Radio Frequency Identification (RFID) Technology

Slides:



Advertisements
Similar presentations
Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Advertisements

Retail Bar Coding Basics a Tutorial. Is bar coding necessary? Reasons for UPC bar codes. Want to sell your products via retail stores. Products are sold.
Overview of new technologies Jørgen Bach Andersen, Aalborg University, Denmark Sven Kuhn, Rasmus Krigslund, Troels B. Sørensen.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
EPCglobal Class-1 Generation 2 UHF RFID
An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof. Bob Kinicki.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
© 2005 LXE All rights reserved. RF-ID in Industrial Logistics Danny Mariën – LXE Belgium.
By: Stan A. Szlapetis Director of Software Services RFID.
Information Modelling and Sharing for RFID-Equipped Objects Harri Hämäläinen WAWC’07 – Work In Progress -session Lappeenranta, August 16th 2007.
EPC Radio Frequency Identify Protocols Class1 Generation-2 UHF RFID 860 MHZ – 960 MHZ EPCglobal.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
University of Kansas | School of Engineering Department of Electrical Engineering and Computer Science Milagros FigueroaApril Access Methods for.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
1 EPCglobal Training Suite. 2 Introduction Tag Protocol - UHF Class 1 Gen 2 Ultra High Frequency (UHF) Generation 2 (Generation 1 is deprecated) Class.
October 05 Standards. October My own lesson in RFID standardization.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Lecture Notes #7 Radio Frequency Identification (RFID)
Confidential 1 Strategies for RFID Success. confidential 2 What is Driving RFID?
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
General Overview Application Uses –Real-Time Location Systems –Inventory Management –Pharmaceutical Tracking –Document Management.
RFID in the Supply Chain Primary Sources: EPC_S.pdf
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
RFID Technology & It’s Uses Presented by: Ron Abdy 3 rd July 2013.
IWD2243 Wireless & Mobile Security
Federal Communications Commission Workshop on Radio Frequency Identification (RFID) October 7, 2004 SAMS ys Technologies.
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.
1 Fall 2007RFID – Technical Issues RFID Technical Issues Operations & Decision Technologies Department Kelley School of Business Indiana University.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
Developing RFID Application In Supply Chain
The Most Widely Used Communication and Automation Technologies in the World By: Bikramjeet Waraich CEO, HBeonLabs 17 Feb 2012.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Khanh Huynh Project Leader Dat Tu Systems Analyst Sandy Fung Team Representative Patrick de Leon Lead Programmer Ching Fei Chan Documentation Specialist.
Clifford Poulard Team C – Cliff Po
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
EPCglobal Training Suite
1 RFID Technology and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
EPC Standards EPC System elements : EPC Coding structure The reader/ tag Protocols Savant platform The Object Numbering Service (ONS) PML server.
Interrelativity.com The Practicalities, Perils and Promise of RFID Joe McCarthy Connector in Chief Interrelativity, Inc 26 April 2005.
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
Doc.: IEEE Submission May 2008 Mike McInnis (The Boeing Company)Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Korea University Ubiquitous LAB. Chapter 8. Design selection Ph.D Chang-Duk Jung.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
COMPARISON I CODE SLI versus I CODE1. 2 Semiconductors Content  Overview, Block Diagram and System Configuration  Memory Organisation (Write Access.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
3506-D WEST LAKE CENTER DRIVE,
RADIO FREQUENCY IDENTIFICATION(RFID)
Radio Frequency Identification (RFID)
RFID Technology & It’s Uses
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Chapter 9 - A Comparison of TTF and RTF UHF RFID Protocols
Mobile Computing Lecture Materials By Bintang Eka Putera.
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

Radio Frequency Identification (RFID) Technology Miodrag Bolic Associate Professor School of Information Technology and Engineering University of Ottawa mbolic@site.uottawa.ca Radio Frequency Identification (RFID) Technology

Outline Introduction to RFID technology EPC Class 1 Generation 2 Radio Frequency Identification (RFID) Technology

RFID – Sample Tags / Readers Sample Readers Stationary reader and antenna (Alien) Signpost activator (Savi) Handheld reader (Checkpoint) Stationary reader and antenna (SAMSys) Doorway antenna (Checkpoint) Pallet tag, UHF (Matrics) Stationary reader (Matrics) Plastic crate tag, UHF (Rafsec) Cardboard-case tag, MW (Matrics) Stationary readers are typically deployed at warehouse portals or loading docks, on conveyor belts or forklift arms, on store shelves, check-out lanes, etc. Radio Frequency Identification (RFID) Technology

What is RFID? -- The Tags Tags can be attached to almost anything: pallets or cases of product vehicles company assets or personnel items such as apparel, luggage, laundry people, livestock, or pets high value electronics such as computers, TVs, camcorders

Are All Tags The Same? Size (16 bits - 512 kBytes +) Variations: Memory Size (16 bits - 512 kBytes +) Read-Only, Read/Write or WORM Type: EEProm, Antifuse Arbitration (Anti-collision) Ability to read/write one or many tags at a time Frequency 125KHz - 5.8 GHz Physical Dimensions Thumbnail to Brick sizes Price ($0.50 to $250)

Tags Tag separation Types of antennas Material of the antennas: Dipole Dual-dipole ... Material of the antennas: copper, silver, film aluminium, ink

Reader classification Mobility Fixed Mobile stand-alone or card interface Intelligence Intelligent – program and filter data Nominal – read/write Interface Wired: TCT, RS232, USB Wireless: WLAN

Reader classification Powering method AC Battery DC from the forklift or a track Reading mode Autonomous Interactive Triggering device Reducing interference Connection with external devices PDA, barcode readers, cameras

Hand-held reader Contain Options usually include: UHF RFID reader PDA computer that is embedded WiFi, USB and RS232 connectivity, external memory slot bar code scanner very often are sealed IP64 or IP65 Options usually include: GPS Bluetooth Camera module Additional battery 2D bar code scanner Cradle Other readers such as 13.56MHz readers Printing labels

Protocols Tag singulation Tree based algorithms Aloha based algorithms

Software and Integration From: http://www.infosys.com/rfid/Infosys_White_Paper_on_RFID_Architecture_Strategy.pdf Radio Frequency Identification (RFID) Technology

RFID Architecture Object Name Service (ONS) Provides a global, distributed lookup service to translate an EPC into one URL where further information on the object (XML - metadata) may be found Dynamic ONS services record a sequence of custodians as an object moves through a supply chain Uses same technology of DNS Integration and security are key The Vertical-Based Extendable Mark-Up Language (XML) XML vocabularies to represent and distribute information related to objects Specific functionality data representation for specific industries

EPC Class 1 Generation 2 UHF protocol Intro and properties Regulatory issues (pages 1-10 TI-RFID UHF Gen 2) Tag memory organization Reader and tags symbols and coding Packet structure Medium access control States and commands Link timing

EPC Classes EPC Class I - V EPCglobal – a joint subsidiary of the Uniform Code Council and EAN International Class V tags Readers. Can power other Class I, II and III tags; Communicate with Classes IV and V. Class IV tags: Active tags with broad-band peer-to-peer communication Class III tags: semi-passive RFID tags Class II tags: passive tags with additional functionality Class 0/Class I: read-only passive tags Radio Frequency Identification (RFID) Technology

EPC Standards: Generation 2 Specification recently approved by EPCglobal Designed to eventually replace Generation 1 standards after a period of testing and transition Radio Frequency Identification (RFID) Technology

UHF Class 1 Gen 2 Features Requirement Gen2 Capability Global Regulatory Compliance Europe, North America, Japan, etc. Operation in Noisy Environments Multiple Sessions, Dense Reader Modes Fast Operation > 1600 tags/sec USA, 600 tags/sec Europe Privacy Protection EPC code not broadcasted, 32-Bit Kill Password Improved Accuracy Elimination of “Ghost Reads”, Adaptive Protocols Memory Write Capability > 7 tag/second write rate, Optional User Memory Group Searches & Filtering Flexible Select Command Low Cost Multi-Vendor Availability Flexibility Tolerates Identical EPC numbers & Multiple EPCs Certified products Currently Available

Properties 1500 tags/sec in North America 600 tags/sec in Europe Speed 1500 tags/sec in North America 600 tags/sec in Europe 70ms to write 96-bit EPC Reliability Adapts to rapidly changing tag populations Including large populations (>1,000 tags) Can identify late-arriving tags immediately Selection Select command allows flexible tag pre-selection Can select / mask specific tags for identification Range 8m read range 6m write range From: EPCglobal. Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9, 2005. Radio Frequency Identification (RFID) Technology

EPC Class 1 Generation 2 UHF protocol Intro and properties Regulatory issues (pages 1-10 TI-RFID UHF Gen 2) Tag memory organization Reader and tags symbols and coding Packet structure Medium access control States and commands Link timing

EPC Class 1 Generation 2 UHF protocol Intro and properties Regulatory issues (pages 1-10 TI-RFID UHF Gen 2) Tag memory organization Reader and tags symbols and coding Packet structure Medium access control States and commands Link timing

EPC Data Standards 96 bit EPC 268 million companies Electronic Product Code (EPC) Uniquely identifies item in supply chain 96 bit EPC 268 million companies Each with 16 million distinct object classes Each class with 68 billion serial numbers Reference : http://java.sun.com/developer/technicalArticles/Ecommerce/r fid/index.html From: http://java.sun.com/developer/technicalArticles/Ecommerce/rfid/index.html Radio Frequency Identification (RFID) Technology

Memory Organization From: EPCglobal. Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9, 2005. Radio Frequency Identification (RFID) Technology

EPC Class 1 Generation 2 UHF protocol Intro and properties Regulatory issues (pages 1-10 TI-RFID UHF Gen 2) Tag memory organization Reader and tags symbols and coding Packet structure Medium access control States and commands Link timing

Reader to tag data link

OOK coding +ASK

Pulse interval encoding +ASK

Spectral mask

Spectral mask for dense reader operation in alternating 200kHz channals

PSD for 40kHz data rate

Tag to Reader Modulation The tag uses Backscatter modulation to respond to a reader. It does this by switching the reflection coefficient of its antenna (using a shunt circuit) from a matched load where the incident RF signal is absorbed, to a short at the antenna terminals where the maximum reflected RF signal is created. The reader instructs the tag which method of data encoding to use when sending its data back: Miller Subcarrier encoding FM0 Baseband encoding The tag can use either/or two modulation formats - the tag manufacturer selects: ASK (Amplitude Shift Keyed) PSK (Phase Shift Keyed)

Tag to reader data link

FM0

Miller encoding

Comparison of PSD of FM0 and Miller

EPC Class 1 Generation 2 UHF protocol Intro and properties Regulatory issues (pages 1-10 TI-RFID UHF Gen 2) Tag memory organization Reader and tags symbols and coding Packet structure Medium access control States and commands Link timing

Control frames

EPC Class 1 Generation 2 UHF protocol Intro and properties Regulatory issues (pages 1-10 TI-RFID UHF Gen 2) Tag memory organization Reader and tags symbols and coding Packet structure Medium access control States and commands (pages 29-46 TI-RFID UHF Gen 2) Link timing

Class 1 Generation 2 Commands Select Inventory commands Query QueryAdjust QueryRep ACK NAK Access commands Req_RN Read Write Kill Lock Access BlockWrite BlockErase From: EPCglobal. Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9, 2005. Radio Frequency Identification (RFID) Technology

#2: Tags That Oversleep Reset Fact: Some tags are heavy sleepers Problem: A tag may still be asleep, from being counted by a prior reader, when it reaches me How do I count it? Reset Late-arriving tags won’t hear the reset Multiple resets will interrupt a Query round Source: Impinj

After ABA, all tags have been counted and are in A AB Symmetry Gen2 doesn’t put tags to sleep. It uses a “flag” instead Flag can be set to “A” or “B” Count tags from ABA Step 1: Query(A) Only “A” tags respond “A” tags set their flag to “B” when they are counted Step 2: Query(B) Only “B” tags respond “B” tags set their flag to “A” when they are counted Go to step 1 After ABA, all tags have been counted and are in A A B B A Source: Impinj

#3: Reader Interruptions Problem: Handheld reader interrupts a dock-door reader Don’t want the dock-door reader to lose its ongoing inventory Solution: Tags have 4 flags rather than just 1 One for each of 4 sessions A reader Queries tags in a single session Different readers can use different sessions Example Shelf reader uses session #1; handheld reader uses session #2 Session 4 A B Session 3 A B Session 2 A B Session 1 A B Source: Impinj

EPC Class 1 Generation 2 UHF protocol Intro and properties Regulatory issues (pages 1-10 TI-RFID UHF Gen 2) Tag memory organization Reader and tags symbols and coding Packet structure States and commands Link timing Medium access control

Link timing From: EPCglobal. Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9, 2005. Radio Frequency Identification (RFID) Technology

EPC Class 1 Generation 2 UHF protocol Intro and properties Regulatory issues (pages 1-10 TI-RFID UHF Gen 2) Tag memory organization Reader and tags symbols and coding Packet structure Medium access control States and commands Link timing

Q algorithm