Anda di halaman 1dari 37

V Radio Frequency Identification (RFID) is an

automatic identification method, relying on


storing and remotely retrieving data using
devices called RFID tags or transponders .
An RFID tag is an object that can be
attached to or incorporated into a product,
animal, or person for the purpose of
identification using radiowaves.
V It is a technology that uses radio waves to transmit key information over distances
(between reader and a movable item) to identify, categorize and track.

V It is grouped under the more generic AIDC technologies.

V It is also called DSRC (Dedicated Short Range Communication).

V This information describes the identity, location and / or condition of any physical object.

V The tags consist of a silicon chip(0.4mm^2) and an antenna that transmits it to a receiving
device, referred to as a reader.

V Every country can set its own rules for determining the frequency of operation of RFID.
Decade Event

V x  x Radar refined and used, major World War II development effort.
RFID invented in 1948.

V x  x Early explorations of RFID technology, laboratory experiments.

V x  x Development of the theory of RFID. Start of applications field trials.

V x  x
Explosion of RFID development.Tests of RFID accelerate.Very early
adopter implementations of RFID.

V x
 x Commercial applications of RFID enter mainstream.

V x  Emergence of standards. RFID widely deployed. RFID becomes a


part of everyday life.
V RFID cards are also known as "proximity" or ´
proxy " cards and come in three general
varieties : Ú , Ú (or  ) and
.

V Active and passive tags are different technologies.


While both use radio frequency energy to
communicate between a tag and reader , the
method of powering the tags is different.But the
amount of power used is small.
V Active RFID tags use internal power source (battery) within
the tag to continuously power the tag , its RF
communication circuitry and generate the outgoing signal.
Also called ´beaconsµ because they broadcast their own
signal.

V Passive tags rely on RF energy transferred from the reader


to tag to power the tag . They have no internal power supply
.The minute electrical current induced in the antenna by
the incoming radio frequency signal provides enough power
for the CMOS integrated ckt in the tag to power up, transmit
a response and then go back to sleep . Most passive tags
signal by backscattering the carrier signal from the reader.
This means that the aerial has to be designed to both collect
power from the incoming signal and also to transmit the
outbound backscatter signal.
V ave longer range and are expensive
V Possess larger memories (1MB) and have better noise immunity
V ave the ability to store information sent by the trans-receiver.

V To economize power consumption, these operate at fixed intervals.

V Are presently about the size of a coin.

V Used in navigation systems for commercial and private aircrafts, in toll


collection, logistics and real time locating systems etc.

V Some active RFID tags include sensors such as temperature logging


or to monitor the temperature of perishable goods.
V ©imple in design

V Can be much smaller


.
V Can have unlimited life span

V Liable to environmental and regulatory constraints

V ©uitable for manufacturing with a printing process for the antenna.

V These are cheap and used for consumer goods.

V Read-only tags are typically passive and are programmed with a


unique set of data (usually 32 to 128 bits) that cannot be modified.
V Similar to passive tags except for the addition of a small battery ,
which allows the tag IC to be constantly powered which removes the
need for the aerial to be designed in order to collect power
from the incoming signal.

V Less reliable and powerful than active tags.

V Faster in response and stronger in reading ratio compared to passive


tags.

V Offer benefits in environments where there is a lot of metal or fluids,


which typically scatter the RF field. As semi-passive tags are pre-energized,
they can be read more reliably in these more difficult environments .
V LOW FREQUENCY TAGS(30- 500 Kz) which use less
power, are cheap , are better able to penetrate non-
metallic substances , ideal for scanning objects with high
water content (fruits and liquids) and transmission range is
less than 6 ft.

V IG FREQUENCY TAGS (850- 950Mz and 2.4Gz -2.5


Gz ) which have longer and better transmission range ,
expensive , can transfer data faster , use more power ,
less likely to pass through materials, useful for air- to-
air and air- to- ground navigation.
V READ ONLY :- Information is programmed onto
chip during manufacturing, no overwriting,
information constant ,least expensive.

V WRITE ONCE-READ MANY :-Information added


only once along with unique identifier but can be
read many times.

V READ-WRITE :-Open to data manipulation by


user·s system without restrictions . Will contain
unique identifier but carry an updateable memory
for data to be added. It is expensive.
V No requirement for line-of-sight, reliable
V Dynamic information carrier (read/write)
V igh memory capacity( if needed)
V Anti-collision (many tags can be read at the same time)
V Robust,reliable and highly efficient
V Performs in rugged, harsh environment
V Cheaper in long term
V Reader virtually maintenance free
V No human intervention
V Scanning can be done at greater distances.
V Can identify items individually
V Very fast, responding in less than 100
milliseconds.
V Provides high level of data integrity.
V An RFID system may consist of several
components: tags, tag readers, edge servers,
middleware, and application software,but the three
main important components are:-

1. A transceiver +antenna (with decoder):-reader


2. A transponder +antenna:- RF tag, electronically
programmed with unique information
3. Data processing subsystem
V An RFID tag is composed of an antenna , a wireless
transducer and an encapsulating material on a single
silicon chip . It is also called an electronic label or
code plate.These are paper thin, flexible smart labels.

V An RFID reader consists of an antenna , transceiver and


decoder, which sends periodic signals to inquire about
any tag in vicinity. On receiving any signal from a tag it
passes on that information to the data processor. It
also takes data from the data processor and writes it to
the tag (write mode).
V The reader is also called the coupler . The
coupler sends a modulated signal and the tag
demodulates the signal and passes the data to
the coupler again which then sends it to
computer for further processing . The computer
returns further data to be written to the tag
through the coupler.

V The data processing subsystem stores and


processes the information for specific applications.
V MIDDLEWARE is a software between the network and the business
applications that processes the data coming from the tags and readers.
V It provides a range of functions:-
- data filtering
- system monitoring
- multiple reader coordination
- converts the bits into characters

V TE BUSINESS APPLICATION SOFTWARE ensures that the data


collected is only as valuable as it is effectively managed.
V The antenna emits radio signals to activate the tag and read
and write data to it. Antennas are the conduits between
the tag and the transceiver, which controls the system's data
acquisition and communication. It can be used as a handheld
or fixed -mount device.

V The electromagnetic field produced by an antenna can be


constantly present when multiple tags are expected
continually. If constant interrogation is not required, the field
can be activated by a sensor device.
V The tag contains a transponder with a digital memory
chip that is given a unique electronic product code . The
interrogator , an antenna packaged with a transceiver and
decoder emits a signal activating the RFID tag so it can read
and write data to it. When an RFID tag passes through the
electromagnetic zone,it detects the reader's activation signal.
The reader decodes the data encoded in the tag's integrated
circuit (silicon chip) and the data is passed to the host
computer.The application software on the host processes the
data, often employing Physical Markup Language (PML).
 



  

   V V 


" 
 

Antenna Reader
Asset/Tag

 


À


À 
~
Host
 

   


  

Each Auto-ID tag can hold up to 96 bits of information called EPC (electronic product code)
which is a unique naming scheme for objects and contains the following parts :
V eader (8-bits):- defines the number, type and length of all subsequent data.
V EPC Manager (28-bits) :- identifies the entity (most often the manufacturer)
responsible for tracking and maintaining the object class and serial number codes.

V ÿbject Class (24-bits):- acts as the tracking mechanism for specific groups- e.g., SKU, lot
number, etc.
V ÿbject Identification Number (36-bits):- serves as the unique identification number
for the item.
V To put that in perspective, 23 bits could tag every car in the world, 33 bits could tag every
person, and 54 bits could tag every grain of rice.

V To put that in perspective, 23 bits could tag every car in the world, 33 bits could tag every
person, and 54 bits could tag every grain of rice.
V Supply chain management
V Mass transit ticketing
V Postal ,courier and insurance services
V Food industry and toxic waste monitoring
V Library systems
V ealthcare, pharmaceutical industry
V Access management and control
V Anti-counterfeiting, document tracking
V Toll collection
V Airline baggage handling and vehicle parking monitoring
V Animal and person identification.
V RF systems are useful for the identification of high unit value products
moving through a tough assembly process (e g :-automobile and agricultural
equipment production).
V With RFID technology ,one is able to track the exact whereabouts of their
product and their carriers as it travels through the distribution chain .

V Valuable breeding stock, lab animals, meat and dairy animals,wildlife,milk


crates can be tracked through these tags.

V It decreases the number of vehicles stolen and inventory lost as well as


decreases travel time of carriers having to repeat visits or finding the
correct address to match the item being shipped.

.
V With RFID tags attached to inventory that is being
loaded and offloaded at the site allows for automatic
recording of what has been loaded and what has been
dropped off as well as what still needs to load.

V A number of countries have begun to embed RFID devices


in new biometric passports, to facilitate efficient machine
reading of personal data.

V RFID technology could be very useful in controlling a


bird flu outbreak through surveillance.
V Costlier to implement and hard to debug.
V RFID tags affixed to products remain functional even
after the products have been purchased
V Unattended RFID tags pose environmental risks .
V Wavelengths in the range 2.4 Gz are absorbed by water(the
human body).
V Good RFID engineers are hard to find.
V Unknown RF sources from welding machines ,airports and
hospitals.

Anda mungkin juga menyukai