SlideShare a Scribd company logo
Presented by– Priyanka Singh
B.Tech (ECE),3rd Sem
Submitted to – Mr. Sumit Danda
OVERVIEW
 RFDI APPLICATION
 SOFTWARE DEFINED RADIO
 METHODOLOGY
 APPLICATION
 FUTURE COSIDERATION
 CONCLUSION
What is RFID?
 RFID = Radio Frequency Identification.
 An ADC (Automated Data Collection) technology that:
 uses radio-frequency waves to transfer data between a reader
and a movable item to identify, categorize, track..
 Is fast and does not require physical sight or contact between
reader/scanner and the tagged item.
 Performs the operation using low cost components.
 Attempts to provide unique identification and backend
integration that allows for wide range of applications.
 Other ADC technologies: Bar codes, OCR
SOFTWARE DEFINED RADIO
 Software-Defined Radio (SDR) is a wireless communications
system where all of the signal processing is implemented in
software.
 Software Defined Radio (SDR) is an advanced radio
technology in which the modulation and demodulation of
radio signals is performed exclusively by software.
 A communication link consists of three components: the
transmitter, the channel, and the receiver.
Ethernet
RFID
Reader
RFID Tag RF Antenna Network Workstation
 RFID system is mainly consists of the following
components:
1) Tag (transponder)
A device that transmits data to reader which is located on the
object to be identifies.
2) Reader (Transceiver)
This device is used to read and/or write data to RFID tags.
Antenna could be build inside the reader. The antenna is the
channel between the tag and the transceiver, which control the
systems data access and communication.
3) Software Defined Radio
Software Defined Radio (SDR) is an advanced radio
technology in which the modulation and demodulation of
radio signals is performed exclusively by software.
RFID applications
 Manufacturing and Processing
 Inventory and production process monitoring
 Warehouse order fulfillment
 Supply Chain Management
 Inventory tracking systems
 Logistics management
 Retail
 Inventory control and customer insight
 Auto checkout with reverse logistics
 Security
 Access control
 Counterfeiting and Theft control/prevention
 Location Tracking
 Traffic movement control and parking management
 Wildlife/Livestock monitoring and tracking
Smart groceries
 Add an RFID tag to all
items in the grocery.
 As the cart leaves the
store, it passes through
an RFID transceiver.
 The cart is rung up in
seconds.
Smart cabinet
1. Tagged item is removed from
or placed in
“Smart Cabinet”
2. “Smart Cabinet” periodically
interrogates to assess
inventory
3. Server/Database is updated to
reflect item’s disposition
4. Designated individuals are
notified regarding items that
need attention (cabinet and
shelf location, action required)
Passive
read/write
tags
affixed to
caps
of containers
Reader antennas placed under each
shelf
Smart fridge
 Recognizes what’s been put in it
 Recognizes when things are removed
 Creates automatic shopping lists
 Notifies you when things are past their expiration
 Shows you the recipes that most closely match what is
available
Some more smart applications
 “Smart” appliances:
 Closets that advice on style depending on clothes available.
 Ovens that know recipes to cook pre-packaged food.
 “Smart” products:
 Clothing, appliances, CDs, etc. tagged for store returns.
 “Smart” paper:
 Airline tickets that indicate your location in the airport.
 “Smart” currency:
 Anti-counterfeiting and tracking
 No line of sight required for reading
 Multiple items can be read with a single scan
 Each tag can carry a lot of data (read/write)
 Individual items identified and not just the
category
 Passive tags have a virtually unlimited lifetime
 Active tags can be read from great distances
 Can be combined with barcode technology
• Hidden placement of tags
• Unique identifiers for all objects worldwide
• Massive data aggregation
• Unauthorized development of detailed profiles
• Unauthorized third party access to profile data
• Hidden readers
“Just in case you
want to know, she’s
carrying 700 Euro…”
 Tag does not give all its information to reader.
 The closer the reader, the more the processing.
 Tag reveals highest level of authenticated information.
1. Reader specifies which level it wants.
2. Tag specifies level of security, and/or amount of
energy needed.
3. Reader proceeds at that level of security.
4. Tag responds if and only if it gets energy and security
required.
Some more approaches
 The Faraday Cage approach.
 Place RFID tags in a protective mesh.
 Would make locomotion difficult.
 The Kill Tag approach.
 Kill the tag while leaving the store.
 RFID tags are too useful for reverse logistics.
 The Tag Encryption approach.
 Tag cycles through several pseudonyms.
 Getting a good model is difficult.
 No ‘one-size-fits-all’ solution.
 Security hinges on the fact that in the real world, an
adversary must have physical proximity to tags to interact
with them.
Strengths
 Advanced technology
 Easy to use
 High memory capacity
 Small size
Weaknesses
 Lack of industry and application
standards
 High cost per unit and high RFID
system integration costs
 Weak market understanding of the
benefits of RFID technology
Opportunities
 Could replace the bar code
 End-user demand for RFID systems
is increasing
 Huge market potential in many
businesses
Threats
 Ethical threats concerning privacy
life
 Highly fragmented competitive
environment
CONCLUSION
REFERENCES
 http://www.epcglobalinc.com/
 http://www.rfidjournal.com/
 http://rfidprivacy.com/
 http://www.rfidinc.com/
 http://www.buyrfid.com/
sdr using rfid application

More Related Content

What's hot

Smart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingSmart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controlling
Pranav Veerani
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
Davide Del Monte
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
Dinesh Nikam
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
fizzyjazzy
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
Naveen Kumar
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
rabeena tasleem
 
Rfid ppt
Rfid pptRfid ppt
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
Pravin Shinde
 
Advance communication through red tacton human area networking technology
Advance communication through red tacton  human area networking technology Advance communication through red tacton  human area networking technology
Advance communication through red tacton human area networking technology
Pawan Sharma
 
Software defined radio
Software defined radioSoftware defined radio
Software defined radio
Rahul Sidhu
 
Human Area Network
Human Area NetworkHuman Area Network
Human Area Network
Sheel Shah
 
Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPT
Ashutha K
 
Mobile communication Technology and Networking
Mobile communication Technology and NetworkingMobile communication Technology and Networking
Mobile communication Technology and Networking
SarthakSarode
 
Electronic Pills
Electronic PillsElectronic Pills
Electronic Pills
Burhanuddin Kapadia
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
Kalpna Saharan
 
Iot
IotIot
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
Kaveen Gayathma
 
Internet of things
Internet of thingsInternet of things
Internet of things
Brockanurag
 
Project report on Iot Based Garbage Monitoring System
Project report on Iot Based Garbage Monitoring System  Project report on Iot Based Garbage Monitoring System
Project report on Iot Based Garbage Monitoring System
alok pal
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernet
Mohammad Waziruddin
 

What's hot (20)

Smart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controllingSmart shopping trolley using rfid and remote controlling
Smart shopping trolley using rfid and remote controlling
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
Advance communication through red tacton human area networking technology
Advance communication through red tacton  human area networking technology Advance communication through red tacton  human area networking technology
Advance communication through red tacton human area networking technology
 
Software defined radio
Software defined radioSoftware defined radio
Software defined radio
 
Human Area Network
Human Area NetworkHuman Area Network
Human Area Network
 
Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPT
 
Mobile communication Technology and Networking
Mobile communication Technology and NetworkingMobile communication Technology and Networking
Mobile communication Technology and Networking
 
Electronic Pills
Electronic PillsElectronic Pills
Electronic Pills
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Iot
IotIot
Iot
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Project report on Iot Based Garbage Monitoring System
Project report on Iot Based Garbage Monitoring System  Project report on Iot Based Garbage Monitoring System
Project report on Iot Based Garbage Monitoring System
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernet
 

Similar to sdr using rfid application

Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
Akash Maurya
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
Saba651353
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
KondiVinay
 
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptxdevzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
Kashinathvpillai
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Publicis Sapient
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
EnCStore Private Limited
 
RFID-1.ppt
RFID-1.pptRFID-1.ppt
RFID-1.ppt
AparnaT17
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
Akash Maurya
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
Nadeem Raza
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
ashish pal
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
lisbala
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
Rbalasubramani
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
saeed001
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in libraries
Shivashish Verma
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
kunal13309
 
Rfid
RfidRfid
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
Hristo Borislavov Kolev
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
ashtopustech
 
RFID In LMS
RFID In LMSRFID In LMS
RFID In LMS
elibrarysoftware
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
calvin6c05
 

Similar to sdr using rfid application (20)

Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
 
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptxdevzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
devzdgdgdcsdfsdfdfgdfdgdggfgdsffgfgfgfi.pptx
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Asset Management on RFID.pptx
Asset Management on RFID.pptxAsset Management on RFID.pptx
Asset Management on RFID.pptx
 
RFID-1.ppt
RFID-1.pptRFID-1.ppt
RFID-1.ppt
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Application of rfid technology in libraries
Application of rfid technology in librariesApplication of rfid technology in libraries
Application of rfid technology in libraries
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Rfid
RfidRfid
Rfid
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
RFID In LMS
RFID In LMSRFID In LMS
RFID In LMS
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
 

Recently uploaded

哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 

sdr using rfid application

  • 1. Presented by– Priyanka Singh B.Tech (ECE),3rd Sem Submitted to – Mr. Sumit Danda
  • 2.
  • 3. OVERVIEW  RFDI APPLICATION  SOFTWARE DEFINED RADIO  METHODOLOGY  APPLICATION  FUTURE COSIDERATION  CONCLUSION
  • 4. What is RFID?  RFID = Radio Frequency Identification.  An ADC (Automated Data Collection) technology that:  uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track..  Is fast and does not require physical sight or contact between reader/scanner and the tagged item.  Performs the operation using low cost components.  Attempts to provide unique identification and backend integration that allows for wide range of applications.  Other ADC technologies: Bar codes, OCR
  • 5. SOFTWARE DEFINED RADIO  Software-Defined Radio (SDR) is a wireless communications system where all of the signal processing is implemented in software.  Software Defined Radio (SDR) is an advanced radio technology in which the modulation and demodulation of radio signals is performed exclusively by software.  A communication link consists of three components: the transmitter, the channel, and the receiver.
  • 6.
  • 7. Ethernet RFID Reader RFID Tag RF Antenna Network Workstation
  • 8.  RFID system is mainly consists of the following components: 1) Tag (transponder) A device that transmits data to reader which is located on the object to be identifies. 2) Reader (Transceiver) This device is used to read and/or write data to RFID tags. Antenna could be build inside the reader. The antenna is the channel between the tag and the transceiver, which control the systems data access and communication. 3) Software Defined Radio Software Defined Radio (SDR) is an advanced radio technology in which the modulation and demodulation of radio signals is performed exclusively by software.
  • 9.
  • 10. RFID applications  Manufacturing and Processing  Inventory and production process monitoring  Warehouse order fulfillment  Supply Chain Management  Inventory tracking systems  Logistics management  Retail  Inventory control and customer insight  Auto checkout with reverse logistics  Security  Access control  Counterfeiting and Theft control/prevention  Location Tracking  Traffic movement control and parking management  Wildlife/Livestock monitoring and tracking
  • 11. Smart groceries  Add an RFID tag to all items in the grocery.  As the cart leaves the store, it passes through an RFID transceiver.  The cart is rung up in seconds.
  • 12. Smart cabinet 1. Tagged item is removed from or placed in “Smart Cabinet” 2. “Smart Cabinet” periodically interrogates to assess inventory 3. Server/Database is updated to reflect item’s disposition 4. Designated individuals are notified regarding items that need attention (cabinet and shelf location, action required) Passive read/write tags affixed to caps of containers Reader antennas placed under each shelf
  • 13. Smart fridge  Recognizes what’s been put in it  Recognizes when things are removed  Creates automatic shopping lists  Notifies you when things are past their expiration  Shows you the recipes that most closely match what is available
  • 14. Some more smart applications  “Smart” appliances:  Closets that advice on style depending on clothes available.  Ovens that know recipes to cook pre-packaged food.  “Smart” products:  Clothing, appliances, CDs, etc. tagged for store returns.  “Smart” paper:  Airline tickets that indicate your location in the airport.  “Smart” currency:  Anti-counterfeiting and tracking
  • 15.
  • 16.  No line of sight required for reading  Multiple items can be read with a single scan  Each tag can carry a lot of data (read/write)  Individual items identified and not just the category  Passive tags have a virtually unlimited lifetime  Active tags can be read from great distances  Can be combined with barcode technology
  • 17.
  • 18. • Hidden placement of tags • Unique identifiers for all objects worldwide • Massive data aggregation • Unauthorized development of detailed profiles • Unauthorized third party access to profile data • Hidden readers “Just in case you want to know, she’s carrying 700 Euro…”
  • 19.
  • 20.  Tag does not give all its information to reader.  The closer the reader, the more the processing.  Tag reveals highest level of authenticated information. 1. Reader specifies which level it wants. 2. Tag specifies level of security, and/or amount of energy needed. 3. Reader proceeds at that level of security. 4. Tag responds if and only if it gets energy and security required.
  • 21. Some more approaches  The Faraday Cage approach.  Place RFID tags in a protective mesh.  Would make locomotion difficult.  The Kill Tag approach.  Kill the tag while leaving the store.  RFID tags are too useful for reverse logistics.  The Tag Encryption approach.  Tag cycles through several pseudonyms.  Getting a good model is difficult.  No ‘one-size-fits-all’ solution.  Security hinges on the fact that in the real world, an adversary must have physical proximity to tags to interact with them.
  • 22. Strengths  Advanced technology  Easy to use  High memory capacity  Small size Weaknesses  Lack of industry and application standards  High cost per unit and high RFID system integration costs  Weak market understanding of the benefits of RFID technology Opportunities  Could replace the bar code  End-user demand for RFID systems is increasing  Huge market potential in many businesses Threats  Ethical threats concerning privacy life  Highly fragmented competitive environment CONCLUSION
  • 23. REFERENCES  http://www.epcglobalinc.com/  http://www.rfidjournal.com/  http://rfidprivacy.com/  http://www.rfidinc.com/  http://www.buyrfid.com/