SlideShare a Scribd company logo
TAGS
RFID: Technology and Applications
2
What is RFID?
 RFID = Radio Frequency Identification.
 An ADC (Automated Data Collection) technology
that:
– uses radio-frequency waves to transfer data between
a reader and a movable item to identify, categorize,
track..
– Is fast and does not require physical sight or contact
between reader/scanner and the tagged item.
– Performs the operation using low cost components.
– Attempts to provide unique identification and backend
integration that allows for wide range of applications.
 Other ADC technologies: Bar codes, OCR.
3
RFID system components
Ethernet
RFID
Reader
RFID Tag RF Antenna Network Workstation
4
RFID tags: Smart labels
… and a chip
attached to it
… on a substrate
e.g. a plastic
foil ...
an antenna,
printed, etched
or stamped ...
A paper label
with RFID inside
5
Some RFID tags
RFID 2005 IIT Bombay 6
Tags can be attached to almost anything:
– Items, cases or pallets of products, high value goods
– vehicles, assets, livestock or personnel
Passive Tags
– Do not require power – Draws from Interrogator Field
– Lower storage capacities (few bits to 1 KB)
– Shorter read ranges (4 inches to 15 feet)
– Usually Write-Once-Read-Many/Read-Only tags
– Cost around 25 cents to few dollars
Active Tags
– Battery powered
– Higher storage capacities (512 KB)
– Longer read range (300 feet)
– Typically can be re-written by RF Interrogators
– Cost around 50 to 250 dollars
RFID tags
7
Tag block diagram
Antenna
Power Supply
Tx Modulator
Rx
Demodulator
Control Logic
(Finite State
machine)
Memory
Cells
Tag Integrated Circuit (IC)
8
RFID tag memory
 Read-only tags
– Tag ID is assigned at the factory during manufacturing
• Can never be changed
• No additional data can be assigned to the tag
 Write once, read many (WORM) tags
– Data written once, e.g., during packing or manufacturing
• Tag is locked once data is written
• Similar to a compact disc or DVD
 Read/Write
– Tag data can be changed over time
• Part or all of the data section can be locked
9
RFID readers
 Reader functions:
– Remotely power tags
– Establish a bidirectional data link
– Communicate with networked server(s)
– Can read 100-300 tags per second
 Readers (interrogators) can be at a fixed point such as
– Entrance/exit
– Point of sale
 Readers can also be mobile/hand-held
10
Some RFID readers
11
RFID systems: logical view
3
2 4 5 6 7 8
Application
Systems
RF
Write data
to RF tags
Trading
Partner
Systems
Read
Manager
Transaction
Data Store
Items with
RF Tags
Reader
Antenna
Antenna
EDI /
XML
10
1
Tag/Item
Relationship
Database 9
Internet
ONS
Server
Product
Information
(PML Format)
11
12
Other Systems
RFID Middleware
Tag Interfaces
12
Reader anatomy
915MHz
Radio
Network
Processor
Digital Signal
Processor
(DSP)
13.56MHz
Radio
Power
Supply
13
RFID advantages over bar-codes
 No line of sight required for reading
 Multiple items can be read with a single scan
 Each tag can carry a lot of data (read/write)
 Individual items identified and not just the category
 Passive tags have a virtually unlimited lifetime
 Active tags can be read from great distances
 Can be combined with barcode technology
14
RFID communications
Tags
Reader
Power from RF field
Reader
Antenna
Reader->Tag Commands
Tag->Reader Responses
RFID Communication
Channel
15
RFID communication
 Host manages Reader(s) and issues Commands
 Reader and tag communicate via RF signal
 Carrier signal generated by the reader
 Carrier signal sent out through the antennas
 Carrier signal hits tag(s)
 Tag receives and modifies carrier signal
– “sends back” modulated signal
– Antennas receive the modulated signal and send them to the
Reader
 Reader decodes the data
 Results returned to the host application
16
Antenna fields: Inductive coupling
Transceiver
Tag Reader
antenna
RFID
Tag
IC or microprocessor
antenna
17
Antenna fields: Propagation coupling
Transceiver
Tag Reader
antenna
RFID
Tag
IC or microprocessor
antenna
18
Operational frequencies
Frequency
Ranges
LF
125 KHz
HF
13.56 MHz
UHF
868 - 915
MHz
Microwave
2.45 GHz &
5.8 GHz
Typical Max
Read Range
(Passive Tags)
Shortest
1”-12”
Short
2”-24”
Medium
1’-10’
Longest
1’-15’
Tag Power
Source
Generally passive
tags only, using
inductive coupling
Generally passive
tags only, using
inductive or
capacitive
coupling
Active tags with
integral battery
or passive tags
using capacitive
storage,
E-field coupling
Active tags with
integral battery or
passive tags using
capacitive storage,
E-field coupling
Data Rate Slower Moderate Fast Faster
Ability to read
near
metal or wet
surfaces
Better Moderate Poor Worse
Applications
Access Control &
Security
Identifying widgets
through
manufacturing
processes or in
harsh environments
Ranch animal
identification
Employee IDs
Library books
Laundry
identification
Access Control
Employee IDs
supply chain
tracking
Highway toll
Tags
Highway toll Tags
Identification of
private vehicle
fleets in/out of a
yard or facility
Asset tracking
19
Multiple Tags
When multiple tags are in range of the reader:
– All the tags will be excited at the same time.
– Makes it very difficult to distinguish between the tags.
20
Tag Collision Problem
 Multiple tags simultaneously respond to query
– Results in collision at the reader
 Several approaches
– Tree algorithm
– Memoryless protocol
– Contactless protocol
– I-code protocol
RFID 2005 IIT Bombay 21
RFID 2005 IIT Bombay 22
23
RFID deployment challenges
 Manage System costs
– Choose the right hardware
– Choose the right integration path
– Choose the right data infrastructure
 Handle Material matters
– RF Tagging of produced objects
– Designing layouts for RF Interrogators
 Tag Identification Scheme Incompatibilities
– Which standard to follow?
 Operating Frequency Variances
– Low Frequency or High Frequency or Ultra High Frequency
 Business Process Redesign
– New processes will be introduced
– Existing processes will be re-defined
– Training of HR
 Cost-ROI (Return on investment) sharing
24
RFID application points
 Assembly Line
 Shipping Portals
 Handheld Applications
Bill of Lading
Material Tracking
Wireless
25
RFID applications
 Manufacturing and Processing
– Inventory and production process monitoring
– Warehouse order fulfillment
 Supply Chain Management
– Inventory tracking systems
– Logistics management
 Retail
– Inventory control and customer insight
– Auto checkout with reverse logistics
 Security
– Access control
– Counterfeiting and Theft control/prevention
 Location Tracking
– Traffic movement control and parking management
– Wildlife/Livestock monitoring and tracking
26
Smart groceries
 Add an RFID tag to all
items in the grocery.
 As the cart leaves the
store, it passes through
an RFID transceiver.
 The cart is rung up in
seconds.
27
1. Tagged item is removed
from or placed in
“Smart Cabinet”
3. Server/Database is
updated to reflect
item’s disposition
4. Designated individuals
are notified regarding
items that need
attention (cabinet and
shelf location, action
required)
2. “Smart Cabinet”
periodically
interrogates to assess
inventory
Passive
read/write tags
affixed to caps
of containers
Reader antennas placed under each shelf
Smart cabinet
28
Smart fridge
 Recognizes what’s been put in it
 Recognizes when things are removed
 Creates automatic shopping lists
 Notifies you when things are past their expiration
 Shows you the recipes that most closely match
what is available
29
Smart groceries enhanced
 Track products
through their entire
lifetime.
30
Some more smart applications
 “Smart” appliances:
– Closets that advice on style depending on clothes available.
– Ovens that know recipes to cook pre-packaged food.
 “Smart” products:
– Clothing, appliances, CDs, etc. tagged for store returns.
 “Smart” paper:
– Airline tickets that indicate your location in the airport.
 “Smart” currency:
– Anti-counterfeiting and tracking.
31
RFID Summary
Strengths
 Advanced technology
 Easy to use
 High memory capacity
 Small size
Weaknesses
 Lack of industry and application
standards
 High cost per unit and high RFID
system integration costs
 Weak market understanding of
the benefits of RFID technology
Opportunities
 Could replace the bar code
 End-user demand for RFID
systems is increasing
 Huge market potential in many
businesses
Threats
 Ethical threats concerning
privacy life
 Highly fragmented competitive
environment
Near
Field
Communication
What Is NFC ?
NFC or Near Field Communication is a short
range high frequency wireless communication
technology.
NFC is mainly aimed for mobile or handheld devices.
A radio communication is established by touching the
two phones or keeping them in a proximity of a few
centimeters (up to 10 cm) .
It allows
exchange,
devices.
for simplified communication, data
and wireless connections between two
Allows communication between Two powered
(active) devices
Powered and non self-powered (passive)
devices
NFC
trade
mark
logo
NFC is an extension of Radio frequency identification (RFID) technology
that combines the interface of a smartcard and a reader into a
single device. This allow two-way communication between endpoints,
where earlier systems were one-way only.
It operates within the globally available and unlicensed radio frequency
band of 13.56 MHz, with a bandwidth of 14 kHz.
Working distance with compact standard antennas: up to 10 cm .
Supported data rates: 106, 212 and 424 Kbit/s
For two devices to communicate using NFC, one device must have an
NFC reader/writer and one must have an NFC tag
Features
NFC Reader
Usually a microcontroller-based (for example
NFC enabled phones) with an
integrated circuits that is capable of
generating radio frequency at
13.56
components
MHz with other
such as
encoders, decoders, antenna, comparators, and firmware designed
to transmit energy to a tag and read information back from it by
detecting the modulation. The reader continuously emits RF
carrier signals, and keeps observing the received RF signals for data.
An NFC Reader (A Smartphone )
NFC Tag
An RFID device incorporating a silicon memory chip connecting to
external antenna. Tag does not have its own power source (passive). The
passive tag absorbs a small portion of the energy emitted by the
reader (phone), and starts sending modulated information when sufficient
energy is acquired from the RF field generated by the reader.
Following figure shows the internal hardware of NFC tag where we can see its memory, logic etc.
1. NFC has two communicative terminals :The INITIATOR is the one who wishes
to communicate and starts the communication. The TARGET receives
the initiator’s communication request and sends back a reply
2. NFC employs two different coding to transfer data. If an active device
transfers data at 106 Kbit/s, a Modified Miller coding with 100% modulation
is used. In all other cases Manchester coding is used with a modulation ratio
of 10%.
INITIATOR
TARGET
Operation Of NFC
Manchester Coding
•A low-to-high transition expresses
a 0 bit, whereas a high-to-low
transition stands for a 1 bit.
Modified Miller Coding
•This line code is characterized by
pauses occurring in the carrier at
different positions of a period.
While a 1 is always encoded in the
same way, coding a 0 is
determined on the basis of the
preceded bit .
Operation Of NFC
39
Passive Communication
Mode: The Initiator device
provides a carrier field
and the target device
answers by modulating
existing field. In this mode,
the Target device
may draw its operating
power from the Initiator-
provided electromagnetic
field.
Active Communication
Mode: Both Initiator and
Target device communicate
by alternately generating
their own field. A device
deactivates its RF field while
it is waiting for data. In this
mode, both devices typically
need to have a power
supply.
There are two mode of communication
Operation Of NFC
NFC devices communicate via magnetic field induction, where two
loop antennas are located within each other's near field, effectively
forming an air-core transformer.
The reader continuously generates an RF carrier sine wave (at 13.56
MHz), watching always for modulation to occur. Detected modulation
of the field would indicate the presence of a tag.
Operation Of NFC
Reader/writer mode
the NFC device is capable of reading NFC Forum-
mandated tag types, such as a tag embedded in
an NFC smart poster
Peer-to-Peer mode
Two NFC devices can exchange data. For example, you
can share Bluetooth or Wi-Fi link set-up parameters
or you can exchange data such as virtual business
cards or digital photos.
Card Emulation mode
The NFC device appears to an external reader
much the same as a traditional contactless smart
card. This enables contactless payments and
ticketing by NFC devices without changing the
existing infrastructure.
Operating Modes of NFC devices
NFC provides a range of benefits to consumers and businesses, such as:
Versatile: NFC is ideally suited to the broadest range of industries,
environments
Open and standards-based: The underlying layers of NFC technology
follow universally implemented ISO, ECMA, and ETSI standards
Technology-enabling: NFC facilitates fast and simple setup of
wireless technologies, (such as Bluetooth, Wi-Fi, etc.)
Inherently secure: NFC transmissions are secure due to short
range communication
Interoperable: NFC works with existing Contactless card technologies
Security-ready: NFC has built-in capabilities to support secure applications
Benefits of NFC
Application of NFC
Smart Posters
An object that has, affixed to or embedded
in it, one or more readable NFC tags
with messages stored in them.
Each tag is read when an NFC device is held
close to it
Not only a paper poster on the wall
Billboard, garment tag, magazine page, even
a three-dimensional object
Application of NFC
NFC and Mobile Payment
A customer makes his payment
through mobile
phone using NFC
NFC phone will open wallet application
Wallet will display product cost when user
clicks ͞Buy͟
At check out, wallet will display all
credit/debit cards in wallet for payment
Customer will select card for payment
Wallet will show the confirmation page
with the check out basket
Wallet will connect to retailer back end
for authorization and display tracking
Application of NFC
RFID 2005 IIT Bombay 47
1983
• The first patent to be associated with the abbreviation RFID was granted
to Charles Walton.
2004
• Nokia, Philips and Sony established the Near Field Communication
(NFC) Forum.
2011
• First mobile phone( Nokia 6131) with NFC released by NOKIA.
2010
• Samsung Nexus S: First Android NFC phone.
2011
• NFC support becomes part of the Symbian mobile operating system
and Blackberry OS.
History of NFC
CONCLUSION
 Mobile handsets are the primary target for NFC and soon NFC will be
implemented in most handheld devices. Even though NFC have the shortest
range among radio frequency technologies but it is revolutionary due
to it’s security, compatibility, user friendly interface, immense
applications etc
 The above mentioned scenarios are just a few examples of how
NFC will change our lives for the better. With the high level of
interest by corporations, as well as involvement of individual
developers and users in this short range communication
standard, the possibilities are endless.

More Related Content

Similar to RFID_NFC_Tags.ppt

Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
EnCStore Private Limited
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
Francisco Carabez
 
Automatic car parking system
Automatic car parking system Automatic car parking system
Automatic car parking system
Ankit Verma
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
nikshaikh786
 
Selectingtags Final
Selectingtags FinalSelectingtags Final
Selectingtags Final
SeanWatson
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
haroonahmed0044
 
13253751 pss7
13253751 pss713253751 pss7
13253751 pss7yaojiayu
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll taxangel300692
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lau_hkbu
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
liuyingxi971017
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
Mohamed Amin Elaguech
 
Rfid (Radio Frequency Identify)
Rfid (Radio Frequency Identify)Rfid (Radio Frequency Identify)
Rfid (Radio Frequency Identify)Ferrindo Putra
 
Rfid technology and applications
Rfid  technology and applicationsRfid  technology and applications
Rfid technology and applications
Pratik Deshmane Jain
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
Priyanka Singh
 
RFiD
RFiDRFiD

Similar to RFID_NFC_Tags.ppt (20)

Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Report
ReportReport
Report
 
Major project
Major projectMajor project
Major project
 
What is rfid
What is rfidWhat is rfid
What is rfid
 
Automatic car parking system
Automatic car parking system Automatic car parking system
Automatic car parking system
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Selectingtags Final
Selectingtags FinalSelectingtags Final
Selectingtags Final
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
13253751 pss7
13253751 pss713253751 pss7
13253751 pss7
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll tax
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
 
Rfid In Brief Ii
Rfid In Brief IiRfid In Brief Ii
Rfid In Brief Ii
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
Rfid (Radio Frequency Identify)
Rfid (Radio Frequency Identify)Rfid (Radio Frequency Identify)
Rfid (Radio Frequency Identify)
 
Rfid technology and applications
Rfid  technology and applicationsRfid  technology and applications
Rfid technology and applications
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
 
Money
MoneyMoney
Money
 
RFiD
RFiDRFiD
RFiD
 

More from Saba651353

deadlock and starvation resources allocation.pptx
deadlock and starvation resources allocation.pptxdeadlock and starvation resources allocation.pptx
deadlock and starvation resources allocation.pptx
Saba651353
 
scheduling Uni processor Long-term .ppt
scheduling  Uni processor Long-term .pptscheduling  Uni processor Long-term .ppt
scheduling Uni processor Long-term .ppt
Saba651353
 
ARTIFICIAL INTELLIGENCE AI technology .pptx
ARTIFICIAL INTELLIGENCE AI technology .pptxARTIFICIAL INTELLIGENCE AI technology .pptx
ARTIFICIAL INTELLIGENCE AI technology .pptx
Saba651353
 
Introduction_wsn.pptx
Introduction_wsn.pptxIntroduction_wsn.pptx
Introduction_wsn.pptx
Saba651353
 
Microcontroller.pptx
Microcontroller.pptxMicrocontroller.pptx
Microcontroller.pptx
Saba651353
 
LlosengCh10E2.ppt
LlosengCh10E2.pptLlosengCh10E2.ppt
LlosengCh10E2.ppt
Saba651353
 
Principles-of-SoftwareTesting.pptx
Principles-of-SoftwareTesting.pptxPrinciples-of-SoftwareTesting.pptx
Principles-of-SoftwareTesting.pptx
Saba651353
 
Software_Verification_and_Validation.ppt
Software_Verification_and_Validation.pptSoftware_Verification_and_Validation.ppt
Software_Verification_and_Validation.ppt
Saba651353
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.ppt
Saba651353
 
COMMUNICATING FINITE MACHINE.pptx
COMMUNICATING FINITE MACHINE.pptxCOMMUNICATING FINITE MACHINE.pptx
COMMUNICATING FINITE MACHINE.pptx
Saba651353
 
730-214 - IEEE Standard for Software Quality Assurance.pptx
730-214 - IEEE Standard for Software Quality Assurance.pptx730-214 - IEEE Standard for Software Quality Assurance.pptx
730-214 - IEEE Standard for Software Quality Assurance.pptx
Saba651353
 

More from Saba651353 (11)

deadlock and starvation resources allocation.pptx
deadlock and starvation resources allocation.pptxdeadlock and starvation resources allocation.pptx
deadlock and starvation resources allocation.pptx
 
scheduling Uni processor Long-term .ppt
scheduling  Uni processor Long-term .pptscheduling  Uni processor Long-term .ppt
scheduling Uni processor Long-term .ppt
 
ARTIFICIAL INTELLIGENCE AI technology .pptx
ARTIFICIAL INTELLIGENCE AI technology .pptxARTIFICIAL INTELLIGENCE AI technology .pptx
ARTIFICIAL INTELLIGENCE AI technology .pptx
 
Introduction_wsn.pptx
Introduction_wsn.pptxIntroduction_wsn.pptx
Introduction_wsn.pptx
 
Microcontroller.pptx
Microcontroller.pptxMicrocontroller.pptx
Microcontroller.pptx
 
LlosengCh10E2.ppt
LlosengCh10E2.pptLlosengCh10E2.ppt
LlosengCh10E2.ppt
 
Principles-of-SoftwareTesting.pptx
Principles-of-SoftwareTesting.pptxPrinciples-of-SoftwareTesting.pptx
Principles-of-SoftwareTesting.pptx
 
Software_Verification_and_Validation.ppt
Software_Verification_and_Validation.pptSoftware_Verification_and_Validation.ppt
Software_Verification_and_Validation.ppt
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.ppt
 
COMMUNICATING FINITE MACHINE.pptx
COMMUNICATING FINITE MACHINE.pptxCOMMUNICATING FINITE MACHINE.pptx
COMMUNICATING FINITE MACHINE.pptx
 
730-214 - IEEE Standard for Software Quality Assurance.pptx
730-214 - IEEE Standard for Software Quality Assurance.pptx730-214 - IEEE Standard for Software Quality Assurance.pptx
730-214 - IEEE Standard for Software Quality Assurance.pptx
 

Recently uploaded

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 

Recently uploaded (20)

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 

RFID_NFC_Tags.ppt

  • 2. 2 What is RFID?  RFID = Radio Frequency Identification.  An ADC (Automated Data Collection) technology that: – uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track.. – Is fast and does not require physical sight or contact between reader/scanner and the tagged item. – Performs the operation using low cost components. – Attempts to provide unique identification and backend integration that allows for wide range of applications.  Other ADC technologies: Bar codes, OCR.
  • 3. 3 RFID system components Ethernet RFID Reader RFID Tag RF Antenna Network Workstation
  • 4. 4 RFID tags: Smart labels … and a chip attached to it … on a substrate e.g. a plastic foil ... an antenna, printed, etched or stamped ... A paper label with RFID inside
  • 6. RFID 2005 IIT Bombay 6 Tags can be attached to almost anything: – Items, cases or pallets of products, high value goods – vehicles, assets, livestock or personnel Passive Tags – Do not require power – Draws from Interrogator Field – Lower storage capacities (few bits to 1 KB) – Shorter read ranges (4 inches to 15 feet) – Usually Write-Once-Read-Many/Read-Only tags – Cost around 25 cents to few dollars Active Tags – Battery powered – Higher storage capacities (512 KB) – Longer read range (300 feet) – Typically can be re-written by RF Interrogators – Cost around 50 to 250 dollars RFID tags
  • 7. 7 Tag block diagram Antenna Power Supply Tx Modulator Rx Demodulator Control Logic (Finite State machine) Memory Cells Tag Integrated Circuit (IC)
  • 8. 8 RFID tag memory  Read-only tags – Tag ID is assigned at the factory during manufacturing • Can never be changed • No additional data can be assigned to the tag  Write once, read many (WORM) tags – Data written once, e.g., during packing or manufacturing • Tag is locked once data is written • Similar to a compact disc or DVD  Read/Write – Tag data can be changed over time • Part or all of the data section can be locked
  • 9. 9 RFID readers  Reader functions: – Remotely power tags – Establish a bidirectional data link – Communicate with networked server(s) – Can read 100-300 tags per second  Readers (interrogators) can be at a fixed point such as – Entrance/exit – Point of sale  Readers can also be mobile/hand-held
  • 11. 11 RFID systems: logical view 3 2 4 5 6 7 8 Application Systems RF Write data to RF tags Trading Partner Systems Read Manager Transaction Data Store Items with RF Tags Reader Antenna Antenna EDI / XML 10 1 Tag/Item Relationship Database 9 Internet ONS Server Product Information (PML Format) 11 12 Other Systems RFID Middleware Tag Interfaces
  • 13. 13 RFID advantages over bar-codes  No line of sight required for reading  Multiple items can be read with a single scan  Each tag can carry a lot of data (read/write)  Individual items identified and not just the category  Passive tags have a virtually unlimited lifetime  Active tags can be read from great distances  Can be combined with barcode technology
  • 14. 14 RFID communications Tags Reader Power from RF field Reader Antenna Reader->Tag Commands Tag->Reader Responses RFID Communication Channel
  • 15. 15 RFID communication  Host manages Reader(s) and issues Commands  Reader and tag communicate via RF signal  Carrier signal generated by the reader  Carrier signal sent out through the antennas  Carrier signal hits tag(s)  Tag receives and modifies carrier signal – “sends back” modulated signal – Antennas receive the modulated signal and send them to the Reader  Reader decodes the data  Results returned to the host application
  • 16. 16 Antenna fields: Inductive coupling Transceiver Tag Reader antenna RFID Tag IC or microprocessor antenna
  • 17. 17 Antenna fields: Propagation coupling Transceiver Tag Reader antenna RFID Tag IC or microprocessor antenna
  • 18. 18 Operational frequencies Frequency Ranges LF 125 KHz HF 13.56 MHz UHF 868 - 915 MHz Microwave 2.45 GHz & 5.8 GHz Typical Max Read Range (Passive Tags) Shortest 1”-12” Short 2”-24” Medium 1’-10’ Longest 1’-15’ Tag Power Source Generally passive tags only, using inductive coupling Generally passive tags only, using inductive or capacitive coupling Active tags with integral battery or passive tags using capacitive storage, E-field coupling Active tags with integral battery or passive tags using capacitive storage, E-field coupling Data Rate Slower Moderate Fast Faster Ability to read near metal or wet surfaces Better Moderate Poor Worse Applications Access Control & Security Identifying widgets through manufacturing processes or in harsh environments Ranch animal identification Employee IDs Library books Laundry identification Access Control Employee IDs supply chain tracking Highway toll Tags Highway toll Tags Identification of private vehicle fleets in/out of a yard or facility Asset tracking
  • 19. 19 Multiple Tags When multiple tags are in range of the reader: – All the tags will be excited at the same time. – Makes it very difficult to distinguish between the tags.
  • 20. 20 Tag Collision Problem  Multiple tags simultaneously respond to query – Results in collision at the reader  Several approaches – Tree algorithm – Memoryless protocol – Contactless protocol – I-code protocol
  • 21. RFID 2005 IIT Bombay 21
  • 22. RFID 2005 IIT Bombay 22
  • 23. 23 RFID deployment challenges  Manage System costs – Choose the right hardware – Choose the right integration path – Choose the right data infrastructure  Handle Material matters – RF Tagging of produced objects – Designing layouts for RF Interrogators  Tag Identification Scheme Incompatibilities – Which standard to follow?  Operating Frequency Variances – Low Frequency or High Frequency or Ultra High Frequency  Business Process Redesign – New processes will be introduced – Existing processes will be re-defined – Training of HR  Cost-ROI (Return on investment) sharing
  • 24. 24 RFID application points  Assembly Line  Shipping Portals  Handheld Applications Bill of Lading Material Tracking Wireless
  • 25. 25 RFID applications  Manufacturing and Processing – Inventory and production process monitoring – Warehouse order fulfillment  Supply Chain Management – Inventory tracking systems – Logistics management  Retail – Inventory control and customer insight – Auto checkout with reverse logistics  Security – Access control – Counterfeiting and Theft control/prevention  Location Tracking – Traffic movement control and parking management – Wildlife/Livestock monitoring and tracking
  • 26. 26 Smart groceries  Add an RFID tag to all items in the grocery.  As the cart leaves the store, it passes through an RFID transceiver.  The cart is rung up in seconds.
  • 27. 27 1. Tagged item is removed from or placed in “Smart Cabinet” 3. Server/Database is updated to reflect item’s disposition 4. Designated individuals are notified regarding items that need attention (cabinet and shelf location, action required) 2. “Smart Cabinet” periodically interrogates to assess inventory Passive read/write tags affixed to caps of containers Reader antennas placed under each shelf Smart cabinet
  • 28. 28 Smart fridge  Recognizes what’s been put in it  Recognizes when things are removed  Creates automatic shopping lists  Notifies you when things are past their expiration  Shows you the recipes that most closely match what is available
  • 29. 29 Smart groceries enhanced  Track products through their entire lifetime.
  • 30. 30 Some more smart applications  “Smart” appliances: – Closets that advice on style depending on clothes available. – Ovens that know recipes to cook pre-packaged food.  “Smart” products: – Clothing, appliances, CDs, etc. tagged for store returns.  “Smart” paper: – Airline tickets that indicate your location in the airport.  “Smart” currency: – Anti-counterfeiting and tracking.
  • 31. 31 RFID Summary Strengths  Advanced technology  Easy to use  High memory capacity  Small size Weaknesses  Lack of industry and application standards  High cost per unit and high RFID system integration costs  Weak market understanding of the benefits of RFID technology Opportunities  Could replace the bar code  End-user demand for RFID systems is increasing  Huge market potential in many businesses Threats  Ethical threats concerning privacy life  Highly fragmented competitive environment
  • 33. What Is NFC ? NFC or Near Field Communication is a short range high frequency wireless communication technology. NFC is mainly aimed for mobile or handheld devices. A radio communication is established by touching the two phones or keeping them in a proximity of a few centimeters (up to 10 cm) . It allows exchange, devices. for simplified communication, data and wireless connections between two Allows communication between Two powered (active) devices Powered and non self-powered (passive) devices NFC trade mark logo
  • 34. NFC is an extension of Radio frequency identification (RFID) technology that combines the interface of a smartcard and a reader into a single device. This allow two-way communication between endpoints, where earlier systems were one-way only. It operates within the globally available and unlicensed radio frequency band of 13.56 MHz, with a bandwidth of 14 kHz. Working distance with compact standard antennas: up to 10 cm . Supported data rates: 106, 212 and 424 Kbit/s For two devices to communicate using NFC, one device must have an NFC reader/writer and one must have an NFC tag Features
  • 35. NFC Reader Usually a microcontroller-based (for example NFC enabled phones) with an integrated circuits that is capable of generating radio frequency at 13.56 components MHz with other such as encoders, decoders, antenna, comparators, and firmware designed to transmit energy to a tag and read information back from it by detecting the modulation. The reader continuously emits RF carrier signals, and keeps observing the received RF signals for data. An NFC Reader (A Smartphone )
  • 36. NFC Tag An RFID device incorporating a silicon memory chip connecting to external antenna. Tag does not have its own power source (passive). The passive tag absorbs a small portion of the energy emitted by the reader (phone), and starts sending modulated information when sufficient energy is acquired from the RF field generated by the reader. Following figure shows the internal hardware of NFC tag where we can see its memory, logic etc.
  • 37. 1. NFC has two communicative terminals :The INITIATOR is the one who wishes to communicate and starts the communication. The TARGET receives the initiator’s communication request and sends back a reply 2. NFC employs two different coding to transfer data. If an active device transfers data at 106 Kbit/s, a Modified Miller coding with 100% modulation is used. In all other cases Manchester coding is used with a modulation ratio of 10%. INITIATOR TARGET Operation Of NFC
  • 38. Manchester Coding •A low-to-high transition expresses a 0 bit, whereas a high-to-low transition stands for a 1 bit. Modified Miller Coding •This line code is characterized by pauses occurring in the carrier at different positions of a period. While a 1 is always encoded in the same way, coding a 0 is determined on the basis of the preceded bit . Operation Of NFC
  • 39. 39
  • 40. Passive Communication Mode: The Initiator device provides a carrier field and the target device answers by modulating existing field. In this mode, the Target device may draw its operating power from the Initiator- provided electromagnetic field. Active Communication Mode: Both Initiator and Target device communicate by alternately generating their own field. A device deactivates its RF field while it is waiting for data. In this mode, both devices typically need to have a power supply. There are two mode of communication Operation Of NFC
  • 41. NFC devices communicate via magnetic field induction, where two loop antennas are located within each other's near field, effectively forming an air-core transformer. The reader continuously generates an RF carrier sine wave (at 13.56 MHz), watching always for modulation to occur. Detected modulation of the field would indicate the presence of a tag. Operation Of NFC
  • 42. Reader/writer mode the NFC device is capable of reading NFC Forum- mandated tag types, such as a tag embedded in an NFC smart poster Peer-to-Peer mode Two NFC devices can exchange data. For example, you can share Bluetooth or Wi-Fi link set-up parameters or you can exchange data such as virtual business cards or digital photos. Card Emulation mode The NFC device appears to an external reader much the same as a traditional contactless smart card. This enables contactless payments and ticketing by NFC devices without changing the existing infrastructure. Operating Modes of NFC devices
  • 43. NFC provides a range of benefits to consumers and businesses, such as: Versatile: NFC is ideally suited to the broadest range of industries, environments Open and standards-based: The underlying layers of NFC technology follow universally implemented ISO, ECMA, and ETSI standards Technology-enabling: NFC facilitates fast and simple setup of wireless technologies, (such as Bluetooth, Wi-Fi, etc.) Inherently secure: NFC transmissions are secure due to short range communication Interoperable: NFC works with existing Contactless card technologies Security-ready: NFC has built-in capabilities to support secure applications Benefits of NFC
  • 45. Smart Posters An object that has, affixed to or embedded in it, one or more readable NFC tags with messages stored in them. Each tag is read when an NFC device is held close to it Not only a paper poster on the wall Billboard, garment tag, magazine page, even a three-dimensional object Application of NFC
  • 46. NFC and Mobile Payment A customer makes his payment through mobile phone using NFC NFC phone will open wallet application Wallet will display product cost when user clicks ͞Buy͟ At check out, wallet will display all credit/debit cards in wallet for payment Customer will select card for payment Wallet will show the confirmation page with the check out basket Wallet will connect to retailer back end for authorization and display tracking Application of NFC
  • 47. RFID 2005 IIT Bombay 47
  • 48. 1983 • The first patent to be associated with the abbreviation RFID was granted to Charles Walton. 2004 • Nokia, Philips and Sony established the Near Field Communication (NFC) Forum. 2011 • First mobile phone( Nokia 6131) with NFC released by NOKIA. 2010 • Samsung Nexus S: First Android NFC phone. 2011 • NFC support becomes part of the Symbian mobile operating system and Blackberry OS. History of NFC
  • 49. CONCLUSION  Mobile handsets are the primary target for NFC and soon NFC will be implemented in most handheld devices. Even though NFC have the shortest range among radio frequency technologies but it is revolutionary due to it’s security, compatibility, user friendly interface, immense applications etc  The above mentioned scenarios are just a few examples of how NFC will change our lives for the better. With the high level of interest by corporations, as well as involvement of individual developers and users in this short range communication standard, the possibilities are endless.