SlideShare a Scribd company logo
1 of 18
1
Contents
• Introduction
• History
• Architechture
• Tags
• Configuration
• Readers and types
• Barcode vs RFID
• Limiting Factors
• Antenna Fields
• RFID communication
• Smart Applications
• Summary
• Scope
• References
… and a chip
attached to it
an antenna,
printed, etched
or stamped ...
… on a substrate
e.g. a plastic
foil ...
A paper label
with RFID inside
2
Introduction
• RFID is an acronym for radio frequency identification.
• Briefly the RF stand for “radio-frequency” and ID means “identifier” that allows an item, for instance a library book, to be identified,
accessed, stored, reprogrammed and communicated by using radio waves
• AnAUTO-ID based System
• Amethod for controlling inventory
• Automatically identify objects
• Saving Time and Money
• Non-Line-Sight Communication
• Minimize Work Stress of Staff
• Offering Self Check out/in
• Gathering statistics on used Items
• Improve Customer ServicesAnd
• Easily Prevent Theft
3
History
• RFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves for
Identifying, Tracking and doing Management of material flow.
• Basic concept behind RFID is same as “Mirror-Sunlight-Reflection theory ”
• Invented and used from (Early 1940’s)
• Commercial Operation begun from 1960’s …
• In 1970s developers, inventors, companies, academic institution and government sectors were actively
worked on RFID
• Most common application were tracked person and objects, identified goods in supply chain, reusable
container, high value tools, security, controlling access to building, networks, payment systems and other
assets.
4
Architechture
Firstly items-tag are scanned by reader;
 Secondly in backend transmitted data coming through
antenna (RF-wave) are being recognized by RFID-
based system PC. It acts as a middleware
communication gateway among items, reader and
system database;
And at the end it filters out and store data in RFID-
databases for checking the data fault and relevant
operation.
Tags Reader
Gatewa
y
Database
Database
Application
User Interface
Backend
Fig.1. A General Overview of RFID
Architecture
Scanned
5
Tags:-
6
Type: Contact less Read/Write
Operating Frequency: 13.56 MHz. (HF-High Frequency).
Capacity: 512 bit up to 10Kbits
Common Usage: Ticketing, Library Management, anti-counterfeiting
Standard Deployment: Electronic label application, ElectronicArticle Surveillance
Tested Read Range: Maximum 10cm Read, andWrite 5cm Detection (The distance may vary depend upon the environment)
Multi-Detection: Yes
Max read quantity: 30 labels/sec
Size: 82mm x 49mm
Material: Opaque matt paper 79
Color: White
Weight: 0.5g
Compliance: ICODE, SLI
Regulatory Specifications: ISO 15693
Operating
Specifications:
Waterproof and dustproof
7
Reader
Adevice that is used to interrogate an Tag.
 Basic components are
 AscanningAntenna
 Atransceiver with a decoder to interpret data
 helps in personalize & read data.
8
Types of Readers
• Inventory Reader
 A compact and light weight hand held device
 Comfortable to use
 High storage capacity
 Multi Functional (such as shelving, sorting, searching, weeding and reading)
 Enhanced Security.
• Book Drop Reader
• Self Checks-in books when patrons drop them in book-drop …..
9
Barcode Vs RFID
10
Limiting factors for RFID
1. Reader transmitter power Pr (Gov’t. limited)
2. Reader receiver sensitivity Sr
3. Reader antenna gain Gr (Gov’t. limited)
4. Tag antenna gain Gt (Size limited)
5. Power required at tag Pt (Silicon process limited)
6. Tag modulator efficiency Et
11
12
Antenna fields: Propagation coupling
Transceiver
Tag Reader
antenna
RFID
Tag
IC or microprocessor
antenna
13
RFID communication
 Host manages Reader(s) and issues Commands
 Reader and tag communicate via RF signal
 Carrier signal generated by the reader
 Carrier signal sent out through the antennas
 Carrier signal hits tag(s)
 Tag receives and modifies carrier signal
– “sends back” modulated signal (Passive Backscatter – also referred to as “field disturbance device”)
 Antennas receive the modulated signal and send them to the Reader
 Reader decodes the data
 Results returned to the host application
14
Smart Applications
• “Smart” appliances:
• Closets that advice on style depending on clothes available.
• Ovens that know recipes to cook pre-packaged food.
• “Smart” products:
• Clothing, appliances, CDs, etc. tagged for store returns.
• “Smart” paper:
• Airline tickets that indicate your location in the airport.
• “Smart” currency:
• Anti-counterfeiting and tracking.
• “Smart” people ??
15
RFID Summary
Strengths
 Advanced technology
 Easy to use
 High memory capacity
 Small size
Weaknesses
 Lack of industry and application
standards
 High cost per unit and high RFID
system integration costs
 Weak market understanding of
the benefits of RFID technology
Opportunities
 Could replace the bar code
 End-user demand for RFID
systems is increasing
 Huge market potential in
many businesses
Threats
 Ethical threats concerning
privacy life
 Highly fragmented competitive
environment
Scope
Consider a supermarket chain implementing RFID:
12 bytes EPC + Reader ID + Time = 18 bytes per tag
Average number of tags in a neighborhood store = 700,000
Data generated per second = 12.6 GB
Data generated per day = 544 TB
Assuming 50 stores in the chain,
data generated per day = 2720 TB
16
References
Angell, I., Kietzmann, J. (2006). "RFID and the end of cash?" (PDF). Communications of the ACM. 49 (12): 90–96.
doi:10.1145/1183236.1183237.Retrieved 9 November 2013.
•"RFID Radio Frequency Identification". http://cctvinstitute.co.uk/rfid-radio-frequency-identification/. 26 April 2017. External link
in |website= (help)
•"RFID Forecasts, Players and Opportunities in 2014-2024".IDTechEx.
•Hacking Exposed Linux: Linux Security Secrets & Solutions (third ed.). McGraw-Hill Osborne Media. 2008. p. 298. ISBN 978-0-
07-226257-5.
•Stockman, Harry (October 1948), "Communication by Means of Reflected Power", Proceedings of the IRE, 36 (10): 1196–1204,
doi:10.1109/JRPROC.1948.226245
•"Genesis of theVersatile RFID Tag". RFID Journal. Retrieved 2013-09-22.
•US 3713148, Cardullo, Mario W. & William L. Parks, "Transponder apparatus and system", published May 21, 1970, issued Jan 23,
1973
17
THANK YOU…!!!
18

More Related Content

What's hot

The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library loriayre
 
Use of RFID in HYDN EDC
Use of RFID in HYDN EDC Use of RFID in HYDN EDC
Use of RFID in HYDN EDC Sambit Biswal
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management Systemrabeena tasleem
 
Rfid based library management system
Rfid based library management systemRfid based library management system
Rfid based library management systemiaitoinfotech
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationNadeem Raza
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
Rfid for library management system printronix
Rfid for library management system printronixRfid for library management system printronix
Rfid for library management system printronixBlaze_Hyd
 
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...Manos Theocharopoulos
 
The Future of Library RFID - a Personal View
The Future of Library RFID - a Personal ViewThe Future of Library RFID - a Personal View
The Future of Library RFID - a Personal ViewMichael Fortune
 

What's hot (20)

The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library The Skinny on RFID and Automated Materials Handling in Library
The Skinny on RFID and Automated Materials Handling in Library
 
Use of RFID in HYDN EDC
Use of RFID in HYDN EDC Use of RFID in HYDN EDC
Use of RFID in HYDN EDC
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
 
Rfid based library management system
Rfid based library management systemRfid based library management system
Rfid based library management system
 
RFID TECHNOLOGY
RFID TECHNOLOGYRFID TECHNOLOGY
RFID TECHNOLOGY
 
RFID for Modern Libraries
RFID for Modern Libraries RFID for Modern Libraries
RFID for Modern Libraries
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
Rfid
RfidRfid
Rfid
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
Rfid for library management system printronix
Rfid for library management system printronixRfid for library management system printronix
Rfid for library management system printronix
 
RFID
RFID RFID
RFID
 
RFID and its Applications
RFID and its ApplicationsRFID and its Applications
RFID and its Applications
 
RFID
RFIDRFID
RFID
 
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
 
RFID
RFIDRFID
RFID
 
The Future of Library RFID - a Personal View
The Future of Library RFID - a Personal ViewThe Future of Library RFID - a Personal View
The Future of Library RFID - a Personal View
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID Privacy
RFID Privacy RFID Privacy
RFID Privacy
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 

Similar to RADIO FREQUENCY IDENTIFICATION(RFID)

Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002 Akash Maurya
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentationAkash Maurya
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.pptSaba651353
 
Technology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesTechnology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesHoueida Kammourié
 
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...Laura Stiff
 
Wnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupamWnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupamKishor Satpathy
 
Cicrespi Introduction To RFID Technology
Cicrespi Introduction To RFID TechnologyCicrespi Introduction To RFID Technology
Cicrespi Introduction To RFID TechnologyStefano Vigorelli
 
Introductiontorfidtechnology2006en 125624115744-phpapp02
Introductiontorfidtechnology2006en 125624115744-phpapp02Introductiontorfidtechnology2006en 125624115744-phpapp02
Introductiontorfidtechnology2006en 125624115744-phpapp02Cicrespi spa
 
My best effort
My best effortMy best effort
My best effortsujataray
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification Suman Dey
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 

Similar to RADIO FREQUENCY IDENTIFICATION(RFID) (20)

Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Rfid
RfidRfid
Rfid
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
 
Technology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesTechnology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. Barcodes
 
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
 
Wnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupamWnl 160 introducing rfid technology by anupam
Wnl 160 introducing rfid technology by anupam
 
Cicrespi Introduction To RFID Technology
Cicrespi Introduction To RFID TechnologyCicrespi Introduction To RFID Technology
Cicrespi Introduction To RFID Technology
 
Introductiontorfidtechnology2006en 125624115744-phpapp02
Introductiontorfidtechnology2006en 125624115744-phpapp02Introductiontorfidtechnology2006en 125624115744-phpapp02
Introductiontorfidtechnology2006en 125624115744-phpapp02
 
My best effort
My best effortMy best effort
My best effort
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

RADIO FREQUENCY IDENTIFICATION(RFID)

  • 1. 1
  • 2. Contents • Introduction • History • Architechture • Tags • Configuration • Readers and types • Barcode vs RFID • Limiting Factors • Antenna Fields • RFID communication • Smart Applications • Summary • Scope • References … and a chip attached to it an antenna, printed, etched or stamped ... … on a substrate e.g. a plastic foil ... A paper label with RFID inside 2
  • 3. Introduction • RFID is an acronym for radio frequency identification. • Briefly the RF stand for “radio-frequency” and ID means “identifier” that allows an item, for instance a library book, to be identified, accessed, stored, reprogrammed and communicated by using radio waves • AnAUTO-ID based System • Amethod for controlling inventory • Automatically identify objects • Saving Time and Money • Non-Line-Sight Communication • Minimize Work Stress of Staff • Offering Self Check out/in • Gathering statistics on used Items • Improve Customer ServicesAnd • Easily Prevent Theft 3
  • 4. History • RFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves for Identifying, Tracking and doing Management of material flow. • Basic concept behind RFID is same as “Mirror-Sunlight-Reflection theory ” • Invented and used from (Early 1940’s) • Commercial Operation begun from 1960’s … • In 1970s developers, inventors, companies, academic institution and government sectors were actively worked on RFID • Most common application were tracked person and objects, identified goods in supply chain, reusable container, high value tools, security, controlling access to building, networks, payment systems and other assets. 4
  • 5. Architechture Firstly items-tag are scanned by reader;  Secondly in backend transmitted data coming through antenna (RF-wave) are being recognized by RFID- based system PC. It acts as a middleware communication gateway among items, reader and system database; And at the end it filters out and store data in RFID- databases for checking the data fault and relevant operation. Tags Reader Gatewa y Database Database Application User Interface Backend Fig.1. A General Overview of RFID Architecture Scanned 5
  • 7. Type: Contact less Read/Write Operating Frequency: 13.56 MHz. (HF-High Frequency). Capacity: 512 bit up to 10Kbits Common Usage: Ticketing, Library Management, anti-counterfeiting Standard Deployment: Electronic label application, ElectronicArticle Surveillance Tested Read Range: Maximum 10cm Read, andWrite 5cm Detection (The distance may vary depend upon the environment) Multi-Detection: Yes Max read quantity: 30 labels/sec Size: 82mm x 49mm Material: Opaque matt paper 79 Color: White Weight: 0.5g Compliance: ICODE, SLI Regulatory Specifications: ISO 15693 Operating Specifications: Waterproof and dustproof 7
  • 8. Reader Adevice that is used to interrogate an Tag.  Basic components are  AscanningAntenna  Atransceiver with a decoder to interpret data  helps in personalize & read data. 8
  • 9. Types of Readers • Inventory Reader  A compact and light weight hand held device  Comfortable to use  High storage capacity  Multi Functional (such as shelving, sorting, searching, weeding and reading)  Enhanced Security. • Book Drop Reader • Self Checks-in books when patrons drop them in book-drop ….. 9
  • 11. Limiting factors for RFID 1. Reader transmitter power Pr (Gov’t. limited) 2. Reader receiver sensitivity Sr 3. Reader antenna gain Gr (Gov’t. limited) 4. Tag antenna gain Gt (Size limited) 5. Power required at tag Pt (Silicon process limited) 6. Tag modulator efficiency Et 11
  • 12. 12 Antenna fields: Propagation coupling Transceiver Tag Reader antenna RFID Tag IC or microprocessor antenna
  • 13. 13 RFID communication  Host manages Reader(s) and issues Commands  Reader and tag communicate via RF signal  Carrier signal generated by the reader  Carrier signal sent out through the antennas  Carrier signal hits tag(s)  Tag receives and modifies carrier signal – “sends back” modulated signal (Passive Backscatter – also referred to as “field disturbance device”)  Antennas receive the modulated signal and send them to the Reader  Reader decodes the data  Results returned to the host application
  • 14. 14 Smart Applications • “Smart” appliances: • Closets that advice on style depending on clothes available. • Ovens that know recipes to cook pre-packaged food. • “Smart” products: • Clothing, appliances, CDs, etc. tagged for store returns. • “Smart” paper: • Airline tickets that indicate your location in the airport. • “Smart” currency: • Anti-counterfeiting and tracking. • “Smart” people ??
  • 15. 15 RFID Summary Strengths  Advanced technology  Easy to use  High memory capacity  Small size Weaknesses  Lack of industry and application standards  High cost per unit and high RFID system integration costs  Weak market understanding of the benefits of RFID technology Opportunities  Could replace the bar code  End-user demand for RFID systems is increasing  Huge market potential in many businesses Threats  Ethical threats concerning privacy life  Highly fragmented competitive environment
  • 16. Scope Consider a supermarket chain implementing RFID: 12 bytes EPC + Reader ID + Time = 18 bytes per tag Average number of tags in a neighborhood store = 700,000 Data generated per second = 12.6 GB Data generated per day = 544 TB Assuming 50 stores in the chain, data generated per day = 2720 TB 16
  • 17. References Angell, I., Kietzmann, J. (2006). "RFID and the end of cash?" (PDF). Communications of the ACM. 49 (12): 90–96. doi:10.1145/1183236.1183237.Retrieved 9 November 2013. •"RFID Radio Frequency Identification". http://cctvinstitute.co.uk/rfid-radio-frequency-identification/. 26 April 2017. External link in |website= (help) •"RFID Forecasts, Players and Opportunities in 2014-2024".IDTechEx. •Hacking Exposed Linux: Linux Security Secrets & Solutions (third ed.). McGraw-Hill Osborne Media. 2008. p. 298. ISBN 978-0- 07-226257-5. •Stockman, Harry (October 1948), "Communication by Means of Reflected Power", Proceedings of the IRE, 36 (10): 1196–1204, doi:10.1109/JRPROC.1948.226245 •"Genesis of theVersatile RFID Tag". RFID Journal. Retrieved 2013-09-22. •US 3713148, Cardullo, Mario W. & William L. Parks, "Transponder apparatus and system", published May 21, 1970, issued Jan 23, 1973 17