SlideShare a Scribd company logo
1 of 19
RFID
(RADIO FREQUENCY IDENTIFICATION)
SOUMEN SANTRA
MCA, M.Tech, SCJP, MCP
RFID ?
 It allows an object or person to be identified at a distance,
using radio waves.
It energize and communicate with some form of tag or card.
An Automated Data Collection (ADC) technology.
It uses radio-frequency waves.
It transfers data between a reader and a movable item.
It can identify, categorize, tracking, etc.
It is fast & reliable
It does not require physical sight.
It can contact between reader/scanner and the tagged item.
RFID : Components
Transponder/Tag
 Uniquely identifiable data item with RFID tag.
Antenna
 Transmits Radio Frequency signals between Tag & RFID Reader.
Transceiver
 Receives Radio Frequency signals from RFID devices, and reads &
passes data to the host for processing.
 Contains a decoder to interpret the data.
RFID Components : Block Diagram
RFID Tags : Types
 Active
 Transmits radio signal.
 Battery powered memory, radio & circuitry.
 High Read Range (300 feet).
 Passive
 Reflects radio signal from reader.
 Reader powered.
 Shorter Read Range (4 inches - 15 feet).
 Self-active-tags
Built-in battery to power the Only when the reader read first tag.
RIFD Reader ?
 A device used to gather information from an RFID tag.
 Used to track individual objects.
 Used to transfer data from the tag to a reader.
 Transmit information to the microcontroller .
 The information known as Electronics Product Code(EPC) .
RFID : Mechanism
 It is referred to as Automatic Identification and Data Capture (AIDC).
 Automatically identify objects, collect data about them.
 Enter those data directly into computer systems with little or no human
intervention.
 It utilizes radio waves to accomplish this.
 RFID systems consist of three components:
 RFID tag or smart label,
 RFID reader,
 Antenna.
 RFID tags contain an integrated circuit and an antenna.
 It is used to transmit data to the RFID reader or interrogator.
 The reader then converts the radio waves to data.
 Information collected from the tags.
 It transferred through a communications interface to a host computer.
 Here the data can be stored in a database and analyzed at a later time.
RFID : Mechanism
RFID
reader t
a
g
1243234909.23AE2F.345K4D055
Smart
antenna
antenna
Interface to host
computer (RS485,
RS232/422, ethernet,
802.11, etc)
1- The Reader
sends an
interrogation
command which
radiated by the
antennas
2- The tag responds
to the reader’s
command by
sending its tag
identifier
3- The reader
communicates the
ID read from tag to
the host computer.
ID: 01.43200B9.23AE1F.345C4D012
BLOCK DIAGRAM
RFID : SECURITY SYSTEM
Allows only authorized people to enter a particular area.
Authorized people are provided with unique tags, to access the area.
Control by microcontroller or an Arduino.
In a microcontroller a RIFD module, a LCD module, buzzer motor, etc used.
Security Components
Microcontroller
This is the CPU of security system.
The various functions like reading digital i/p from reader, turn on buzzer for
invalid card, turn on the motor or relay perform if card is valid.
 LCD
Used to display alphabets along with numbers on its screen.
Used to display the details of the card .
MOTOR
It is turned on to indicate the door opening based on valid card .
RFID : WORKING PRINCIPLE SECURITY
SYSTEM
 The reader sends signal to the tag using an antenna.
 The tag receives this information and resends this information along with the information in
its memory.
 The reader receives this signal and transmits to the processor for further processing.
Micro
controller
LCD
Buzzer
RFID
Card
RFID
Reader
Motor
Driver
ICMotor
RFID : APPLICATION
 Instructions based : Schools , colleges, and hospitals etc.
 Communication based : Transportation , tracking of birds and animals.
 Security based system.
 Detect any defect in products etc.
 Inventory based : Item management for retail, health care, etc.
 Railway & car identification and tracking and Electronic toll collection
Application
Batch Wireless
Fixed Station
RFID : Versions
 Gen 2 and UHF standards.
 Faster read rates (up to 1500 tags / second).
 Reduced level of interference with multiple tags.
 Tags can be re-written multiple times.
 Security – password protection, encryption, authentication.
 Service Companies Impinj Inc., Qualcomm, Unilever, UPS, etc.
RFID : Advantages
 No Physical Communication.
 Fast read/write capability
 Response in Real-time
 Tag more authenticate than bar code
 Distance not matter.
RFID : FREQUENCY BANDS
Updating Required
 More secureness & restrictive.
 To build new systems with new platform.
 Support “Zombie” RFID tags.
 New standardization such as UHF, Gen 2, etc.
 Adapt learning experience.
THANK YOU
Give Feedback

More Related Content

What's hot

RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance SystemAtiq Shaikh
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identificationRavi Teja
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and ApplicationsAnal Mandal
 
RFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTRFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTnikhilpatewar
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemShahrikh Khan
 
RFID based indoor tracking system
RFID based indoor tracking systemRFID based indoor tracking system
RFID based indoor tracking systemSherwin Rodrigues
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology Ho Vu
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Androidtodbotdotcom
 

What's hot (20)

RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance System
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 
RFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTRFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPT
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin System
 
RFID based indoor tracking system
RFID based indoor tracking systemRFID based indoor tracking system
RFID based indoor tracking system
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology
 
RFID
RFIDRFID
RFID
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
RFID
RFID RFID
RFID
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Android
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 

Similar to RFID (RADIO FREQUENCY IDENTIFICATION)

Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)Robiul Islam
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMAyush Dixit
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakornn7046
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working Niranjan
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraqmontaser185
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security SystemNataraj Patil
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its ImplentationSonal Tiwari
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1Mayank Vora
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1Mayank Vora
 
rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxRohithTopula
 

Similar to RFID (RADIO FREQUENCY IDENTIFICATION) (20)

Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakor
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security System
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its Implentation
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1
 
C361520
C361520C361520
C361520
 
rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptx
 

More from Soumen Santra

Cell hole identification in carcinogenic segment using Geodesic Methodology: ...
Cell hole identification in carcinogenic segment using Geodesic Methodology: ...Cell hole identification in carcinogenic segment using Geodesic Methodology: ...
Cell hole identification in carcinogenic segment using Geodesic Methodology: ...Soumen Santra
 
PPT_PAPERID 31_SOUMEN_SANTRA - ICCET23.pptx
PPT_PAPERID 31_SOUMEN_SANTRA - ICCET23.pptxPPT_PAPERID 31_SOUMEN_SANTRA - ICCET23.pptx
PPT_PAPERID 31_SOUMEN_SANTRA - ICCET23.pptxSoumen Santra
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Traveling salesman problem: Game Scheduling Problem Solution: Ant Colony Opti...
Traveling salesman problem: Game Scheduling Problem Solution: Ant Colony Opti...Traveling salesman problem: Game Scheduling Problem Solution: Ant Colony Opti...
Traveling salesman problem: Game Scheduling Problem Solution: Ant Colony Opti...Soumen Santra
 
Optimization techniques: Ant Colony Optimization: Bee Colony Optimization: Tr...
Optimization techniques: Ant Colony Optimization: Bee Colony Optimization: Tr...Optimization techniques: Ant Colony Optimization: Bee Colony Optimization: Tr...
Optimization techniques: Ant Colony Optimization: Bee Colony Optimization: Tr...Soumen Santra
 
A Novel Real Time Home Automation System with Google Assistance Technology
A Novel Real Time Home Automation System with Google Assistance TechnologyA Novel Real Time Home Automation System with Google Assistance Technology
A Novel Real Time Home Automation System with Google Assistance TechnologySoumen Santra
 
Java basic part 2 : Datatypes Keywords Features Components Security Exceptions
Java basic part 2 : Datatypes Keywords Features Components Security Exceptions Java basic part 2 : Datatypes Keywords Features Components Security Exceptions
Java basic part 2 : Datatypes Keywords Features Components Security Exceptions Soumen Santra
 
Threads Advance in System Administration with Linux
Threads Advance in System Administration with LinuxThreads Advance in System Administration with Linux
Threads Advance in System Administration with LinuxSoumen Santra
 
Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Soumen Santra
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Soumen Santra
 
Code-Division Multiple Access (CDMA)
Code-Division Multiple Access (CDMA)Code-Division Multiple Access (CDMA)
Code-Division Multiple Access (CDMA)Soumen Santra
 
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : DetailsPURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : DetailsSoumen Santra
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CASoumen Santra
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION Soumen Santra
 
Threads Basic : Features, Types & Implementation
Threads Basic : Features, Types  & ImplementationThreads Basic : Features, Types  & Implementation
Threads Basic : Features, Types & ImplementationSoumen Santra
 
CLOUD COMPUTING : BASIC CONCEPT REGARDING LOAD BALANCING AND Virtual Machine ...
CLOUD COMPUTING : BASIC CONCEPT REGARDING LOAD BALANCING AND Virtual Machine ...CLOUD COMPUTING : BASIC CONCEPT REGARDING LOAD BALANCING AND Virtual Machine ...
CLOUD COMPUTING : BASIC CONCEPT REGARDING LOAD BALANCING AND Virtual Machine ...Soumen Santra
 
JavaScript with Syntax & Implementation
JavaScript with Syntax & ImplementationJavaScript with Syntax & Implementation
JavaScript with Syntax & ImplementationSoumen Santra
 

More from Soumen Santra (20)

Cell hole identification in carcinogenic segment using Geodesic Methodology: ...
Cell hole identification in carcinogenic segment using Geodesic Methodology: ...Cell hole identification in carcinogenic segment using Geodesic Methodology: ...
Cell hole identification in carcinogenic segment using Geodesic Methodology: ...
 
PPT_PAPERID 31_SOUMEN_SANTRA - ICCET23.pptx
PPT_PAPERID 31_SOUMEN_SANTRA - ICCET23.pptxPPT_PAPERID 31_SOUMEN_SANTRA - ICCET23.pptx
PPT_PAPERID 31_SOUMEN_SANTRA - ICCET23.pptx
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Traveling salesman problem: Game Scheduling Problem Solution: Ant Colony Opti...
Traveling salesman problem: Game Scheduling Problem Solution: Ant Colony Opti...Traveling salesman problem: Game Scheduling Problem Solution: Ant Colony Opti...
Traveling salesman problem: Game Scheduling Problem Solution: Ant Colony Opti...
 
Optimization techniques: Ant Colony Optimization: Bee Colony Optimization: Tr...
Optimization techniques: Ant Colony Optimization: Bee Colony Optimization: Tr...Optimization techniques: Ant Colony Optimization: Bee Colony Optimization: Tr...
Optimization techniques: Ant Colony Optimization: Bee Colony Optimization: Tr...
 
Quick Sort
Quick SortQuick Sort
Quick Sort
 
Merge sort
Merge sortMerge sort
Merge sort
 
A Novel Real Time Home Automation System with Google Assistance Technology
A Novel Real Time Home Automation System with Google Assistance TechnologyA Novel Real Time Home Automation System with Google Assistance Technology
A Novel Real Time Home Automation System with Google Assistance Technology
 
Java basic part 2 : Datatypes Keywords Features Components Security Exceptions
Java basic part 2 : Datatypes Keywords Features Components Security Exceptions Java basic part 2 : Datatypes Keywords Features Components Security Exceptions
Java basic part 2 : Datatypes Keywords Features Components Security Exceptions
 
Java Basic PART I
Java Basic PART IJava Basic PART I
Java Basic PART I
 
Threads Advance in System Administration with Linux
Threads Advance in System Administration with LinuxThreads Advance in System Administration with Linux
Threads Advance in System Administration with Linux
 
Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
Code-Division Multiple Access (CDMA)
Code-Division Multiple Access (CDMA)Code-Division Multiple Access (CDMA)
Code-Division Multiple Access (CDMA)
 
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : DetailsPURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
 
Threads Basic : Features, Types & Implementation
Threads Basic : Features, Types  & ImplementationThreads Basic : Features, Types  & Implementation
Threads Basic : Features, Types & Implementation
 
CLOUD COMPUTING : BASIC CONCEPT REGARDING LOAD BALANCING AND Virtual Machine ...
CLOUD COMPUTING : BASIC CONCEPT REGARDING LOAD BALANCING AND Virtual Machine ...CLOUD COMPUTING : BASIC CONCEPT REGARDING LOAD BALANCING AND Virtual Machine ...
CLOUD COMPUTING : BASIC CONCEPT REGARDING LOAD BALANCING AND Virtual Machine ...
 
JavaScript with Syntax & Implementation
JavaScript with Syntax & ImplementationJavaScript with Syntax & Implementation
JavaScript with Syntax & Implementation
 

Recently uploaded

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 

Recently uploaded (20)

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 

RFID (RADIO FREQUENCY IDENTIFICATION)

  • 1. RFID (RADIO FREQUENCY IDENTIFICATION) SOUMEN SANTRA MCA, M.Tech, SCJP, MCP
  • 2. RFID ?  It allows an object or person to be identified at a distance, using radio waves. It energize and communicate with some form of tag or card. An Automated Data Collection (ADC) technology. It uses radio-frequency waves. It transfers data between a reader and a movable item. It can identify, categorize, tracking, etc. It is fast & reliable It does not require physical sight. It can contact between reader/scanner and the tagged item.
  • 3. RFID : Components Transponder/Tag  Uniquely identifiable data item with RFID tag. Antenna  Transmits Radio Frequency signals between Tag & RFID Reader. Transceiver  Receives Radio Frequency signals from RFID devices, and reads & passes data to the host for processing.  Contains a decoder to interpret the data.
  • 4. RFID Components : Block Diagram
  • 5. RFID Tags : Types  Active  Transmits radio signal.  Battery powered memory, radio & circuitry.  High Read Range (300 feet).  Passive  Reflects radio signal from reader.  Reader powered.  Shorter Read Range (4 inches - 15 feet).  Self-active-tags Built-in battery to power the Only when the reader read first tag.
  • 6. RIFD Reader ?  A device used to gather information from an RFID tag.  Used to track individual objects.  Used to transfer data from the tag to a reader.  Transmit information to the microcontroller .  The information known as Electronics Product Code(EPC) .
  • 7. RFID : Mechanism  It is referred to as Automatic Identification and Data Capture (AIDC).  Automatically identify objects, collect data about them.  Enter those data directly into computer systems with little or no human intervention.  It utilizes radio waves to accomplish this.  RFID systems consist of three components:  RFID tag or smart label,  RFID reader,  Antenna.  RFID tags contain an integrated circuit and an antenna.  It is used to transmit data to the RFID reader or interrogator.  The reader then converts the radio waves to data.  Information collected from the tags.  It transferred through a communications interface to a host computer.  Here the data can be stored in a database and analyzed at a later time.
  • 8. RFID : Mechanism RFID reader t a g 1243234909.23AE2F.345K4D055 Smart antenna antenna Interface to host computer (RS485, RS232/422, ethernet, 802.11, etc) 1- The Reader sends an interrogation command which radiated by the antennas 2- The tag responds to the reader’s command by sending its tag identifier 3- The reader communicates the ID read from tag to the host computer. ID: 01.43200B9.23AE1F.345C4D012
  • 10. RFID : SECURITY SYSTEM Allows only authorized people to enter a particular area. Authorized people are provided with unique tags, to access the area. Control by microcontroller or an Arduino. In a microcontroller a RIFD module, a LCD module, buzzer motor, etc used.
  • 11. Security Components Microcontroller This is the CPU of security system. The various functions like reading digital i/p from reader, turn on buzzer for invalid card, turn on the motor or relay perform if card is valid.  LCD Used to display alphabets along with numbers on its screen. Used to display the details of the card . MOTOR It is turned on to indicate the door opening based on valid card .
  • 12. RFID : WORKING PRINCIPLE SECURITY SYSTEM  The reader sends signal to the tag using an antenna.  The tag receives this information and resends this information along with the information in its memory.  The reader receives this signal and transmits to the processor for further processing. Micro controller LCD Buzzer RFID Card RFID Reader Motor Driver ICMotor
  • 13. RFID : APPLICATION  Instructions based : Schools , colleges, and hospitals etc.  Communication based : Transportation , tracking of birds and animals.  Security based system.  Detect any defect in products etc.  Inventory based : Item management for retail, health care, etc.  Railway & car identification and tracking and Electronic toll collection
  • 15. RFID : Versions  Gen 2 and UHF standards.  Faster read rates (up to 1500 tags / second).  Reduced level of interference with multiple tags.  Tags can be re-written multiple times.  Security – password protection, encryption, authentication.  Service Companies Impinj Inc., Qualcomm, Unilever, UPS, etc.
  • 16. RFID : Advantages  No Physical Communication.  Fast read/write capability  Response in Real-time  Tag more authenticate than bar code  Distance not matter.
  • 18. Updating Required  More secureness & restrictive.  To build new systems with new platform.  Support “Zombie” RFID tags.  New standardization such as UHF, Gen 2, etc.  Adapt learning experience.