SlideShare ist ein Scribd-Unternehmen logo
1 von 22
RFID STANDS FOR….
RADIO
FREQUENCY
IDENTIFICATION
GSM STANDS FOR ……
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
“We need technology in every classroom and in
every student and teacher’s hand because it is the
pen and paper of our time,and it’s the lens through
which we experience much of this world” –David
Warlick
1. About RFID
KEY COMPONENT TO BE USED FOR CLASS ATTENDANCE
A) An RFID Tag
b) An RFID Antenna
C) An RFID Reader
D)GSM MODULE
e) An RFID Station/PC
AN RFID TAG
An RFID Tag are made of :-
1)Chip :- Hold information about physical object
2)Antenna :-Transmit signal at radio frequency
3)Package :-encase chips and antenna so that
tag can be attached to physical object
Tag are
Active Tag Passive Tag
Power –Battery Power-No(get from reader
through mutual inductance)
Signal –stronger Signal –Weaker
Range-100 feet Range-upto 30 feet
NOTE :- These cards are known as proximity card
AN RFID READER
An RFID Reader is a device used to gather data
information from an rfid tag,which is used to track
individual objects.Radio waves are used to transfer
data to RFID reader from an rfid tag
Transfer of energy from one circuit[READER] to
another[CARD] by mean of electromagnetic
waves at Radio frequency through mutual inductance
INTRODUCTION
GSM is a 2nd generation[2-G] cellular standard
developed to cater voice services and data delivery
using time division
multiplication access[TDMA]
GSM SERVICES
Tele services :-Includes mobile phones and emergency
calls etc.
data services :-Includes SMS(short messge
service),Fax,voice mail,electronic-mail.
Supplementary service:-I/C&O/G calls,call forwarding,call
holding,call waiting,conference etc.
1.)Communication :-mobile,wireless
communication,support for voice and data services
2.)Total mobility :-International access,chip-card enables use
of access points of different providers
3.)World wide connectivity :-one number,the network
handles every location
4.)High capacity :-better frequency efficient,smaller cells
more,customer per cell
5.)High transmission capacity :-High audio quality and
reliability for wireless,uninterrupted phone calls at higher
sppeds(e.g.,from cars and trains)
ADVANTAGE OF GSM
IMAGE VIEW OF THE GSM
RFID BASED ATTENDANCE SYSTEM
FLOW CHART
COMPLETE BLOCK DIAGRAM OF CAS
1.)Proxy attendance can be caught.
2.)Hardcopy paper work of attendandacesheet is
reduced
3.)Data can be stored long time compare to attendance
sheets.
ADVANTAGE
RFID V/S BAR CODE COMPARISON
RFID and BAR Codes are similar in that they are both data
collection technologies,meaning they automate the
process of collecting data.
Line of sight Not required (In most cases) Required
Read Range Passive UHF RFID :
-upto 40 feet(fixed readers)
-upto 20 feet(handheld readers)
Active RFID :
-upto 100’s feet or more
Several inches upto
several feets.
Read Rate 10’s,100’s,or 1000’s simultaneously Only one at a time
Identification Can uniquely identify each item
/asset tagged
Most barcodes only
identify the type of
item(UPC code)but
not uniquely
Read/Write Many RFID tags are Read/Write Read only
Technology RF(Radio frequency) Optical(LASER)
Interference Like TSA(Transportation security
administration),same RFID
frequencies don’t like metal and
liquids.They can interference with
same RF frequencies
Obstructed barcodes
cannot be read(dirt
covering barcode,torn
barcode,etc).
Automation Most “fixed” readers don’t require
human involvement to collect
data(automated)
Most barcode
scanners require a
human to
operate(labor
intensive)
OTHER APPLICATION ARE
1.)people tracking
2.)Document tracking
3.)Health care
4.)Manufacturing
5.)Department of road transportation and
highways
6.)Center for railway information system
7.)Apparel tracking
8.)Laptop tracking
PROS AND CONS
PROS CONS
-RFID tags are very simple to
install/inject inside the body of
animal,thus helping to keep tract on
them.
-Expensiveness of technology than Bar
code
-The RFID tags can store data upto 2kb.
-The RFID technology can not be easily
replicated and therefore,it increases
the security of the product.
Collision :
-signals can ‘collide’when multiple
signals are read at once
-Those signals are either lost or read
with errors
-mobility -failure
-Unlimited scope -still evolving
-reduced human intervention
CONCLUSION
+RFID Is helpful in tracking assets–human
and machine
+Used in inventory control
+Scope limited by imagination of its
implementation
FUTURE PROSPECTS
+Can be extended to embedded system
Ex:-so the RFID chip can be embedded within the
laptop for tracking
+Application software can be made web based
Rfid and gsm based cas

Weitere ähnliche Inhalte

Was ist angesagt?

Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakornn7046
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance systemA Jay Vardhan
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfidMandar Jagtap
 
Rfid based attendance sytem
Rfid based attendance sytemRfid based attendance sytem
Rfid based attendance sytemPiyush Saini
 
Rfid in construction
Rfid in constructionRfid in construction
Rfid in constructionArjun C Babu
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identificationharoonahmed0044
 
Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFIDYudhi Irawan
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemShahrikh Khan
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentationAkash Maurya
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMSuvendu Kumar Dash
 
RFID BASED SMART CARD READER
RFID BASED SMART CARD READERRFID BASED SMART CARD READER
RFID BASED SMART CARD READERbharath405
 

Was ist angesagt? (20)

Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakor
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
 
Rfid report
Rfid reportRfid report
Rfid report
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
 
Rfid based attendance sytem
Rfid based attendance sytemRfid based attendance sytem
Rfid based attendance sytem
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 
Rfid in construction
Rfid in constructionRfid in construction
Rfid in construction
 
RFID BASED ATTENDANCE SYSTEM.pptx
RFID BASED ATTENDANCE SYSTEM.pptxRFID BASED ATTENDANCE SYSTEM.pptx
RFID BASED ATTENDANCE SYSTEM.pptx
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
RFID & IOT
RFID & IOTRFID & IOT
RFID & IOT
 
Basics Of Rfid Technology
Basics Of Rfid TechnologyBasics Of Rfid Technology
Basics Of Rfid Technology
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFID
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin System
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
What is rfid
What is rfidWhat is rfid
What is rfid
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control system
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEM
 
RFID BASED SMART CARD READER
RFID BASED SMART CARD READERRFID BASED SMART CARD READER
RFID BASED SMART CARD READER
 

Ähnlich wie Rfid and gsm based cas

rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxRohithTopula
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.pptSaba651353
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationSudip Gupta
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Rfid technology
Rfid technologyRfid technology
Rfid technologyDeepak Raj
 
RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food SystemsMohsinAga1
 
Introduction to Radio Frequency Identification deviceD
Introduction to Radio Frequency Identification deviceDIntroduction to Radio Frequency Identification deviceD
Introduction to Radio Frequency Identification deviceDrangerboss2890
 

Ähnlich wie Rfid and gsm based cas (20)

rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptx
 
rohith.pptx
rohith.pptxrohith.pptx
rohith.pptx
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
 
RFiD
RFiDRFiD
RFiD
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
RFID
RFIDRFID
RFID
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Emec
EmecEmec
Emec
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Rfid Basics Qed
Rfid Basics QedRfid Basics Qed
Rfid Basics Qed
 
RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food Systems
 
Introduction to Radio Frequency Identification deviceD
Introduction to Radio Frequency Identification deviceDIntroduction to Radio Frequency Identification deviceD
Introduction to Radio Frequency Identification deviceD
 

Kürzlich hochgeladen

Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 

Kürzlich hochgeladen (20)

Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 

Rfid and gsm based cas

  • 1.
  • 2. RFID STANDS FOR…. RADIO FREQUENCY IDENTIFICATION GSM STANDS FOR …… GLOBAL SYSTEM FOR MOBILE COMMUNICATION “We need technology in every classroom and in every student and teacher’s hand because it is the pen and paper of our time,and it’s the lens through which we experience much of this world” –David Warlick
  • 3.
  • 5. KEY COMPONENT TO BE USED FOR CLASS ATTENDANCE A) An RFID Tag b) An RFID Antenna C) An RFID Reader D)GSM MODULE e) An RFID Station/PC
  • 7. An RFID Tag are made of :- 1)Chip :- Hold information about physical object 2)Antenna :-Transmit signal at radio frequency 3)Package :-encase chips and antenna so that tag can be attached to physical object Tag are Active Tag Passive Tag Power –Battery Power-No(get from reader through mutual inductance) Signal –stronger Signal –Weaker Range-100 feet Range-upto 30 feet NOTE :- These cards are known as proximity card
  • 8. AN RFID READER An RFID Reader is a device used to gather data information from an rfid tag,which is used to track individual objects.Radio waves are used to transfer data to RFID reader from an rfid tag
  • 9. Transfer of energy from one circuit[READER] to another[CARD] by mean of electromagnetic waves at Radio frequency through mutual inductance
  • 10. INTRODUCTION GSM is a 2nd generation[2-G] cellular standard developed to cater voice services and data delivery using time division multiplication access[TDMA] GSM SERVICES Tele services :-Includes mobile phones and emergency calls etc. data services :-Includes SMS(short messge service),Fax,voice mail,electronic-mail. Supplementary service:-I/C&O/G calls,call forwarding,call holding,call waiting,conference etc.
  • 11.
  • 12. 1.)Communication :-mobile,wireless communication,support for voice and data services 2.)Total mobility :-International access,chip-card enables use of access points of different providers 3.)World wide connectivity :-one number,the network handles every location 4.)High capacity :-better frequency efficient,smaller cells more,customer per cell 5.)High transmission capacity :-High audio quality and reliability for wireless,uninterrupted phone calls at higher sppeds(e.g.,from cars and trains) ADVANTAGE OF GSM
  • 13. IMAGE VIEW OF THE GSM
  • 17. 1.)Proxy attendance can be caught. 2.)Hardcopy paper work of attendandacesheet is reduced 3.)Data can be stored long time compare to attendance sheets. ADVANTAGE RFID V/S BAR CODE COMPARISON RFID and BAR Codes are similar in that they are both data collection technologies,meaning they automate the process of collecting data.
  • 18. Line of sight Not required (In most cases) Required Read Range Passive UHF RFID : -upto 40 feet(fixed readers) -upto 20 feet(handheld readers) Active RFID : -upto 100’s feet or more Several inches upto several feets. Read Rate 10’s,100’s,or 1000’s simultaneously Only one at a time Identification Can uniquely identify each item /asset tagged Most barcodes only identify the type of item(UPC code)but not uniquely Read/Write Many RFID tags are Read/Write Read only Technology RF(Radio frequency) Optical(LASER) Interference Like TSA(Transportation security administration),same RFID frequencies don’t like metal and liquids.They can interference with same RF frequencies Obstructed barcodes cannot be read(dirt covering barcode,torn barcode,etc). Automation Most “fixed” readers don’t require human involvement to collect data(automated) Most barcode scanners require a human to operate(labor intensive)
  • 19. OTHER APPLICATION ARE 1.)people tracking 2.)Document tracking 3.)Health care 4.)Manufacturing 5.)Department of road transportation and highways 6.)Center for railway information system 7.)Apparel tracking 8.)Laptop tracking
  • 20. PROS AND CONS PROS CONS -RFID tags are very simple to install/inject inside the body of animal,thus helping to keep tract on them. -Expensiveness of technology than Bar code -The RFID tags can store data upto 2kb. -The RFID technology can not be easily replicated and therefore,it increases the security of the product. Collision : -signals can ‘collide’when multiple signals are read at once -Those signals are either lost or read with errors -mobility -failure -Unlimited scope -still evolving -reduced human intervention
  • 21. CONCLUSION +RFID Is helpful in tracking assets–human and machine +Used in inventory control +Scope limited by imagination of its implementation FUTURE PROSPECTS +Can be extended to embedded system Ex:-so the RFID chip can be embedded within the laptop for tracking +Application software can be made web based