15-446 Networked Systems Practicum Lecture 6 – RFID technology 1.

Slides:



Advertisements
Similar presentations
Alien Technology® Patti Blessing Director Business Development
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
RuBee Andrew Giles An alternative to RFID? ● What is RuBee? ● The differences between RuBee and RFID. ● Applications that could benefit from.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
© 2005 LXE All rights reserved. RF-ID in Industrial Logistics Danny Mariën – LXE Belgium.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
RFID Overview Greg Leeming Intel Corporation 11/8/2004.
1 RFID Technology Mike Arnold Randall Chang Brent Hedberg Lauren Nelson Brad Samples Mike Arnold Randall Chang Brent Hedberg Lauren Nelson Brad Samples.
October 05 Standards. October My own lesson in RFID standardization.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Cow Jewelry – or – Revolution Travis Sparks
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Lecture Notes #7 Radio Frequency Identification (RFID)
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
Overview of RFID System Characteristics Operating Frequency Method of Coupling Transmission Range Data Storage Capacity Power Supply (Active, Passive)
上海交通大学 自动化系 FROZEN FOOD Case : Cool-Chain of RFID.
RFID in the Supply Chain Primary Sources: EPC_S.pdf
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Dual-frequency Antenna Design for RFID Application
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
IWD2243 Wireless & Mobile Security
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
FPGA based RFID Reader Group Members – Farhan Tariq Usman Sarwar Khalid Khan Supervisor- Mr. Naveed Ahmed Internal Advisor- Prof. Dr. Abdul Razzak Memon.
Radio Frequency Identification So What? What is RFID Type of technology that uses electromagnetic radio frequency to identify objects, animals and humans.
Developing RFID Application In Supply Chain
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
RFID: The Next Big Little Thing William T. Colleran, Ph.D. President & CEO, Impinj Inc. Copyright 2003 Impinj, Inc. All rights reserved.
NFC - Near Field Communication Technology
Wireless# Guide to Wireless Communications
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
EPCglobal Training Suite
RFID Network Infrastructure: Backgrounder IEEE LANMAN 2007.
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Applications of Rfid (radio frequency identification) © 2015 albert-learning.com APPLICATIONS OF RFID (RADIO FREQUENCY IDENTIFICATION)
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
Introduction to RFID Technology By: Vahid Bagher Poor 1.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
1. 2 Technology The Evolution Of 3 What is RFID Technology? Radio Frequency Identification - A technology that uses electronic tags placed on objects,
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY. By Twesige Richard.
Mobile Computing CSE 40814/60814 Spring 2017.
Radio Frequency Identification (RFID)
Radio Frequency IDentification
RFID Technology & It’s Uses
RADIO FREQUENCY IDENTIFICATION
Radio Frequency Identification and Near Field Communication
Greg Leeming Intel Corporation 11/8/2004
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Radio Frequency Identification
- Dylan Leintz - Dr. Davies
RFID used for real-time tracking Physics 490 seminar 4/15/2019
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

Networked Systems Practicum Lecture 6 – RFID technology 1

Basic RFID NFC (RFID + Storage) Next Generation RFIDs (RFID + Computation + Storage) 2

RFID History First Bar code patents – 1930s First use of RFID device – 2nd world war – Brittan used RFID-like technology for Identify- Friend or Foe Harry Stockman October 1948 Paper – Communication by means of reflected power ( The proceedings of the Institute of Radio Engineers) First RFID Patent Auto-ID center founded at MIT – 1999 Standardization effort taken over by EPC Global (Electronic Product Code) Current thrust primarily driven by Wal-Mart and DoD Automate Distribution: Reduce cost (man power, shipping mistakes) Increase sales (keep shelves full) DoD Total Asset Visibility Initiative

Basic Tag Operational Principles N S TAG Reader TAG Backscatter Near field (LF, HF): inductive coupling of tag to magnetic field circulating around antenna (like a transformer) Varying magnetic flux induces current in tag. Modulate tag load to communicate with reader field energy decreases proportionally to 1/R 3 (to first order) Far field (UHF, microwave): backscatter. Modulate back scatter by changing antenna impedance Field energy decreases proportionally to 1/R Boundry between near and far field: R = wavelength/2 pi so, once have reached far field, lower frequencies will have lost significantly more energy than high frequencies Absorption by non-conductive materials significant problem for microwave frequencies Inductive Coupling

Tag Details LFHFUHFMicrowave Freq. Range KHz13.56 MHz MHz GHz Read Range 10 cm1M2-7 M1M Market share 74%17%6%3% Coupling Magnetic Electro magnetic Existing standards 11784/85, , 15693,14443 A, B, and C EPC C0, C1, C1G2, Application Smart Card, Ticketing, animal tagging, Access, Laundry Small item management, supply chain, Anti-theft, library, transportation Transportation vehicle ID, Access/Security, large item management, supply chain Transportation vehicle ID (road toll), Access/Security, large item management, supply chain

Types of Tags Passive Operational power scavenged from reader radiated power Semi-passive Operational power provided by battery Active Operational power provided by battery - transmitter built into tag

Real Tags

Electronic Product Code Header - Tag version number EPC Manager - Manufacturer ID Object class - Manufacturer ’ s product ID Serial Number - Unit ID With 96 bit code, 268 million companies can each categorize 16 million different products where each product category contains up to 687 billion individual units Note: 64 bit versions also defined, 256 bit version under definition

Class 1 Gen 2 tags 900 Mhz 10m range Downlink = information + energy 26.7 – 128kbps Uplink = energy sent down as continuous wave (CW) + modulate reflection coefficient of antenna 11

Multiple Tags? What happens when multiple tags are in range of the transceiver? All the tags will be excited at the same time. Makes it very difficult to distinguish between the tags.

Collision Avoidance Similar to network collision avoidance Probabilistic Tags return at random times Deterministic Reader searches for specific tags

CIG2 MAC 14

Traditional RFID Market Segments Auto Immobilizers Access Control Animal Tracking Automated Vehicle Id Isolated systemsIsolated systems Simple readsSimple reads Slow growthSlow growth

The New Mkt Segment Consumer Pkg Goods Supply Chain Wal-Mart June ’03 announcement Pallet/Case tagging  Top 100 suppliers Jan ’05  Other 30K by end of ’06 4 Billion tags/year 300k direct readers 18 Million indirect readers End to end systemsEnd to end systems Complex readsComplex reads Emerging marketEmerging market +

RFID in the Supply-Chain

Today: Outside the Supply Chain

Basic RFID NFC (RFID + Storage) Next Generation RFIDs (RFID + Computation + Storage) 19

NFC Phy 13.56MHz frequency, 14kHz band Range 4cm (max 20cm) Active (2 transmitters) and Passive (1 transmitter + load modulation) mode Data rate = 106, 212 or 424kbps 20

NFC Tag Types Type 1 and 2 96 or 48 bytes, 106kbps Read/write or read only Expansion to 2kbyte Type 3 2kbyte 212kbps Read-only Type 4 32kbyte kbps Read-only 21

Basic RFID NFC (RFID + Storage) Next Generation RFIDs (RFID + Computation + Storage) 22

Collection of small, battery-powered sensing devices (motes) Peer-to-peer communication (multi-hop network) Range of monitoring applications: habitat monitoring, structural integrity of bridges volcanic activity, forest fires, etc. 23

UHF RFID EPC Class Gen 2 Powered reader infrastructure plus simple passive tags Direct reader to tag communication 4W EIRP from readers, tags “backscatter,” range of up to ~30ft Applications around inventory / supply chain management 24

25

Combine the best of both: Small / inexpensive passive tags that sense/compute (WISPs) and communicate directly with apps in infrastructure (via readers) Key advantages: Ubiquitous, long-lived instrumentation, business simplicity, flexibility 26

Milk App Cold chain monitoring: Track many small items, e.g., bags of blood, items in fridge, with cheap and/or disposable tag Use proximity of readers to sense temperature and vital statistics when refrigerated most of the time Use stored energy (super-cap) to sense for brief periods when items are away from reader and exposed 27

Intermittent Power How do we run programs on WISPs with intermittent power? WISP power model: Gathers energy from readers, when in range (~15ft) at unpredictable times Has limited on board storage (capacitor << battery) Expends energy to sense/compute and communicate Slowly loses stored energy 28

WISP API to expose power state to application code “Enough power yet to complete this step?” Divide large computation into multiple small stages Store state in non-volatile memory or on readers Coordinate to match reader power to WISP needs Continue to provide for a sufficient interval Implications Lower reliability due to unpredictable contacts, power durations Variable frequency of operation due to “pre-charge” period 29