SlideShare a Scribd company logo
1 of 24
Presented by– Priyanka Singh
B.Tech (ECE),3rd Sem
Submitted to – Mr. Sumit Danda
OVERVIEW
 RFDI APPLICATION
 SOFTWARE DEFINED RADIO
 METHODOLOGY
 APPLICATION
 FUTURE COSIDERATION
 CONCLUSION
What is RFID?
 RFID = Radio Frequency Identification.
 An ADC (Automated Data Collection) technology that:
 uses radio-frequency waves to transfer data between a reader
and a movable item to identify, categorize, track..
 Is fast and does not require physical sight or contact between
reader/scanner and the tagged item.
 Performs the operation using low cost components.
 Attempts to provide unique identification and backend
integration that allows for wide range of applications.
 Other ADC technologies: Bar codes, OCR
SOFTWARE DEFINED RADIO
 Software-Defined Radio (SDR) is a wireless communications
system where all of the signal processing is implemented in
software.
 Software Defined Radio (SDR) is an advanced radio
technology in which the modulation and demodulation of
radio signals is performed exclusively by software.
 A communication link consists of three components: the
transmitter, the channel, and the receiver.
Ethernet
RFID
Reader
RFID Tag RF Antenna Network Workstation
 RFID system is mainly consists of the following
components:
1) Tag (transponder)
A device that transmits data to reader which is located on the
object to be identifies.
2) Reader (Transceiver)
This device is used to read and/or write data to RFID tags.
Antenna could be build inside the reader. The antenna is the
channel between the tag and the transceiver, which control the
systems data access and communication.
3) Software Defined Radio
Software Defined Radio (SDR) is an advanced radio
technology in which the modulation and demodulation of
radio signals is performed exclusively by software.
RFID applications
 Manufacturing and Processing
 Inventory and production process monitoring
 Warehouse order fulfillment
 Supply Chain Management
 Inventory tracking systems
 Logistics management
 Retail
 Inventory control and customer insight
 Auto checkout with reverse logistics
 Security
 Access control
 Counterfeiting and Theft control/prevention
 Location Tracking
 Traffic movement control and parking management
 Wildlife/Livestock monitoring and tracking
Smart groceries
 Add an RFID tag to all
items in the grocery.
 As the cart leaves the
store, it passes through
an RFID transceiver.
 The cart is rung up in
seconds.
Smart cabinet
1. Tagged item is removed from
or placed in
“Smart Cabinet”
2. “Smart Cabinet” periodically
interrogates to assess
inventory
3. Server/Database is updated to
reflect item’s disposition
4. Designated individuals are
notified regarding items that
need attention (cabinet and
shelf location, action required)
Passive
read/write
tags
affixed to
caps
of containers
Reader antennas placed under each
shelf
Smart fridge
 Recognizes what’s been put in it
 Recognizes when things are removed
 Creates automatic shopping lists
 Notifies you when things are past their expiration
 Shows you the recipes that most closely match what is
available
Some more smart applications
 “Smart” appliances:
 Closets that advice on style depending on clothes available.
 Ovens that know recipes to cook pre-packaged food.
 “Smart” products:
 Clothing, appliances, CDs, etc. tagged for store returns.
 “Smart” paper:
 Airline tickets that indicate your location in the airport.
 “Smart” currency:
 Anti-counterfeiting and tracking
 No line of sight required for reading
 Multiple items can be read with a single scan
 Each tag can carry a lot of data (read/write)
 Individual items identified and not just the
category
 Passive tags have a virtually unlimited lifetime
 Active tags can be read from great distances
 Can be combined with barcode technology
• Hidden placement of tags
• Unique identifiers for all objects worldwide
• Massive data aggregation
• Unauthorized development of detailed profiles
• Unauthorized third party access to profile data
• Hidden readers
“Just in case you
want to know, she’s
carrying 700 Euro…”
 Tag does not give all its information to reader.
 The closer the reader, the more the processing.
 Tag reveals highest level of authenticated information.
1. Reader specifies which level it wants.
2. Tag specifies level of security, and/or amount of
energy needed.
3. Reader proceeds at that level of security.
4. Tag responds if and only if it gets energy and security
required.
Some more approaches
 The Faraday Cage approach.
 Place RFID tags in a protective mesh.
 Would make locomotion difficult.
 The Kill Tag approach.
 Kill the tag while leaving the store.
 RFID tags are too useful for reverse logistics.
 The Tag Encryption approach.
 Tag cycles through several pseudonyms.
 Getting a good model is difficult.
 No ‘one-size-fits-all’ solution.
 Security hinges on the fact that in the real world, an
adversary must have physical proximity to tags to interact
with them.
Strengths
 Advanced technology
 Easy to use
 High memory capacity
 Small size
Weaknesses
 Lack of industry and application
standards
 High cost per unit and high RFID
system integration costs
 Weak market understanding of the
benefits of RFID technology
Opportunities
 Could replace the bar code
 End-user demand for RFID systems
is increasing
 Huge market potential in many
businesses
Threats
 Ethical threats concerning privacy
life
 Highly fragmented competitive
environment
CONCLUSION
REFERENCES
 http://www.epcglobalinc.com/
 http://www.rfidjournal.com/
 http://rfidprivacy.com/
 http://www.rfidinc.com/
 http://www.buyrfid.com/
sdr using rfid application

More Related Content

What's hot

Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance systemeskkarthik
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFCMehvish Mushtaq
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMSuvendu Kumar Dash
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
IRJET- Smart Trolley System for Automated Billing using RFID and IoT
IRJET-  	  Smart Trolley System for Automated Billing using RFID and IoTIRJET-  	  Smart Trolley System for Automated Billing using RFID and IoT
IRJET- Smart Trolley System for Automated Billing using RFID and IoTIRJET Journal
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management Systemrabeena tasleem
 

What's hot (20)

Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
 
Smartdust
SmartdustSmartdust
Smartdust
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFC
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEM
 
RFID
RFIDRFID
RFID
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control system
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
RFID
RFID RFID
RFID
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
IRJET- Smart Trolley System for Automated Billing using RFID and IoT
IRJET-  	  Smart Trolley System for Automated Billing using RFID and IoTIRJET-  	  Smart Trolley System for Automated Billing using RFID and IoT
IRJET- Smart Trolley System for Automated Billing using RFID and IoT
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
 

Similar to sdr using rfid application

Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002 Akash Maurya
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.pptSaba651353
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxKondiVinay
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentationAkash Maurya
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationNadeem Raza
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptxlisbala
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in librariesShivashish Verma
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMHristo Borislavov Kolev
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutionsashtopustech
 

Similar to sdr using rfid application (20)

Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
 
RFID-1.ppt
RFID-1.pptRFID-1.ppt
RFID-1.ppt
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in libraries
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Rfid
RfidRfid
Rfid
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
RFID In LMS
RFID In LMSRFID In LMS
RFID In LMS
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
 

Recently uploaded

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

sdr using rfid application

  • 1. Presented by– Priyanka Singh B.Tech (ECE),3rd Sem Submitted to – Mr. Sumit Danda
  • 2.
  • 3. OVERVIEW  RFDI APPLICATION  SOFTWARE DEFINED RADIO  METHODOLOGY  APPLICATION  FUTURE COSIDERATION  CONCLUSION
  • 4. What is RFID?  RFID = Radio Frequency Identification.  An ADC (Automated Data Collection) technology that:  uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track..  Is fast and does not require physical sight or contact between reader/scanner and the tagged item.  Performs the operation using low cost components.  Attempts to provide unique identification and backend integration that allows for wide range of applications.  Other ADC technologies: Bar codes, OCR
  • 5. SOFTWARE DEFINED RADIO  Software-Defined Radio (SDR) is a wireless communications system where all of the signal processing is implemented in software.  Software Defined Radio (SDR) is an advanced radio technology in which the modulation and demodulation of radio signals is performed exclusively by software.  A communication link consists of three components: the transmitter, the channel, and the receiver.
  • 6.
  • 7. Ethernet RFID Reader RFID Tag RF Antenna Network Workstation
  • 8.  RFID system is mainly consists of the following components: 1) Tag (transponder) A device that transmits data to reader which is located on the object to be identifies. 2) Reader (Transceiver) This device is used to read and/or write data to RFID tags. Antenna could be build inside the reader. The antenna is the channel between the tag and the transceiver, which control the systems data access and communication. 3) Software Defined Radio Software Defined Radio (SDR) is an advanced radio technology in which the modulation and demodulation of radio signals is performed exclusively by software.
  • 9.
  • 10. RFID applications  Manufacturing and Processing  Inventory and production process monitoring  Warehouse order fulfillment  Supply Chain Management  Inventory tracking systems  Logistics management  Retail  Inventory control and customer insight  Auto checkout with reverse logistics  Security  Access control  Counterfeiting and Theft control/prevention  Location Tracking  Traffic movement control and parking management  Wildlife/Livestock monitoring and tracking
  • 11. Smart groceries  Add an RFID tag to all items in the grocery.  As the cart leaves the store, it passes through an RFID transceiver.  The cart is rung up in seconds.
  • 12. Smart cabinet 1. Tagged item is removed from or placed in “Smart Cabinet” 2. “Smart Cabinet” periodically interrogates to assess inventory 3. Server/Database is updated to reflect item’s disposition 4. Designated individuals are notified regarding items that need attention (cabinet and shelf location, action required) Passive read/write tags affixed to caps of containers Reader antennas placed under each shelf
  • 13. Smart fridge  Recognizes what’s been put in it  Recognizes when things are removed  Creates automatic shopping lists  Notifies you when things are past their expiration  Shows you the recipes that most closely match what is available
  • 14. Some more smart applications  “Smart” appliances:  Closets that advice on style depending on clothes available.  Ovens that know recipes to cook pre-packaged food.  “Smart” products:  Clothing, appliances, CDs, etc. tagged for store returns.  “Smart” paper:  Airline tickets that indicate your location in the airport.  “Smart” currency:  Anti-counterfeiting and tracking
  • 15.
  • 16.  No line of sight required for reading  Multiple items can be read with a single scan  Each tag can carry a lot of data (read/write)  Individual items identified and not just the category  Passive tags have a virtually unlimited lifetime  Active tags can be read from great distances  Can be combined with barcode technology
  • 17.
  • 18. • Hidden placement of tags • Unique identifiers for all objects worldwide • Massive data aggregation • Unauthorized development of detailed profiles • Unauthorized third party access to profile data • Hidden readers “Just in case you want to know, she’s carrying 700 Euro…”
  • 19.
  • 20.  Tag does not give all its information to reader.  The closer the reader, the more the processing.  Tag reveals highest level of authenticated information. 1. Reader specifies which level it wants. 2. Tag specifies level of security, and/or amount of energy needed. 3. Reader proceeds at that level of security. 4. Tag responds if and only if it gets energy and security required.
  • 21. Some more approaches  The Faraday Cage approach.  Place RFID tags in a protective mesh.  Would make locomotion difficult.  The Kill Tag approach.  Kill the tag while leaving the store.  RFID tags are too useful for reverse logistics.  The Tag Encryption approach.  Tag cycles through several pseudonyms.  Getting a good model is difficult.  No ‘one-size-fits-all’ solution.  Security hinges on the fact that in the real world, an adversary must have physical proximity to tags to interact with them.
  • 22. Strengths  Advanced technology  Easy to use  High memory capacity  Small size Weaknesses  Lack of industry and application standards  High cost per unit and high RFID system integration costs  Weak market understanding of the benefits of RFID technology Opportunities  Could replace the bar code  End-user demand for RFID systems is increasing  Huge market potential in many businesses Threats  Ethical threats concerning privacy life  Highly fragmented competitive environment CONCLUSION
  • 23. REFERENCES  http://www.epcglobalinc.com/  http://www.rfidjournal.com/  http://rfidprivacy.com/  http://www.rfidinc.com/  http://www.buyrfid.com/