You are on page 1of 16

Radio Frequency Identification

Introduction
RFID: A technology that uses radio frequency waves to
transfer data between a reader and movable item for detection,
tracking or identification purpose.
RFID is also called Dedicated Short Range Communication or
DSRC.
RFID Infrastructure
• Rf is a flexible technology, easy to use.
• It does not require line of sight or any any type of contact to
operate.
• It provides a high level of security.
• It works under any environmental condition and provide high
level of data integrity.
• Radio waves transfer data between an item to which an RFID
is attached and an RFID reader.
Components Of Rfid
• An antenna or coil.
• A transponder (RF TAG) electrically programmed with
unique information.
• An antenna and transceiver are together called as an
interrogator or reader.
• Host computer and appropriate software.
• We can have RNC’s (reader network
controller).
Active
Active
Tag
Tag

Tag
Tag
Types
Types
Semi-
Semi-
Passive
Passive Passive
Passive
tag
tag tag
tag
Active Tags
• Active tags have their own internal power source to
broadcast the response radio signal to a reader

• Operational range up to 100s of meters

+ More reliable
+ Battery life up to 10 years
- Expensive
Semi Passive Tags
• Similar to active tags.

• Internal power supply supplies to microchip only;


• Response is powered by backscattering only

+ Greater sensitivity than passive tags.


PASSIVE TAGS

• No internal Power source:


• It is energized in the presence of a reader

• Range up to 3-5 m

• The chip contain non- volatile, writable EEPROM for storing


data.

+ Longer Life
+ Cheap & small.
RFID Readers
•Reader sends out a wave to the tag which broadcasts back its
stored data to the reader.

•The data collected from the tag is uploaded on the computer

•Readers can be at fixed points such as:-


• Entrance/exit

• Warehouse

•Readers can also be mobile, hand-held or wireless


RFID OPERATION
SEQUENCE OF COMMUNICATION

1. Carrier signals sent by the reader (upon request from the host
application).

2. Carrier signal hits tag(s).

3. Tag receives and modifies carrier signal:


• “sends back” modulated signal.

4. Reader receives & decodes the data.

5. Results sent to the host application for further processing.


RFID OPERATION

Tag
Electronic Product Code

ECP Object Serial


Header Number
0-7bits Manager Class
8-35 bits 36-59bits 60-95bits

• Objective:
 To provide unique identification of physical objects.

• It is of total 95 bits.
Advantages
+ Penetrates materials well (water, tissue, wood, aluminum)
+ Good non-line-of-sight communication (except for conductive,
"lossy" materials)

+ Requires less than 100 milliseconds


+ No contact
+ Simultaneously reads of multiple items
Disadvantages
- Does not penetrate or transmit around metals (iron, steel)

- Accidental eating of tags in food

- Shielding of tags accidentally or deliberately prevents

payment of products at the checkout

- Radiation Laws and Public perception


Applications
• Airline Baggage Tracking

• Vehicle Security System

• Hotel Room Access

• Parcel Shipping System

• Toll System
Thank You

Presented By:
Pratham Khandelwal
Neha Yadav
Priyank Goel
Prateek Joshi
Siddharth Kumar Birla

You might also like