You are on page 1of 11

PRESENTED BY

T.MOHANAPRIYAA-III EEE P.PRIYA-III CSE M.KUMARASAMY COLLEGE OF ENGINEERING THALAVAPALAYAM KARUR.

ABSTRACT This paper explores the applications and future commercial impacts of radio frequency identification RFID technology. Its objective is to summarize the ways in which organizations and academics are thinking about these technologies and to stimulate strategic thinking about their possible uses and implications. It first provides an overview of this technology and how it works. Then it explores the surprisingly wide variety of current applications of RFID. Next it looks at several classes of potential RFID applications and how these might affect how organizations work. Finally, it examines the cost and implementation considerations of this technology. The paper concludes that RFID is a viable technology with many possible applications. However, only some of the impacts on organizations and society can be anticipated at present

INTRODUCTION
ABOUT EMBEDDED SYSTEM Embedded systems are the prime focus in the electronic era. The embedded are actually refer to hidden processor inside a system for performing the special function. It is an electronic system that includes a microcontroller to perform a specific dedicated application. The embedded system has microcontroller and memory that employ embedded microcomputers.

NEED OF EMBEDDED SYSTEM High reliability Flexibility Accuracy The throughput of the system is very high The response is dynamic RFID OVERVIEW Radio frequency identification or RFID is a generic term for technologies that use radio waves to automatically identify people or objects.RF (Radio Frequency) communication occurs by the transference of data over electromagnetic waves. An RFID System can be visualized as the sum of the following three components: RFID READER An RFID reader is a device that is used to interrogate an RFID TAG . The reader has an antenna that emits radiowaves .The tag responds by sending back its data. RFID TAG An RFID tag is composed of a microchip that stored data and a coupling element, such as coiled antenna, used to communicate via radio frequency communication. Most tags communicate only when they are interrogated by a RFID reader. RFID tag or transponder RFID reader or transceiver Data processing subsystem

TYPES OF TAGS

Tags are categorized into three types, Active tags Passive tags Semipassive tags ACTIVE TAGS

Active RFID tags contain a battery, which is used to drive the microchip's circuitry and to broadcast the signal to a reader (the way a cell phone transmits signals to a base station). PASSIVE TAGS Passive tags use the power induced by the magnetic field of the RFID reader. Moreover passive tags are cheaper and more sensitive to regulatory and environmental constraints, as compared to active tags. The limited resources of a passive tag require it to both harvest its energy and communicate with a reader within a narrow frequency as permitted by regulatory agencies. Passive tags typically obtain their power from the communication signal either through inductive coupling or far field energy harvesting. INDUCTIVE COUPLING Inductive coupling uses the magnetic field generated by the communication signal to induce a current in its coupling element (usually a coiled antenna and a capacitor). The current induced in the coupling element charges the on-tag capacitor that provides the operating voltage, and power required for the tag. Thus the inductively coupled systems behave mostly like loosely coupled transformers. So this type of inductive coupling works well in the near-field of the communication signal. FAR FIELD ENERGY HARVESTING Far field energy harvesting uses the energy from the interrogation signals far field signal to power the tag. The far field begins where the near field ends, at a distance of 1/ (2f) from the emitting antenna. The signal incident upon the tag antenna induces a voltage athe input terminals of the tag. This voltage is detected by the RF front-end circuitry of the tag and is used to charge a capacitor that provides the operating voltage for the tag.

SEMI-PASSIVE TAGS Semi-passive tags use a battery to drive the chip and communicate by drawing power from the reader. Active and semi-passive tags are useful for tracking high-value goods that are needed to be scanned over long ranges, such as railway cars on a track, but they cost a dollar or more, making them too expensive to put on low-cost items. RFID Vs BARCODE RFID is not necessarily "better" than bar codes.

The big difference between the two is bar codes are line-of-sight technology. RFID tags can be read as long as they are within range of a reader. In barcodes if a label is ripped, soiled or falls off, there is no way to scan the item. Standard bar codes identify only the manufacturer and product, not the unique item. RFID Vs SMART CARD Smart Cards cannot be used for products. Smart Cards are cheaper than RFID tags. There is no range of coverage for Smart Cards as RFID tags. So we cant track the supplier chain. There should be a physical contact between the reader and the Smart Card. The durability of the Smart Cards is less EXISTING SYSTEM At present, the attendance for students in schools and colleges are taken manually. It is smartcard very tedious to maintain the records of all the students of various classes. Even though had replaced the existing manual system. It has the disadvantage that not more than one smartcard can be scratched simultaneously. NEED FOR THE SYSTEM The existing system is taking more time. It has been overcome by our system Student attendance maintenance system using RFID in which the attendance will be marked in the database while the student with the RFID tag enters near the reader. Also in the RFID system there is no line of sight technology.

SYSTEM OPERATION The unique ID is stored in the RFID tag which is possessed by the student. After the tag senses the interrogation signal from the reader while entering the classroom, it responds by transmitting the ID stored in it to the system buffer through RS232 cable .Then the received ID will be verified with the database and if it is found correct, the attendance will be marked in the database by using visual basic. BLOCK DIAGRAM RF TAG

MICROCONTROLLER

RF TRANSMITTER

RF RECEIVER

BLOCKDIAGRAM FOR RECEIVER


MICROCONTROLLER RF TRANSMITTER R

RF RECEIVER

PC INTERFACING CIRCUIT

PC

HOW RFID WORKS? An RFID system consists of a tag, which is made up of a microchip with an antenna, and an interrogator or reader with an antenna. The reader sends out electromagnetic waves. The tag antenna is tuned to receive these waves. A passive RFID tag draws power from field created by the reader and uses it to power the microchips circuits. The chip then modulates the waves that the tag sends back to the reader and the reader converts the new waves into digital data.The current consumption is typically 2milliampere. It executes each instruction within 0.2us.

DESCRIPTION Student can give their attendance using their own RFID card. The project contains a database, which holds details about date all the seven hours, number of days attended and number of days absent. When the student enters the class the system reads the card number. The card number is verified with the database. The database contains all the details about the cards and the owner of the card. The attendance will be marked by checking the time of entrance. FREQUENCIES AND REGULATIONS The operation of RFID systems worldwide is regulated by local government bodies which control the electromagnetic spectrum in a region. Most RFID systems operate in so-called Industrial-Scientific-Medical (ISM) bands. These bands are freely available for use by low-power, short-range systems. The ISM bands are designated by the International Telecommunications Union (ITU).The most commonly used ISM frequencies for RFID are 13.56 MHz and 902-928 MHz. READER ANTI-COLLISSION

Reader collision occurs when the signals from two or more readers overlap.The tag is unable to respond simultaneous queries. This can be solved by having the readers programmed to read fractionally different times. This is achieved by using the technique Time Division Mutiple Access-TDMA or Anti-collision technique can still result in the same tag being read twice. RFID TAG ANTI COLLISION TAG COLLISION happens when multiple tags are energized by the RFID tag reader simultaneously, and reflect their respective signals back to the reader at the same time. This problem is often seen whenever a large volume of tags must be read together in the same RF field. The reader is unable to differentiate these signals; tag collision confuses the reader. Different systems have been invented to isolate individual tags; the system used may vary by vendor. For example, when the reader recognizes that tag collision has taken place, it sends a special signal (a "gap pulse"). Upon receiving this signal, each tag consults a random number counter to determine the interval to wait before sending its data. Since each tag gets a unique number interval, the tags send their data at different times. RFID SECURITY BENEFITS AND THREATS Universally deploying RFID tags offers many potential security benefits, yet may expose new privacy threats. Because RF communication is non-contact and non-line-of-sight, whereas other means of identification are either contact-based or require line-of-sight. Otherwise intrusive or cumbersome security practices, such as airline passenger and baggage tracking, can be made practical by using RFID systems. Authentication systems always take advantage of RFID technology, for example car key-less entry systems.

SOME APPROACHES TO RFID PROTECTION RFID tag can operate in either locked or unlocked state. While, locked a tag responds to all queries with the current ID value and restricts all other functionality. While, unlocked, the full functionality and memory of the tag are available to anyone in the interrogation zone.

To unlock a tag, the owner sends the original key value to the tag. The tag then hashes this value and compares it to the lock stored under the ID. If the value matches, the tag unlocks In the event of power loss or transmission interruption, tags will return to a default locked state ADVANTAGES Automated record keeping increases accuracy. Increased security. Better time management. Reduction in maintainence. Greater control over inventory. Transmit and receive information without wires. Reduces paper work. DISADVANTAGES Cost is higher than smartcard. APPLICATIONS Database management Library systems Airport baggage handling Electronic payment Retail theft management Automotive manufacturing Homeland security Postal services parking CONCLUSION In order to reduce the complexity in giving attendance , the smart cards and RFID tags are used. The RFID has many advantages over smart cards. It overcomes the need for physical contact between the card and the reader. Also only one smart card can be scratched at a time. The project contains a database, which holds details about day attendance, hour attendance , number of days attended and number of days absent. The options are separated for staffs as well as the students such as daily attendance, Class attendance and reports are also for staffs and students

separately. This will reduce the work load for staffs. Also the students will be aware of their attendance percentage. The student can check his individual performance and the staff can check the overall attendance percentage of the class.

You might also like