RFID Review / Bluetooth ENGR 475 – Telecommunications Harding University December 5, 2006 Jonathan White.

Slides:



Advertisements
Similar presentations
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
Advertisements

Indian Institute of Technology Hyderabad Presented By : Harish Kumar, Tulasi Ram. Bluetooth.
Mobile M2M Applications Oregon Connections 2014 – “ The Internet of Things” Presentation by Neil Grubb October 23, 2014.
Frame control duration address 1 address 2 address 4 address 3 payloadCRC seq control frame: addressing Address 2: MAC address.
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Wireless Network Taxonomy Wireless communication includes a wide range of network types and sizes. Government regulations that make specific ranges of.
Wireless LAN Technology
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
Short Distance Wireless Communication. Team 5 Thomas French Jordan Harris Mike Symanow Luseane Tangataevaha.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
CCTV SYSTEMS WIRELESS BASED CCTV.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Trends In Unlicensed Spread Spectrum Devices Presentation at FCC Commission Meeting May 10, 2001 Office of Engineering and Technology Federal Communications.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Wireless Networks. Why go wireless? C Don’t have to be tied to a N, furniture or infrastructure Can retrieve , access the Internet, a corporate database.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 6 1 Real-Time Communication on the Internet Exploring Wireless Networks Tutorial.
Wireless Technology Wireless devices transmit information via Electromagnetic waves Early wireless devices –Radios – often called wireless in.
Computer networks 6: Wireless and Mobile Networks.
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Area 2 Computers & Technology Group 21 August 2008 Dean Steichen Br.#8.
Wireless LAN Applications
What is Blue Tooth ? Blue tooth is a cable replacement technology that can be used to connect almost any device to any other devices. Blue tooth is the.
Succeeding with Technology Telecom, Wireless & Networks Fundamentals Media, Devices, and Software Wireless Telecommunications Networks and Distributed.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
Wireless Communication. Learning Objectives: By the end of this topic you should be able to: describe wireless communication methods, describe wireless.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
Wide Area Networks Vedant Saran. What is WAN?  A Wide Area Network(WAN) is a network that spreads over a large area such as office companies in different.
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
Radio Frequency ID (RFID) Tracking System for a Building Complex Tim Gordon Matt Tracy John O’Malley Mentor: Y. Shang, Y. Saab.
Near Field Communication Telecommunication Kacie Johnson Summer Bird Washington Farver Jonathan Wright Mike Muchane.
(Ultra low power connectivity for small devices) By: Parthesha K.N. 8 th semester I T S I T, Tumkur.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
MASNET GroupXiuzhen ChengFeb 8, 2006 Terms and Concepts Behind Wireless Communications.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
Wireless Data Transmission. For wireless data transmission to occur you need three things A transmitter A receiver A wireless channel –The higher the.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
IEEE Wireless Personal Area Networks Wireless networks classified into four broad categories: –Wireless personal area network (WPAN): Hand-held.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
6: Wireless and Mobile Networks6-1 hub or switch AP 2 AP 1 H1 BBS 2 BBS : mobility within same subnet router r H1 remains in same IP subnet: IP.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
BluetoothTechnology Presenting By: AJAY DAGAR (ECE) Roll No: B.Tech VIIth Semester Inderprastha Engineering College.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
A presentation by Abhijit Chakrabarty or Dept of Computer Sc. & Engg. Dream Institute of Technology.
ICT Unit 4: Network and the effects of using them
Respected Ma’am & Dear friends
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
Personal Communication Services & WiFi
Some Bluetooth Background
Presented by Khaled Al Otaishan
Bluetooth Presented by :- Sachin mogha
Physical layer protocol bluetooth
Radio Frequency Identification (RFID)
A SEMINAR ON BLUETOOTH.
Bluetooth: Vision, Goals and Architecture
Bluetooth, RFID, Data Link Layer Switching
Near field communication (NFC)
Presentation transcript:

RFID Review / Bluetooth ENGR 475 – Telecommunications Harding University December 5, 2006 Jonathan White

Outline  What you need to know about RFID  Bluetooth  Applications  Future  Technical Specifications AlgorithmsAlgorithms Air InterfaceAir Interface Security ConcernsSecurity Concerns

RFID Review  RFID – Radio Frequency Identification.  Idea: Use low cost tags to identify objectsUse low cost tags to identify objects  Benefits: Line of sight isn’t required (as in UPC Codes).Line of sight isn’t required (as in UPC Codes). Much faster inventorying of objects.Much faster inventorying of objects. Enables each item to be uniquely identified.Enables each item to be uniquely identified.

RFID Review  3 types of tags: Active: Have a battery, are always able to transmit and receive, very large, long range, very expensive.Active: Have a battery, are always able to transmit and receive, very large, long range, very expensive.  Example: Airplane controllers Semi-Active: Have a battery, but they only transmit when in an RF field. They are large and fairly expensive.Semi-Active: Have a battery, but they only transmit when in an RF field. They are large and fairly expensive.  Example: Toll tags Passive: No battery, receive power from only the RF field, very small, very cheap, small range.Passive: No battery, receive power from only the RF field, very small, very cheap, small range.  Example: Entry key fobs, Exxon SpeedPass, EPCGlobal tags.

EPC  Electronic Product Code. A replacement for UPCA replacement for UPC Has all the data of a UPC plus other fields.Has all the data of a UPC plus other fields. Some fields can be used to store variables.Some fields can be used to store variables. Some fields can be used to uniquely identify each object.Some fields can be used to uniquely identify each object. Many interesting applications.Many interesting applications.

EPC Details  Low Range: 20 feet  Low Cost: 5 cents  Low Power requirements: Near field: Under 10 cm or so, tag acts like the opposite side of a transformer, and it can receive more power.Near field: Under 10 cm or so, tag acts like the opposite side of a transformer, and it can receive more power. Far field: From.5 feet to 20 feet, tag uses backscattering to reflect a modulated RF field to the receiver.Far field: From.5 feet to 20 feet, tag uses backscattering to reflect a modulated RF field to the receiver.  Operates in the 900 MHz region. Unlicensed, limited by the government.Unlicensed, limited by the government.

Bluetooth  Designed in Sweden in  The goal was to design one interface for devices to connect and exchange information wirelessly. This would aid in the elimination of all the cables that are proliferating all around us.This would aid in the elimination of all the cables that are proliferating all around us. Not designed to provide power, however.Not designed to provide power, however. Also, Bluetooth was originally designed to be short range and secure, but this is not necessarily true now.Also, Bluetooth was originally designed to be short range and secure, but this is not necessarily true now.

Bluetooth Applications  Wireless Cell phone handsets  Wireless controllers (Wii)  Wireless computer connections Most common: keyboard, mouse, printerMost common: keyboard, mouse, printer  For remote controls where IR was used. Better range and accuracy.Better range and accuracy.  PDA’s, Calculators  Transfer of files in an Ad Hoc Network. If you don’t have a WiFi network available.If you don’t have a WiFi network available.

Bluetooth Applications

Future of Bluetooth  Bluetooth has a good future: Data rates of 3 MbpsData rates of 3 Mbps Better securityBetter security Better range.Better range.  This will allow Bluetooth TVs and video projectors.  The goal is to make an unwired society. But, you still need power.But, you still need power.

Technical Specs  Bluetooth operates in the 2.4 GHz range. Unlicensed, same band that certain wireless phones, garage door openers, and baby monitors use.Unlicensed, same band that certain wireless phones, garage door openers, and baby monitors use.  Bluetooth devices typically operate at around.1 Watts. Much less than the 3 Watts that a typical cell phone operates at.Much less than the 3 Watts that a typical cell phone operates at.  Maximum range is supposed to 100 meters. This can be extended to a mile with antennas.This can be extended to a mile with antennas.

Technical Specs  Bluetooth can connect up to 8 devices. 1 master, 7 slaves with about a 10 meter radius.1 master, 7 slaves with about a 10 meter radius.  Bluetooth uses spread spectrum frequency hopping. There are 79 potential frequencies a device can transmit on, so this should help eliminate collisions.There are 79 potential frequencies a device can transmit on, so this should help eliminate collisions.

Technical Specs  Devices constantly scan for a new Bluetooth connection. This lets them know what master is controlling them, and whether or not another device should be added to the group.This lets them know what master is controlling them, and whether or not another device should be added to the group.  Since this connection is automatic, security is a large problem for Bluetooth. Bluetooth viruses, bluejacking, blue bugging.Bluetooth viruses, bluejacking, blue bugging.

Conclusion  The use of Bluetooth will be expanded in the coming years.  Good for a wire replacement.  It won’t replace WiFi or cellular networks. It’s impact on Telecommunications is very secondary.It’s impact on Telecommunications is very secondary.