434 Radio Frequency Identification Technology

22
TABLE OF CONTENTS CHAPTER-1INTRODUCTION TO RFID TECHNOLOGY INTRODUCTION 3 CHAPTER-2 RFID SYSTEM 4 2.1 WORKING 4 2.2 TAGS 5 2.3 READER 5 CHAPTER 3: TYPES OF TAGS 8 3.1 ACTIVE TAGS 9 3.2 PASSIVE TAGS 9 3.3 RFID FREQUENCIES 9 CHAPTER 4: TYPES OF RFID APPLICATIONS 12 4.1 HEALTHCARE APPLICATIONS 12 4.2 SECURITY AND CONTROL APPLICATIONS 13 4.3 PATROLLING LOG APPLICATIONS 13 4.4 BAGGAGE APPLICATIONS 14 1

Transcript of 434 Radio Frequency Identification Technology

Page 1: 434 Radio Frequency Identification Technology

TABLE OF CONTENTS

CHAPTER-1INTRODUCTION TO RFID TECHNOLOGY

INTRODUCTION 3

CHAPTER-2 RFID SYSTEM 4

2.1 WORKING 4

2.2 TAGS 5

2.3 READER 5

CHAPTER 3: TYPES OF TAGS 8

3.1 ACTIVE TAGS 9

3.2 PASSIVE TAGS 9

3.3 RFID FREQUENCIES 9

CHAPTER 4: TYPES OF RFID APPLICATIONS 12

4.1 HEALTHCARE APPLICATIONS 12

4.2 SECURITY AND CONTROL APPLICATIONS 13

4.3 PATROLLING LOG APPLICATIONS 13

4.4 BAGGAGE APPLICATIONS 14

4.5 TOLLROAD APPLICATIONS 14

REFERENCES 15

CONCLUSION 16

1

Page 2: 434 Radio Frequency Identification Technology

LIST OF FIGURES

CHAPTER-2

2.1. RFID SYSTEM 5

2.2 BASIC COMMUNICATION BETWEEN HOSTY AND TAGGED SYSTEM 7

LIST OF TABLES

CHAPTER-3

3.1. COMPARISION OF PASSIVE AND ACTIVE TAGS 9

3.2. COMMON RFID FREQUENCIES AND PASSIVE RANGES [13]9

3.3 RFID FREQUENCIES RANGE [15] 11

2

Page 3: 434 Radio Frequency Identification Technology

CHAPTER-1

INTRODUCTION OF RFID

Radio frequency identification (RFID) is a contactless form of automatic

identification and data capture. Dating back to World War II, RFID transponders were used

to identify friendly aircraft. The RFID system consists of a reader, transponder, and antenna

utilizing several frequency ranges.

Barcodes have been developed in the railroad business to keep track of the various

cars. Out of this system of identification grew the U.P.C (Universal Product Code) which is

now used in almost all manufactured goods. UPC is used to store the manufacturer code as

well as the product code in a form that can be easily read by various scanners - even from a

distance. But there are limits to the use of barcodes. There must be a direct line of sight

between the reader and the code. The barcode can be obscured, for example by paint. One

only has read-access to the data, i.e., one cannot add new data without adding another label.

This is the point where a relatively new technology comes in: RFID (Radio Frequency

Identification). In RFID electronic chips are used to store data that can be broadcast via radio

waves to the reader, eliminating the need for a direct line of sight and making it possible for

"tags" to be placed anywhere on or in the product. One can even write to tags made of

semiconductor chips, thus enabling updating of data. This write function introduces new

capabilities, such as the updating of the manufacturing process of the attached item.

RFID first appeared in tracking and access applications during the 1980s. These

wireless AIDC systems allow for non-contact reading and are effective in manufacturing and

other hostile environments where bar code labels could not survive.

The RFID reader is designed for fast and easy system integration without losing

performance, functionality or security. The RFID reader consists of a real time processor,

operating system, virtual portable memory, and transmitter/receiver unit in one small self-

contained module that is easily installed in the ceiling or in any other convenient location.

3

Page 4: 434 Radio Frequency Identification Technology

CHAPTER-2

RFID SYSTEM

2.1 WORKING:

An RFID system consists of tags, readers, communication protocols, computer

networks, and databases. A typical RFID system is shown in Figure 1.

The tag is a miniature chip containing product information with an affixed radio

antenna. The tag is attached to an item or packaging and contains a unique serial number

called an electronic product code (EPC). The EPC is used to uniquely identify the pallet,

case, or item. For low-cost tags, a reader transmits a radio signal to the tags to energize them

so that the tag can transmit its EPC. A reader can be either stationary in a fixed state or

handheld. There are communication protocols that define the exchange of messages from the

tag to reader and reader to tag. The readers are connected to a computer network so that they

can be queried by a management system. Then the management system can query a database

determined by the EPC to find out more information about the item to which the tag is

attached.

4

Page 5: 434 Radio Frequency Identification Technology

Figure 2.1. RFID system

2.2 TAGS:

A tag contains information and a reader queries the tag for the information. A tag is

sometimes called a transponder. The word transponder comes from the words transmitter

and responder. It is an identifier affixed to a certain item or an object holding its

identification information. The tag responds to a reader’s request by transmitting the

information. The tag consists of a microchip connected to an antenna and sometimes a

battery. The chip has memory and today can store information up to 128 Kbytes. The tag’s

antenna is physically attached to the chip and is used to draw energy from the reader to

energize the tag.

5

Page 6: 434 Radio Frequency Identification Technology

Recent technology advances have made the size of a tag microchip smaller than a

sand grain. However, its physical dimensions are determined by the size of antenna. A tag

with a battery is known as an active tag and a tag without a battery is known as a passive tag.

Active tags generate energy from its battery and passive tags receive energy from reader that

generates a radio frequency (RF) field.

2.3 READER:

A reader, also known as an interrogator, is a device used to query one or more tags

within its range and communicate with them. It consists of one or more antennas that emit

radio waves and receive signals from one or more tags. The reader sends a request as an

interrogating signal for identification information to the tag. The tag wakes up and responds

or broadcasts with the respective information by sending an encoded modified signal, which

the reader decodes, forwarding it to the data processing device.

A data processing device aggregates the information from multiple tags and processes

data. It provides a distributed .database of information about items identified by tags and is

positioned between readers and enterprise applications. It can provide a variety of

computational functions on behalf of applications.

6

Page 7: 434 Radio Frequency Identification Technology

FIG2. 2: BASIC COMMUNICATION BETWEEN HOST AND THE TAGGED ITEM

7

Page 8: 434 Radio Frequency Identification Technology

CHAPTER-3

TYPES OF TAGS:

There are two broad categories of RFID tags: active and passive. The

characteristics of active and passive tags are summarized in Table 1. Each type will be

described in separate sections.

Table3. 1. Comparison of passive and active tags

Characteristics Passive RFID tag Active RFID tag

Power Source Provided by a reader Inbuilt

Availability of power Within the field of

reader

Continuous

Signal Strength

(Reader to Tag)

High Low

Signal Strength (Tag to

Reader)

Low High

Communication range < 3meters >100 meters

Tag reads < 20 moving tags @

3mph in few seconds

>1000 moving tags @

100mph in 1 sec

Memory 128 bytes 128 Kbytes

Applicability in supply

chain

Applicable where

tagged items

movement is

constrained

Applicable where

tagged items

movement is variable

and unconstrained

Expense $0.05 $10.00-$50.00

8

Page 9: 434 Radio Frequency Identification Technology

3.1 ACTIVE TAGS:

Active tags have their own transmitter and power source to transmit the information

stored on the microchip. They operate at 455 MHz, 2.45 GHz, or 5.8 GHz, and they typically

have a read range of 60 feet to 300 feet (20 meters to 100 meters). The battery-supplied

power of an active tag generally gives it a longer read range. The trade off is greater size,

greater cost, and a limited operational life that may yield a maximum of 10 years, depending

upon operating temperatures and battery type.

There are two types of active tags: transponders and beacons. Active transponders are

woken up when they receive a signal from a reader. These are used in toll payment collection,

checkpoint control and in tracking cargo. Transponders conserve battery life by having the

tag broadcast its signal only when it is within range of a reader.

Beacons are used in most real-time locating systems, where the precise location of an asset

needs to be tracked. In an RTLS, a beacon emits a signal with its unique identifier at pre-set

intervals. It could be every three seconds or once a day, depending on how important it is to

know the location of an asset at a particular moment in time.

RTLS are usually used outside, say, in a distribution yard, but automakers use the

systems in large manufacturing facilities to track parts bins. Active tags generally depend on

the amount of memory, the battery life required, any on-board sensors, and the ruggedness. A

thicker, more durable plastic housing increases the cost.

3.2PASSIVE TAGS:

Passive tags do not have a power source, but simply reflect back or backscatter the

energy coming from the reader antenna [13]. Passive tags are consequently much lighter than

active tags, less expensive, and offer a virtually unlimited operational lifetime. The trade off

is that they have shorter read ranges than active tags and require a higher-powered reader.

Passive tags operate at low, high, and ultra-high frequencies [14]. Low-frequency systems

generally operate at 124 kHz, 125 kHz or 135 kHz. High-frequency systems use 13.56 MHz.

Ultra-high frequency (UHF) systems operate at approximately 900 MHz and 2.45 GHz. The

tags used in the supply chain operate between 860 and 960 MHz and are the most common.

Common frequencies used by passive systems are shown in Table 2 [13].

9

Page 10: 434 Radio Frequency Identification Technology

Table 3.2. Common RFID frequencies and passive ranges [13]

Frequency Band Description Range

125 – 134 KHz Low frequency (LF) To 18 inches

13.553 – 13.567 MHz High frequency (HF) 3 -10 feet

400 – 1000 MHz Ultra-high frequency (UHF) 10 – 30 feet

2.45 GHz Microwave 10+ feet

3.3 RFID FREQUENCIES:

RFID systems operate on different frequencies depending on the application. Ten

such frequencies [15] are defined and are shown Table 3. Four classes of frequencies used in

RFID system are: Low Frequency (LF) with frequency range of 30 KHz to 300 KHz, High

Frequency (HF) with frequency range of 3MHz to 30MHz, Ultra High Frequency (UHF), and

Microwave Frequency above 1 GHz. These frequencies have specific ranges known as

industrial-scientific–medical (ISM) or short-range device (SRD) frequency ranges. RFID

systems operate on different frequencies so they will not interfere with existing radio

frequency systems.

10

Page 11: 434 Radio Frequency Identification Technology

Table 3.3. RFID frequency ranges [15]

Frequency Band Description

< 135 KHz Low frequency (LF)

6.765 – 6.795 MHz High frequency (HF)

7.4 – 8.8 MHz High frequency (HF)

13.553 – 13.567 MHz High frequency (HF)

26.957 – 27. 283 MHz High frequency (HF)

433 MHz Ultra-high frequency (UHF)

868 – 870 MHz Ultra-high frequency (UHF)

902 – 928 MHz Ultra-high frequency (UHF)

2.4 – 2.483 GHz Super-high frequency (SHF)

5.725 – 5.875 GHz Super-high frequency (SHF)

11

Page 12: 434 Radio Frequency Identification Technology

CHAPTER-4

TYPE OF RFID APPLICATIONS

4.1 HEALTHCARE APPLICATIONS:

The hospital case study conducted by a research shows that there are objects which

need to be considered when developing a model to represent patients’ flow. These objects are

associated with location. The finite set of locations within the hospital will be captured

through mobile technology in a live environment. The following components have been

observed in an overall picture of patients’ movement. However, the in depth investigation of

each component is yet to be explored.

• The number of paramedical staff involved in patient movement processes.

• The number of actions performed in patient movement processes.

• The resources involved in an patients movement processes.

• The finite number of locations used for patient movement processes.

• The process of integrating patient movement information with an existing IT infrastructure.

The system should enable the integration and optimization of resources while improving

accuracy and minimizing patients’ transition time leading to improvements in patients’

services.

RFIT applications in healthcare could save important resources that can further contribute to

better patient care. RFIT applications could reduce the number of errors by tagging medical

objects in the healthcare setting such as patients’ files and medical equipment tracking in a

timely manner. RFIT further improves the situation for patients’ care by integrating medical

objects involved throughout the patients’ care. RFIT based timely information about the

location of objects would increase the efficiency and effectiveness of paramedical staff

leading to improved patients’ experience.

12

Page 13: 434 Radio Frequency Identification Technology

4.2 SECURITY AND CONTROL APPLICATIONS

RFID tags can be attached to the equipment/user personal/official belongings such as

organization ID cards and vehicles. By applying RFID application in secure zones, not only

permission can be granted to and revoke for the users/persons in particular zone but also

record individual access and the length of their stay. It is also good for audit trial. These

types of application consider time and flow carefully and as an aspect that is very important.

4.3PATROLLING LOG APPLICATIONS

RFID is also used for auditing and controlling security persons themselves.

Application provides checkpoints for patrolling the security guards. Checkpoints are basically

a RFID tag which security guard needs to scan during their sequential patrol through the

reader. The reader maintains the record of the time and point at which the security guard

swapped his card. This will not only help security firms administration to check the

performance of its security guards but also used as a reference to track events. This

application can also help to improve the patrolling process, e.g. through identifying the need

to increase patrols or check points in a patrolled area.

4.4BAGGAGE APPLICATIONS

Airline industries, package and delivery service lose a lot of money on lost or late

delivery of baggage/packages. Handling large amount of packages from many places to

various destinations on different routes can be very complex. In this scenario RFID

application provide best resource management, effective operation and efficient transfer of

packages. RFID helps to identify the packages, and provide records that can advice the

industry on possible areas that may require some improvements. It also keeps customers

informed about their packages.

13

Page 14: 434 Radio Frequency Identification Technology

4.5TOLL ROAD APPLICATIONS

RFID applications make the toll collection/charging better with improved traffic flow,

as cars/vehicles cannot pass through toll stations without stopping for payment. RFID is used

to automatically identify the account holder and make faster transactions. This application

helps to keep good traffic flow and to identify traffic patterns using data mining techniques

that can inform the administration or decision support systems. For example, the information

can be used to report the traffic conditions or to extend and develop future plan

14

Page 15: 434 Radio Frequency Identification Technology

REFERENCES

• Microsoft UK, RFID: An Introduction,

http://www.rfid.com/pdfs_downloads/RFID_Blueprint_final.pdf

June, 2004.

• Kim Hargraves and Steven Shafer, RFID Privacy: The Microsoft Perspective,

http://www.rfid.com/pdfs_downloads/RFID_Privacy_Whitepaper_for_FTC_FINAL

June, 2004.

 

• Dargan, Gaurav; Johnson, Brain; Panchalingam, Mukunthan; Stratis, Chris, The Use

of Radio Frequency Identification as a Replacement for Traditional Bar coding,

May 2006.

 

• An Introduction to RFID Technology,

http://www.wikipedia.org/wiki/RFID

 

• Radio Frequency Identification: Applications and Implications for Consumers”,

http://www.ftc.gov/os/2005/03/050308rfidrpt.pdf

Jan 2008.

 

• Klaus Sinkenzeller, RFID Handbook, Second Edition, John Wiley & Sons, England

2004.

 

15

Page 16: 434 Radio Frequency Identification Technology

CONCLUSION

RFID is the most emerging technology which could replace all the tracking systems and mechanisms and is going to rule the world due to its smallest size and its possibility of implantation.

16

Page 17: 434 Radio Frequency Identification Technology

RADIO FREQUENCY IDENTIFICATION TECHNOLOGY

17