View
71
Download
0
Category
Preview:
DESCRIPTION
RADIO FREQUENCY IDENTIFICATION(RFID). Karin Mithamo CIS 580. Overview. Definition of RFID How RFID Works Problems with RFID Current Applications Potential Application Database analyst and RFID. What is RFID?. Auto-ID technology bar codes, optical character readers and - PowerPoint PPT Presentation
Citation preview
RADIO FREQUENCY IDENTIFICATION(RFID)RADIO FREQUENCY IDENTIFICATION(RFID)
Karin Mithamo Karin Mithamo
CIS 580CIS 580
OverviewOverview
Definition of RFIDDefinition of RFID How RFID WorksHow RFID Works Problems with RFIDProblems with RFID Current ApplicationsCurrent Applications Potential ApplicationPotential Application Database analyst and RFIDDatabase analyst and RFID
What is RFID?What is RFID?
Auto-ID technology Auto-ID technology – bar codes, bar codes, – optical character readers and optical character readers and – biometric technologies, like retinal scans. biometric technologies, like retinal scans.
Radio frequency tags (chips) Radio frequency tags (chips) – to identify real objects,to identify real objects,– retrieve information by enabling readers, andretrieve information by enabling readers, and– Transmitting captured data to a computer system.Transmitting captured data to a computer system.
How RFID WorksHow RFID Works
Scanning AntennaScanning Antenna – Radio frequency signalsRadio frequency signals– radiation means of communication radiation means of communication – Antenna receives signals from the tag, and Antenna receives signals from the tag, and – Passes the information to a system. Passes the information to a system. – The scanning antennas can be permanently affixed to a The scanning antennas can be permanently affixed to a
surface or be handheld.surface or be handheld.
How RFID works ContinuedHow RFID works Continued
Transponder Transponder – Programmed RFID tag – Programmed RFID tag – Passed through scanning antenna field, Passed through scanning antenna field, – Detects the activation signal, Detects the activation signal, – Activates the RFID chip. Activates the RFID chip.
TransceiverTransceiver– Tag ReaderTag Reader– Transmits microchip information to scanning antenna. Transmits microchip information to scanning antenna.
RFID HardwareRFID Hardware
Magnetic / Inductive CouplingMagnetic / Inductive Coupling
TransceiverTag Reader
antenna
RFIDTag
IC or microprocessor
antenna
RFID HardwareRFID Hardware
Transmission CouplingTransmission Coupling
TransceiverTag Reader
antenna
RFIDTag
IC or microprocessor
antenna
Types of Tags: Active TagsTypes of Tags: Active Tags Active TagsActive Tags
– On-board transceiverOn-board transceiver– Battery – must be replacedBattery – must be replaced– Longer range- 60 to 300 feetLonger range- 60 to 300 feet– Application- Large bulky assetsApplication- Large bulky assets
Active Tags: ContinuedActive Tags: Continued
Types of Active TagsTypes of Active Tags– Transponders Transponders
Activated when they receive a signal from a reader. Activated when they receive a signal from a reader. Broadcast signal only when within range of a reader. Broadcast signal only when within range of a reader. Application Application
– toll payment collection and toll payment collection and – checkpoint control.checkpoint control.
Types of Active TagsTypes of Active Tags– BeaconsBeacons
Used in real-time locating systems (RTLS), to precisely Used in real-time locating systems (RTLS), to precisely locate an asset that needs to be tracked. locate an asset that needs to be tracked.
Emits a signal with its unique identifier at intervals. Emits a signal with its unique identifier at intervals. The signal is picked up by at least three reader The signal is picked up by at least three reader
antennas placed around the border of the area where antennas placed around the border of the area where assets are being tracked. assets are being tracked.
Application :Application :– distribution yards, and distribution yards, and – large auto making manufacturing facilities.large auto making manufacturing facilities.
Passive TagsPassive Tags
Passive TagsPassive Tags– Reflect energyReflect energy– Power SourcePower Source– TransmitterTransmitter– Maintenance Maintenance
Passive TagsPassive Tags
– FrequencyFrequencyLow frequencyLow frequencyHigh frequency or High frequency or Ultra-high frequency Ultra-high frequency
– PerformancePerformanceDifferent at each frequency, Different at each frequency, Light propertiesLight propertiesLevel of performance. Level of performance.
Real TagsReal Tags
Types of TagsTypes of Tags
Read OnlyRead Only– factory programmedfactory programmed– usually chiplessusually chipless
Read / WriteRead / Write– on-board memoryon-board memory– can save datacan save data– can change IDcan change ID– higher costhigher cost
TECHNICAL PROBLEMSTECHNICAL PROBLEMS Global StandardsGlobal Standards
– Automatic Identification and Data Capture TechniquesAutomatic Identification and Data Capture Techniques– Identification Cards and related devices Identification Cards and related devices – Identification and communication Identification and communication – Agricultural electronicsAgricultural electronics– Road Transport and Traffic TelematicsRoad Transport and Traffic Telematics– Transportable Gas Cylinders Transportable Gas Cylinders
Operational RequirementsOperational Requirements Identification of cylinders and contentsIdentification of cylinders and contents
TECHNICAL PROBLEMSTECHNICAL PROBLEMS
System disruptionSystem disruption– Electromagnetic FrequencyElectromagnetic Frequency– Low BatteryLow Battery
Reader CollisionReader Collision– Reader overlapReader overlap
Tag CollisionTag Collision– Too many TagsToo many Tags
Security, privacy and ethics Security, privacy and ethics problemsproblems
Reading consent Reading consent – Difficult removalDifficult removal– Post sale tag readingPost sale tag reading
Death of distance.Death of distance.– High-gain antennaHigh-gain antenna
Linking to private numbersLinking to private numbers– Credit card NumberCredit card Number
Current ApplicationsCurrent Applications
Livestock TaggingLivestock Tagging Wild Animal TrackingWild Animal Tracking Electronic Article Surveillance (EAS)Electronic Article Surveillance (EAS) Automated Toll CollectionAutomated Toll Collection Animal HusbandryAnimal Husbandry Vehicle Anti-TheftVehicle Anti-Theft
More ApplicationsMore Applications
Passive / Secure EntryPassive / Secure Entry Airline Baggage TrackingAirline Baggage Tracking Postal Package TrackingPostal Package Tracking Time and AttendanceTime and Attendance
Livestock TaggingLivestock Tagging
Meet Bobby the Cow
Bobby has an old fashioned ear tag for identification.
Tracking PenguinsTracking Penguins
http://www.beitec.com/penguin.htm
Automated Toll CollectionAutomated Toll Collection
Package TrackingPackage Tracking
Picture courtesy Texas Instruments
Potential Application: Grocery StorePotential Application: Grocery Store
Existence of Bar codesExistence of Bar codes Potential replacementPotential replacement Unmet need: Speed of checkoutsUnmet need: Speed of checkouts
Grocery Store ScenarioGrocery Store Scenario
Several full carts slow Several full carts slow down the checkout down the checkout process.process.
Cost of tags relative to Cost of tags relative to cashiercashier
Enhanced Groceries Store ChainEnhanced Groceries Store Chain
Track products Track products in the course of in the course of their entire their entire existence.existence.
Diagram courtesy How Stuff Works
Grocery Store with RFIDGrocery Store with RFID
All items in the store have All items in the store have RFID tag.RFID tag.
The cart is rung up in The cart is rung up in seconds with the help of seconds with the help of an RFID transceiveran RFID transceiver
Other Potential RFID ApplicationsOther Potential RFID Applications
RFID in the Euro by 2005RFID in the Euro by 2005 Xerox PARC Page DetectionXerox PARC Page Detection Department of DefenseDepartment of Defense Immigrations DepartmentsImmigrations Departments HospitalsHospitals
Database Analyst and RFIDDatabase Analyst and RFID Company AnalysisCompany Analysis Executive managers and technologyExecutive managers and technology
– Financial factorsFinancial factors– Value creationValue creation– Vendor analysisVendor analysis
Company TransitionCompany Transition– Current SystemCurrent System– Need for new SystemNeed for new System
Security and PrivacySecurity and Privacy– IntegrityIntegrity– Data availabilityData availability– ConfidentialityConfidentiality
ReferencesReferences
AIM Global NetworkAIM Global Networkhttp://www.aimglobal.orghttp://www.aimglobal.orgTexas Instruments RFID SolutionsTexas Instruments RFID Solutionshttp://www.ti.com/tiris/http://www.ti.com/tiris/RFID Journal .IncRFID Journal .Inchttp://www.rfidjournal.com/http://www.rfidjournal.com/http://www.technovelgy.com/ct/Technologyhttp://www.technovelgy.com/ct/Technology
Recommended