SlideShare a Scribd company logo
1 of 29
RFID
RADIO FREQUENCY IDENTIFICATION
What is RFID?
ī‚— Radio-frequency identification (RFID) is an automatic identification

method using radio waves.
ī‚—RFID also began to see use in wildlife monitoring and research. RFID tags can

be used to monitor animal movement without adversely affecting the animal,
There’s a chip
Implanted RFID tags in Humans
Applications
īƒ˜ Supply chain automation
īƒ˜ Asset tracking
īƒ˜ Medical applications
īƒ˜ People tracking
īƒ˜ Manufacturing
īƒ˜ Retail
īƒ˜ Warehouses
īƒ˜ Livestock
īƒ˜ Timing
The RFID System
1.

Tag.

2.

Reader.

3.

Reader antenna.

4.

Controller.

5.

Host and software system.

6.

Communication infrastructure.
Tag
ī‚—An RFID tag is a device that can store

and transmit data to a reader in a contact
less manner using radio waves.
ī‚—RFID tags can be classified in three

different ways.
1)Passive
2)Active
3)Semi-Active(Semi-Passive)
Passive Tag
īƒ˜ No on-board power source (for example, a battery)
īƒ˜ Uses the power emitted from the reader to energize itself and

transmit its stored data to the reader
īƒ˜ Reader always communicates first, followed by the tag.
īƒ˜ Smaller than an active or semi-active tag. It has a variety of read
ranges starting with less than 1 inch to about 30 feet (9 meters
approximately).
īƒ˜ Cheaper compared to an active or semi-active tag.
ī‚—
Active Tag
īƒ˜ Has on-board power source (for example, a battery; other sources

of power, such as solar, are also possible)
īƒ˜ Own on-board power supply to transmit its data to a reader.
īƒ˜ No need for reader's emitted power for data transmission.
īƒ˜ A tag always communicates first, followed by the reader.
īƒ˜ Can broadcast its data to its surroundings even in the absence of a
reader
Semi-Active (Semi-Passive) Tags
īƒ˜ Have an on-board power source (for example, a battery)
īƒ˜ Uses the reader's emitted power for transmitting its data
īƒ˜ Also called a battery-assisted tag.
īƒ˜ Reader always communicates first, followed by the tag.
Another way to Classify Tags
īƒ˜ Read-only (RO)
īƒ˜ Write once, read many (WORM)
īƒ˜ Read-write (RW)
Reader????
īƒ˜An RFID reader can read from and write

data to compatible RFID tags.
īƒ˜A reader thus doubles up as a writer. The
act of writing the tag data by a reader is
called creating a tag.
ī‚—A reader has the following main

components:
īƒ˜Transmitter
īƒ˜Receiver
īƒ˜Microprocessor
īƒ˜Memory
īƒ˜Controller (which may reside as an external
component)
īƒ˜Communication interface
īƒ˜Power
Working
ī‚—A radio device called a tag is attached to the object that

needs to be identified.
ī‚—When this tagged object is presented in front of a suitable
RFID reader, the tag transmits this data to the reader (via
the reader antenna).
ī‚—The reader then reads the data and has the capability to
forward it over suitable communication channels.
ī‚—This application can then use this unique data to identify the
object presented to the reader.
ī‚—It can then perform a variety of actions
Backscatter modulation?
īƒ˜ A common way the communication between a tag and a reader
īƒ˜ Reader sends a signal (energy) to a tag, and the tag responds by

reflecting a part of this energy back to the reader.
īƒ˜ A charge device such as a capacitor contained in the tag makes
this reflection possible.
īƒ˜ The capacitor gets charged as it stores the energy received
from the reader.
īƒ˜ As the tag responds back, it uses this energy to send the signal
back to the reader. The capacitor discharges in the process.
Reader Tag Interaction
īƒ˜ A tag consist of a dipole antenna attached to an interdigital transducer (IDT) placed on a
īƒ˜
īƒ˜
īƒ˜
īƒ˜
īƒ˜
īƒ˜

piezoelectric substrate.
A series of well-placed individual electrodes acting as reflectors are positioned on the
substrate.
The antenna applies an electrical impulse to the IDT when it receives the RF signal
from a reader.
Some of these waves are reflected back to the IDT by the reflectors; the rest are
absorbed by the substrate.
The reflected waves form a unique pattern, determined by the reflector positions,
representing the tag data.
These waves are converted back to the RF signal in the IDT and transmitted back to
the RFID reader via the tag antenna.
The reader then decodes the received signal to extract the tag data.
Software
ī‚—private void Form1_Load(object sender, EventArgs e)
ī‚—{ rfid1 = new RFID(); rfid1.Attach += new

AttachEventHandler(rfid_Attach); rfid1.Detach += new
DetachEventHandler(rfid_Detach); rfid1.RFIDTag += new
TagEventHandler(rfid_Tag); rfid1.RFIDTagLost += new
TagEventHandler(rfid_TagLost); rfid1.open(); }
Design
Software Contd.
ī‚—private void antennaCheckBox_CheckedChanged(object sender,

EventArgs e)
ī‚—{ rfid1.Antenna = cboxAntenna.Checked; }
Software Contd.
ī‚—void rfid_Attach(object sender, AttachEventArgs e)
ī‚— { Phidgets.RFID phid = (Phidgets.RFID)sender;

lblAttached.Text = " Attached: " + phid.Name; lblSerial.Text =
" Serial: " + phid.SerialNumber; lblVersion.Text = " Version: "
+ phid.Version; }

ī‚—void rfid_Detach(object sender, DetachEventArgs e)
ī‚—{ lblAttached.Text = "Not Attached"; }
Software Contd.
ī‚—void rfid_Tag(object sender, TagEventArgs e)
ī‚—{ txtTag.Text = e.Tag;
ī‚— lastRFIDTag = txtTag.Text;
ī‚—rfid1.LED = true; // light on }
ī‚—void rfid_TagLost(object sender, TagEventArgs e)
ī‚—{ txtTag.Text = "";
ī‚—rfid1.LED = false; // light off
ī‚—lbPrevRFIDTags.Items.Insert(0, string.Format("Tag: {0} - {1}",

++TagCtr, lastRFIDTag)); }
After reading Tags.
Frequency
īƒ˜LF band: 125 and 135 kHz--LF generally use passive
tags
īƒ˜HF band 3 MHz to 30 MH
īƒ˜Typical Frequency: 13.56 MHz--HF system uses passive
tags .
īƒ˜HF systems are also widely used, especially in hospitals
īƒ˜These frequency bands can be used freely worldwide.
īƒ˜UHF band:300 MHz to 1 GHz
īƒ˜Typical Frequency :915 MHz--Uses both active and
passive tags
īƒ˜MW band>1 GHz
īƒ˜Typical Frequency: 2.4 GHz or 5.8 GHz—Uses Semi
active and passive tags.
Technical Issues
īƒ˜ Tag Collision
īƒ˜ Reader Collision
īƒ˜ Tag Readability
īƒ˜ Read Robustness

Ethical Issues
īƒ˜ Passive RFID tags could conceivably used for surveillance of

unsuspecting tag carriers
īƒ˜ Embedding of RFID tags in humans: This has been proven to
work, but should it be done?
Advantages
ī‚—Contactless. An RFID tag can be read without any physical

contact between the tag and the reader.
ī‚—Writable data. The data of a read-write (RW) RFID tag can be
rewritten a large number of times.
ī‚—Absence of line of sight. A line of sight is generally not
required for an RFID reader to read an RFID tag.
ī‚—Variety of read ranges.
ī‚—Wide data-capacity range.
ī‚—Support for multiple tag reads.
ī‚—Perform smart tasks.
Disadvantages
īƒ˜ Poor performance with RF-opaque and RF-absorbent

objects.
īƒ˜ Impacted by environmental factors.
īƒ˜ Limitation on actual tag reads.
īƒ˜ Impacted by hardware interference.
CONCLUSION
īƒ˜ RFID, is an emerging technology which can be used for a variety

of applications.
īƒ˜ However, the potential for abuse of this technology is vast and
requires careful consideration to avoid.
Questions?????????

More Related Content

What's hot

RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security SystemNataraj Patil
 
Electronic Identification System using RFID
Electronic Identification System using RFIDElectronic Identification System using RFID
Electronic Identification System using RFIDijceronline
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)Robiul Islam
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Backscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceBackscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceFilantropi Event Management
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1Mayank Vora
 
RFID Masterclass 2015
RFID Masterclass 2015RFID Masterclass 2015
RFID Masterclass 2015CNRFID
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its ImplentationSonal Tiwari
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)Soumen Santra
 
Basics Of Rfid Technology
Basics Of Rfid TechnologyBasics Of Rfid Technology
Basics Of Rfid TechnologyVineet M Srivastav
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3nikshaikh786
 
Maxim klimov 1433 how rfid works
Maxim klimov 1433 how rfid  worksMaxim klimov 1433 how rfid  works
Maxim klimov 1433 how rfid worksmarchawes
 
Radio Frequency identification (RFID)
Radio Frequency identification (RFID)Radio Frequency identification (RFID)
Radio Frequency identification (RFID)Kamel Alhomsi
 
A Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsA Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsEditor IJMTER
 
Co4301524529
Co4301524529Co4301524529
Co4301524529IJERA Editor
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraqmontaser185
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
RFIID REPORT FILE
RFIID REPORT FILERFIID REPORT FILE
RFIID REPORT FILEAnjani Kotarya
 
Tesis Maestria - 1er Avance
Tesis Maestria - 1er AvanceTesis Maestria - 1er Avance
Tesis Maestria - 1er AvanceBruno Espinoza
 

What's hot (20)

RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security System
 
Electronic Identification System using RFID
Electronic Identification System using RFIDElectronic Identification System using RFID
Electronic Identification System using RFID
 
Radio frequency identification (rfid)
Radio frequency identification (rfid)Radio frequency identification (rfid)
Radio frequency identification (rfid)
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Backscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceBackscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA Device
 
Radio Frequency1
Radio Frequency1Radio Frequency1
Radio Frequency1
 
RFID Masterclass 2015
RFID Masterclass 2015RFID Masterclass 2015
RFID Masterclass 2015
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its Implentation
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
Basics Of Rfid Technology
Basics Of Rfid TechnologyBasics Of Rfid Technology
Basics Of Rfid Technology
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Maxim klimov 1433 how rfid works
Maxim klimov 1433 how rfid  worksMaxim klimov 1433 how rfid  works
Maxim klimov 1433 how rfid works
 
Radio Frequency identification (RFID)
Radio Frequency identification (RFID)Radio Frequency identification (RFID)
Radio Frequency identification (RFID)
 
A Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID SensorsA Survey: SMS Sending Through RFID Sensors
A Survey: SMS Sending Through RFID Sensors
 
Page 1 54
Page 1 54Page 1 54
Page 1 54
 
Co4301524529
Co4301524529Co4301524529
Co4301524529
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
RFIID REPORT FILE
RFIID REPORT FILERFIID REPORT FILE
RFIID REPORT FILE
 
Tesis Maestria - 1er Avance
Tesis Maestria - 1er AvanceTesis Maestria - 1er Avance
Tesis Maestria - 1er Avance
 

Similar to RFID

rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxRohithTopula
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1Mayank Vora
 
Electronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptxElectronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptxnirdeshmucha1
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance SystemAtiq Shaikh
 
2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptxNameetDaga1
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationSudip Gupta
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptxlisbala
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 

Similar to RFID (20)

rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptx
 
rohith.pptx
rohith.pptxrohith.pptx
rohith.pptx
 
Radio Frequency1
Radio  Frequency1Radio  Frequency1
Radio Frequency1
 
Rfid
RfidRfid
Rfid
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Electronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptxElectronic Toll Collection System Using RFID seminar.pptx
Electronic Toll Collection System Using RFID seminar.pptx
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance System
 
2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
RFID
RFIDRFID
RFID
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFiD
RFiDRFiD
RFiD
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 

More from Romil Shah

Boston hacks
Boston hacksBoston hacks
Boston hacksRomil Shah
 
THE THIRD EYE-Presentation
THE THIRD EYE-PresentationTHE THIRD EYE-Presentation
THE THIRD EYE-PresentationRomil Shah
 
Thermal Imaging
Thermal ImagingThermal Imaging
Thermal ImagingRomil Shah
 
Microwave Power Transmission
Microwave Power TransmissionMicrowave Power Transmission
Microwave Power TransmissionRomil Shah
 
Pick your poison: Quiz on Vices
Pick your poison: Quiz on VicesPick your poison: Quiz on Vices
Pick your poison: Quiz on VicesRomil Shah
 
Business Plan on newspaper
Business Plan on newspaperBusiness Plan on newspaper
Business Plan on newspaperRomil Shah
 
Seven Sisters: Political Research on Develepment
Seven Sisters: Political Research on DevelepmentSeven Sisters: Political Research on Develepment
Seven Sisters: Political Research on DevelepmentRomil Shah
 
Free Space Optical Communication
Free Space Optical CommunicationFree Space Optical Communication
Free Space Optical CommunicationRomil Shah
 
Microwave Photonics
Microwave PhotonicsMicrowave Photonics
Microwave PhotonicsRomil Shah
 

More from Romil Shah (9)

Boston hacks
Boston hacksBoston hacks
Boston hacks
 
THE THIRD EYE-Presentation
THE THIRD EYE-PresentationTHE THIRD EYE-Presentation
THE THIRD EYE-Presentation
 
Thermal Imaging
Thermal ImagingThermal Imaging
Thermal Imaging
 
Microwave Power Transmission
Microwave Power TransmissionMicrowave Power Transmission
Microwave Power Transmission
 
Pick your poison: Quiz on Vices
Pick your poison: Quiz on VicesPick your poison: Quiz on Vices
Pick your poison: Quiz on Vices
 
Business Plan on newspaper
Business Plan on newspaperBusiness Plan on newspaper
Business Plan on newspaper
 
Seven Sisters: Political Research on Develepment
Seven Sisters: Political Research on DevelepmentSeven Sisters: Political Research on Develepment
Seven Sisters: Political Research on Develepment
 
Free Space Optical Communication
Free Space Optical CommunicationFree Space Optical Communication
Free Space Optical Communication
 
Microwave Photonics
Microwave PhotonicsMicrowave Photonics
Microwave Photonics
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
đŸŦ The future of MySQL is Postgres 🐘
đŸŦ  The future of MySQL is Postgres   🐘đŸŦ  The future of MySQL is Postgres   🐘
đŸŦ The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
đŸŦ The future of MySQL is Postgres 🐘
đŸŦ  The future of MySQL is Postgres   🐘đŸŦ  The future of MySQL is Postgres   🐘
đŸŦ The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

RFID

  • 2. What is RFID? ī‚— Radio-frequency identification (RFID) is an automatic identification method using radio waves. ī‚—RFID also began to see use in wildlife monitoring and research. RFID tags can be used to monitor animal movement without adversely affecting the animal,
  • 5. Applications īƒ˜ Supply chain automation īƒ˜ Asset tracking īƒ˜ Medical applications īƒ˜ People tracking īƒ˜ Manufacturing īƒ˜ Retail īƒ˜ Warehouses īƒ˜ Livestock īƒ˜ Timing
  • 6. The RFID System 1. Tag. 2. Reader. 3. Reader antenna. 4. Controller. 5. Host and software system. 6. Communication infrastructure.
  • 7. Tag ī‚—An RFID tag is a device that can store and transmit data to a reader in a contact less manner using radio waves. ī‚—RFID tags can be classified in three different ways. 1)Passive 2)Active 3)Semi-Active(Semi-Passive)
  • 8. Passive Tag īƒ˜ No on-board power source (for example, a battery) īƒ˜ Uses the power emitted from the reader to energize itself and transmit its stored data to the reader īƒ˜ Reader always communicates first, followed by the tag. īƒ˜ Smaller than an active or semi-active tag. It has a variety of read ranges starting with less than 1 inch to about 30 feet (9 meters approximately). īƒ˜ Cheaper compared to an active or semi-active tag. ī‚—
  • 9. Active Tag īƒ˜ Has on-board power source (for example, a battery; other sources of power, such as solar, are also possible) īƒ˜ Own on-board power supply to transmit its data to a reader. īƒ˜ No need for reader's emitted power for data transmission. īƒ˜ A tag always communicates first, followed by the reader. īƒ˜ Can broadcast its data to its surroundings even in the absence of a reader
  • 10. Semi-Active (Semi-Passive) Tags īƒ˜ Have an on-board power source (for example, a battery) īƒ˜ Uses the reader's emitted power for transmitting its data īƒ˜ Also called a battery-assisted tag. īƒ˜ Reader always communicates first, followed by the tag.
  • 11. Another way to Classify Tags īƒ˜ Read-only (RO) īƒ˜ Write once, read many (WORM) īƒ˜ Read-write (RW)
  • 12. Reader???? īƒ˜An RFID reader can read from and write data to compatible RFID tags. īƒ˜A reader thus doubles up as a writer. The act of writing the tag data by a reader is called creating a tag. ī‚—A reader has the following main components: īƒ˜Transmitter īƒ˜Receiver īƒ˜Microprocessor īƒ˜Memory īƒ˜Controller (which may reside as an external component) īƒ˜Communication interface īƒ˜Power
  • 13. Working ī‚—A radio device called a tag is attached to the object that needs to be identified. ī‚—When this tagged object is presented in front of a suitable RFID reader, the tag transmits this data to the reader (via the reader antenna). ī‚—The reader then reads the data and has the capability to forward it over suitable communication channels. ī‚—This application can then use this unique data to identify the object presented to the reader. ī‚—It can then perform a variety of actions
  • 14.
  • 15. Backscatter modulation? īƒ˜ A common way the communication between a tag and a reader īƒ˜ Reader sends a signal (energy) to a tag, and the tag responds by reflecting a part of this energy back to the reader. īƒ˜ A charge device such as a capacitor contained in the tag makes this reflection possible. īƒ˜ The capacitor gets charged as it stores the energy received from the reader. īƒ˜ As the tag responds back, it uses this energy to send the signal back to the reader. The capacitor discharges in the process.
  • 17. īƒ˜ A tag consist of a dipole antenna attached to an interdigital transducer (IDT) placed on a īƒ˜ īƒ˜ īƒ˜ īƒ˜ īƒ˜ īƒ˜ piezoelectric substrate. A series of well-placed individual electrodes acting as reflectors are positioned on the substrate. The antenna applies an electrical impulse to the IDT when it receives the RF signal from a reader. Some of these waves are reflected back to the IDT by the reflectors; the rest are absorbed by the substrate. The reflected waves form a unique pattern, determined by the reflector positions, representing the tag data. These waves are converted back to the RF signal in the IDT and transmitted back to the RFID reader via the tag antenna. The reader then decodes the received signal to extract the tag data.
  • 18. Software ī‚—private void Form1_Load(object sender, EventArgs e) ī‚—{ rfid1 = new RFID(); rfid1.Attach += new AttachEventHandler(rfid_Attach); rfid1.Detach += new DetachEventHandler(rfid_Detach); rfid1.RFIDTag += new TagEventHandler(rfid_Tag); rfid1.RFIDTagLost += new TagEventHandler(rfid_TagLost); rfid1.open(); }
  • 20. Software Contd. ī‚—private void antennaCheckBox_CheckedChanged(object sender, EventArgs e) ī‚—{ rfid1.Antenna = cboxAntenna.Checked; }
  • 21. Software Contd. ī‚—void rfid_Attach(object sender, AttachEventArgs e) ī‚— { Phidgets.RFID phid = (Phidgets.RFID)sender; lblAttached.Text = " Attached: " + phid.Name; lblSerial.Text = " Serial: " + phid.SerialNumber; lblVersion.Text = " Version: " + phid.Version; } ī‚—void rfid_Detach(object sender, DetachEventArgs e) ī‚—{ lblAttached.Text = "Not Attached"; }
  • 22. Software Contd. ī‚—void rfid_Tag(object sender, TagEventArgs e) ī‚—{ txtTag.Text = e.Tag; ī‚— lastRFIDTag = txtTag.Text; ī‚—rfid1.LED = true; // light on } ī‚—void rfid_TagLost(object sender, TagEventArgs e) ī‚—{ txtTag.Text = ""; ī‚—rfid1.LED = false; // light off ī‚—lbPrevRFIDTags.Items.Insert(0, string.Format("Tag: {0} - {1}", ++TagCtr, lastRFIDTag)); }
  • 24. Frequency īƒ˜LF band: 125 and 135 kHz--LF generally use passive tags īƒ˜HF band 3 MHz to 30 MH īƒ˜Typical Frequency: 13.56 MHz--HF system uses passive tags . īƒ˜HF systems are also widely used, especially in hospitals īƒ˜These frequency bands can be used freely worldwide. īƒ˜UHF band:300 MHz to 1 GHz īƒ˜Typical Frequency :915 MHz--Uses both active and passive tags īƒ˜MW band>1 GHz īƒ˜Typical Frequency: 2.4 GHz or 5.8 GHz—Uses Semi active and passive tags.
  • 25. Technical Issues īƒ˜ Tag Collision īƒ˜ Reader Collision īƒ˜ Tag Readability īƒ˜ Read Robustness Ethical Issues īƒ˜ Passive RFID tags could conceivably used for surveillance of unsuspecting tag carriers īƒ˜ Embedding of RFID tags in humans: This has been proven to work, but should it be done?
  • 26. Advantages ī‚—Contactless. An RFID tag can be read without any physical contact between the tag and the reader. ī‚—Writable data. The data of a read-write (RW) RFID tag can be rewritten a large number of times. ī‚—Absence of line of sight. A line of sight is generally not required for an RFID reader to read an RFID tag. ī‚—Variety of read ranges. ī‚—Wide data-capacity range. ī‚—Support for multiple tag reads. ī‚—Perform smart tasks.
  • 27. Disadvantages īƒ˜ Poor performance with RF-opaque and RF-absorbent objects. īƒ˜ Impacted by environmental factors. īƒ˜ Limitation on actual tag reads. īƒ˜ Impacted by hardware interference.
  • 28. CONCLUSION īƒ˜ RFID, is an emerging technology which can be used for a variety of applications. īƒ˜ However, the potential for abuse of this technology is vast and requires careful consideration to avoid.

Editor's Notes

  1. TK is figured as follows: $97 for ROA, mech & accy $22 for Lyn manufac $4.76 for burden (4%) Total of $123.76