SlideShare ist ein Scribd-Unternehmen logo
1 von 39
MODULE 2: RFID
TECHNOLOGY
CO2: Identify the
different
technology
CONTENTS
★Introduction
★Principle of RFID
★Components of RFID system:
●RFID tag
●Reader
●RFID middleware
★Issues
INTRODUCTION
★RFID stands for Radio Frequency
Identification
★This rapidly-growing technology transmits
information wirelessly, through the use of radio
waves.
★RFID requires using a device known as a
reader.
★The reader device contains an antenna and a
small chip to transmit information via the radio-
INTRODUCTION
★Radio Frequency Identification (RFID) is a method that is
used to track or identify an object by radio transmission uses
over the web.
★Data digitally encoded in an RFID tag which might be read by
the reader.
★This is device work as a tag or label during which data read
from tags that are stored in the database through the reader
as compared to traditional barcodes and QR codes.
★It is often read outside the road of sight either passive or
active RFID.
INTRODUCTION
KINDS OF RFID
★There are many kinds of RFID, each with different
properties
★Most RFID tags have neither an electric plug nor a
battery.
★All of the energy needed to operate them is
supplied in the form of radio waves by RFID readers.
★This technology is called passive RFID to
distinguish it from the(less common) active RFID in
which there is a power source on the tag.
KINDS OF RFID
UHF RHID ( Ultra-High Frequency RFID ). It is used on
shipping pallets and some driver’s licenses. Readers send
signals in the 902-928 MHz band. Tags communicate at
distances of several meters by changing the way they reflect the
reader signals; the reader is able to pick up these reflections.
This way of operating is called backscatter.
HF RFID (High-Frequency RFID ). It operates at 13.56 MHz
and is likely to be in your passport, credit cards, books, and
noncontact payment systems. HF RFID has a short-range,
typically a meter or less because the physical mechanism is
based on induction rather than backscatter.
KINDS OF RFID
★There are also other forms of RFID using other frequencies,
such as LF RFID(Low-Frequency RFID), which was developed
before HF RFID and used for animal tracking
★There are two types of RFID :
○Passive RFID –
In this device, RF tags are not attached by a power supply and passive
RF tag stored their power. When it is emitted from active antennas and
the RF tag are used specific frequency like 125-134MHZ as low
frequency, 13.56MHZ as a high frequency and 856MHZ to 960MHZ as
ultra-high frequency.
○Active RFID –
In this device, RF tags are attached by a power supply that emits a
signal and there is an antenna which receives the data.
CLASSIFICATION OF RFID
SYSTEM
RFID System is classified into 2 Fields, Near Field RFID and Far Field RFID.
CLASSIFICATION OF RFID
SYSTEM
★Near Field RFID –
Near Field RFID has small, Omni-directional reader
antenna & tag read range between 5mm to 10cm
depending on frequency & antenna.
○Passive
★Far Field RFID –
Far Field RFID has resonant, directional antenna &
tag range that can reach up to 22.1m.
○Passive
○Active
RFID SYSTEM
★RFID System composed of RFID Reader & RFID Tags.
★RFID Reader –
It is a device used to communicate with RFID Tag which consists of one
or more antennas, used to emit radio waves & receive signals back, from
RFID Tag. The RFID reader is also called as interrogator as it used to
interrogate RFID Tag.
★RFID Tags –
RFID Tags consists of 2 parts:
○Integrated Circuit :
It is used for storing & processing data.
○Antenna :
It is used for transmitting receiving signal.
○Active Tag :
These have their own power supply and allows a read range of about 100 feet.
○Passive Tag :
A reader inductively gives power to Passive Tags as they don’t have their own power
supply. Passive Tags are most widely used Tag and their read range is approximately
30 feet.
WORKING PRINCIPLE OF RFID
★RFID uses radio waves to perform AIDC function.
★AIDC stands for Automatic Identification and Data
Capture technology which performs object identification
and collection and mapping of the data.
★An antenna is an device which converts power into
radio waves which are used for communication between
reader and tag. RFID readers retrieve the information
from RFID tag which detects the tag and reads or writes
the data into the tag.
★It may include one processor, package, storage and
transmitter and receiver unit.
WORKING PRINCIPLE OF RFID
FEATURES OF RFID
★An RFID tag consists of two-part
which is an microcircuit and an
antenna.
★This tag is covered by protective
material which acts as a shield against
the outer environment effect.
★This tag may active or passive in
which we mainly and widely used
passive RFID.
APPLICATION OF RFID
★It utilized in tracking shipping containers, trucks and
railroad, cars.
★It uses in Asset tracking.
★It utilized in credit-card shaped for access application.
★It uses in Personnel tracking.
★Controlling access to restricted areas.
★It uses ID badging.
★Supply chain management.
★Counterfeit prevention (e.g., in the pharmaceutical
industry).
APPLICATIONS OF RFID
★Document tracking.
★Controlling access to restricted areas
★Asset tracking
★Personnel tracking
★Inventory management
★ID badging
★Supply chain management
★Manufacturing
★Healthcare
ADVANTAGES OF RFID
★It provides data access and real-time information
without taking to much time.
★RFID tags follow the instruction and store a large
amount of information.
★The RFID system is non-line of sight nature of the
technology.
★It improves the Efficiency, traceability of production.
★In RFID hundred of tags read in a short time.
DISADVANTAGES OF RFID
★It takes longer to program RFID Devices.
★RFID intercepted easily even it is
Encrypted.
★In an RFID system, there are two or three
layers of ordinary household foil to dam the
radio wave.
★There is privacy concern about RFID
devices anybody can access information
about anything.
★Active RFID can costlier due to battery.
DIFFERENCE BETWEEN RFID
AND BARCODE
Radio-Frequency Identification (RFID) :
It is an acronym for “radio-frequency identification” and refers to science
whereby digital data encoded in RFID tags or smart labels are captured with
aid of a reader by radio waves. In RFID data from a tag or label are captured
via a gadget that stores data in a database. RFID, however, has quite a few
benefits over systems that use barcode asset monitoring software. The most
incredible is that RFID tag statistics can be examined outside line-of-sight.
An RFID tag incorporates a sensor connected to an antenna that allows
transmission of data to reader. Each sensor carries a unique identifier and
an RFID reader that can concurrently scan a lot of tags.
DIFFERENCE BETWEEN RFID
AND BARCODE
Barcode :
Barcode is a type of code which is machine-readable i.e. a machine-
code/machine language in structure of numbers and a pattern of parallel
lines of various widths, printed on a commodity and used specifically for
stock control. Barcoding makes use of a scanner with a beam of light to
“read” black and white traces of a barcode.
The scanner consists of a sensor that creates a signal from the mirrored or
reflected light, and a decoder then interprets sign into textual content and
sends it to a PC or database. Barcode scanners require line of sight and
ought to “see” every barcode one at a time in order to seize data.
S.No. RFID Barcode
1.
It is based totally on radio-
frequency.
It is primarily based on optical
technology.
2.
It does no longer require Line
of sight.
It requires Line of sight
because scanner must have an
unobstructed view and must
be oriented properly.
3.
It has greater data storage as in
contrast to barcodes.
It has much less data storage
up to solely 24 characters.
4.
Memory storage is possible in
RFID with assist of tags.
Memory storage is not
possible in barcodes.
5.
It is more resistant or durable
than a barcode.
It is much less resistant than
RFID.
6.
Several RFID tags can be
examined simultaneously i.e.
multiple read is allowed in
RFID.
Only a single barcode can be
scanned at a time i.e one card
can be read at a time.
7.
Read/write abilities using RFID
tags.
Barcode has totally reading
capabilities and can’t write
anything.
DIFFERENCE BETWEEN RFID
AND BARCODE
⮚RFID or Radio Frequency Identification is an automatic
identification method that uses wireless non-contact radio
frequency waves in which data is digitally encoded in RFID
tags or smart labels which can be read by reader through
radio waves.
⮚The transfer of data takes place between a reader and a
movable thing that can be identified & track. RFID can be
considered similar to barcodes as data read from tags are
stored in database or you can say device which captures
label’s data, stores data in a database.
DIFFERENCE BETWEEN RFID
AND BARCODE
⮚The major difference between barcodes or QR codes and
RFID is that RFID tag data can be read outside line-of-sight
whereas traditional barcodes can’t.
⮚RFID doesn’t require any physical contact between reader
or scanner and tagged item.
⮚There is a microchip placed inside a label which is used to
transfer data when label is exposed to radio waves.
⮚RFID tags are mainly used in industries for tracking
progress of a product.
RFID MIDDLEWARE
COMPONENTS
A RFID middleware is the interface that sits between the RFID hardware and
RFID applications. It provides the following advantages:
It hides the RFID hardware details from the applications;
It handles and processes the raw RFID data before passing it as aggregated
events to the applications;
It provides an application level interface for managing RFID readers and
querying the RFID data.
RFID MIDDLEWARE
COMPONENTS
⮚A layer of the RFID middleware incorporates all the device drivers of
different hardware and exposes to the application standard interfaces
to access this hardware.
⮚If the application was provided with all the device drivers of all
connected readers, it will be a hard job to manage and interface each
of the devices.
⮚The application developer will then need to understand all the
hardware specific internals and operations.
⮚Also, the application, if provided with the huge amount of raw tag
data reported by the readers, will find it very difficult to process the
data in real time.
⮚A RFID middleware provides a standardized way of dealing with this
flood of information, which processes the raw data and provides the
RFID MIDDLEWARE
COMPONENTS
As shown in figure RFID middleware is
generally composed of four major layers:
1. Reader Interface
2. Data Processor and Storage
3. Application Interface
4. Middleware Management
RFID MIDDLEWARE
COMPONENTS
RFID MIDDLEWARE
COMPONENTS
Reader interface
The reader interface is the lowest layer of the RFID middleware which
handles the interaction with the RFID hardware. It maintains the
device drivers of all the devices supported by the system, and
manages all the hardware related parameters like reader protocol, air
interface, and host-side communication.
Data processor and storage
The data processor and storage layer is responsible for processing
and storing the raw data coming from the readers. Examples of
processing logic carried by this layer are data filtering, aggregation,
and transformation. This layer also processes the data level events
associated with a specific application.
RFID MIDDLEWARE
COMPONENTS
Application interface
The application interface provides the application with an API to
access, communicate, and configure the RFID middleware. It
integrates the enterprise applications with the RFID middleware by
translating the applications’ requests to low level middleware
commands.
Middleware management
The middleware management layer helps managing the
configuration of the RFID middleware, and provides the following
capabilities:
⮚Add, configure, and modify connected RFID readers;
⮚Modify application level parameters such as filters, and duplicate
removal timing window;
⮚Add and remove services supported by the RFID middleware.
RFID MIDDLEWARE
COMPONENTS
⮚RFID readers are typically abstracted as a logical
reader which is either a collection of several readers
or a part of the reader.
⮚This grouping mechanism is used where there is a
need to have a set of readers capturing data from a
particular area such as a warehouse with many
loading docks.
⮚The advantage of this is that the application can
query a small number of logical readers rather than
having to aggregate events from each of the
individual readers.
RFID MIDDLEWARE
COMPONENTS
There are two standardized interaction models used to define the
communication between the middleware and the applications.
An application can operate at synchronous mode when requesting services
on demand or asynchronous mode when it registers for information to be
sent to it when certain conditions are met.
RFID middleware usually provide some kind of data filtering, because
sometimes it might be required to report only certain type and value of the
tag data to the application.
The application needs to provide a set of defined patterns to the middleware.
The middleware then allows only data that matches the pattern to be
reported to the application.
ISSUES: Technical problems with RFID
★ Problems with RFID Standards
 RFID has been implemented in different ways by different
manufacturers; global standards are still being worked on. It should be
noted that some RFID devices are never meant to leave their network
(as in the case of RFID tags used for inventory control within a
company). This can cause problems for companies.
 There are several guidelines and specifications for RFID technology,
but the main standards organizations are:
 International Organization for Standardization (ISO)
 Electronics Product Code Global Incorporated (EPCglobal)
 International Electrotechnical Commission (IEC)
 Each radio frequency has associated standards, including ISO 14223
and ISO/IEC 18000-2 for LF RFID, ISO 15693 and ISO/IEC 14443 for
HF RFID, and ISO 18000-6C for UHF RFID.
ISSUES: Technical problems
with RFID
★ RFID systems can be easily disrupted
○ Since RFID systems make use of the electromagnetic spectrum (like WiFi
networks or cellphones), they are relatively easy to jam using energy at
the right frequency. Although this would only be an inconvenience for
consumers in stores (longer waits at the checkout), it could be disastrous
in other environments where RFID is increasingly used, like hospitals or in
the military in the field.
○ Also, active RFID tags (those that use a battery to increase the range of
the system) can be repeatedly interrogated to wear the battery down,
disrupting the system.
ISSUES: Technical problems with
RFID
★ RFID Reader Collision
Reader collision occurs when the signals from two or more readers overlap. The
tag is unable to respond to simultaneous queries. Systems must be carefully set
up to avoid this problem; many systems use an anti-collision protocol (also
called a singulation protocol. Anti-collision protocols enable the tags to take
turns in transmitting to a reader. (http://www.technovelgy.com/ct/Technology-
Article.asp?ArtNum=58)
★ RFID Tag Collision
Tag collision occurs when many tags are present in a small area; but since the
read time is very fast, it is easier for vendors to develop systems that ensure
that tags respond one at a time. (http://www.technovelgy.com/ct/Technology-
Article.asp?ArtNum=57)
ISSUES: Security, privacy and ethics problems with RFID
The following problems with RFID tags and readers have been reported.
The contents of an RFID tag can be read after the item leaves the supply chain
An RFID tag cannot tell the difference between one reader and another. RFID scanners are very
portable; RFID tags can be read from a distance, from a few inches to a few yards. This allows anyone
to see the contents of your purse or pocket as you walk down the street. Some tags can be turned off
when the item has left the supply chain
RFID tags are difficult to remove
RFID tags are difficult to for consumers to remove; some are very small (less than a half-millimeter
square, and as thin as a sheet of paper) - others may be hidden or embedded inside a product where
consumers cannot see them. New technologies allow RFID tags to be "printed" right on a product and
may not be removable at all
RFID tags can be read without your knowledge
Since the tags can be read without being swiped or obviously scanned (as is the case with magnetic
strips or barcodes), anyone with an RFID tag reader can read the tags embedded in your clothes and
other consumer products without your knowledge. For example, you could be scanned before you enter
the store, just to see what you are carrying. You might then be approached by a clerk who knows what
you have in your backpack or purse, and can suggest accessories or other items.
ISSUES: Security, privacy and ethics problems with RFID
RFID tags can be read a greater distances with a high-gain antenna
For various reasons, RFID reader/tag systems are designed so that distance
between the tag and the reader is kept to a minimum (see the material on tag
collision above). However, a high-gain antenna can be used to read the tags
from much further away, leading to privacy problems.
RFID tags with unique serial numbers could be linked to an individual
credit card number
At present, the Universal Product Code (UPC) implemented with barcodes
allows each product sold in a store to have a unique number that identifies
that product. Work is proceeding on a global system of product identification
that would allow each individual item to have its own number. When the item
is scanned for purchase and is paid for, the RFID tag number for a particular
item can be associated with a credit card number.
Zombie RFID Tags
★ One of the main concerns with RFID tags is that their contents can be
read by anyone with an appropriately equipped scanner - even after you
take it out of the store.
★ One technology that has been suggested is a zombie RFID tag, a tag
that can be temporarily deactivated when it leaves the store. The process
would work like this: you bring your purchase up to the register, the RFID
scanner reads the item, you pay for it and as you leave the store, you
pass a special device that sends a signal to the RFID tag to "die." That is,
it is no longer readable.
★ The "zombie" element comes in when you bring an item back to the store.
A special device especially made for that kind of tag "re-animates" the
RFID tag, allowing the item to reenter the supply chain.
Next-Generation Uses of RFID
★ Some vendors have been combining RFID tags with sensors of
different kinds. This would allow the tag to report not simply the
same information over and over, but identifying information along
with current data picked up by the sensor.
★ For example, an RFID tag attached to a leg of lamb could report
on the temperature readings of the past 24 hours, to ensure that
the meat was properly kept cool.
★ Over time, the proportion of "scan-it-yourself" aisles in retail
stores will increase. Eventually, we may wind up with stores that
have mostly "scan-it-yourself" aisles and only a few checkout
stations for people who are disabled or unwilling.
Next-generation RFID use
RFID systems are becoming increasingly used to support internet of
things deployments. Combining the technology with smart sensors
and/or GPS technology enables sensor data including temperature,
movement and location to be wirelessly transmitted.

Weitere ähnliche Inhalte

Was ist angesagt?

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) Chetan Pandey
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFCMehvish Mushtaq
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io tKunal Bangar
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemMahmudul Hasan
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols Nagesh Rao
 
RFID
RFIDRFID
RFIDdont
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Shopping and automatic billing using rfid technology
Shopping and automatic billing using rfid technologyShopping and automatic billing using rfid technology
Shopping and automatic billing using rfid technologyIAEME Publication
 

Was ist angesagt? (20)

Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFC
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access System
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
RFID Shopping System
RFID Shopping SystemRFID Shopping System
RFID Shopping System
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
 
RFID
RFIDRFID
RFID
 
Introduction To LoRaWan
Introduction To LoRaWanIntroduction To LoRaWan
Introduction To LoRaWan
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Shopping and automatic billing using rfid technology
Shopping and automatic billing using rfid technologyShopping and automatic billing using rfid technology
Shopping and automatic billing using rfid technology
 

Ähnlich wie Ioe module 2

Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisSMO Clicks
 
Radio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfRadio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfarchiesgallery
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersPOXO RFID AUTOMATION
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its ImplentationSonal Tiwari
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working Niranjan
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
RFID based object detection
RFID based object detectionRFID based object detection
RFID based object detectionshahsamkit73
 

Ähnlich wie Ioe module 2 (20)

Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | Identis
 
Rfid
RfidRfid
Rfid
 
Rfid sourya cse
Rfid sourya cseRfid sourya cse
Rfid sourya cse
 
Radio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfRadio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdf
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID
RFIDRFID
RFID
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
RFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturersRFID readers in India - RFID manufacturers
RFID readers in India - RFID manufacturers
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its Implentation
 
RFID Sensor and Its Working
RFID  Sensor and Its Working RFID  Sensor and Its Working
RFID Sensor and Its Working
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
RFID based object detection
RFID based object detectionRFID based object detection
RFID based object detection
 
Rfid
RfidRfid
Rfid
 

Mehr von nikshaikh786

Module 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptxModule 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptxnikshaikh786
 
Module 1_ Introduction.pptx
Module 1_ Introduction.pptxModule 1_ Introduction.pptx
Module 1_ Introduction.pptxnikshaikh786
 
Module 1_ Introduction to Mobile Computing.pptx
Module 1_  Introduction to Mobile Computing.pptxModule 1_  Introduction to Mobile Computing.pptx
Module 1_ Introduction to Mobile Computing.pptxnikshaikh786
 
Module 2_ GSM Mobile services.pptx
Module 2_  GSM Mobile services.pptxModule 2_  GSM Mobile services.pptx
Module 2_ GSM Mobile services.pptxnikshaikh786
 
MODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptxMODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptxnikshaikh786
 
MODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptxMODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptxnikshaikh786
 
Module 3_ Classification.pptx
Module 3_ Classification.pptxModule 3_ Classification.pptx
Module 3_ Classification.pptxnikshaikh786
 
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...nikshaikh786
 
Module 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptxModule 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptxnikshaikh786
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxnikshaikh786
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
MODULE 5- EDA.pptx
MODULE 5- EDA.pptxMODULE 5- EDA.pptx
MODULE 5- EDA.pptxnikshaikh786
 
MODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptxMODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptxnikshaikh786
 
Module 3 - Time Series.pptx
Module 3 - Time Series.pptxModule 3 - Time Series.pptx
Module 3 - Time Series.pptxnikshaikh786
 
Module 2_ Regression Models..pptx
Module 2_ Regression Models..pptxModule 2_ Regression Models..pptx
Module 2_ Regression Models..pptxnikshaikh786
 
MODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxMODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxnikshaikh786
 
MAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdfMAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdfnikshaikh786
 
VIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdfVIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdfnikshaikh786
 

Mehr von nikshaikh786 (20)

Module 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptxModule 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptx
 
Module 1_ Introduction.pptx
Module 1_ Introduction.pptxModule 1_ Introduction.pptx
Module 1_ Introduction.pptx
 
Module 1_ Introduction to Mobile Computing.pptx
Module 1_  Introduction to Mobile Computing.pptxModule 1_  Introduction to Mobile Computing.pptx
Module 1_ Introduction to Mobile Computing.pptx
 
Module 2_ GSM Mobile services.pptx
Module 2_  GSM Mobile services.pptxModule 2_  GSM Mobile services.pptx
Module 2_ GSM Mobile services.pptx
 
MODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptxMODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptx
 
MODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptxMODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptx
 
DWM-MODULE 6.pdf
DWM-MODULE 6.pdfDWM-MODULE 6.pdf
DWM-MODULE 6.pdf
 
TCS MODULE 6.pdf
TCS MODULE 6.pdfTCS MODULE 6.pdf
TCS MODULE 6.pdf
 
Module 3_ Classification.pptx
Module 3_ Classification.pptxModule 3_ Classification.pptx
Module 3_ Classification.pptx
 
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
 
Module 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptxModule 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptx
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
MODULE 5- EDA.pptx
MODULE 5- EDA.pptxMODULE 5- EDA.pptx
MODULE 5- EDA.pptx
 
MODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptxMODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptx
 
Module 3 - Time Series.pptx
Module 3 - Time Series.pptxModule 3 - Time Series.pptx
Module 3 - Time Series.pptx
 
Module 2_ Regression Models..pptx
Module 2_ Regression Models..pptxModule 2_ Regression Models..pptx
Module 2_ Regression Models..pptx
 
MODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxMODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptx
 
MAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdfMAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdf
 
VIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdfVIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdf
 

Kürzlich hochgeladen

DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptNoman khan
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 

Kürzlich hochgeladen (20)

DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).ppt
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 

Ioe module 2

  • 1. MODULE 2: RFID TECHNOLOGY CO2: Identify the different technology
  • 2. CONTENTS ★Introduction ★Principle of RFID ★Components of RFID system: ●RFID tag ●Reader ●RFID middleware ★Issues
  • 3. INTRODUCTION ★RFID stands for Radio Frequency Identification ★This rapidly-growing technology transmits information wirelessly, through the use of radio waves. ★RFID requires using a device known as a reader. ★The reader device contains an antenna and a small chip to transmit information via the radio-
  • 4. INTRODUCTION ★Radio Frequency Identification (RFID) is a method that is used to track or identify an object by radio transmission uses over the web. ★Data digitally encoded in an RFID tag which might be read by the reader. ★This is device work as a tag or label during which data read from tags that are stored in the database through the reader as compared to traditional barcodes and QR codes. ★It is often read outside the road of sight either passive or active RFID.
  • 6. KINDS OF RFID ★There are many kinds of RFID, each with different properties ★Most RFID tags have neither an electric plug nor a battery. ★All of the energy needed to operate them is supplied in the form of radio waves by RFID readers. ★This technology is called passive RFID to distinguish it from the(less common) active RFID in which there is a power source on the tag.
  • 7. KINDS OF RFID UHF RHID ( Ultra-High Frequency RFID ). It is used on shipping pallets and some driver’s licenses. Readers send signals in the 902-928 MHz band. Tags communicate at distances of several meters by changing the way they reflect the reader signals; the reader is able to pick up these reflections. This way of operating is called backscatter. HF RFID (High-Frequency RFID ). It operates at 13.56 MHz and is likely to be in your passport, credit cards, books, and noncontact payment systems. HF RFID has a short-range, typically a meter or less because the physical mechanism is based on induction rather than backscatter.
  • 8. KINDS OF RFID ★There are also other forms of RFID using other frequencies, such as LF RFID(Low-Frequency RFID), which was developed before HF RFID and used for animal tracking ★There are two types of RFID : ○Passive RFID – In this device, RF tags are not attached by a power supply and passive RF tag stored their power. When it is emitted from active antennas and the RF tag are used specific frequency like 125-134MHZ as low frequency, 13.56MHZ as a high frequency and 856MHZ to 960MHZ as ultra-high frequency. ○Active RFID – In this device, RF tags are attached by a power supply that emits a signal and there is an antenna which receives the data.
  • 9. CLASSIFICATION OF RFID SYSTEM RFID System is classified into 2 Fields, Near Field RFID and Far Field RFID.
  • 10. CLASSIFICATION OF RFID SYSTEM ★Near Field RFID – Near Field RFID has small, Omni-directional reader antenna & tag read range between 5mm to 10cm depending on frequency & antenna. ○Passive ★Far Field RFID – Far Field RFID has resonant, directional antenna & tag range that can reach up to 22.1m. ○Passive ○Active
  • 11. RFID SYSTEM ★RFID System composed of RFID Reader & RFID Tags. ★RFID Reader – It is a device used to communicate with RFID Tag which consists of one or more antennas, used to emit radio waves & receive signals back, from RFID Tag. The RFID reader is also called as interrogator as it used to interrogate RFID Tag. ★RFID Tags – RFID Tags consists of 2 parts: ○Integrated Circuit : It is used for storing & processing data. ○Antenna : It is used for transmitting receiving signal. ○Active Tag : These have their own power supply and allows a read range of about 100 feet. ○Passive Tag : A reader inductively gives power to Passive Tags as they don’t have their own power supply. Passive Tags are most widely used Tag and their read range is approximately 30 feet.
  • 12. WORKING PRINCIPLE OF RFID ★RFID uses radio waves to perform AIDC function. ★AIDC stands for Automatic Identification and Data Capture technology which performs object identification and collection and mapping of the data. ★An antenna is an device which converts power into radio waves which are used for communication between reader and tag. RFID readers retrieve the information from RFID tag which detects the tag and reads or writes the data into the tag. ★It may include one processor, package, storage and transmitter and receiver unit.
  • 14. FEATURES OF RFID ★An RFID tag consists of two-part which is an microcircuit and an antenna. ★This tag is covered by protective material which acts as a shield against the outer environment effect. ★This tag may active or passive in which we mainly and widely used passive RFID.
  • 15. APPLICATION OF RFID ★It utilized in tracking shipping containers, trucks and railroad, cars. ★It uses in Asset tracking. ★It utilized in credit-card shaped for access application. ★It uses in Personnel tracking. ★Controlling access to restricted areas. ★It uses ID badging. ★Supply chain management. ★Counterfeit prevention (e.g., in the pharmaceutical industry).
  • 16. APPLICATIONS OF RFID ★Document tracking. ★Controlling access to restricted areas ★Asset tracking ★Personnel tracking ★Inventory management ★ID badging ★Supply chain management ★Manufacturing ★Healthcare
  • 17. ADVANTAGES OF RFID ★It provides data access and real-time information without taking to much time. ★RFID tags follow the instruction and store a large amount of information. ★The RFID system is non-line of sight nature of the technology. ★It improves the Efficiency, traceability of production. ★In RFID hundred of tags read in a short time.
  • 18. DISADVANTAGES OF RFID ★It takes longer to program RFID Devices. ★RFID intercepted easily even it is Encrypted. ★In an RFID system, there are two or three layers of ordinary household foil to dam the radio wave. ★There is privacy concern about RFID devices anybody can access information about anything. ★Active RFID can costlier due to battery.
  • 19. DIFFERENCE BETWEEN RFID AND BARCODE Radio-Frequency Identification (RFID) : It is an acronym for “radio-frequency identification” and refers to science whereby digital data encoded in RFID tags or smart labels are captured with aid of a reader by radio waves. In RFID data from a tag or label are captured via a gadget that stores data in a database. RFID, however, has quite a few benefits over systems that use barcode asset monitoring software. The most incredible is that RFID tag statistics can be examined outside line-of-sight. An RFID tag incorporates a sensor connected to an antenna that allows transmission of data to reader. Each sensor carries a unique identifier and an RFID reader that can concurrently scan a lot of tags.
  • 20. DIFFERENCE BETWEEN RFID AND BARCODE Barcode : Barcode is a type of code which is machine-readable i.e. a machine- code/machine language in structure of numbers and a pattern of parallel lines of various widths, printed on a commodity and used specifically for stock control. Barcoding makes use of a scanner with a beam of light to “read” black and white traces of a barcode. The scanner consists of a sensor that creates a signal from the mirrored or reflected light, and a decoder then interprets sign into textual content and sends it to a PC or database. Barcode scanners require line of sight and ought to “see” every barcode one at a time in order to seize data.
  • 21. S.No. RFID Barcode 1. It is based totally on radio- frequency. It is primarily based on optical technology. 2. It does no longer require Line of sight. It requires Line of sight because scanner must have an unobstructed view and must be oriented properly. 3. It has greater data storage as in contrast to barcodes. It has much less data storage up to solely 24 characters. 4. Memory storage is possible in RFID with assist of tags. Memory storage is not possible in barcodes. 5. It is more resistant or durable than a barcode. It is much less resistant than RFID. 6. Several RFID tags can be examined simultaneously i.e. multiple read is allowed in RFID. Only a single barcode can be scanned at a time i.e one card can be read at a time. 7. Read/write abilities using RFID tags. Barcode has totally reading capabilities and can’t write anything.
  • 22. DIFFERENCE BETWEEN RFID AND BARCODE ⮚RFID or Radio Frequency Identification is an automatic identification method that uses wireless non-contact radio frequency waves in which data is digitally encoded in RFID tags or smart labels which can be read by reader through radio waves. ⮚The transfer of data takes place between a reader and a movable thing that can be identified & track. RFID can be considered similar to barcodes as data read from tags are stored in database or you can say device which captures label’s data, stores data in a database.
  • 23. DIFFERENCE BETWEEN RFID AND BARCODE ⮚The major difference between barcodes or QR codes and RFID is that RFID tag data can be read outside line-of-sight whereas traditional barcodes can’t. ⮚RFID doesn’t require any physical contact between reader or scanner and tagged item. ⮚There is a microchip placed inside a label which is used to transfer data when label is exposed to radio waves. ⮚RFID tags are mainly used in industries for tracking progress of a product.
  • 24. RFID MIDDLEWARE COMPONENTS A RFID middleware is the interface that sits between the RFID hardware and RFID applications. It provides the following advantages: It hides the RFID hardware details from the applications; It handles and processes the raw RFID data before passing it as aggregated events to the applications; It provides an application level interface for managing RFID readers and querying the RFID data.
  • 25. RFID MIDDLEWARE COMPONENTS ⮚A layer of the RFID middleware incorporates all the device drivers of different hardware and exposes to the application standard interfaces to access this hardware. ⮚If the application was provided with all the device drivers of all connected readers, it will be a hard job to manage and interface each of the devices. ⮚The application developer will then need to understand all the hardware specific internals and operations. ⮚Also, the application, if provided with the huge amount of raw tag data reported by the readers, will find it very difficult to process the data in real time. ⮚A RFID middleware provides a standardized way of dealing with this flood of information, which processes the raw data and provides the
  • 26. RFID MIDDLEWARE COMPONENTS As shown in figure RFID middleware is generally composed of four major layers: 1. Reader Interface 2. Data Processor and Storage 3. Application Interface 4. Middleware Management
  • 28. RFID MIDDLEWARE COMPONENTS Reader interface The reader interface is the lowest layer of the RFID middleware which handles the interaction with the RFID hardware. It maintains the device drivers of all the devices supported by the system, and manages all the hardware related parameters like reader protocol, air interface, and host-side communication. Data processor and storage The data processor and storage layer is responsible for processing and storing the raw data coming from the readers. Examples of processing logic carried by this layer are data filtering, aggregation, and transformation. This layer also processes the data level events associated with a specific application.
  • 29. RFID MIDDLEWARE COMPONENTS Application interface The application interface provides the application with an API to access, communicate, and configure the RFID middleware. It integrates the enterprise applications with the RFID middleware by translating the applications’ requests to low level middleware commands. Middleware management The middleware management layer helps managing the configuration of the RFID middleware, and provides the following capabilities: ⮚Add, configure, and modify connected RFID readers; ⮚Modify application level parameters such as filters, and duplicate removal timing window; ⮚Add and remove services supported by the RFID middleware.
  • 30. RFID MIDDLEWARE COMPONENTS ⮚RFID readers are typically abstracted as a logical reader which is either a collection of several readers or a part of the reader. ⮚This grouping mechanism is used where there is a need to have a set of readers capturing data from a particular area such as a warehouse with many loading docks. ⮚The advantage of this is that the application can query a small number of logical readers rather than having to aggregate events from each of the individual readers.
  • 31. RFID MIDDLEWARE COMPONENTS There are two standardized interaction models used to define the communication between the middleware and the applications. An application can operate at synchronous mode when requesting services on demand or asynchronous mode when it registers for information to be sent to it when certain conditions are met. RFID middleware usually provide some kind of data filtering, because sometimes it might be required to report only certain type and value of the tag data to the application. The application needs to provide a set of defined patterns to the middleware. The middleware then allows only data that matches the pattern to be reported to the application.
  • 32. ISSUES: Technical problems with RFID ★ Problems with RFID Standards  RFID has been implemented in different ways by different manufacturers; global standards are still being worked on. It should be noted that some RFID devices are never meant to leave their network (as in the case of RFID tags used for inventory control within a company). This can cause problems for companies.  There are several guidelines and specifications for RFID technology, but the main standards organizations are:  International Organization for Standardization (ISO)  Electronics Product Code Global Incorporated (EPCglobal)  International Electrotechnical Commission (IEC)  Each radio frequency has associated standards, including ISO 14223 and ISO/IEC 18000-2 for LF RFID, ISO 15693 and ISO/IEC 14443 for HF RFID, and ISO 18000-6C for UHF RFID.
  • 33. ISSUES: Technical problems with RFID ★ RFID systems can be easily disrupted ○ Since RFID systems make use of the electromagnetic spectrum (like WiFi networks or cellphones), they are relatively easy to jam using energy at the right frequency. Although this would only be an inconvenience for consumers in stores (longer waits at the checkout), it could be disastrous in other environments where RFID is increasingly used, like hospitals or in the military in the field. ○ Also, active RFID tags (those that use a battery to increase the range of the system) can be repeatedly interrogated to wear the battery down, disrupting the system.
  • 34. ISSUES: Technical problems with RFID ★ RFID Reader Collision Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem; many systems use an anti-collision protocol (also called a singulation protocol. Anti-collision protocols enable the tags to take turns in transmitting to a reader. (http://www.technovelgy.com/ct/Technology- Article.asp?ArtNum=58) ★ RFID Tag Collision Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time. (http://www.technovelgy.com/ct/Technology- Article.asp?ArtNum=57)
  • 35. ISSUES: Security, privacy and ethics problems with RFID The following problems with RFID tags and readers have been reported. The contents of an RFID tag can be read after the item leaves the supply chain An RFID tag cannot tell the difference between one reader and another. RFID scanners are very portable; RFID tags can be read from a distance, from a few inches to a few yards. This allows anyone to see the contents of your purse or pocket as you walk down the street. Some tags can be turned off when the item has left the supply chain RFID tags are difficult to remove RFID tags are difficult to for consumers to remove; some are very small (less than a half-millimeter square, and as thin as a sheet of paper) - others may be hidden or embedded inside a product where consumers cannot see them. New technologies allow RFID tags to be "printed" right on a product and may not be removable at all RFID tags can be read without your knowledge Since the tags can be read without being swiped or obviously scanned (as is the case with magnetic strips or barcodes), anyone with an RFID tag reader can read the tags embedded in your clothes and other consumer products without your knowledge. For example, you could be scanned before you enter the store, just to see what you are carrying. You might then be approached by a clerk who knows what you have in your backpack or purse, and can suggest accessories or other items.
  • 36. ISSUES: Security, privacy and ethics problems with RFID RFID tags can be read a greater distances with a high-gain antenna For various reasons, RFID reader/tag systems are designed so that distance between the tag and the reader is kept to a minimum (see the material on tag collision above). However, a high-gain antenna can be used to read the tags from much further away, leading to privacy problems. RFID tags with unique serial numbers could be linked to an individual credit card number At present, the Universal Product Code (UPC) implemented with barcodes allows each product sold in a store to have a unique number that identifies that product. Work is proceeding on a global system of product identification that would allow each individual item to have its own number. When the item is scanned for purchase and is paid for, the RFID tag number for a particular item can be associated with a credit card number.
  • 37. Zombie RFID Tags ★ One of the main concerns with RFID tags is that their contents can be read by anyone with an appropriately equipped scanner - even after you take it out of the store. ★ One technology that has been suggested is a zombie RFID tag, a tag that can be temporarily deactivated when it leaves the store. The process would work like this: you bring your purchase up to the register, the RFID scanner reads the item, you pay for it and as you leave the store, you pass a special device that sends a signal to the RFID tag to "die." That is, it is no longer readable. ★ The "zombie" element comes in when you bring an item back to the store. A special device especially made for that kind of tag "re-animates" the RFID tag, allowing the item to reenter the supply chain.
  • 38. Next-Generation Uses of RFID ★ Some vendors have been combining RFID tags with sensors of different kinds. This would allow the tag to report not simply the same information over and over, but identifying information along with current data picked up by the sensor. ★ For example, an RFID tag attached to a leg of lamb could report on the temperature readings of the past 24 hours, to ensure that the meat was properly kept cool. ★ Over time, the proportion of "scan-it-yourself" aisles in retail stores will increase. Eventually, we may wind up with stores that have mostly "scan-it-yourself" aisles and only a few checkout stations for people who are disabled or unwilling.
  • 39. Next-generation RFID use RFID systems are becoming increasingly used to support internet of things deployments. Combining the technology with smart sensors and/or GPS technology enables sensor data including temperature, movement and location to be wirelessly transmitted.