SlideShare a Scribd company logo
Teknologi RFID
GaluhYudha Mahardika / galuh.y.mahardika@gmail.com/ +6282338470900
Dimas Aji Pratama / d.ajipratama@gmail.com/ +6282298069578
Djoko Cahyo Utomo/ djoko.c.utomo@gmail.com/ +6285289051446
What is the RFID ?
General overview of Radio
Frequency Identification :
The technology uses radio
waves.
What is the purpose of the RFID ?
The type of RFID
RFID has three types:
1. ActiveTag 2. PasifTag
3. SemiActive /
Passive Semi
Components of RFID
• There are five components of RFID system
• RFID tags
• antenna
• terminal Reader
• host controller
• host Computer
RFID Tags
• In the form of stickers , paper or
plastic with a variety of sizes.
Antenna
• For as the sender and receiver.
Terminal / Reader
• Consists of RFID - reader and
antenna that will affect the
optimal distance identification.
Host Controler
• Host controller for RFID
systems typically connected
desktop or laptop computer ,
which is located close to the
reader.
Host Computer / Server
• Computer systems that
manage the flow of information
from items that are detected
within the scope of RFID
system.
How Does It Work
Advantages of RFID System
•The ability to read the data without visual
access
•The ability to read data from moving objects
•The ability to read data at a distance , from
3cm to 100 meters
Other advantages using RFID
• Retail Business • Government
Examples of RFID in the Form Video
THANK

More Related Content

What's hot

15250385 pss7-ans
15250385 pss7-ans15250385 pss7-ans
15250385 pss7-ans
Hongqin Wang
 
RFID & its Applications
RFID & its ApplicationsRFID & its Applications
RFID & its Applications
15251454
 
Automated and unmaned parking system using rfid technology by sam
Automated and unmaned parking system using rfid technology by samAutomated and unmaned parking system using rfid technology by sam
Automated and unmaned parking system using rfid technology by sam
sam zion
 
13253751 pss7
13253751 pss713253751 pss7
13253751 pss7yaojiayu
 
radio-frequency identification (RFID)
radio-frequency identification (RFID)radio-frequency identification (RFID)
radio-frequency identification (RFID)
Sudeb Das
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance system
afserfec56
 
TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2Venkatesa Prasad
 
Teamliftss library management
Teamliftss library managementTeamliftss library management
Teamliftss library management
Venkatesa Prasad
 
15223272 pss7
15223272 pss715223272 pss7
15223272 pss7
wingwing96
 
13209523 pss7
13209523 pss713209523 pss7
13209523 pss713209523
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15223515
 
Bluetooth rfid readers
Bluetooth rfid readersBluetooth rfid readers
Bluetooth rfid readers
nephsystem
 
RFID
RFIDRFID
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
sweta dargad
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
Robiul Islam
 
14218232 pss7-ans
14218232 pss7-ans14218232 pss7-ans
14218232 pss7-ans
Man Yee Tai
 
15222845 pss7-ans
15222845 pss7-ans15222845 pss7-ans
15222845 pss7-ans
15222845
 
13203215 pss7
13203215 pss713203215 pss7
13203215 pss7
samanmky
 
15251209 pss7.pptx
15251209 pss7.pptx15251209 pss7.pptx
15251209 pss7.pptx
羽鸿 张
 

What's hot (20)

15250385 pss7-ans
15250385 pss7-ans15250385 pss7-ans
15250385 pss7-ans
 
RFID & its Applications
RFID & its ApplicationsRFID & its Applications
RFID & its Applications
 
Automated and unmaned parking system using rfid technology by sam
Automated and unmaned parking system using rfid technology by samAutomated and unmaned parking system using rfid technology by sam
Automated and unmaned parking system using rfid technology by sam
 
13253751 pss7
13253751 pss713253751 pss7
13253751 pss7
 
radio-frequency identification (RFID)
radio-frequency identification (RFID)radio-frequency identification (RFID)
radio-frequency identification (RFID)
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance system
 
TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2TEAMLIFTSS_Library_Management_V2
TEAMLIFTSS_Library_Management_V2
 
Teamliftss library management
Teamliftss library managementTeamliftss library management
Teamliftss library management
 
15223272 pss7
15223272 pss715223272 pss7
15223272 pss7
 
13213806 pss7
13213806 pss713213806 pss7
13213806 pss7
 
13209523 pss7
13209523 pss713209523 pss7
13209523 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
Bluetooth rfid readers
Bluetooth rfid readersBluetooth rfid readers
Bluetooth rfid readers
 
RFID
RFIDRFID
RFID
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
 
14218232 pss7-ans
14218232 pss7-ans14218232 pss7-ans
14218232 pss7-ans
 
15222845 pss7-ans
15222845 pss7-ans15222845 pss7-ans
15222845 pss7-ans
 
13203215 pss7
13203215 pss713203215 pss7
13203215 pss7
 
15251209 pss7.pptx
15251209 pss7.pptx15251209 pss7.pptx
15251209 pss7.pptx
 

Viewers also liked

RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
Sandeep Singh
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slidesguestbed1dd
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
Francisco Carabez
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applications
Naveen Kumar
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th semAmit Ranjan
 

Viewers also liked (8)

RFID-SECURITY_Vatsalya
RFID-SECURITY_VatsalyaRFID-SECURITY_Vatsalya
RFID-SECURITY_Vatsalya
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applications
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 

Similar to Radio Frequency Identification (RFID)

RFID
RFIDRFID
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
IJERA Editor
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Publicis Sapient
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
Arunkumar Kubasad
 
RFID
RFIDRFID
RFIDdont
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And Application
FishEyeBox
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
kunal13309
 
RFID
RFIDRFID
RFID Application
RFID ApplicationRFID Application
RFID ApplicationRainySiu
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
Pravin Shinde
 
Rfid sourya cse
Rfid sourya cseRfid sourya cse
Rfid sourya cse
sourya kumar
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Deepak Raj
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
Akash Karwande
 
13212907 pss7
13212907 pss713212907 pss7
13212907 pss7
Chi Ki Cheung
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
Akash Maurya
 
16224213 pss7
16224213 pss716224213 pss7
16224213 pss7
Martin Man
 
Rfid parking solution
Rfid parking solutionRfid parking solution
Rfid parking solution
nephsystem
 
Rfid parking for chaotic free parking
Rfid parking for chaotic free parkingRfid parking for chaotic free parking
Rfid parking for chaotic free parking
nephsystem
 

Similar to Radio Frequency Identification (RFID) (20)

RFID
RFIDRFID
RFID
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
RFID
RFIDRFID
RFID
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And Application
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID
RFIDRFID
RFID
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13252976 pss7
13252976 pss713252976 pss7
13252976 pss7
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
Rfid sourya cse
Rfid sourya cseRfid sourya cse
Rfid sourya cse
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
13212907 pss7
13212907 pss713212907 pss7
13212907 pss7
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
16224213 pss7
16224213 pss716224213 pss7
16224213 pss7
 
Rfid parking solution
Rfid parking solutionRfid parking solution
Rfid parking solution
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid parking for chaotic free parking
Rfid parking for chaotic free parkingRfid parking for chaotic free parking
Rfid parking for chaotic free parking
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Radio Frequency Identification (RFID)

  • 1. Teknologi RFID GaluhYudha Mahardika / galuh.y.mahardika@gmail.com/ +6282338470900 Dimas Aji Pratama / d.ajipratama@gmail.com/ +6282298069578 Djoko Cahyo Utomo/ djoko.c.utomo@gmail.com/ +6285289051446
  • 2. What is the RFID ? General overview of Radio Frequency Identification : The technology uses radio waves.
  • 3. What is the purpose of the RFID ?
  • 4. The type of RFID RFID has three types: 1. ActiveTag 2. PasifTag 3. SemiActive / Passive Semi
  • 5. Components of RFID • There are five components of RFID system • RFID tags • antenna • terminal Reader • host controller • host Computer
  • 6. RFID Tags • In the form of stickers , paper or plastic with a variety of sizes.
  • 7. Antenna • For as the sender and receiver.
  • 8. Terminal / Reader • Consists of RFID - reader and antenna that will affect the optimal distance identification.
  • 9. Host Controler • Host controller for RFID systems typically connected desktop or laptop computer , which is located close to the reader.
  • 10. Host Computer / Server • Computer systems that manage the flow of information from items that are detected within the scope of RFID system.
  • 11. How Does It Work
  • 12. Advantages of RFID System •The ability to read the data without visual access •The ability to read data from moving objects •The ability to read data at a distance , from 3cm to 100 meters
  • 13. Other advantages using RFID • Retail Business • Government
  • 14. Examples of RFID in the Form Video
  • 15. THANK

Editor's Notes

  1. Active RFID tags have their own power source and also reach longer distances than passive RFID tags . Active RFID tags also have a larger memory so that the stored data is more mixed. Passive RFID tags do not have their own power supply . RFID only armed existing electrical induction in the antenna by the incoming radio frequency scanning , but it is sufficient for RFID tags provide a response back . Although the response provided only in the form of ID only. The passive RFID tag has a range of different distances ranging from 10 mm up to 6 meters . 3. Semi - passive RFID active RFID similar to the label . Semi - passive RFID labels have internal resources , but it does not emit a signal to an RFID reader transmits first.
  2. In each of these tags are chips capable of storing certain information and can transmit and receive signals from antennas
  3. Antennas used may vary depending on the cost , function , application , and operating frequency.
  4. RFID terminal will read or change information stored in the tag through radio frequency . RFID terminal is connected directly to the host computer system .
  5. This controller has two main functions . First , receiving data from the reader and perform data processing such as filtering and collation . Second , the device monitors to ensure the reader is functioning properly , as well as securing and updating instructions on RFID systems . Host controller is connected to the reader via network technologies such as Transmission Control Protocol / Internet Protocol ( TCP / IP ) or sometimes through serial connectivity . Generally , one controller can manage multiple reader , with the ratio depending on the volume of data received from the reader .
  6. Controls the communication between the tag and the reader . The host can be a stand -alone computer or be connected to the LAN network / Internet for communication with the server.
  7. Government field : At this time the government announced for subsidized fuel restriction therefore in the government using RFID that can be installed in a car near the pit to fill the fuel that RFID will have a car or a vehicle to detect when it is already filling the fuel number of times . Retail field : RFID can be used to reduce the rate of loss of goods in a store , because RFID tags attached to each item and any items brought by the customer can be on - track whether already paid or not . RFID can also be placed on pelangga card and when the card is scanned at the time of payment ( check out ) at the counter , POS monitors can offer additional products that have not been purchased , based on historical data that is stored in the database .