SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Internet of Things - 
Enabling Technologies 
RFID 
-By 
Swetha Kogatam 
SJSU ID : 009439339
RFID technology and its applications 
in Internet of Things (IoT) 
Authors : 
-Xiaolin Jia, Quanyuan Feng , Taihua Fan, Quanshui Lei ; 
-School of Computer Science and Technology, Southwest University of 
Science and Technology, Mianyang, China; 
-School of Information Science and Technology, Southwest Jiaotong 
University, Chengdu, China 
Published in: Consumer Electronics, Communications 
and Networks (CECNet), 2012 2nd International Conference 
Date of Conference : 21-23 April 2012 
Conference Location : Yichang 
Publisher: IEEE
What is RFID ? 
Radio frequency identification system (RFID) is an 
automatic technology and aids machines or 
computers to identity objects, record metadata or 
control individual target through radio waves. 
The RFID technology was first appeared in 1945, as 
an espionage tool for the Soviet Union. 
Main Advantage: 
Is the automated identification and data capture 
that promises wholesale changes across a broad 
spectrum of business activities and aims to reduce 
the cost of the already used systems such as bar 
codes. 3
RFID consists of 
1. Tags (transmitters/ responders) : The tag is a microchip 
connected with an antenna, which can be attached to an 
object as the identifier of the object. 
2. Readers (transmitters 
/ receivers) : The RFID 
reader communicates 
with the RFID tag using 
radio waves.
RFID & IOT 
When the RFID readers abided by appropriate 
communication protocols are connected to the terminal 
of Internet, the readers distributed throughout the world 
can identify, track and monitor the objects attached with 
tags globally, automatically, and in real time, if needed. 
This is the so-called Internet of Things (IOT). 
IOT first became popular through the Auto-ID Center and 
related market analysts publications and RFID is often 
seen as a prerequisite for the IOT.
IOT ARCHITECTURE 
The IOT system architecture is 
generally divided into three 
layers: 
1. the perception layer, 
2. the network layer, 
3. the service layer (or 
application layer)
1. Perception layer is the information origin and the core layer of 
IOT. All kinds of information of the physical world used in IOT are 
perceived and collected in this layer 
Ex : wireless sensors network (WSN), tags and reader-writers etc. 
2. Network layer also called as transport layer, includes access 
network and core network, provides transparent data 
transmission capability. 
The information from perception layer can be sent to the 
upper layer using existing mobile communication network. 
3. Service layer also called application layer, includes data 
management sub-layer and application service sub-layer. 
 The data management sub-layer provides processing complex 
data and uncertain information
RFID System 
RFID systems are composed of three main components: 
1. RFID tags 
2. RFID reader 
3. Application 
system 
RFID tags have the following essential components in 
common: 
antenna, integrated circuit, printed circuit board 
8
RFID Tag 
Also known as transponders (transmitter/responder), are 
attached to the objects to count or identify. 
Tags could be either active or passive. 
The main responsibility of antenna of RFID tag is to transmit 
and receive radio waves for the purpose of communication. 
The antenna is also known as the coupling mechanism, which 
can transform the energy in the form of electromagnetic 
radiation. This is the way the tag and reader communicating 
each other. 
The integrated circuit (IC) is a packaged collection of discrete 
components that provide the brains for the tag and transmit 
the tag’s unique identifier (ID). 
The printed circuit board (PCB) is the material that holds the 
tag together. The circuit board may be rigid or flexible, and is 
composed of many different types of materials, depending on 
the type and purpose of the tag. 9
Tags are built to comply with a categorization called a class. 
EPCglobal has defined six classifications for RFID tags (0 to 5) 
Class 0/class 1: These classes provide the basic radio 
frequency (RF) passive capability. Class 0 is factory-programmed. 
Beyond class 0, including class 1, the tags are 
user-programmable. 
Class 2: Additional functionality is added, which includes 
encryption and read-write RF memory 
Class 3: Batteries are found on board that will power logic in 
the computer circuit. Class 3 provides longer range and 
broadband communications 
Class 4: Active tags are part of the definition of class 4 tags. 
Peer-to-peer communications and additional sensing arc also 
included. 
Class 5: Class 5 tags contain enough power to activate other 
tags and could be effectively classified as a reader
RFID Reader 
The reader is responsible for orchestrating the 
communication with any tags in its read range and then 
presenting the tags’ data to an application that can make 
use of the data. 
Main functions are to 
 activate the tags, 
 structure the communication sequence with the tag and 
 transfer data between the application software and tags 
Readers in all systems can be reduced to two 
fundamental functional blocks: 
1. Control system and 
2. High frequency (HF) interface 
11
HF interface performs the following functions : 
1.Generation of high frequency transmission power to activate 
the transponder and supply it with power; 
2.Modulation of the transmission signal to send data to the 
transponder; 
3.Reception and demodulation of HF signals transmitted by a 
transponder.
Control unit performs the following functions: 
1.Communication with the application software and the 
execution of commands from the application software; 
2.Signal coding and decoding. In more complex systems the 
following additional functions are available 
3.Execution of an anti-collision algorithm; 
4.Encryption and decryption of the data to be transferred 
between transponder and reader; 
5.Performance of authentication between transponder and 
reader. 
6.Control of the communication with a transponder 
Application system: 
Also called data processing system, can be an application 
or database, depending on the application 
Application software initiates all readers and tags 
activities 
13
Evolution of IOT 
The evolution of IOT is coinciding with that of RFID and sensor 
technologies. RFID technology is a very important and 
fundamental groundwork for IOT. 
14
CHALLENGES & CONCLUSION 
Collision Problems 
Security and Privacy Concerns 
Other Challenges 
Cost , Design & Integration into existing systems 
CONCLUSION 
• The IOT uses a variety of information sensing identification 
device and information processing equipment, such as RFID, 
WSN, GPRS, etc. combining with the Internet to form an 
extensive network in order to informationize and intelligentize 
the entities or objects. 
• This paper analyzes the applications and challenges of RFID 
technology, which is the important and foundational 
component of IOT. 
15

Weitere ähnliche Inhalte

Was ist angesagt?

Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
Amit Ranjan
 
RFID
RFIDRFID
RFID
dont
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance system
A.k. Goverdhan
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
Akshat Rohatgi
 

Was ist angesagt? (20)

Iot architecture
Iot architectureIot architecture
Iot architecture
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
RFID
RFIDRFID
RFID
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
 
IoT and connected devices: an overview
IoT and connected devices: an overviewIoT and connected devices: an overview
IoT and connected devices: an overview
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance system
 
CoAP - Web Protocol for IoT
CoAP - Web Protocol for IoTCoAP - Web Protocol for IoT
CoAP - Web Protocol for IoT
 
connecting smart object in IoT.pptx
connecting smart object in IoT.pptxconnecting smart object in IoT.pptx
connecting smart object in IoT.pptx
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Smart shopping system using rfid
Smart shopping system using rfidSmart shopping system using rfid
Smart shopping system using rfid
 

Andere mochten auch

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
Dmitri Shiryaev
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Vala Afshar
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
guestbed1dd
 

Andere mochten auch (20)

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applications
 
Intro to IoT-23Sep2015
Intro to IoT-23Sep2015Intro to IoT-23Sep2015
Intro to IoT-23Sep2015
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
I International Workshop RFID and IoT - Dia 20 - RFID Radio Regulations and I...
 
Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology Best Practices for Marketing IoT and RFID Technology
Best Practices for Marketing IoT and RFID Technology
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
Xirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSysXirrus - Digital Transformation event 29 feb - EuroSys
Xirrus - Digital Transformation event 29 feb - EuroSys
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Ähnlich wie Internet of Things and its Enabling Technologies - RFID

5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
ijasuc
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
eSAT Journals
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
Bharath Chapala
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsm
ramesh chatty
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
Editor IJARCET
 

Ähnlich wie Internet of Things and its Enabling Technologies - RFID (20)

Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
Co4301524529
Co4301524529Co4301524529
Co4301524529
 
Rfid3
Rfid3Rfid3
Rfid3
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsm
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Internet of Things and its Enabling Technologies - RFID

  • 1. Internet of Things - Enabling Technologies RFID -By Swetha Kogatam SJSU ID : 009439339
  • 2. RFID technology and its applications in Internet of Things (IoT) Authors : -Xiaolin Jia, Quanyuan Feng , Taihua Fan, Quanshui Lei ; -School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China; -School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China Published in: Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference Date of Conference : 21-23 April 2012 Conference Location : Yichang Publisher: IEEE
  • 3. What is RFID ? Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identity objects, record metadata or control individual target through radio waves. The RFID technology was first appeared in 1945, as an espionage tool for the Soviet Union. Main Advantage: Is the automated identification and data capture that promises wholesale changes across a broad spectrum of business activities and aims to reduce the cost of the already used systems such as bar codes. 3
  • 4. RFID consists of 1. Tags (transmitters/ responders) : The tag is a microchip connected with an antenna, which can be attached to an object as the identifier of the object. 2. Readers (transmitters / receivers) : The RFID reader communicates with the RFID tag using radio waves.
  • 5. RFID & IOT When the RFID readers abided by appropriate communication protocols are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT). IOT first became popular through the Auto-ID Center and related market analysts publications and RFID is often seen as a prerequisite for the IOT.
  • 6. IOT ARCHITECTURE The IOT system architecture is generally divided into three layers: 1. the perception layer, 2. the network layer, 3. the service layer (or application layer)
  • 7. 1. Perception layer is the information origin and the core layer of IOT. All kinds of information of the physical world used in IOT are perceived and collected in this layer Ex : wireless sensors network (WSN), tags and reader-writers etc. 2. Network layer also called as transport layer, includes access network and core network, provides transparent data transmission capability. The information from perception layer can be sent to the upper layer using existing mobile communication network. 3. Service layer also called application layer, includes data management sub-layer and application service sub-layer.  The data management sub-layer provides processing complex data and uncertain information
  • 8. RFID System RFID systems are composed of three main components: 1. RFID tags 2. RFID reader 3. Application system RFID tags have the following essential components in common: antenna, integrated circuit, printed circuit board 8
  • 9. RFID Tag Also known as transponders (transmitter/responder), are attached to the objects to count or identify. Tags could be either active or passive. The main responsibility of antenna of RFID tag is to transmit and receive radio waves for the purpose of communication. The antenna is also known as the coupling mechanism, which can transform the energy in the form of electromagnetic radiation. This is the way the tag and reader communicating each other. The integrated circuit (IC) is a packaged collection of discrete components that provide the brains for the tag and transmit the tag’s unique identifier (ID). The printed circuit board (PCB) is the material that holds the tag together. The circuit board may be rigid or flexible, and is composed of many different types of materials, depending on the type and purpose of the tag. 9
  • 10. Tags are built to comply with a categorization called a class. EPCglobal has defined six classifications for RFID tags (0 to 5) Class 0/class 1: These classes provide the basic radio frequency (RF) passive capability. Class 0 is factory-programmed. Beyond class 0, including class 1, the tags are user-programmable. Class 2: Additional functionality is added, which includes encryption and read-write RF memory Class 3: Batteries are found on board that will power logic in the computer circuit. Class 3 provides longer range and broadband communications Class 4: Active tags are part of the definition of class 4 tags. Peer-to-peer communications and additional sensing arc also included. Class 5: Class 5 tags contain enough power to activate other tags and could be effectively classified as a reader
  • 11. RFID Reader The reader is responsible for orchestrating the communication with any tags in its read range and then presenting the tags’ data to an application that can make use of the data. Main functions are to  activate the tags,  structure the communication sequence with the tag and  transfer data between the application software and tags Readers in all systems can be reduced to two fundamental functional blocks: 1. Control system and 2. High frequency (HF) interface 11
  • 12. HF interface performs the following functions : 1.Generation of high frequency transmission power to activate the transponder and supply it with power; 2.Modulation of the transmission signal to send data to the transponder; 3.Reception and demodulation of HF signals transmitted by a transponder.
  • 13. Control unit performs the following functions: 1.Communication with the application software and the execution of commands from the application software; 2.Signal coding and decoding. In more complex systems the following additional functions are available 3.Execution of an anti-collision algorithm; 4.Encryption and decryption of the data to be transferred between transponder and reader; 5.Performance of authentication between transponder and reader. 6.Control of the communication with a transponder Application system: Also called data processing system, can be an application or database, depending on the application Application software initiates all readers and tags activities 13
  • 14. Evolution of IOT The evolution of IOT is coinciding with that of RFID and sensor technologies. RFID technology is a very important and fundamental groundwork for IOT. 14
  • 15. CHALLENGES & CONCLUSION Collision Problems Security and Privacy Concerns Other Challenges Cost , Design & Integration into existing systems CONCLUSION • The IOT uses a variety of information sensing identification device and information processing equipment, such as RFID, WSN, GPRS, etc. combining with the Internet to form an extensive network in order to informationize and intelligentize the entities or objects. • This paper analyzes the applications and challenges of RFID technology, which is the important and foundational component of IOT. 15