have supported us with a new SoC, BCM2837. This
retains the same basic architecture as its predecessors BCM2835 and BCM2836, so all
those projects and tutorials which rely on the precise details of the Raspberry Pi hardware
will continue to work. The 900MHz 32-bit quad-core ARM Cortex- A7 CPU complex has
been replaced by a custom-hardened 1.2GHz 64-bit quad-core ARM Cortex-A53
In terms of size it is identical to the B+ and Pi 2. All the connectors and mounting holes
are in the same place so all existing add-ons, HATs and cases should fit just fine although
the power and activity LEDs have moved to make room for the WiFi antenna.
The performance of the Pi 3 is roughly 50-60% faster than the Pi 2 which means it is
ten times faster than the original Pi.
All of the connectors are in the same place and have the same functionality, and
the board can still be run from a 5V micro-USB power adapter. This time round, we’re
recommending a 2.5A adapter if you want to connect power-hungry USB devices to
the Raspberry Pi.
Raspberry Pi Raspberry Pi Model B+ Model A+ Model A
3 Model B 2 Model B
RAM 1GB SDRAM @ 400 1GB SDRAM @ 400 512 MB SDRAM 256 MB SDRAM 256 MB SDRAM
MHz MHz @ 400 MHz @ 400 MHz @ 400 MHz
Storage MicroSD MicroSD MicroSD MicroSD SDCard
USB 2.0 4x USB Ports 4x USB Ports 4x USB Ports 1x USB Port 1x USB Port
Power Draw 2.5A @ 5V 1.8A @ 5V 1.8A @ 5V 1.8A @ 5V 1.2A @ 5V
/ voltage
GPIO 40 pin 40 pin 40 pin 40 pin 26 pin
Ethernet Port Yes Yes Yes No No
Wi-Fi Built in No No No No
Bluetooth LE Built in No No No No
CHAPTER 4
TELEGRAM
Telegram is a cloud-based instant messaging and voice over IP service developed by
Telegram Messenger LLP, a privately held company registered in London, United
Kingdom, founded by the Russian entrepreneur Pavel Durov and his brother Nikolai.
Telegram client apps are available for Android, iOS, Windows Phone, Windows
NT, macOS and Linux. Users can send messages and exchange photos, videos, stickers, audio
and files of any type.
Telegram's client-side code is open-source software but the source code for recent
versions is not always immediately published, whereas its server-side code is closed-source and
proprietary. The service also provides APIs to independent developers. In March 2018, Telegram
stated that it had 200 million monthly active users. According to its CEO, as of April 2017,
Telegram’s annual growth rate was greater than 50%.
Messages and media in Telegram are only client-server encrypted and stored on the
servers by default. The service provides end-to-end encryption for voice calls,[24] and optional
end-to-end encrypted "secret" chats between two online users, yet not for groups or channels.
Telegram's security model has received notable criticism by cryptography experts. They
criticized the general security model of permanently storing all contacts, messages and media
together with their decryption keys on its servers by default and by not enabling end-to-end
encryption for messages by default. Pavel Durov has argued that this is because it helps to avoid
third-party unsecure backups, and to allow users to access messages and files from any device.
Cryptography experts have furthermore criticized Telegram's use of a custom-designed
encryption protocol that has not been proven reliable and secure.
Telegram has faced censorship or outright bans in some countries over accusations that
the app's services have been used to facilitate illegal activities, such as protests and terrorism, as
well as declining demands to facilitate government access to user data and communications.
Security
Cryptography experts have expressed both doubts and criticisms on Telegram's MTProto
encryption scheme, saying that deploying home-brewed and unproven cryptography may render
the encryption vulnerable to bugs that potentially undermine its security, due to a lack of
scrutiny. It has also been suggested that Telegram did not employ developers with sufficient
expertise or credibility in this field.
Critics have also disputed claims by Telegram that it is "more secure than mass market
messengers like WhatsApp and Line", because WhatsApp applies end-to-end encryption to all of
its traffic by default and uses the Signal Protocol, which has been "reviewed and endorsed by
leading security experts", while Telegram does neither and insecurely stores all messages, media
and contacts in their cloud. Since July 2016, Line has also applied end-to-end encryption to all of
its messages by default.
The Electronic Frontier Foundation (EFF) listed Telegram on its "Secure Messaging
Scorecard" in February 2015. Telegram's default chat function received a score of 4 out of 7
points on the scorecard. It received points for having communications encrypted in transit,
having its code open to independent review, having the security design properly documented,
and having completed a recent independent security audit. Telegram's default chat function
missed points because the communications were not encrypted with keys the provider didn't have
access to, users could not verify contacts' identities, and past messages were not secure if the
encryption keys were stolen. Telegram's optional secret chat function, which provides end-to-end
encryption, received a score of 7 out of 7 points on the scorecard. The EFF said that the results
"should not be read as endorsements of individual tools or guarantees of their security", and that
they were merely indications that the projects were "on the right track".
In December 2015, two researchers from Aarhus University published a report in which
they demonstrated that MTProto does not achieve indistinguishability under chosen-ciphertext
attack (IND-CCA) or authenticated encryption. The researchers stressed that the attack was of a
theoretical nature and they "did not see any way of turning the attack into a full plaintext-
recovery attack". Nevertheless, they said they saw "no reason why [Telegram] should use a less
secure encryption scheme when more secure (and at least as efficient) solutions exist". The
Telegram team responded that the flaw does not affect message security and that "a future patch
would address the concern". Telegram 4.6, released in December 2017, supports MTProto 2.0,
which Telegram claims now satisfied the conditions for IND-CCA.
Account self-destruction
The default method of authentication that Telegram uses for logins is SMS-based single-factor
authentication. All that is needed in order to log into an account and gain access to that user's
cloud-based messages is a one-time passcode that is sent via SMS to the user's phone number.
These login SMS messages are known to have been intercepted in Iran, Russia and Germany,
possibly in coordination with phone companies. Pavel Durov has said that Telegram users in
"troubled countries" should enable two-factor authentication by creating passwords, which
Telegram allows, but does not require.
Cloud-based messages
Telegram's default messages are cloud-based and can be accessed on any of the user's
connected devices. Users can share photos, videos, audio messages and other files (up to
1.5 gigabyte in size per file). Users can send messages to other users individually or to groups of
up to 100,000 members.[63] Sent messages can be edited and deleted on both sides within 48
hours after they have been sent. This gives user an ability to correct typos and retract messages
that were sent by mistake. The transmission of messages to Telegram Messenger LLP's servers is
encrypted with the service's MTProto protocol. According to Telegram's privacy policy, "all data
is stored heavily encrypted and the encryption keys in each case are stored in several other DCs
in different jurisdictions. This way local engineers or physical intruders cannot get access to user
data". This makes the messages' security roughly comparable to that of e-mail. Here, most
providers employ client-server encryption as well, however usually with the standardized
protocol Transport Layer Security. E-mails may or may not be encrypted on the servers.
Telegram cloud messages and media remain on the servers at least until deleted by all
participants.
Bots
Channels
Telegram secure the data about the channel author and subscribers. The admin of the
channel can obtain general data about the channel. Each message has its own view counter,
showing how many users have seen this message. Channels can be created for broadcasting
messages to an unlimited number of subscribers. Channels can be publicly available with an alias
and a permanent URL so anyone can join. Users who join a channel can see the entire message
history. Users can join and leave channels at any time. Furthermore, users can mute a channel,
meaning that the user will still receive messages, but won't be notified. Admin can provide a
poll, voting or give permission to post comments on the Telegram channel with help of bots.
Stickers
Drafts
Drafts are unfinished messages synced across user devices. One can start typing a
message on one device and continue on another. The draft will persist in editing area on any
device until it is sent or removed.
Secret chats
Messages can also be sent with client-to-client encryption in so-called secret chats. These
messages are encrypted with the service's MTProto protocol. Unlike Telegram's cloud-based
messages, messages sent within a secret chat can be accessed only on the device upon which the
secret chat was initiated and the device upon which the secret chat was accepted; they cannot be
accessed on other devices. Messages sent within secret chats can, in principle, be deleted at any
time and can optionally self-destruct.
Secret chats have to be initiated and accepted by an invitation, upon which the encryption
keys for the session are exchanged. Users in a secret chat can verify that no man-in-the-middle
attack has occurred by comparing pictures that visualize their public key fingerprints.
According to Telegram, secret chats have supported perfect forward secrecy since December
2014. Encryption keys are periodically changed after a key has been used more than 100 times or
has been in use for more than a week. Old encryption keys are destroyed.
Windows and Linux users are still not able to use secret chats using the official Telegram
Desktop app while the official macOS-only client supports them
Telegram's local message database is not encrypted by default. Some Telegram clients allow
users to encrypt the local message database by setting a passphrase.
Voice calls
In the end of March 2017, Telegram introduced its own voice calls. The calls are built
upon the end-to-end encryption of Secret Chats. Connection is established as peer-to-
peer whenever possible; otherwise the closest server to the client is used. According to Telegram,
there is a neural network working to learn various technical parameters about call to provide
better quality of the service for future uses. After a brief initial trial in Western Europe, voice
calls are now available for use in most countries.
Since version 4.0, released in May 2017, Telegram offers a dedicated video hosting
platform called Telescope. The round videos can be up to one minute long and auto play. When
posted in a public channel on Telegram, the videos are also uploaded to and viewable without an
account at telesco.pe. However, Telegram video messages and "Telescope" videos sent within
non-public chats or groups are not published.
Live locations
For either 15 minutes, one hour, or eight hours, Telegram users can share their live
location in a chat since version 4.4 released in October 2017. If multiple users share their live
location within a group, they are shown on an interactive map. Sharing the 'live location' can be
stopped at any time.
Social login
In February 2018, Telegram launched their social login feature to its users, named as
Telegram Login. It features a website widget that could be embedded into websites, allowing
users to sign into a third party website with their Telegram account. The gateway sends users'
Telegram name, username, and profile picture to the website owner, while users' phone number
remains hidden. The gateway is integrated with a bot, which is linked with the developer's
specific website domain.
Passport
In July 2018, Telegram introduced their online authorisation and identity management
system, Telegram Passport, for platforms that requires real-life identification. It asks users to
upload their own official documents such as passport, identity card, driver license, etc. When an
online service requires such identification documents and verification, it forwards the
information to the platform with the user's permission. Telegram stated that it does not have
access to the data, while the platform will only share the information to the authorized
recipient. However, the service was criticised for being vulnerable to online brute force attacks
CHAPTER 5
5.1 INSTALLATION STEPS
https://sourceforge.net/projects/win32diskimager/
https://www.sdcard.org/downloads/formatter_4/
https://www.raspberrypi.org/downloads/raspbian/
Go to my computer or My PC and find the drive name where the SD card is mounted.
Step 4: Format the SD Card
Open SD Card Formatter and select the drive you noticed in the previous step.
Open win32diskimager.
Browse the .img file of Raspbian OS that was extracted from the downloaded file.
Click on open and then click on Write. If any warning pops up then ignore those by clicking
OK.
Wait for the write to be completed and it may take some minutes. So be patient.
Step 6: Eject the SD Card
CHAPTER 6
CODE
CHAPTER 7
RESULT
CHAPTER 8
APPLICATIONS
1. Homes
ADVANTAGES
1. Easy to use and monitor
2. Less power consumption
CHAPTER 9
CONCLUSION
REFERENCES
[1] Gareth Mitchell, The Raspberry Pi single-board computer will revolutionize computer
science teaching [For & against], Vol.7, NO.3,pp. 26, 2012.
[2] Charles Severence, “Eben Upton: Raspberry Pi”, vol.46, NO.10, pp. 14-16, 2013.
[3] Raspberry Pi Foundation, http://www.raspberry.org
[4] Chris Edwards, “Not-so-humble raspberry pi gets big ideas”, vol.8, NO.3, pp. 30-33, 2013.
[5] Matt Richardson and Shawn Wallace, Getting Started with Raspberry
[6]Python Software Foundation[US], https://pypi.python.org/pypi