TOPIC:
RADIO FREQUENCY IDENTIFICATION(RFID)
Basically RFID is a tag dissimilar to barcode that contains a small memory element which is used to store the information required about the particular element on which the RFID tag is placed.
Eg:
While passing through a toll plaza a vehicle uses a tag which is read or scanned by the cameras so that to avoid wastage of time
The RFIDS are also placed on books in libraries for knowing the information about the book.
PRESENTATION CREDITS:
SANKOJU YASHWANTH
2. Contents
• Introduction
• History
• Architechture
• Tags
• Configuration
• Readers and types
• Barcode vs RFID
• Limiting Factors
• Antenna Fields
• RFID communication
• Smart Applications
• Summary
• Scope
• References
… and a chip
attached to it
an antenna,
printed, etched
or stamped ...
… on a substrate
e.g. a plastic
foil ...
A paper label
with RFID inside
2
3. Introduction
• RFID is an acronym for radio frequency identification.
• Briefly the RF stand for “radio-frequency” and ID means “identifier” that allows an item, for instance a library book, to be identified,
accessed, stored, reprogrammed and communicated by using radio waves
• AnAUTO-ID based System
• Amethod for controlling inventory
• Automatically identify objects
• Saving Time and Money
• Non-Line-Sight Communication
• Minimize Work Stress of Staff
• Offering Self Check out/in
• Gathering statistics on used Items
• Improve Customer ServicesAnd
• Easily Prevent Theft
3
4. History
• RFID (Radio Frequency Identifier) an Auto-ID data collection system surveillance, using RF waves for
Identifying, Tracking and doing Management of material flow.
• Basic concept behind RFID is same as “Mirror-Sunlight-Reflection theory ”
• Invented and used from (Early 1940’s)
• Commercial Operation begun from 1960’s …
• In 1970s developers, inventors, companies, academic institution and government sectors were actively
worked on RFID
• Most common application were tracked person and objects, identified goods in supply chain, reusable
container, high value tools, security, controlling access to building, networks, payment systems and other
assets.
4
5. Architechture
Firstly items-tag are scanned by reader;
Secondly in backend transmitted data coming through
antenna (RF-wave) are being recognized by RFID-
based system PC. It acts as a middleware
communication gateway among items, reader and
system database;
And at the end it filters out and store data in RFID-
databases for checking the data fault and relevant
operation.
Tags Reader
Gatewa
y
Database
Database
Application
User Interface
Backend
Fig.1. A General Overview of RFID
Architecture
Scanned
5
7. Type: Contact less Read/Write
Operating Frequency: 13.56 MHz. (HF-High Frequency).
Capacity: 512 bit up to 10Kbits
Common Usage: Ticketing, Library Management, anti-counterfeiting
Standard Deployment: Electronic label application, ElectronicArticle Surveillance
Tested Read Range: Maximum 10cm Read, andWrite 5cm Detection (The distance may vary depend upon the environment)
Multi-Detection: Yes
Max read quantity: 30 labels/sec
Size: 82mm x 49mm
Material: Opaque matt paper 79
Color: White
Weight: 0.5g
Compliance: ICODE, SLI
Regulatory Specifications: ISO 15693
Operating
Specifications:
Waterproof and dustproof
7
8. Reader
Adevice that is used to interrogate an Tag.
Basic components are
AscanningAntenna
Atransceiver with a decoder to interpret data
helps in personalize & read data.
8
9. Types of Readers
• Inventory Reader
A compact and light weight hand held device
Comfortable to use
High storage capacity
Multi Functional (such as shelving, sorting, searching, weeding and reading)
Enhanced Security.
• Book Drop Reader
• Self Checks-in books when patrons drop them in book-drop …..
9
11. Limiting factors for RFID
1. Reader transmitter power Pr (Gov’t. limited)
2. Reader receiver sensitivity Sr
3. Reader antenna gain Gr (Gov’t. limited)
4. Tag antenna gain Gt (Size limited)
5. Power required at tag Pt (Silicon process limited)
6. Tag modulator efficiency Et
11
13. 13
RFID communication
Host manages Reader(s) and issues Commands
Reader and tag communicate via RF signal
Carrier signal generated by the reader
Carrier signal sent out through the antennas
Carrier signal hits tag(s)
Tag receives and modifies carrier signal
– “sends back” modulated signal (Passive Backscatter – also referred to as “field disturbance device”)
Antennas receive the modulated signal and send them to the Reader
Reader decodes the data
Results returned to the host application
14. 14
Smart Applications
• “Smart” appliances:
• Closets that advice on style depending on clothes available.
• Ovens that know recipes to cook pre-packaged food.
• “Smart” products:
• Clothing, appliances, CDs, etc. tagged for store returns.
• “Smart” paper:
• Airline tickets that indicate your location in the airport.
• “Smart” currency:
• Anti-counterfeiting and tracking.
• “Smart” people ??
15. 15
RFID Summary
Strengths
Advanced technology
Easy to use
High memory capacity
Small size
Weaknesses
Lack of industry and application
standards
High cost per unit and high RFID
system integration costs
Weak market understanding of
the benefits of RFID technology
Opportunities
Could replace the bar code
End-user demand for RFID
systems is increasing
Huge market potential in
many businesses
Threats
Ethical threats concerning
privacy life
Highly fragmented competitive
environment
16. Scope
Consider a supermarket chain implementing RFID:
12 bytes EPC + Reader ID + Time = 18 bytes per tag
Average number of tags in a neighborhood store = 700,000
Data generated per second = 12.6 GB
Data generated per day = 544 TB
Assuming 50 stores in the chain,
data generated per day = 2720 TB
16
17. References
Angell, I., Kietzmann, J. (2006). "RFID and the end of cash?" (PDF). Communications of the ACM. 49 (12): 90–96.
doi:10.1145/1183236.1183237.Retrieved 9 November 2013.
•"RFID Radio Frequency Identification". http://cctvinstitute.co.uk/rfid-radio-frequency-identification/. 26 April 2017. External link
in |website= (help)
•"RFID Forecasts, Players and Opportunities in 2014-2024".IDTechEx.
•Hacking Exposed Linux: Linux Security Secrets & Solutions (third ed.). McGraw-Hill Osborne Media. 2008. p. 298. ISBN 978-0-
07-226257-5.
•Stockman, Harry (October 1948), "Communication by Means of Reflected Power", Proceedings of the IRE, 36 (10): 1196–1204,
doi:10.1109/JRPROC.1948.226245
•"Genesis of theVersatile RFID Tag". RFID Journal. Retrieved 2013-09-22.
•US 3713148, Cardullo, Mario W. & William L. Parks, "Transponder apparatus and system", published May 21, 1970, issued Jan 23,
1973
17