SlideShare une entreprise Scribd logo
1  sur  40
What is it? (And why should you care?)
RFID – What is it? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Tag Operational Principles N S TAG Reader Reader TAG Backscatter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Inductive Coupling
Why Now! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID Uses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bar Codes on Steroids ,[object Object],[object Object]
RFID  Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID Tag Attributes Active RFID Passive RFID Tag Power Source Internal to tag Energy transferred using RF from reader Tag Battery Yes No Required signal strength Very Low Very High Range Up to 100m Up to 3-5m, usually less Multi-tag reading 1000’s of tags recognized – up to 100mph Few hundred within 3m of reader Data Storage Up to 128 Kb or read/ write & search 128 bytes of read/write
Passive RFID Tags ,[object Object],[object Object],[object Object]
Active Tags ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Constitutes an RFID System? ,[object Object],[object Object],[object Object],[object Object],[object Object]
RFID API Software (Communicates with the RFID Reader) Customer-Specific Application Software  Host Computer Host Memory Space Reader Antenna Application Program Interface (API) Application Program Interface (API) Components of an RFID System
Antenna Reader Firmware Customer’s MIS Host Application Software API TCP/IP Power ~ Asset Asset/Tag RFID System Components (block diagram) Tag Insert
RFID Operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID Operations
What is RFID? -- The Tags ,[object Object],[object Object],[object Object]
 
What is RFID? -- The Readers ,[object Object],[object Object],[object Object],[object Object],[object Object]
RFID Readers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID Readers
Host CPU ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID System Basics ,[object Object],[object Object],[object Object],[object Object],[object Object]
How far, how fast, how much, how many, attached to what?
Status Today ,[object Object],[object Object]
Status Today ,[object Object],[object Object],[object Object],[object Object]
Status Today ,[object Object],[object Object],[object Object]
Status Today ,[object Object],[object Object],[object Object],[object Object]
Status Today ,[object Object],[object Object],[object Object],“ Mark of the Beast” Urban legend “ Andrew Jackson’s Exploding Eyeball” Urban legend
Applications
Portal Applications Bill of Lading Material Tracking
Portal Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conveyor / Assembly Line Read / Write Operations Higher Accuracy than Bar Code
Hand Held Application Categories Wireless   Batch   Fixed Station
Shipping Validation Tote/Box/Unit Level Inventory
Intelligent Labels
The HazMat Label
HazMat Smart Label ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Future ,[object Object],[object Object]
RFID Journal  rfidjournal.com InformationWeek  informationweek.com RFID Weblog   rfid-weblog.com Don’t Forget! “ RFID in the Supply Chain” 19 November 2004  Martin Center

Contenu connexe

Tendances

RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
Rfid based attendance sytem
Rfid based attendance sytemRfid based attendance sytem
Rfid based attendance sytemPiyush Saini
 
RFID
RFIDRFID
RFIDdont
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and ApplicationsAnal Mandal
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance systemafserfec56
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance systemA Jay Vardhan
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applicationsNaveen Kumar
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemShahrikh Khan
 

Tendances (20)

Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID
RFID RFID
RFID
 
Rfid based attendance sytem
Rfid based attendance sytemRfid based attendance sytem
Rfid based attendance sytem
 
RFID
RFIDRFID
RFID
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance system
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Smart shopping system using rfid
Smart shopping system using rfidSmart shopping system using rfid
Smart shopping system using rfid
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applications
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin System
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 

Similaire à RFID Basics

Similaire à RFID Basics (20)

Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
RFID
RFIDRFID
RFID
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
Rfid Basics Qed
Rfid Basics QedRfid Basics Qed
Rfid Basics Qed
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Basics Of Rfid Technology
Basics Of Rfid TechnologyBasics Of Rfid Technology
Basics Of Rfid Technology
 
Selectingtags Final
Selectingtags FinalSelectingtags Final
Selectingtags Final
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
Rfid In Brief Ii
Rfid In Brief IiRfid In Brief Ii
Rfid In Brief Ii
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
What is rfid
What is rfidWhat is rfid
What is rfid
 
Rfid rupesh
Rfid rupeshRfid rupesh
Rfid rupesh
 
IntroductionRFID1-EMBA.ppt
IntroductionRFID1-EMBA.pptIntroductionRFID1-EMBA.ppt
IntroductionRFID1-EMBA.ppt
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
Major project
Major projectMajor project
Major project
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Automatic car parking system
Automatic car parking system Automatic car parking system
Automatic car parking system
 
Rfid
RfidRfid
Rfid
 

Dernier

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

RFID Basics

  • 1. What is it? (And why should you care?)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. RFID Tag Attributes Active RFID Passive RFID Tag Power Source Internal to tag Energy transferred using RF from reader Tag Battery Yes No Required signal strength Very Low Very High Range Up to 100m Up to 3-5m, usually less Multi-tag reading 1000’s of tags recognized – up to 100mph Few hundred within 3m of reader Data Storage Up to 128 Kb or read/ write & search 128 bytes of read/write
  • 10.
  • 11.
  • 12.
  • 13. RFID API Software (Communicates with the RFID Reader) Customer-Specific Application Software Host Computer Host Memory Space Reader Antenna Application Program Interface (API) Application Program Interface (API) Components of an RFID System
  • 14. Antenna Reader Firmware Customer’s MIS Host Application Software API TCP/IP Power ~ Asset Asset/Tag RFID System Components (block diagram) Tag Insert
  • 15.
  • 17.
  • 18.  
  • 19.
  • 20.
  • 22.
  • 23.
  • 24. How far, how fast, how much, how many, attached to what?
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 31. Portal Applications Bill of Lading Material Tracking
  • 32.
  • 33. Conveyor / Assembly Line Read / Write Operations Higher Accuracy than Bar Code
  • 34. Hand Held Application Categories Wireless Batch Fixed Station
  • 38.
  • 39.
  • 40. RFID Journal rfidjournal.com InformationWeek informationweek.com RFID Weblog rfid-weblog.com Don’t Forget! “ RFID in the Supply Chain” 19 November 2004 Martin Center