SlideShare une entreprise Scribd logo
1  sur  35
RFID: Technology and Applications
By: Sweta Dargad
Assistant Professor
ITM Universe
The Wave of the Future
Outline
• History of RFID
• Types & Systems
• Current Uses
• Future Applications
• Controversies
What is RFID?
• A technology that employs a microchip with
an antenna that broadcasts its unique
identifier and location to receivers.
• Employs a microchip called a smart tag,
broadcasts unique 96-bit identifier to receiver.
• Receiver relays the data to a computer.
Ethernet
RFID
Reader
RFID Tag RF Antenna Network Workstation
RFID vs. Bar Codes
• Does not require human to manually pass
item
over scanner.
• More accurate inventory count.
• Can be incorporated into product, person,
animal.
• Can track each individual item.
History of RFID
• 1939
– IFF Transponder: Identification, friend or foe
(IFF) is an identification system designed for
command and control. It enables military and
national (civilian air traffic control)
interrogation systems to identify aircraft,
vehicles or forces as friendly and to determine
their bearing and range from the interrogator
– Used by allies in WWII
• 1945
– Leon Theremin made “The Thing”, also known
as listening device
– Espionage tool for Soviet Union
History cont.
• 1973
– Claims U.S. patent was first true ancestor
• 1980
– Retail
– Use of RFID in tracking and access applications
appeared
– Price, color, date of purchase
RFID Tags
• Contains two main parts:
– Silicon chips
– Antennas
• Components enable tags to receive and
respond to radio frequencies queries from
RFID transceivers.
• Three types:
– Passive
– Semi-Passive
– Active
RFID Tags cont.
• Passive
– Have no internal power supply
– Electrical current inducted in antenna by the incoming signal
proves power for integrated circuit in tag to power up and
transmit response
– Very Small, Limited Range, Unlimited Life
• Semi Passive
– Similar to passive tags, with the addition of a small battery
– Battery powers the integrated circuit
– Bigger, Longer Range, Limited Life
• Active
– Have their own internal power source
– Many operate at fixed intervals
– Also called beacons (broadcast own signal)
– Large ( coin), Much larger memories, Longer range
Tag block diagram
Antenna
Power Supply
Tx Modulator
Rx Demodulator
Control Logic
(Finite State
machine)
Memory
Cells
Tag Integrated Circuit (IC)
RFID readers
• Reader functions:
– Remotely power tags
– Establish a bidirectional data link
– Inventory tags, filter results
– Communicate with networked server(s)
– Can read 100-300 tags per second
• Readers (interrogators) can be at a fixed point such as
– Entrance/exit
– Point of sale
• Readers can also be mobile/hand-held
RFID System
 Objects equipped with RFID tag
 Tag contains transponder
with digital memory chip.
 Interrogator: an antenna
packaged with transceiver and
decoder.
 emits signal activating tag.
 Reader detects activation
signal, decodes the data on the
tag’s silicon chip.
 Data passed to host computer.
Growing Technology
• “Line of Sight” Technology
• RFID superior over Barcode
– Elements and accidents can disturb or damage
barcodes
• Best Buy, Wal-Mart, And Target began
implementation
– Efficient in ability to track & respond accordingly
Product Marketing – 75 years ago
You can have any
color,
as long as its black !
Product Marketing - Today
5
Add consumer
flexibility,
courtesy of
robotics,
computers …
Customer
window into
final stage of
manufacturing
Need to ensure error-free, custom assembly
Need inventory of components for the various customization
options
Critical Issues
Assembly process control
Inventory management
Supply chain integration
Customer insight
Effect on manufacturing
Applications of RFID
 Manufacturing and Processing
 Inventory and production process monitoring
 Warehouse order fulfillment
 Supply Chain Management
 Inventory tracking systems
 Logistics management
 Retail
 Inventory control and customer insight
 Auto checkout with reverse logistics
 Security
 Access control
 Counterfeiting and Theft control/prevention
 Location Tracking
 Traffic movement control and parking management
 Wildlife/Livestock monitoring and tracking
Current Uses
• Wal-Mart now requires its
suppliers to use RFID tags
on shipping crates and
pallets to improve
inventory management in
the supply chain.
• Fed Ex bought RFID-
enabled aircraft from
Airbus to reduce
maintenance time and
costs.
• Cattle and farm animals
are being tagged to
Smart groceries enhanced
Track products through their
entire lifetime.
Issues in Defense solved
• U.S. Department of Defense – to better track
goods along supply chain (logistics and
inventory).
• Electronic payment – credit card companies
moving to RFID-enabled cards to increase
efficiency and reduce time at point-of-sale for
customer, merchant, and card issuer.
Some more smart devices
• “Smart” appliances:
– Closets that advice on style depending on clothes available.
– Ovens that know recipes to cook pre-packaged food.
• “Smart” products:
– Clothing, appliances, CDs, etc. tagged for store returns.
• “Smart” paper:
– Airline tickets that indicate your location in the airport.
• “Smart” currency:
– Anti-counterfeiting and tracking.
• “Smart” people ??
The Future of RFID
 Medical
Drug Counterfeiting
Tracking & Tracing
Medical “Passports”
Foster Care System
Food Chain Precautions
 Shopping
Cashier-less check out
and payment
 Household Technology
Smart keys
Intelligent washing
machines
Monitoring refrigerators
Intelligent
ovens/microwaves
Controversy
• Privacy
– Consumer Rights
• Consumers should be informed if their products have
an RFID tag.
– Tracking of consumers (Profiling)
• RFID chips withstand dirt and scratches and can be
scanned from distances upward of 25 feet.
• Personal Information Leakage.
• Drawing the Line – Need for Legislation?
– Who Should Regulate?
Controversy cont.
• “Killing” of RFID Tags
– Tracking vs. the washing machine
– Options of killing after purchase
• Medical
– Implants/Personal Information
• Verichip is a tiny implantable chip that holds medical
records
• Bracelets to track infants in medical wards and elderly
in nursing homes.
– Used in animals for tracking.
Controversy cont.
• Medical
– Health Risks
• Hard to remove once implanted.
• Long term effects unknown.
• Religious
– Mark of the Beast, etc.
• The implanted RFID chip is certain to inflame Christian
fundamentalists, some of whom believe that such chips
are the Satanic “mark of the Beast” predicted in
Revelations 13:16 “And he causeth all, both small and
great, rich and poor, free and bond to receive a mark in
their right hand, or in their foreheads.”
RF effects of common materials
Communication protocols
ETSI EN 302 208 standard
• Shared operation in band 865.0 – 868.0 MHz at
transmit powers upto 2 W ERP.
– Operation in 10 sub-bands of 200 kHz.
– Power levels of 100 mW, 500 mW and 2 W ERP.
• Mandatory “listen before talk” and “look before leap”.
865.7MHz 867.5MHz
FT
865.1MHz 867.9MHz
100mW
867.7MHz865.5MHz
LT
FT
LT LT
FT
600kHz 600kHz600kHz
2W
FT
LT
500mW
865.0MHz 865.6MHz 867.6MHz 868.0MHz
Reader Collision Problem
• Reader-Reader Interference
• Reader-Tag Interference
Reader Collision and Hidden Terminal
• The passive tags are not able to take part in the collision
resolution or avoidance, as in other wireless systems
• Consider: RTS-CTS for hidden terminal problem in 802.11
– rfid: T is not able to send a CTS in response to an RTS from R
 In case multiple readers try to read
the same tag, the tag cannot
respond selectively to a particular
reader
TDMA based solution
• Assign different time slots and/or frequencies
to nearby readers
– Reduces to graph coloring problem (readers form
vertices)
• Only reader to reader interference
– Assign different operating frequencies
• Only multiple reader to tag interference
– Assign different time slots for operation
• Both types of interference
– First allot different time slots, then frequencies
Main Points
• Slowly becoming an industry standard
• Speeds up the supply chain process
• Easier to manage inventory
• Continually evolving
• Controversial technology
Questions for you….
• Define RFID technology?
• When was RFID introduced?
• What are two main reasons RFID is
controversial?
• Name the three types of RFID tags?
• How are they currently using RFID tags?
• How is RFID Technology expected to effect
households?
Questions?

Contenu connexe

Tendances

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) Chetan Pandey
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutionsashtopustech
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applicationsNaveen Kumar
 
Advanced Topics In Digital Signal Processing
Advanced Topics In Digital Signal ProcessingAdvanced Topics In Digital Signal Processing
Advanced Topics In Digital Signal ProcessingJim Jenkins
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)GITAM
 
Basics of digital filters
Basics of digital filtersBasics of digital filters
Basics of digital filtersSmile Hossain
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 
Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfidNaveen Sihag
 

Tendances (20)

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
RFID TECHNOLOGY
RFID TECHNOLOGYRFID TECHNOLOGY
RFID TECHNOLOGY
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applications
 
RFID
RFID RFID
RFID
 
Advanced Topics In Digital Signal Processing
Advanced Topics In Digital Signal ProcessingAdvanced Topics In Digital Signal Processing
Advanced Topics In Digital Signal Processing
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)
 
RFID
RFIDRFID
RFID
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Basics of digital filters
Basics of digital filtersBasics of digital filters
Basics of digital filters
 
RF Transceivers
RF TransceiversRF Transceivers
RF Transceivers
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
Library management system using rfid
Library management system using rfidLibrary management system using rfid
Library management system using rfid
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 

En vedette

En vedette (6)

Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
 
Acoustic wave form
Acoustic wave formAcoustic wave form
Acoustic wave form
 
Acoustic transducers
Acoustic transducersAcoustic transducers
Acoustic transducers
 
Surface Acoustic Wave Devices
Surface Acoustic Wave DevicesSurface Acoustic Wave Devices
Surface Acoustic Wave Devices
 
Meriam bibile IMaRC2016
Meriam bibile IMaRC2016Meriam bibile IMaRC2016
Meriam bibile IMaRC2016
 
RFID: Past, Present, and Future
RFID: Past, Present, and FutureRFID: Past, Present, and Future
RFID: Past, Present, and Future
 

Similaire à Applications of RFID technology

Similaire à Applications of RFID technology (20)

Rifd
RifdRifd
Rifd
 
RFID Part-19
RFID Part-19RFID Part-19
RFID Part-19
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
13251503 pss7
13251503 pss713251503 pss7
13251503 pss7
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
 
RFID
RFIDRFID
RFID
 
15205487pss7 ans
15205487pss7 ans15205487pss7 ans
15205487pss7 ans
 
R1x g22 rfid ii
R1x g22 rfid iiR1x g22 rfid ii
R1x g22 rfid ii
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 
12201375 PSS7
12201375 PSS712201375 PSS7
12201375 PSS7
 

Plus de sweta dargad

RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoringsweta dargad
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring Systemsweta dargad
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring systemsweta dargad
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimessweta dargad
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’ssweta dargad
 

Plus de sweta dargad (11)

Sock Puppet.pptx
Sock Puppet.pptxSock Puppet.pptx
Sock Puppet.pptx
 
Stacks
StacksStacks
Stacks
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’s
 
Cacti
CactiCacti
Cacti
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Dernier (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Applications of RFID technology

  • 1. RFID: Technology and Applications By: Sweta Dargad Assistant Professor ITM Universe The Wave of the Future
  • 2. Outline • History of RFID • Types & Systems • Current Uses • Future Applications • Controversies
  • 3. What is RFID? • A technology that employs a microchip with an antenna that broadcasts its unique identifier and location to receivers. • Employs a microchip called a smart tag, broadcasts unique 96-bit identifier to receiver. • Receiver relays the data to a computer. Ethernet RFID Reader RFID Tag RF Antenna Network Workstation
  • 4. RFID vs. Bar Codes • Does not require human to manually pass item over scanner. • More accurate inventory count. • Can be incorporated into product, person, animal. • Can track each individual item.
  • 5. History of RFID • 1939 – IFF Transponder: Identification, friend or foe (IFF) is an identification system designed for command and control. It enables military and national (civilian air traffic control) interrogation systems to identify aircraft, vehicles or forces as friendly and to determine their bearing and range from the interrogator – Used by allies in WWII • 1945 – Leon Theremin made “The Thing”, also known as listening device – Espionage tool for Soviet Union
  • 6. History cont. • 1973 – Claims U.S. patent was first true ancestor • 1980 – Retail – Use of RFID in tracking and access applications appeared – Price, color, date of purchase
  • 7. RFID Tags • Contains two main parts: – Silicon chips – Antennas • Components enable tags to receive and respond to radio frequencies queries from RFID transceivers. • Three types: – Passive – Semi-Passive – Active
  • 8. RFID Tags cont. • Passive – Have no internal power supply – Electrical current inducted in antenna by the incoming signal proves power for integrated circuit in tag to power up and transmit response – Very Small, Limited Range, Unlimited Life • Semi Passive – Similar to passive tags, with the addition of a small battery – Battery powers the integrated circuit – Bigger, Longer Range, Limited Life • Active – Have their own internal power source – Many operate at fixed intervals – Also called beacons (broadcast own signal) – Large ( coin), Much larger memories, Longer range
  • 9. Tag block diagram Antenna Power Supply Tx Modulator Rx Demodulator Control Logic (Finite State machine) Memory Cells Tag Integrated Circuit (IC)
  • 10. RFID readers • Reader functions: – Remotely power tags – Establish a bidirectional data link – Inventory tags, filter results – Communicate with networked server(s) – Can read 100-300 tags per second • Readers (interrogators) can be at a fixed point such as – Entrance/exit – Point of sale • Readers can also be mobile/hand-held
  • 11.
  • 12.
  • 13. RFID System  Objects equipped with RFID tag  Tag contains transponder with digital memory chip.  Interrogator: an antenna packaged with transceiver and decoder.  emits signal activating tag.  Reader detects activation signal, decodes the data on the tag’s silicon chip.  Data passed to host computer.
  • 14. Growing Technology • “Line of Sight” Technology • RFID superior over Barcode – Elements and accidents can disturb or damage barcodes • Best Buy, Wal-Mart, And Target began implementation – Efficient in ability to track & respond accordingly
  • 15. Product Marketing – 75 years ago You can have any color, as long as its black !
  • 16. Product Marketing - Today 5 Add consumer flexibility, courtesy of robotics, computers … Customer window into final stage of manufacturing
  • 17. Need to ensure error-free, custom assembly Need inventory of components for the various customization options Critical Issues Assembly process control Inventory management Supply chain integration Customer insight Effect on manufacturing
  • 18. Applications of RFID  Manufacturing and Processing  Inventory and production process monitoring  Warehouse order fulfillment  Supply Chain Management  Inventory tracking systems  Logistics management  Retail  Inventory control and customer insight  Auto checkout with reverse logistics  Security  Access control  Counterfeiting and Theft control/prevention  Location Tracking  Traffic movement control and parking management  Wildlife/Livestock monitoring and tracking
  • 19. Current Uses • Wal-Mart now requires its suppliers to use RFID tags on shipping crates and pallets to improve inventory management in the supply chain. • Fed Ex bought RFID- enabled aircraft from Airbus to reduce maintenance time and costs. • Cattle and farm animals are being tagged to
  • 20. Smart groceries enhanced Track products through their entire lifetime.
  • 21. Issues in Defense solved • U.S. Department of Defense – to better track goods along supply chain (logistics and inventory). • Electronic payment – credit card companies moving to RFID-enabled cards to increase efficiency and reduce time at point-of-sale for customer, merchant, and card issuer.
  • 22. Some more smart devices • “Smart” appliances: – Closets that advice on style depending on clothes available. – Ovens that know recipes to cook pre-packaged food. • “Smart” products: – Clothing, appliances, CDs, etc. tagged for store returns. • “Smart” paper: – Airline tickets that indicate your location in the airport. • “Smart” currency: – Anti-counterfeiting and tracking. • “Smart” people ??
  • 23. The Future of RFID  Medical Drug Counterfeiting Tracking & Tracing Medical “Passports” Foster Care System Food Chain Precautions  Shopping Cashier-less check out and payment  Household Technology Smart keys Intelligent washing machines Monitoring refrigerators Intelligent ovens/microwaves
  • 24. Controversy • Privacy – Consumer Rights • Consumers should be informed if their products have an RFID tag. – Tracking of consumers (Profiling) • RFID chips withstand dirt and scratches and can be scanned from distances upward of 25 feet. • Personal Information Leakage. • Drawing the Line – Need for Legislation? – Who Should Regulate?
  • 25. Controversy cont. • “Killing” of RFID Tags – Tracking vs. the washing machine – Options of killing after purchase • Medical – Implants/Personal Information • Verichip is a tiny implantable chip that holds medical records • Bracelets to track infants in medical wards and elderly in nursing homes. – Used in animals for tracking.
  • 26. Controversy cont. • Medical – Health Risks • Hard to remove once implanted. • Long term effects unknown. • Religious – Mark of the Beast, etc. • The implanted RFID chip is certain to inflame Christian fundamentalists, some of whom believe that such chips are the Satanic “mark of the Beast” predicted in Revelations 13:16 “And he causeth all, both small and great, rich and poor, free and bond to receive a mark in their right hand, or in their foreheads.”
  • 27. RF effects of common materials
  • 29. ETSI EN 302 208 standard • Shared operation in band 865.0 – 868.0 MHz at transmit powers upto 2 W ERP. – Operation in 10 sub-bands of 200 kHz. – Power levels of 100 mW, 500 mW and 2 W ERP. • Mandatory “listen before talk” and “look before leap”. 865.7MHz 867.5MHz FT 865.1MHz 867.9MHz 100mW 867.7MHz865.5MHz LT FT LT LT FT 600kHz 600kHz600kHz 2W FT LT 500mW 865.0MHz 865.6MHz 867.6MHz 868.0MHz
  • 30. Reader Collision Problem • Reader-Reader Interference • Reader-Tag Interference
  • 31. Reader Collision and Hidden Terminal • The passive tags are not able to take part in the collision resolution or avoidance, as in other wireless systems • Consider: RTS-CTS for hidden terminal problem in 802.11 – rfid: T is not able to send a CTS in response to an RTS from R  In case multiple readers try to read the same tag, the tag cannot respond selectively to a particular reader
  • 32. TDMA based solution • Assign different time slots and/or frequencies to nearby readers – Reduces to graph coloring problem (readers form vertices) • Only reader to reader interference – Assign different operating frequencies • Only multiple reader to tag interference – Assign different time slots for operation • Both types of interference – First allot different time slots, then frequencies
  • 33. Main Points • Slowly becoming an industry standard • Speeds up the supply chain process • Easier to manage inventory • Continually evolving • Controversial technology
  • 34. Questions for you…. • Define RFID technology? • When was RFID introduced? • What are two main reasons RFID is controversial? • Name the three types of RFID tags? • How are they currently using RFID tags? • How is RFID Technology expected to effect households?