Download as pdf or txt
Download as pdf or txt
You are on page 1of 41

IOE

Q 1. Objects in ioe
Q 2. identifiers in ioe
Q 3. Ioe enabling technologies
1. Bluetooth
2. Zigbee
3. Z-wave

4. Wi-Fi

5. NFC
6. LoRaWAN
Q. 4 Explain RFID basic
Q 5. RFID Components
1. Tags
RFID tags are what stores and transmits the data that needs to be deciphered. The tags
can be attached to assets to send data to the antenna. The microchip embedded in the
tag is what stores the tag's ID and programmable data related to the asset. This stored
data is then transferred to the reader through antennas.
There are three major frequency ranges that RFID tags operate.
1. Low-Frequency (LF) Tags
2. High-Frequency (HF) Tags
3. Ultra-High Frequency (UHF) Tags - passive and active

Types
1. Passive
2. Active
3. Semi Passive
2. Antennas
Antennas are necessary elements in an RFID system because they transmit the RFID
tag’s data to the reader. Without some type of RFID antenna, whether integrated or
standalone, the RFID reader cannot correctly send and receive signals to RFID tags.

3. Readers
RFID readers are connected to the antenna and receive data from the RFID tag. The
reader is what receives and converts the radio waves into digital data on a computer
database.
There are two types of readers. There are Fixed Readers and Mobile Readers. Fixed
readers are typically mounted to walls or other objects and stay in one location to read
data stored in a tag. Mobile readers can be installed or carried anywhere it is needed.

4. Database
The RFID system requires a computer database to process data stored in tags. This
software can program tags, manage devices and data, remote monitoring and hardware
configuration.

Q 6. Principle of RFID
The basic principle of RFID technology: the RF signal to be transmitted by the reader&writer is
coded and loaded onto the high frequency carrier signal, and then sent out through the antenna.
A RFID reader stays powered on all the time and is normally powered from an external power
source. So when it is ON, the oscillator in it generates a signal with a desired frequency but as
the signal strength will be very less (which may lead to fading off the signal if it is transmitted
directly) it has to be amplified which can be done using an amplifier circuit, inorder to propogate
the signal to a longer distance we need to modulate the signal which is done by a modulator.
With all these improvements the signal is now ready to be transmitted which can be done by an
antenna which converts the electrical signal into a electromagnetic signal.

The RFID reader signals are everywhere with it’s promity to detect a tag. When a RFID tag
comes in the proxmity of the RFID reader the tag detects the readers signal through a coil
present in it which converts the received RF signal into a electrical signal. This converted signal
alone is sufficient to power up the microchip present in the tag. Once the microchip gets
powered up, its function is to send the data (unique ID) which it is stored in it. The same way the
signal came in, it is sent out through the same coil into the air.

RFID reader also has a transceiver in it. When the signal comes back from the tag through the
antenna of RFID reader it is fed to the demodulator and then decoded by a decoder where the
original data can be obtained and then further processed by a microcontroller or a
microprocessor to perform a specific task.

In case of an active RFID tag it detects the signal from the reader only to trigger the circuit and
make the tag ready to send the data to the reader, since active tags have built-in power source.
Q 7. RFID Tags
Q 8. Explain RFID System
RFID is an acronym for “radio-frequency identification” and refers to a technology whereby
digital data encoded in RFID tags or smart labels (defined below) are captured by a reader via
radio waves. ... RFID, however, has several advantages over systems that use barcode asset
tracking software.
Q 9. RFID Middleware

Issues while designing RFID Middleware


-multiple hw support
-synchronization and scheduling
-Real-time handling of incoming data from RFID readers
-interfacing with multiple application
-Scalability
Q 10. Applications of RFID
Q 11.Anti Collision in RFID
Q 12. Aloha Protocols
Aloha Protocols
Aloha-based protocols use a random-access strategy in order to successfully identify the
number of tags in an interrogation .They belong to the group of probabilistic protocols because
the tags transmit their own ID in randomly selected slots in a frame in order to reduce the
possibility of a collision. However, there is no guarantee that all of the tags will be identified in
the interrogation process. These protocols suffer from the well-known tag starvation problem, in
the sense that a tag may not be correctly read during a reading cycle due to an excessive
number
of collisions with that same tag. Every frame consists of a certain number of slots, and the tags
can only respond once per frame .
The main Aloha-based protocols can be divided into four subgroups: Pure Aloha (PA),
Slotted Aloha (SA), Frame Slotted Aloha (FSA) and Dynamic Frame Slotted Aloha (DFSA)
protocols.
1. Pure Aloha
Pure Aloha (PA) is one of the simplest anti-collision protocols. It is based on TDMA .
Whenever tags enter the interrogation zone, they randomly choose a frequency on which to
transmit their data. A collision will occur if several tags transmit data at the same time, resulting
in complete or incomplete collisions. A complete collision occurs when the messages of two
tags
fully collide; an incomplete collision, however, takes place when only part of the tag message
collides with another tag message. This procedure is shown in Figure 8 and will be repeated
until all tags are successfully identified.

PA has been presented using different extra-features [8,23] such as: muting for silencing
tags after being identified; the ‘Slow down’ for decreasing a tag response rate after
identification;
the ‘Fast Mode’ for sending a silence message before a tag begins transmission; and
combinations of these different features.

2. Slotted Aloha
To avoid incomplete collisions, Slotted Aloha (SA) has been created. In SA, the time is
divided into several slots and each tag must randomly select a slot in which it will transmit its
data [8,21,23,24]. The communication between the reader and the tag is now synchronous. An
example of communication with this protocol is presented in Figure 9.

Also, SA can use features similar to those presented for PA. The muting of slow down
features are used to silence or decrease the rate of the tags; the early end closes the slot earlier
than normal; and also combinations of the types.
Q 13. Challenges of RFID
• Problems with RFID Standards
• RFID systems can be easily disrupted
• RFID Reader Collision
• RFID Tag Collision
• Security, privacy and ethics problems with RFID
• RFID tags are difficult to remove
• RFID tags can be read without your knowledge
• RFID tags can be read a greater distances with a high-gain antenna

You might also like