SlideShare a Scribd company logo
What is RFID

chip

Antenna

Radio-frequency
identification
(RFID) is the use of a wireless noncontact system that uses radiofrequency electromagnetic fields to
transfer data from a tag attached to an
object, for the purposes of automatic
identification and tracking.
RFID is also called dedicated short
range communication(DSRC)
Applications of RFID
 Payment by mobile phones
 Inventory systems
 Product tracking
 Transportation
 Infrastructure management
 Passports
 Transportation payments
 Animal identification
 Human identification
 Hospitals and healthcare
 Libraries
 Museums
 Schools and universities
 Sports
Animal Identification
E-Passport
Library Systems
Human Identification
EPC Gen 2 Architecture
Each RFID tag contains a unique code that facilitating
the identification process & is known as EPC
EPC is the new Electronic Product Code that
replaces the older UPC (Universal Product Code)
found on many item labels and is a set of numbers plus
a bar code.
 Since UPC first started in 1963 it became out of date
with today's global economies and EPC is
the Radio Frequency Identification (RFID) modern
day equivalent of the older UPC.
In most instances, EPCs are encoded on RFID tags
which can be used to track all kinds of objects
including: trade items, fixed assets, documents, or
reusable transport items.
"Class-1" refers to the functionality of the tag while
"Gen-2" refers to the physical and logical standards of
tag and the encompassing system. These standards are
maintained by EPCglobal.
Gen 2, EPC Gen 2, EPC C1G2 are the short names
commonly used instead of "Electronic Product
Code Class 1 Generation 2" standard.
EPC Standard
Working of RFID
A RFID system is made up of two parts: a tag or label and
a reader.
RFID tags or labels are embedded with a transmitter and
a receiver.
 The RFID component on the tags have two parts: a
microchip that stores and processes information, and an
antenna to receive and transmit a signal.
The tag contains the specific serial number for one
specific object.
To read the information encoded on a tag, a two-way radio
transmitter-receiver called an interrogator or reader emits a
signal to the tag using an antenna.
The tag responds with the information written in its
memory bank.

The interrogator will then transmit the read results to an
RFID computer program.
Working of RFID
Types of RFID tags
Types of RFID Tags

There are two types of RFID tags: passive and battery
powered.
 A passive RFID tag will use the interrogator’s radio
wave energy to relay its stored information back to the
interrogator.
 A batter powered RFID tag is embedded with a small
battery that powers the relay of information.
RFID readers
Reader functions:
•Remotely power tags
•Establish a bidirectional data link
•Inventory tags, filter results
•Communicate with networked
server(s)
•Can read 100-300 tags per second
Readers (interrogators) can be at a
fixed point such as
•Entrance/exit
•Point of sale
Readers can also be mobile/hand-held
RFID communication
Host manages Reader(s) and issues Commands
• Reader and tag communicate via RF signal
• Carrier signal generated by the reader
• Carrier signal sent out through the antennas
• Carrier signal hits tag(s)
• Tag receives and modifies carrier signal– “sends back” modulated
signal

•Antennas receive the modulated signal and send them to the Reader
•Reader decodes the data
• Results returned to the host application
EPC Gen 2 Physical Layer
 The physical layer defines how bits are sent between the
RFID reader and tags.
 In the U.S., transmissions are sent in the unlicensed 902–
928 MHz ISM band. This band falls in the UHF (Ultra High
Frequency) range, so the tags are referred to as UHF RFID
tags.
 The reader and tags use forms of ASK (Amplitude Shift
Keying) modulation
 They take turns to send bits, so the link is half duplex.
There are two main differences from other physical
layers.
The first is that the reader is always transmitting a
signal, regardless of whether it is the reader or tag that is
communicating.

Naturally, the reader transmits a signal to send bits to
tags. For the tags to send bits to the reader, the reader
transmits a fixed carrier signal that carries no bits.
The tags harvest this signal to get the power they need
to run; otherwise, a tag would not be able to transmit in
the first place.
To send data, a tag changes whether it is reflecting
the signal from the reader, like a radar signal bouncing
off a target, or absorbing it.
This method is called backscatter.
It differs from all the other wireless situations
 Backscatter is a low-energy way for the tag to create
a weak signal of its own that shows up at the reader.
For the reader to decode the incoming signal, it must
filter out the outgoing signal that it is transmitting.
The second difference is that very simple forms of
modulation are used so that they can be implemented on a
tag that runs on very little power and costs only a
few cents to make.
 To send data to the tags, the reader uses two amplitude
levels.
Bits are determined to be either a 0 or a 1, depending on
how long the reader waits before a low-power period.
The tag measures the time between low-power
periods and compares this time to a reference measured
during a preamble.
Reader and tag backscatter signals
Tag responses consist of the tag alternating
its backscatter state at fixed intervals to create
a series of pulses in the signal.
Anywhere from one to eight pulse periods
can be used to encode each 0 or 1, depending
on the need for reliability.
EPC Gen 2 Tag Identification Layer
EPC Gen 2 Tag Identification Layer

•To inventory the nearby tags, the reader needs to
receive a message from each tag that gives the
identifier for the tag.
•The reader might broadcast a query to ask all tags
to send their identifiers.
The closest protocol for the current situation,
in which the tags cannot hear each others’
transmissions, is slotted ALOHA, one of the
earliest protocols.
This protocol is adapted for use in Gen 2 RFID
In the first slot (slot 0), the reader sends a
Query message to start the process.
Each QRepeat message advances to the next
slot. EPC Gen 2 Tag Identification Layer
EPC Gen 2 Tag Identification Layer
Tags do not send their identifiers when they first
reply.
Instead, a tag sends a short 16-bit random number
in an RN16 message.

If there is no collision, the reader receives this
message and sends an ACK message of its own.
At this stage, the tag has acquired the slot and sends
its EPC identifier.
The reason for this exchange is that EPC identifiers are
long, so collisions on these messages would be
expensive.
Instead, a short exchange is used to test whether the
tag can safely use the slot to send its identifier.
Once its identifier has been successfully transmitted,
the tag temporarily stops responding to new Query
messages so that all the remaining tags can be identified
If the reader sees too many slots with no responses or too
many slots with collisions, it can send a Qadjust message to
decrease or increase the range of slots over which the tags
are responding.
The reader can also write data to tags as they are
identified.
Tag Identification Message Formats
 The message is compact because the downlink rates are limited,

from 27 kbps up to 128 kbps.
The next flags, DR, M, and TR, determine the physical
layer parameters for reader transmissions and tag
responses.
Then come three fields, Sel, Session, and Target, that
select the tags to respond.
In this way, multiple readers can operate in overlapping
coverage areas by using different sessions.
Next is the most important parameter for this command, Q.
This field defines the range of slots over which tags will
respond, from 0 to 2Q−1. Finally, there is a CRC to protect the
message fields.
the Query message is much shorter than most packets too.
The tag responses simply carry data, such as the EPC identifier.
Originally the tags were just for identification purposes
Advantages of RFID:
Inventory efficiency
Vulnerability to damage minimized
Easy to use
High memory capacity
Disadvantages of RFID:
Security concerns
High cost
Unread tags
Rfid

More Related Content

What's hot

Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
bansarirajani
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
RFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksRFID and Wireless Sensor Networks
RFID and Wireless Sensor Networks
Kartik Kachhadiya
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
Saptha Wanniarachchi
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
sweta dargad
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
Chetan Pandey
 
RFID
RFIDRFID
RFID
RFIDRFID
RFIDdont
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
Kaveen Gayathma
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
Anal Mandal
 
Rfid Tags India
Rfid Tags IndiaRfid Tags India
Rfid Tags India
EcartesTech1
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
RFID
RFID RFID
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
nikshaikh786
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Publicis Sapient
 
Rfid
RfidRfid
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
Ravi Teja
 

What's hot (20)

Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksRFID and Wireless Sensor Networks
RFID and Wireless Sensor Networks
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
RFID
RFIDRFID
RFID
 
RFID
RFIDRFID
RFID
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 
Rfid Tags India
Rfid Tags IndiaRfid Tags India
Rfid Tags India
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
RFID
RFID RFID
RFID
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Rfid
RfidRfid
Rfid
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 

Viewers also liked

RFID integration at Toyota Parts Centre Europe
RFID integration at Toyota Parts Centre EuropeRFID integration at Toyota Parts Centre Europe
RFID integration at Toyota Parts Centre Europe
Jurgen Geys
 
Retail management using rfid
Retail management using rfidRetail management using rfid
Retail management using rfid
Saurav Suman
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applications
Naveen Kumar
 
Experiential Marketing & RFID
Experiential Marketing & RFIDExperiential Marketing & RFID
Experiential Marketing & RFID
Kommando Experience Marketing
 
The Beginners Guide to NFC
The Beginners Guide to NFCThe Beginners Guide to NFC
The Beginners Guide to NFC
RJW_Tap
 
The Whole Trick to SUCCESS in the SEO BUSINESS is..
The Whole Trick to SUCCESS in the SEO BUSINESS is..The Whole Trick to SUCCESS in the SEO BUSINESS is..
The Whole Trick to SUCCESS in the SEO BUSINESS is..
HubShout, LLC
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th semAmit Ranjan
 
Introduction to NFC
Introduction to NFCIntroduction to NFC
Introduction to NFC
Venkat Alagarsamy
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
Vivek Prasad
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
Ankur Sharma
 

Viewers also liked (12)

RFID integration at Toyota Parts Centre Europe
RFID integration at Toyota Parts Centre EuropeRFID integration at Toyota Parts Centre Europe
RFID integration at Toyota Parts Centre Europe
 
Retail management using rfid
Retail management using rfidRetail management using rfid
Retail management using rfid
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applications
 
Experiential Marketing & RFID
Experiential Marketing & RFIDExperiential Marketing & RFID
Experiential Marketing & RFID
 
The Beginners Guide to NFC
The Beginners Guide to NFCThe Beginners Guide to NFC
The Beginners Guide to NFC
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
The Whole Trick to SUCCESS in the SEO BUSINESS is..
The Whole Trick to SUCCESS in the SEO BUSINESS is..The Whole Trick to SUCCESS in the SEO BUSINESS is..
The Whole Trick to SUCCESS in the SEO BUSINESS is..
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
Introduction to NFC
Introduction to NFCIntroduction to NFC
Introduction to NFC
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 

Similar to Rfid

43 97-101
43 97-10143 97-101
43 97-101
idescitation
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
giri529
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
nikshaikh786
 
RFID
RFIDRFID
RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security SystemNataraj Patil
 
Seminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection SystemSeminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection System
Rajan Bairasriya
 
Running Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxRunning Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docx
toltonkendal
 
Page 1 54
Page 1 54Page 1 54
Page 1 54
apoorva_chhabra
 
A Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsA Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID Sensors
Editor IJMTER
 
Backscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceBackscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA Device
Filantropi Event Management
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
Robiul Islam
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1Mayank Vora
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1Mayank Vora
 
RFID
RFIDRFID
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
Soumen Santra
 
RFID Electromagnetic project (rfid)
 RFID Electromagnetic project (rfid) RFID Electromagnetic project (rfid)
RFID Electromagnetic project (rfid)
Faculty of Engineering, Alexandria University, Egypt
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 

Similar to Rfid (20)

43 97-101
43 97-10143 97-101
43 97-101
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
Rfid
RfidRfid
Rfid
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
RFID
RFIDRFID
RFID
 
RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security System
 
RFIID REPORT FILE
RFIID REPORT FILERFIID REPORT FILE
RFIID REPORT FILE
 
Seminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection SystemSeminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection System
 
Running Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docxRunning Head RFID Transportation2RFID in Tr.docx
Running Head RFID Transportation2RFID in Tr.docx
 
Rfid In Brief Ii
Rfid In Brief IiRfid In Brief Ii
Rfid In Brief Ii
 
Page 1 54
Page 1 54Page 1 54
Page 1 54
 
A Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsA Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID Sensors
 
Backscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceBackscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA Device
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1
 
RFID
RFIDRFID
RFID
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
RFID Electromagnetic project (rfid)
 RFID Electromagnetic project (rfid) RFID Electromagnetic project (rfid)
RFID Electromagnetic project (rfid)
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Rfid

  • 1.
  • 2. What is RFID chip Antenna Radio-frequency identification (RFID) is the use of a wireless noncontact system that uses radiofrequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. RFID is also called dedicated short range communication(DSRC)
  • 4.  Payment by mobile phones  Inventory systems  Product tracking  Transportation  Infrastructure management  Passports  Transportation payments  Animal identification  Human identification  Hospitals and healthcare  Libraries  Museums  Schools and universities  Sports
  • 9. EPC Gen 2 Architecture Each RFID tag contains a unique code that facilitating the identification process & is known as EPC EPC is the new Electronic Product Code that replaces the older UPC (Universal Product Code) found on many item labels and is a set of numbers plus a bar code.  Since UPC first started in 1963 it became out of date with today's global economies and EPC is the Radio Frequency Identification (RFID) modern day equivalent of the older UPC.
  • 10. In most instances, EPCs are encoded on RFID tags which can be used to track all kinds of objects including: trade items, fixed assets, documents, or reusable transport items. "Class-1" refers to the functionality of the tag while "Gen-2" refers to the physical and logical standards of tag and the encompassing system. These standards are maintained by EPCglobal. Gen 2, EPC Gen 2, EPC C1G2 are the short names commonly used instead of "Electronic Product Code Class 1 Generation 2" standard.
  • 12. Working of RFID A RFID system is made up of two parts: a tag or label and a reader. RFID tags or labels are embedded with a transmitter and a receiver.  The RFID component on the tags have two parts: a microchip that stores and processes information, and an antenna to receive and transmit a signal. The tag contains the specific serial number for one specific object.
  • 13. To read the information encoded on a tag, a two-way radio transmitter-receiver called an interrogator or reader emits a signal to the tag using an antenna. The tag responds with the information written in its memory bank. The interrogator will then transmit the read results to an RFID computer program.
  • 16. Types of RFID Tags There are two types of RFID tags: passive and battery powered.  A passive RFID tag will use the interrogator’s radio wave energy to relay its stored information back to the interrogator.  A batter powered RFID tag is embedded with a small battery that powers the relay of information.
  • 17. RFID readers Reader functions: •Remotely power tags •Establish a bidirectional data link •Inventory tags, filter results •Communicate with networked server(s) •Can read 100-300 tags per second Readers (interrogators) can be at a fixed point such as •Entrance/exit •Point of sale Readers can also be mobile/hand-held
  • 18. RFID communication Host manages Reader(s) and issues Commands • Reader and tag communicate via RF signal • Carrier signal generated by the reader • Carrier signal sent out through the antennas • Carrier signal hits tag(s) • Tag receives and modifies carrier signal– “sends back” modulated signal •Antennas receive the modulated signal and send them to the Reader •Reader decodes the data • Results returned to the host application
  • 19. EPC Gen 2 Physical Layer  The physical layer defines how bits are sent between the RFID reader and tags.  In the U.S., transmissions are sent in the unlicensed 902– 928 MHz ISM band. This band falls in the UHF (Ultra High Frequency) range, so the tags are referred to as UHF RFID tags.  The reader and tags use forms of ASK (Amplitude Shift Keying) modulation  They take turns to send bits, so the link is half duplex.
  • 20. There are two main differences from other physical layers. The first is that the reader is always transmitting a signal, regardless of whether it is the reader or tag that is communicating. Naturally, the reader transmits a signal to send bits to tags. For the tags to send bits to the reader, the reader transmits a fixed carrier signal that carries no bits. The tags harvest this signal to get the power they need to run; otherwise, a tag would not be able to transmit in the first place.
  • 21. To send data, a tag changes whether it is reflecting the signal from the reader, like a radar signal bouncing off a target, or absorbing it. This method is called backscatter. It differs from all the other wireless situations  Backscatter is a low-energy way for the tag to create a weak signal of its own that shows up at the reader. For the reader to decode the incoming signal, it must filter out the outgoing signal that it is transmitting.
  • 22. The second difference is that very simple forms of modulation are used so that they can be implemented on a tag that runs on very little power and costs only a few cents to make.  To send data to the tags, the reader uses two amplitude levels. Bits are determined to be either a 0 or a 1, depending on how long the reader waits before a low-power period. The tag measures the time between low-power periods and compares this time to a reference measured during a preamble.
  • 23. Reader and tag backscatter signals
  • 24. Tag responses consist of the tag alternating its backscatter state at fixed intervals to create a series of pulses in the signal. Anywhere from one to eight pulse periods can be used to encode each 0 or 1, depending on the need for reliability.
  • 25. EPC Gen 2 Tag Identification Layer
  • 26. EPC Gen 2 Tag Identification Layer •To inventory the nearby tags, the reader needs to receive a message from each tag that gives the identifier for the tag. •The reader might broadcast a query to ask all tags to send their identifiers.
  • 27. The closest protocol for the current situation, in which the tags cannot hear each others’ transmissions, is slotted ALOHA, one of the earliest protocols. This protocol is adapted for use in Gen 2 RFID In the first slot (slot 0), the reader sends a Query message to start the process. Each QRepeat message advances to the next slot. EPC Gen 2 Tag Identification Layer
  • 28. EPC Gen 2 Tag Identification Layer
  • 29. Tags do not send their identifiers when they first reply. Instead, a tag sends a short 16-bit random number in an RN16 message. If there is no collision, the reader receives this message and sends an ACK message of its own. At this stage, the tag has acquired the slot and sends its EPC identifier.
  • 30. The reason for this exchange is that EPC identifiers are long, so collisions on these messages would be expensive. Instead, a short exchange is used to test whether the tag can safely use the slot to send its identifier. Once its identifier has been successfully transmitted, the tag temporarily stops responding to new Query messages so that all the remaining tags can be identified
  • 31. If the reader sees too many slots with no responses or too many slots with collisions, it can send a Qadjust message to decrease or increase the range of slots over which the tags are responding. The reader can also write data to tags as they are identified.
  • 32. Tag Identification Message Formats  The message is compact because the downlink rates are limited, from 27 kbps up to 128 kbps.
  • 33. The next flags, DR, M, and TR, determine the physical layer parameters for reader transmissions and tag responses. Then come three fields, Sel, Session, and Target, that select the tags to respond. In this way, multiple readers can operate in overlapping coverage areas by using different sessions.
  • 34. Next is the most important parameter for this command, Q. This field defines the range of slots over which tags will respond, from 0 to 2Q−1. Finally, there is a CRC to protect the message fields. the Query message is much shorter than most packets too. The tag responses simply carry data, such as the EPC identifier. Originally the tags were just for identification purposes
  • 35. Advantages of RFID: Inventory efficiency Vulnerability to damage minimized Easy to use High memory capacity Disadvantages of RFID: Security concerns High cost Unread tags