Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 15

INDEX

Introduction TO RFID ... 1

Transponder . RFID TAG .

2 3

TAG READER .. RFID Frequencies . RFID TAG MEMORY . HOW IT WORKS?? . SYSTEM PERFORMANCE ... RFID V/S BARCODE ...
APPLICATIONS . ADVANTAGES & DISADVANTAGE .. CONCLUSION

4 5 7 7 9 10
11 12 13

INTRODUCTION

Almost every product in the market has a barcode printed on it. Barcodesare machine-readable parallel bars that store binary information, revealing information about the product. Thus, it acts as the product fingerprint. As we goto the supermarket to buy things, the checkout person runs our selection over the scanner to scan the barcode, theres an audible beep, and we are told how much money we owe. But the days of barcode are numbered. The reason is that a technology called radiofrequency identification (RFID) is catching on.RFID tags are being used by corporations to track people and products in just about every industry. They transform everyday objects like cargo containers, car keys, and even clothes on the rack at a shopping mall into mini nodes on a network. Databases then record the location and status of these network nodes to determine product movements. This technology can completely replace barcodes. The automotive industry makes use of small RFID tags that offer a high level of security at low cost. A lot of developments are taking place in RFID technology that will change the course of the industry, particularly in the supply chain area.
1

TRANSPONDER A tag is any device or label that identifies the host to which it is attached. It typically does not hinder the operation of the host or adversely affect its appearance. The word transponder is derived from the words transmitter and

responder. The tag responds to a transmitted or communicated request for the data it carries. i . F g 1

Transponder Block Diagram The transponder memory may comprise of read-only (ROM), random access (RAM), and non-volatile programmable memory for data storage depending on the type and sophistication of the device. The ROM-based memory is used to accommodate security data and the transponder operating system instructions which in conjunction with the processor or processing logic deals with the internal house-keeping functions like response delay timing, data flow control and supply switching. The RAM-based memory is used for temporary
2

data storage during transponder interrogation and response. The non-volatile programmable memory may be of several types of which the electrically erasable programmable read-only memory (EEPROM) is the most common. It is used to store the transponder data and needs to be non-volatile to ensure that the data is

retained when the device is in its quiescent or power-saving sleep state. Data buffers are further components of memory used to temporarily hold the incoming data following demodulation and outgoing data for modulation and interface with the transponder antenna. The interface circuitry provides the facility to direct and accommodate the interrogation field energy for powering purposes in passive transponders and triggering of the transponder response. The transponder antenna senses the interrogating field and serves as the means for transmitting the transponder response for interrogation.

Antenn a

RFID TAG
Power Supply Memor y Cells

Tx Modulator Rx Demodulato r Tag Integrated Circuit (IC)

Control Logic (Finite Stat machine)

Tag block diagram


On the basis of the presence of battery, tags can be classified into active Or passive tags. 3 Active tags are powered by an internal battery and are generally read/write devices. They contain a cell having a high power to weight ratio and are capable of operating over a temperature range of -50 to +70 degree Celsius. Active tags have a finite life time. A suitable cell coupled to suitable low power circuitry can ensure functionality of ten or more years depending on operating

temperatures, read/write cycles and usage. They have greater size and increased cost compared to passive tags. Passive tags operate without an internal battery source, deriving the power to operate from the field generated by the reader. They are hence lighter than active tags and have greater life time. They have shorter read ranges compared to active tags. They are also constrained in their ability to store data and perform well in electromagnetically noisy environments.

TAG READER
The reader/interrogators can differ considerably in complexity depending on the type of tags being supported and functions to be fulfilled. The overall function is to provide the means OF communicating with the tag and facilitating data transfer. Functions performed by readers include signal conditioning, parity error checking and correction. Once the signal from a transponder has been correctly received and decoded, algorithms can be applied to decide whether the signal is a repeat transmission and may then instruct the transponder to stop transmitting. This is known as Command Response Protocol and is used to circumvent the problem of reading multiple tags in a short span of time. Using interrogators in this way is also referred to as Hands Down Polling. A moreSecure, but slower tag polling technique is called Hands Up Polling which involves the interrogator looking for tags with specific identities and interrogating them, in turn. A further approach uses multiple readers, multiplexed into one interrogator but results in cost increase.
4

RFID Frequencies
Frequency refers to the size of the radio waves used to communicate between the RFID system components. It is generally safe to assume that a higher frequency equates to a faster data transfer rate and longer read ranges, but also more sensitivity to environmental factors such as liquid and metal

that can interfere with radio waves. RFID systems currently operate in the Low Frequency (LF), High Frequency (HF) and Ultrahigh Frequency (UHF) bands. Each frequency has advantages and disadvantages relative to its capabilities. Generally a lower frequency means a lower read range and slower data read rate, but increased capabilities for reading near or on metal or liquid surfaces. No single frequency is ideal for all applications, even within a single industry. Just as separate bar code symbologies are used at different levels of consumer goods packaging, from U.P.C./EAN symbols at the item level to Code 128 and two-dimensional symbologies on cases and pallets, RFID tags of different frequencies and functionality will be used together within overall supply chain operations. Low-Frequency (LF) Low-frequency RFID systems are typically 125 KHz, though there are systems operating at 134 KHz as well. This frequency band provides a shorter read range (< 1m) and slower read speed than the higher frequencies. LF RFID systems have the strongest ability to read tags on objects with high water or metal content compared to any of the higher frequencies. LF systems tend to be less sensitive to interference than higher frequency options. Typical low-frequency RFID applications are access control, animal tracking, vehicle immobilizers, healthcare applications, product authentication and various point-of-sale applications (such as Mobil/Exxon Speed Pass). The LF spectrum is not considered a truly global application because of slight differences in frequency and power levels throughout the world. High-Frequency (HF) High-frequency RFID systems operate at 13.56 MHz, and feature a greater read range and higher-read speed than LF systems. Also, the price of the tags is among the lowest of all RFID tags. Typical read range is 1-2 meter and the ability to read tags on objects with high water or metal content is not as good as LF systems but stronger than UHF systems. Applications include smart cards and smart shelves for item level tracking, and are also currently used to track library books, healthcare patients, product authentication and airline baggage. Another common application is maintenance data logging for sensitive equipment that needs regular checking such as fire suppression systems.

ULTRAHIGH-FREQUENCY(UHF)
Ultrahigh frequency RFID utilizes the 860 to 930MHz band typically 868 MHz in Europe and 915 MHz in North America. UHF tags typically cost about the same as HF tags. Read range is up to 10m to 50m and the data

transfer rate is faster than HF systems, though still lower than Microwave based RFID systems, which are discussed next. One drawback to UHF systems is a limited ability to read tags on objects with or surrounded by high water or metal content. This is typically the frequency recommended for distribution and logistics applications and is the basis for the Electronic Product Code (EPC) standard driven through the Auto-ID Center. Of course, the EPC standard is the focus of Wal-Mart and the Department of Defense in the United States. The primary rationale for utilizing this frequency in the supply chain is the greater read range it offers over the other frequency ranges. However, UHF is also widely used for electronic toll collection systems on highways, manufacturing applications and parking lot access based on the greater range provided by the frequency. The North American market operates at or near 915 MHz, while much of Western Europe is at the low end of the spectrum, and several Asian companies recently opened the higher end of the spectrum to RFID usage.

Microwave
The final frequency option is the microwave band, either 2.45GHz or 5.8GHz. Though microwave based RFID systems offer the highest data read rates, they are the most expensive systems and have a limited read range of up to 10 - 100m. Additionally, microwave based systems are not able to penetrate objects with high water or metal content which makes it unsuitable for many applications. At this time, microwave is constrained to specialized applications such as tracking airline baggage or electronic toll collection. Though it could be used for some supply chain applications with high data content, the inability to penetrate water or metal combined with the higher cost will limit its deployments in this realm.
6

RFID TAG MEMORY


1.Read-only tags
Tag ID is assigned at the factory during manufacturing

Can never be changed No additional data can be assigned to the tag

2.Write once, read many (WORM) tags


Data written once, e.g., during packing or manufacturing Tag is locked once data is written Similar to a compact disc or DVD

3.Read/Write TAG
data can be changed over time Part or all of the data section can be locked

HOW IT WORKS??

RFID Reader

RFID Tag

RF Antenna

Network Workstation

Ethernet

An RFID system consists of RFID tags ,a means of reading or interrogating the tags and a means of communicating the data to a host computer or information management system. The system will also include a facility for entering or programming data into tags, if it is not done at the source by the manufacturer. There may also be present antennas for communication between the ag and the reader. The reader sends out a radio frequency wave to the tag and the tag broadcasts back its stored data to the reader. The system has two antennas, one for the tag and the other on the reader. The data collected from the tag can either be sent directly to a host computer through standard interfaces or it can be stored in a portable reader and later updated to the computer for data processing. The automatic reading and direct use of tag data is called automatic data capture. When the tag which is battery free,is to be read ,the reader sends out a power pulse to the antenna lasting for about 50ms.The magnetic field generated is collected by the antenna in the transponder that is tuned to the same frequency. This received energy is rectified and stored on a capacitor within the transponder.
8

When the power pulse has finished, the transponder immediately transmits back its data, using the energy stored within its capacitor as its power source.

The details picked up by the receiving antenna and decoded by the reader unit. Once all the data has been transmitted, the storage capacitor is discharged resetting the transponder to make it ready for the next read cycle. The period between transmission pulses is called sync time and lasts between 20ms and 50ms depending on the system set up. The transmission technique between the transponder and the reader is FSK. This approach has good resistance to noise and is cost effective to implement.

SYSTEM PERFORMANCE
Reading distance:
The actual reading distance depends on the transponder type, electromagnetic noise, transponder orientation, antenna type. In general, a 32mm glass transponder can be read with a stationary reader and gate antenna from a distance of about 1m.Larger transponders can achieve ranges up to 2m with handheld readers offering lower ranges up to 250mm.

Data accuracy:
A 16-bit cyclic redundancy check algorithm is used to ensure that only valid data is sent from the reader to its associated controller.

Antenna selection:
Of the antenna types, the one giving larger read ranges is Selected. Electromagnetic noise affects the readout pattern.

Transponder orientation:
For maximum range, the antenna orientation with Respect to the transponder must be optimized for maximum coupling. The Orientation in line with a ferrite antenna produces the largest read ranges from 2mm glass transponder.

Reading speed:
Many applications require that that transponder must remain in the reading range. Since a standard stationary reader completes one cycle in abut 120ms, transponders must remain in the boundaries of a readout pattern for at least that amount of time.
9

RFID V/S BARCODE

If compared, RFID technology is found to be more comprehensive than barcode technology. It is possible to read RFID tags from a greater distance. An RFID reader can access the information of the tag from a distance of around 300 feet, whereas barcode technology can't be read from a distance of more than 15 feet. RFID technology also scores over barcode technology in terms of speed. RFID tags can be interpreted much faster than barcode tags. Barcode reading is comparatively slower because it requires a direct line of sight. On an average, a barcode reader takes around one second to successfully interpret two tags, whereas in the same time the RFID reader can interpret around 40 tags. RFID tags are well protected or either implanted inside the product, and hence are not subjected to much wear and tear. Interpreting a barcode requires a direct line of sight to the printed barcode, because of which the barcode is printed on the outer side of the product, and is thus subjected to greater wear and tear. It also limits the re-utilization of barcodes. As barcode the lacks read and write facility, it is not possible to add to the information already existing on it. Though it appears to be more a comprehensive data collection technology owing to the lack in end-to-end supply chain deployments, firms have to think twice before opting for it. Barcode technology is relatively cheaper than RFID technology. The cost incurred for RFID technology increases further more if it is customized for a particular product. When RFID technology is deployed, the company has to make arrangements to collect and filter the data that comes from various sources, and then evaluate it and send the information to the management system, all of which can turn out to be very costly. Barcode tags are much lighter and smaller than RFID tags, and therefore are easier to use. Although RFID tags have a very good range, they often get affected when they come in close proximity to some metals, thus making it difficult to interpret the data. If damaged, RFID tags cannot be replaced, while in barcode systems, the damaged tags can easily be replaced. Owing to its speed, range and durability, RFID has made a place for itself in high-end technologies and businesses, while the relatively cheaper and easy to use barcode is widely used in everyday applications. So even though 10 RFID has taken over barcode in some fields, both the technologies do coexist in world today.

APPLICATIONS
Payment by mobile phones: Since summer 2009, two credit card companies have been working with Dallas, Texas-based Device Fidelity to develop specialized micro SD cards. When inserted into a mobile phone, the micro SD card can be both a passive tag and an RFID reader.After inserting the micro SD, a user's phone can be linked to bank accounts and used in mobile payment.

Car-sharing: The Zip car car-sharing service uses RFID cards for locking and unlocking cars and for member identification.
Product tracking: RFID use in product tracking applications begins with plant-based production processes, and then extends into post-sales configuration management policies for large buyers. Casino chip tracking: These tags allowed casinos the ability to detect counterfeit chips, track betting habits of individual players, speed up chip tallies, and determine counting mistakes of dealers. In 2010, the Bellagio casino was robbed of $1.5 million in chips. The RFID tags of these chips were immediately invalidated, thus making the cash value of these chips $0. Animal identification : RFID tags for animals represent one of the oldest uses of RFID technology. Libraries: The RFID tag can contain identifying information, such as a book's title or material type, it provides self check-in and anti-theft, Passports: can be used to authenticate the identity of travelers, and used to keep track travels of user Schools and universities: School authorities in the Japanese city of Osaka are now chipping children's clothing, back packs, and student IDs in a primary school.A school in Doncaster, England is piloting a monitoring system designed to keep tabs on pupils by tracking radio chips in their uniforms.

Supply chain- WalMart, Target, BestBuy, and other retailers have discovered that RFID technology can keep inventories at the optimal level, reduce out-of-stock losses, limit shoplifting, and speed customers through check-out lines.

RFID technology permits no line of sight reading.

ADVANTAGES

Robustness and reliability under difficult environmental conditions. These tags can be read through water, snow, concrete, bricks, plastics, wood, and most non-metallic materials Available in a wide variety of physical forms, shapes, sizes and protective housings. RFID tags can be read at very high speeds. In most cases the response time is less than 100ms. Difficulty in duplicating, offers a high degree of security.

Cost

DISADVANTAGES

RFID solutions cost much higher than the conventional barcodes. A large fraction of its cost lies in the software infrastructure and the enterprise Application and integration

Lack of standardization.

Standardization has not been provided across many fronts, ranging from the different data formats used to interpretability between RFID readers and tags from different vendors to interference between RFID products from different manufacturers.

RFID will hurt privacy

RFID transponders are forever part of the product, and designed to respond when a signal is received.

12

CONCLUSION
RFID tags will soon be tracking millions of consumer products worldwide. Manufacturers will know the exact location of each product they make from the time it is made until it is used and tossed in the recycle bin or trash can. The crypto transponders will be well suited for future generation vehicle entry systems. The RFID tagging will take off when the cost of the tags drops to one percent of the cost of the product it is applied to, and that date is somewhere near. The benefits of RFID technology cannot be ignored in todays tight staffing and funding climate.

13

You might also like