SlideShare a Scribd company logo
Created by-Narsa Ram
ECE-173/12
Dated-07/11/2015
Credits to-Amit sir/Web Tek Labs
Private Ltd.
RFID concepts
points to be covered are as
follows:-
1)Introduction
2)Historic development
3)Current RFID
technology
3.1)Energy sources
3.2)Frequency
bands
3.3)standards
3.4)RFID system
4)Working principle
5)security
6)Application
1)Introduction:- RFID
Radio Frequency
Identification tags or
simply “tags” are
small transponders
that respond to
queries from a reader
by wirelessly
transmitting a serial
number or similar
identifier using radio
frequency waves.
2)Historic development:-
The first RFID application was
the “identification friends or
foe”(IFF) system ans it was used
by the british in the 2nd world
war.The first commercial RFID
application was “Electronic
Article surveillance”(EAS). It was
developed in the seventies as a
theft prevention system.
3)Current RFID technology:-
This section describes out of
which parts RFID tags consists
of,how they work in principle and
what types of tags do exist.it
focuses on how tags are powered
and what frequency bands are
used.
RFID transponders In general
consists of:-1)chip 2)Antenna
3)case 4)battery(for active tags
only)
3.1)Energy sources:-3-types of
transponders(tags) in relation to power or
energy
a)Passive tags-do not have an internal power
source
-rely on power induced by reader through
mutual inductance
-ranges between 2mm and a few meters.
b)semi-passive tags-sometimes uses battery
depending upon application
c)Active tags-contain an internal power
source
-signal strength is high as compare to semi
and passive tags
3.2) Frequency bands-
low frequency : 30-500khz
High frequency :10-15Mhz
Ultra frequency :850-950Mhz,2.4-
2.5Ghz,5.8Ghz.
3.3)standards:-A short list of RFID standards
follows: ISO 11784, ISO 11785, ISO 14223,
ISO 10536, ISO 14443, ISO 15693, ISO
18000.
3.4)RFID system:-A rfid reader and
few tags are in general of little
use.the retrieval of a serial
number does provide much
information to the user nor does it
help to keep track of items in a
production chain.the real power of
rfid comes in combination with a
backend that stores additional
information such as descriptions
for products and where and when
a certain tag was scanned.
4)Working principle:-Transfer of
energy(data) from one
ckt(reader)to
another(transponde)through a
shared magnetic field by mean of
mutual inductance powers
microchip
-circuitry uses load modulation to
send data back to reader.
5)Security:-
-privacy
-Authentication
-Attack ranges
-Attacks again RFID system
6) Application area:-
-people,animal etc tracking
-Document tracking
-Health care
-Manufacturing
-Attendance based system
like classes,offices etc…
-Laptop tracking
-used in Automatic toll tax
payment
“We need technology in ev
ery classroom and in every
student and teacher’s hand
because it is the pen and
paper of our time,and it’s
the lens through which we
experience much of this
world” –David Warlick
THANKU YOU
??????

More Related Content

What's hot

Attack presentation
Attack presentationAttack presentation
Attack presentation
Frikha Nour
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
kunal13309
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
Maarten Weyn
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
ijwmn
 
Guard patrol systems
Guard patrol systemsGuard patrol systems
Guard patrol systems
Guard Patrol Products
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
IJERA Editor
 
Internet of things
Internet of thingsInternet of things
Internet of things
esyam95
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
Robiul Islam
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
arushi bhatnagar
 
Security in wireless cellular network
Security in wireless cellular networkSecurity in wireless cellular network
Security in wireless cellular network
Awais Mansoor Chohan
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Agris Ameriks
 
Radio hacking - Part 1
Radio hacking - Part 1 Radio hacking - Part 1
Radio hacking - Part 1
nullowaspmumbai
 
Concentris Systems Overview
Concentris Systems OverviewConcentris Systems Overview
Concentris Systems Overview
lgalluzi
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
AirTight Networks
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
Saikiran Panjala
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
Adel Zalok
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
Ahmad Sharifi
 

What's hot (19)

Attack presentation
Attack presentationAttack presentation
Attack presentation
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
Rfid
RfidRfid
Rfid
 
Guard patrol systems
Guard patrol systemsGuard patrol systems
Guard patrol systems
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Security in wireless cellular network
Security in wireless cellular networkSecurity in wireless cellular network
Security in wireless cellular network
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Radio hacking - Part 1
Radio hacking - Part 1 Radio hacking - Part 1
Radio hacking - Part 1
 
Concentris Systems Overview
Concentris Systems OverviewConcentris Systems Overview
Concentris Systems Overview
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 

Viewers also liked

Первый марафон легко и красиво
Первый марафон легко и красивоПервый марафон легко и красиво
Первый марафон легко и красиво
Lera Bar'ba
 
Первый марафон: легко и красиво?
Первый марафон: легко и красиво?Первый марафон: легко и красиво?
Первый марафон: легко и красиво?
Lera Bar'ba
 
«Слабые» места спортсмена-любителя. Часть первая: борьба с жировой тканью.
«Слабые» места спортсмена-любителя. Часть первая: борьба с жировой тканью.«Слабые» места спортсмена-любителя. Часть первая: борьба с жировой тканью.
«Слабые» места спортсмена-любителя. Часть первая: борьба с жировой тканью.
Lera Bar'ba
 
Rfid and gsm based cas
Rfid and gsm based casRfid and gsm based cas
Rfid and gsm based cas
Narsa Ram
 
Повреждение мышечной ткани в практике спортивного врача
Повреждение мышечной ткани в практике спортивного врачаПовреждение мышечной ткани в практике спортивного врача
Повреждение мышечной ткани в практике спортивного врача
Lera Bar'ba
 
International standards
International standardsInternational standards
International standards
Muhammad Umair Akram
 
Enabling Investment in Gas Projects in Africa - LNG
Enabling Investment in Gas Projects in Africa - LNGEnabling Investment in Gas Projects in Africa - LNG
Enabling Investment in Gas Projects in Africa - LNG
Babs Omotowa
 
Traceability of meat and meat product
Traceability of meat and meat productTraceability of meat and meat product
Traceability of meat and meat product
Bhujendra Soni
 
Rfid and gsm based cas
Rfid and gsm based casRfid and gsm based cas
Rfid and gsm based cas
Narsa Ram
 
Project management in NHAI
Project management in NHAIProject management in NHAI
Project management in NHAIAnshuman Jaiswal
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
Mehjabin Sultana
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
Rsume for School from Canisius Collage
Rsume for School from Canisius CollageRsume for School from Canisius Collage
Rsume for School from Canisius CollageSumaiya Meman
 
Trait Naxiety And State Anxiety Among Diabetic Patients
Trait Naxiety And State Anxiety Among Diabetic PatientsTrait Naxiety And State Anxiety Among Diabetic Patients
Trait Naxiety And State Anxiety Among Diabetic PatientsSarath Mohan
 
Rfid a modern technique in animal identification
Rfid  a modern technique in animal identificationRfid  a modern technique in animal identification
Rfid a modern technique in animal identification
Rameswar Panda
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance SystemAtiq Shaikh
 
Elasticity of Agricultural Products
Elasticity of Agricultural ProductsElasticity of Agricultural Products
Elasticity of Agricultural Products
mnbashar
 
Ellis Whittam Brochure
Ellis Whittam BrochureEllis Whittam Brochure
Ellis Whittam BrochureCody Silvester
 

Viewers also liked (20)

Первый марафон легко и красиво
Первый марафон легко и красивоПервый марафон легко и красиво
Первый марафон легко и красиво
 
ELI to Credit
ELI to CreditELI to Credit
ELI to Credit
 
Первый марафон: легко и красиво?
Первый марафон: легко и красиво?Первый марафон: легко и красиво?
Первый марафон: легко и красиво?
 
«Слабые» места спортсмена-любителя. Часть первая: борьба с жировой тканью.
«Слабые» места спортсмена-любителя. Часть первая: борьба с жировой тканью.«Слабые» места спортсмена-любителя. Часть первая: борьба с жировой тканью.
«Слабые» места спортсмена-любителя. Часть первая: борьба с жировой тканью.
 
Rfid and gsm based cas
Rfid and gsm based casRfid and gsm based cas
Rfid and gsm based cas
 
Повреждение мышечной ткани в практике спортивного врача
Повреждение мышечной ткани в практике спортивного врачаПовреждение мышечной ткани в практике спортивного врача
Повреждение мышечной ткани в практике спортивного врача
 
International standards
International standardsInternational standards
International standards
 
Enabling Investment in Gas Projects in Africa - LNG
Enabling Investment in Gas Projects in Africa - LNGEnabling Investment in Gas Projects in Africa - LNG
Enabling Investment in Gas Projects in Africa - LNG
 
Traceability of meat and meat product
Traceability of meat and meat productTraceability of meat and meat product
Traceability of meat and meat product
 
Rfid and gsm based cas
Rfid and gsm based casRfid and gsm based cas
Rfid and gsm based cas
 
Project management in NHAI
Project management in NHAIProject management in NHAI
Project management in NHAI
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Rsume for School from Canisius Collage
Rsume for School from Canisius CollageRsume for School from Canisius Collage
Rsume for School from Canisius Collage
 
Trait Naxiety And State Anxiety Among Diabetic Patients
Trait Naxiety And State Anxiety Among Diabetic PatientsTrait Naxiety And State Anxiety Among Diabetic Patients
Trait Naxiety And State Anxiety Among Diabetic Patients
 
Rfid a modern technique in animal identification
Rfid  a modern technique in animal identificationRfid  a modern technique in animal identification
Rfid a modern technique in animal identification
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance System
 
Elasticity of Agricultural Products
Elasticity of Agricultural ProductsElasticity of Agricultural Products
Elasticity of Agricultural Products
 
CV
CVCV
CV
 
Ellis Whittam Brochure
Ellis Whittam BrochureEllis Whittam Brochure
Ellis Whittam Brochure
 

Similar to Created by narsa ram

Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
montaser185
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identificationarionslideshare
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
eSAT Journals
 
rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptx
RohithTopula
 
rohith.pptx
rohith.pptxrohith.pptx
rohith.pptx
RohithTopula
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
Mohamed Amin Elaguech
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
Positive Hack Days
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
giri529
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
Brent Muir
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification
Suman Dey
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
KOPPOLI KIRANKUMAR
 
Presentation 2 rfid standards & protocols
Presentation 2 rfid standards & protocolsPresentation 2 rfid standards & protocols
Presentation 2 rfid standards & protocols
Mouhanad Alkhaldi
 
Rfid3
Rfid3Rfid3
Rfid3
kunal13309
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
Alexander Decker
 

Similar to Created by narsa ram (20)

Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
 
rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptx
 
rohith.pptx
rohith.pptxrohith.pptx
rohith.pptx
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
 
Presentation 2 rfid standards & protocols
Presentation 2 rfid standards & protocolsPresentation 2 rfid standards & protocols
Presentation 2 rfid standards & protocols
 
Rfid3
Rfid3Rfid3
Rfid3
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 

Recently uploaded

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 

Recently uploaded (20)

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 

Created by narsa ram

  • 1. Created by-Narsa Ram ECE-173/12 Dated-07/11/2015 Credits to-Amit sir/Web Tek Labs Private Ltd.
  • 2. RFID concepts points to be covered are as follows:- 1)Introduction 2)Historic development 3)Current RFID technology 3.1)Energy sources 3.2)Frequency bands 3.3)standards 3.4)RFID system 4)Working principle 5)security 6)Application
  • 3. 1)Introduction:- RFID Radio Frequency Identification tags or simply “tags” are small transponders that respond to queries from a reader by wirelessly transmitting a serial number or similar identifier using radio frequency waves.
  • 4. 2)Historic development:- The first RFID application was the “identification friends or foe”(IFF) system ans it was used by the british in the 2nd world war.The first commercial RFID application was “Electronic Article surveillance”(EAS). It was developed in the seventies as a theft prevention system.
  • 5. 3)Current RFID technology:- This section describes out of which parts RFID tags consists of,how they work in principle and what types of tags do exist.it focuses on how tags are powered and what frequency bands are used. RFID transponders In general consists of:-1)chip 2)Antenna 3)case 4)battery(for active tags only)
  • 6. 3.1)Energy sources:-3-types of transponders(tags) in relation to power or energy a)Passive tags-do not have an internal power source -rely on power induced by reader through mutual inductance -ranges between 2mm and a few meters. b)semi-passive tags-sometimes uses battery depending upon application c)Active tags-contain an internal power source -signal strength is high as compare to semi and passive tags 3.2) Frequency bands- low frequency : 30-500khz High frequency :10-15Mhz Ultra frequency :850-950Mhz,2.4- 2.5Ghz,5.8Ghz. 3.3)standards:-A short list of RFID standards follows: ISO 11784, ISO 11785, ISO 14223, ISO 10536, ISO 14443, ISO 15693, ISO 18000.
  • 7. 3.4)RFID system:-A rfid reader and few tags are in general of little use.the retrieval of a serial number does provide much information to the user nor does it help to keep track of items in a production chain.the real power of rfid comes in combination with a backend that stores additional information such as descriptions for products and where and when a certain tag was scanned.
  • 8. 4)Working principle:-Transfer of energy(data) from one ckt(reader)to another(transponde)through a shared magnetic field by mean of mutual inductance powers microchip -circuitry uses load modulation to send data back to reader.
  • 9. 5)Security:- -privacy -Authentication -Attack ranges -Attacks again RFID system 6) Application area:- -people,animal etc tracking -Document tracking -Health care -Manufacturing -Attendance based system like classes,offices etc… -Laptop tracking -used in Automatic toll tax payment
  • 10. “We need technology in ev ery classroom and in every student and teacher’s hand because it is the pen and paper of our time,and it’s the lens through which we experience much of this world” –David Warlick THANKU YOU ??????