Download presentation
Presentation is loading. Please wait.
Published byAngelica Potter Modified over 9 years ago
1
By: Farnoush Farajpour ( 91124327110 ) Dec 2012
2
Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. It's grouped under the broad category of automatic identification technologies. Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. It's grouped under the broad category of automatic identification technologies. Auto-ID technologies include bar codes, optical character readers and some biometric technologies, such as retinal scans. The auto-ID technologies have been used to reduce the amount of time and labor needed to input data manually and to improve data accuracy. 2
3
IFF Technology (Identify Friend or Foe) used by Allied bombers During World War II; IFF Technology (Identify Friend or Foe) used by Allied bombers During World War II; Invention of “The Thing” or “the Great Seal bug”, an espionage tool, by Léon Theremin, 1945; Invention of “The Thing” or “the Great Seal bug”, an espionage tool, by Léon Theremin, 1945; Advances in radar and RF communications systems, 1950s and 1960s; Advances in radar and RF communications systems, 1950s and 1960s; Today RFID Invention by Mario Cardullo, 1973; Today RFID Invention by Mario Cardullo, 1973; Until recently, the cost of RFID has limited its use. Until recently, the cost of RFID has limited its use. 3
4
The RFID tags, The RFID tags, The RFID readers, The RFID readers, The antennas and radio, The antennas and radio, The computer network (if any) to connect the readers The computer network (if any) to connect the readers 4
5
Basic building block of RFID; Consist of: Basic building block of RFID; Consist of: An antenna A small silicon chip containing a radio receiver, A radio modulator for sending a response back to the reader, Control logic, Some amount of memory, A power system For glass bottle* For generic cartoon* (high performance) For wood pallet* For generic cartoon* 5
6
PASSIVE Tags: The power system completely powered by the incoming RF signal PASSIVE Tags: The power system completely powered by the incoming RF signal ACTIVE Tags: The power system has a battery ACTIVE Tags: The power system has a battery SEMI-PASSIVE Tags: Has a battery & use the reader’s power to transmit a message back to the RFID reader (using a technique known as backscatter) SEMI-PASSIVE Tags: Has a battery & use the reader’s power to transmit a message back to the RFID reader (using a technique known as backscatter) Size Comparing: Some Smaller than 0.4 mm thickness (Passive), Some as large as a book (Semi-Passive), Some implantable size of a grain of rice; Size Comparing: Some Smaller than 0.4 mm thickness (Passive), Some as large as a book (Semi-Passive), Some implantable size of a grain of rice; 6
7
Active RFIDPassive RFID PowerBattery operatedNo internal power Required Signal StrengthLowHigh Communication RangeLong range (100m+)Short range (3m) Data StorageLarge read/write data (128kb)Small read/write data (128b) Per Tag CostGenerally, $15 to $100Generally, $0.15 to $5.00 Tag SizeVaries depending on application"Sticker" to credit card size Fixed Infrastructure CostsLower - cheaper interrogatorsHigher - fixed readers Per Asset Variable CostsHigher - see tag costLower - see tag cost Best Area of Use High volume assets moving within designated areas ("4 walls") in random and dynamic systems High volume assets moving through fixed choke points in definable, uniform systems Industries / ApplicationsAuto dealerships/ Auto manufacturing/ Hospitals - asset tracking/ Construction/ Mining/ Laboratories/ Remote monitoring/ IT asset management Supply chain/ High volume manufacturing/ Libraries / book stores/ Pharmaceuticals/ Passports/ Electronic tolls/ Item level tracking 7
8
Size Reading Range Price Speed Reliability Lifetime 8
9
Promiscuous/ Secure: Communicate with any reader/ requiring a password from the reader Promiscuous/ Secure: Communicate with any reader/ requiring a password from the reader Programmability: A serial number of 64-bit or 96-bit & read- only storage/ Serial number burned by the manufacturer OR end user/ Serial number fixed OR changeable/ Containing read-write memory/ Containing sensor directly reports to the RFID reader OR store in a memory/ Have a self-destruct, or “kill” feature/ Contactless Smart Cards in financial applications (wireless protocols and passive powering) Programmability: A serial number of 64-bit or 96-bit & read- only storage/ Serial number burned by the manufacturer OR end user/ Serial number fixed OR changeable/ Containing read-write memory/ Containing sensor directly reports to the RFID reader OR store in a memory/ Have a self-destruct, or “kill” feature/ Contactless Smart Cards in financial applications (wireless protocols and passive powering) 9
10
Electronic Product Code (EPC) tags: Electronic Product Code (EPC) tags: Follows the EPC standard developed by the MIT Auto-ID Center Managed by the trade organization EPC global Table: EPC RFID Classes 10
11
Table: EPC RFID Chip Generation 11
12
Sending a pulse of radio energy to the tag listening for the tag’s response containing the tag’s serial number and other information 12
13
Simple RFID systems, the reader’s RF signal as an on-off switch/ More sophisticated systems, the signal contains commands, instructions, passwords, etc. Simple RFID systems, the reader’s RF signal as an on-off switch/ More sophisticated systems, the signal contains commands, instructions, passwords, etc. The RFID readers designed to read a particular kind of tag/ MULTIMODE readers can read many different kinds of tags The RFID readers designed to read a particular kind of tag/ MULTIMODE readers can read many different kinds of tags RFID readers usually ON, continually transmitting radio energy/ Battery-powered devices, the radio pulse sent only in response to an external event RFID readers usually ON, continually transmitting radio energy/ Battery-powered devices, the radio pulse sent only in response to an external event 13
14
The RFID physical layer Used to couple the reader to the tag to transfer information Unlicensed Spectrum: A specific part of the spectrum set aside for use without a radio license. Unlicensed Spectrum: A specific part of the spectrum set aside for use without a radio license. Most RFID systems use Unlicensed Spectrum frequencies Most RFID systems use Unlicensed Spectrum frequencies The larger the antenna on the reader and the tag, the better an RFID system will work, the more transmitted power The larger the antenna on the reader and the tag, the better an RFID system will work, the more transmitted power 14
15
The reader sends received messages to a computer The computer analyzes the message depend on the application; e.g. checks the number in a reference list and perform in a special way; or sends EPC code to a large database to check the specifications; etc. 15
16
16
17
Supply Chain Management (SCM) Supply Chain Management (SCM) Work in Process (WIP) Work in Process (WIP) passengers luggage transfer passengers luggage transfer Banking Banking E-Payments E-Payments Super markets Management Super markets Management Libraries Libraries Car Manufacturers Car Manufacturers Parking Parking Post Post Inspection Inspection Tracking Tracking … 17
18
18
19
RFIDBarcode Read Rate High throughput. Multiple (>100) tags can be read simultaneously. Very low throughput. Tags can only be read manually, one at a time. Line of Sight Not required. Items can be oriented in any direction, as long as it is in the read range, and direct line of sight is never required. Definitely required. Scanner must physically see each item directly to scan, and items must be oriented in a very specific manner. Human Capital Virtually none. Once up and running, the system is completely automated. Large requirements. Laborers must scan each tag. Read/Write Capability More than just reading. Ability to read, write, modify, and update. Read only. Ability to read items and nothing else. Durability High. Much better protected, and can even be internally attached, so it can be read through very harsh environments. Low. Easily damaged or removed; cannot be read if dirty or greasy. Security High. Difficult to replicate. Data can be encrypted, password protected, or include a "kill" feature to remove data permanently, so information stored is much more secure. Low. Much easier to reproduce or counterfeit. Event Triggering Capable. Can be used to trigger certain events (like door openings, alarms, etc.). Not capable. Cannot be used to trigger events. 19
20
Problems with RFID Standards Problems with RFID Standards RFID systems Disruption RFID systems Disruption RFID Reader Collision RFID Reader Collision RFID Tag Collision: The tags need to support an anti-collision protocol or a singulation protocol RFID Tag Collision: The tags need to support an anti-collision protocol or a singulation protocol Metal & Water Interference Metal & Water Interference Different Security/ Privacy Problems Different Security/ Privacy Problems Difficulty in removing:New technologies allow RFID tags to be "printed" right on a product and may not be removable at all Difficulty in removing: New technologies allow RFID tags to be "printed" right on a product and may not be removable at all 20
21
21
22
22
23
The Northside Independent School District in San Antonio, Texas, is putting RFID tags in the photo ID cards of their students so they can be tracked while on campus. No matter what people may say they intent to do with them, no matter what good they say will come out of it, the data collected from tracking our children with RFID tags will eventually be used to strip them of their freedoms and create a prison-like atmosphere in our schools… The Northside Independent School District in San Antonio, Texas, is putting RFID tags in the photo ID cards of their students so they can be tracked while on campus. No matter what people may say they intent to do with them, no matter what good they say will come out of it, the data collected from tracking our children with RFID tags will eventually be used to strip them of their freedoms and create a prison-like atmosphere in our schools… 23
24
24
25
RFID: Applications, Security, and Privacy, Simson Garfinkel, Beth Rosenberg, Addison-Wesley Professional; 1 edition (July 16 2005) RFID: Applications, Security, and Privacy, Simson Garfinkel, Beth Rosenberg, Addison-Wesley Professional; 1 edition (July 16 2005) Management Information Systems: managing the digital firm, 11th ed, Laudon, Kenneth Management Information Systems: managing the digital firm, 11th ed, Laudon, Kenneth RFID Journal, New York RFID Journal, New York www.thingmagic.com www.thingmagic.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.