Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

IoT Connectivity Technologies

Radio Frequency Identification

RFID, or Radio-Frequency Identification, is a technology that uses radio waves


to identify and track objects, animals, or people.

It operates on the principle of electromagnetic fields and consists of three main


components: the RFID tag, the RFID reader and a computer system.
RFID is a versatile technology that can be used to track and identify objects
in a variety of ways. It is a valuable tool for businesses and organizations
that need to keep track of their assets and resources.
RFID Components
An RFID system consists of three main components:

•Tags: The tags are small devices that are attached to the object that
you want to identify. They contain a microchip and an antenna. The
microchip stores the unique identification number for the tag. The
antenna receives and transmits radio waves.

•Readers: The readers are devices that emit radio waves and read the
information from the tags. They can be either fixed or mobile.

•Middleware: The middleware is software that connects the readers


and tags to a computer system. It is used to store and manage the
data collected from the tags.
Working Principle
The working principle of RFID is as follows:

1.The reader emits radio waves.


2.The tags in the vicinity of the reader receive the radio waves and
power up their microchips.
3.The microchips in the tags send their unique identification
numbers back to the reader.
4.The reader decodes the identification numbers and sends them to
the middleware.
5.The middleware stores the identification numbers in a database.
Range of RFID
The read range of an RFID system depends on the type of tag, the
type of reader, and the frequency of the radio waves. Passive tags
have a shorter read range than active tags. Active tags have a
battery that powers their microchips, so they can transmit their
identification numbers over a longer distance.
Radio Frequency Identification (RFID)

• RFID belongs to a group of technologies referred to as Automatic


Identification and Data Capture (AIDC).
• AIDC methods automatically
• identify objects,
• collect data related to them,
• and enter those data directly into computer systems with little or no human
intervention.
• RFID methods utilize radio waves to accomplish this.
Radio Frequency Identification (RFID)

• RFID uses tags and readers for communication.


• RFID tagshavedata encoded onto them digitally.
• RFID readers canreadvaluesencoded in these tagswithout physically touching
them.
• Functionally similar to barcodes as data readfrom tags arestoredin a database.
• RFID systems tasks: identifying tags,readingdata,feeding readdata directly into
computer systems through radio waves
RFID Tags and Operation
• Tagsconsist of an integrated circuitand an antenna, encasedin a protectivecasing
to protect from wear-and-tear and environmental effects.
• Tags can be either active or passive.
• Passive tags arehas to be powered using an RFID readerbeforedata transmission.
• Active tagshavetheirown power sources and do not need external activation by
readers.
• Tagsare used fortransmitting the data to RFID interrogatoror RFID reader.
• Radio wavesarethen convertedto a more usable form of data by this reader.
•The frequency of the radio waves used in RFID systems ranges from 125
kHz to 960 MHz. The lower frequencies have a longer read range, but
they can also be more susceptible to interference. The higher frequencies
have a shorter read range, but they are less susceptible to interference.

•The tags can be either passive or active. Passive tags do not have their
own power source. They are powered by the radio waves emitted by the
reader. Active tags have a battery that powers their microchips. They can
transmit their identification numbers over a longer distance than passive
tags.

•The middleware can be either centralized or distributed. In a centralized


system, all of the data collected from the tags is stored in a central
database. In a distributed system, the data is stored in multiple
databases.
Components of RFID System
1) RFID tag or smart label, 2) RFID reader, and 3) An antenna.

OR
Reader
RFID Operation
• A host computer systemaccesses the collecteddataon the readerby a
communication technology such as WiFi or Ethernet
• The data on the host systemis finally updated on a database and uploaded to
Internet

WiFi/Ethernet
RFID standards
• Main standards organizations are:
• International Organization for Standardization (ISO)
• Electronics Product Code Global Incorporated (EPCglobal)
• International Electrotechnical Commission (IEC)
• Each radio frequency has associated standards
• ISO 14223 and ISO/IEC 18000-2 for LF RFID,
• ISO 15693 and ISO/IEC 14443 for HF RFID,
• ISO 18000-6C for UHF RFID.
RFID and IoT – Application
• RFID chips can be placed on clothing in shelves to give each garment an
individual ID in a display section in the store
• Readers can read the tags and transmit to host computer system from there
it can go on to the Internet
• From Internet customer can locate a specific style/color/size combination
within the store in real time
• The data helps understand the level of inventory on a shelf to the store
owner
• A Passive Infrared (PIR) sensor could read passing humans or sensor that
can read foot traffic determines whether product placement is attracting
enough passers-by/demand of the product. Data goes to Internet.
• If inventory is low and customer passing by is high supplier will be informed
RFID applications
• FastTag electronic toll collection system operated by National Highway
Authority of India.
• It employs Radio Frequency Identification technology for making toll
payments directly from the prepaid or savings account linked to it
• Inventory management,
• Asset tracking,
• Personnel tracking,
• Supply chain management.
• Controlling access to restricted areas
Applications
•Inventory tracking
•Access control
•Toll collection
•Animal tracking
•Attendance monitoring
•Logistics
•Supply chain management
Think – Pair - Share
• How many components are available with RFID?

• Explain working principle of RFID.

• What is the range of RFID?

• Differentiate between RFID and Barcode.

• Provide applications of RFID.

• Design your product/application in which RFID can be used.


Near Field Communication (NFC)
• Jointly developed by Philips and Sony as a short-range wireless
connectivity standard
• NFC stands for Near Field Communication. It is a short-range
wireless communication technology that uses radio waves to
establish communication between two devices.
• Enables peer-to-peer (P2P) data exchange network.
• The communication between compatible devices requires a pair of
transmitting and receiving devices.
• The typical NFC operating frequency for data is 13.56 MHz, with a
typical range upto 20cm
• Supports data-rates of 106, 212, or 424 Kbps.
• http://nearfieldcommunication.org/
Near Field Devices
1) passive NFC 2) active NFC
• Passive NFC devices don’t need a power source for communicating
with the NFC reader.
• Tags and other small transmitters can act as a passive NFC device.
• However, passive devices cannot process information; they simply
store information, which is read by an NFC reader.
Near Field Devices
• Active NFC devices can communicate with active as well as
passive NFC devices.
• Active devices are capable of reading as well as writing
(transmitting) data to other NFC terminals or devices.
• Eg. a smartphone, would
• collect information from NFC tags
• exchange information with other compatible phones/devices
• alter information on NFC tag if authorized to make such changes.
Working Principle
The working principle of NFC is as follows:

1.The active NFC device emits radio waves.


2.The passive NFC device receives the radio waves and
powers up its microchip.
3.The microchip in the passive NFC device sends its unique
identification number back to the active NFC device.
4.The active NFC device decodes the identification number
and performs the desired action.
Here are some additional details about the working principle of NFC:

•The frequency of 13.56 MHz is used by NFC because it is a globally


unlicensed frequency. This means that NFC devices can be used
anywhere in the world without the need for a license.
•The NFC standard defines three modes of operation:
• Reader/writer mode: In this mode, the active NFC device is a reader
and the passive NFC device is a tag. The reader can read the data
from the tag or write data to the tag.
• Peer-to-peer mode: In this mode, both devices are active and can
communicate with each other. This mode is used for applications
such as mobile payments and file sharing.
• Card emulation mode: In this mode, the passive NFC device
emulates a smart card. This mode is used for applications such as
access control and contactless authentication.
NFC operation and communication
• Small electric current is emitted by NFC reader, which creates a magnetic
field that acts asa bridge in physical spacebetween two NFC devices.
• The generated EM field is converted back into electrical impulses
through another coil on the client device.
• Data such asidentifiers, messages, currency, status, and others can be
transmitted using NFCs.

Information extracted
NFC Reader Electro Electro Magnetic field from the electrical
emits Magnetic converted to pulses on the
electrical field created electrical pulses on receiver side by
current by current the client device microcontroller
NFC operation and communication
NFC information exchange mode
• 1) peer-to-peer, 2) read/write, and 3) card emulation.
• Peer-to-peer mode
• enables two NFC devices to exchange information.
• transmitting device goes active while receiving device becomes passive.
• During reverse transfer, both devices change roles.
• Read/write mode of information exchange
• alows only one-way data transmission.
• Active NFC device connects to a passive device to read information from it
• Card emulation mode
• enables an NFC device (general y, smartphones) to act asa contactless credit card and
make payments using just a simple tap on an NFC reader.
Use of Near Field Communication
(NFC) Platforms
• Global contactless
transaction values will reach
US$10 trillion by 2027, up
from US$4.6 trillion in 2022,
with contactless mobile
• Contactless card payments
by 119% over the same
period, according to a
Juniper Research forecast.
Applications
NFC can be used for a variety of applications, including:

•Mobile payments
•E-ticketing
•Access control
•Data exchange
•File sharing
•Contactless authentication
Think – Pair - Share
• What is operating frequency for NFC?

• Differentiate between passive and active NFC devices.

• Explain the working principle of NFC.

• Explain basic block diagram of NFC.

• Explain three modes of operation for NFC.

• Differentiate between RFID and NFC.

• Provide main applications of NFC.

• Give any information where you have used NFC for data transfer.

You might also like