You are on page 1of 52

(Electronics and Communication Department)

Minor Project Report


On
RFID based power management system
2013-2014
Gided !y" #bmitted to "
Dr$ %a&ita '(are Pro)$ #angeeta *a'(ate

Under the guidance of
Dr. Kavita Khare
Certificate
I hereby certify that the work which is being presented in the B.Tech.
Minor Project Report entitled RFID BASED POWER
MANAGEMENT, in partial fulfillent of the re!uireents for the
award of the Bachelr ! Technl"# in Electrnic$ % &''(nicatin
En"ineerin" and subitted to the "epartent of #lectronics $
Counication #ngineering of Maulana %&ad 'ational Institute of
Technology is an authentic record of our own work carried out under the
super(ision of Dr. KA)ITA K*ARE, Electrnic$ an+ &''(nicatin
De,art'ent. and by )asha *aushal +,,,,,-,-,./ ayushi choudhary
+,,,,,-012./ aditya patel +,,,,,-034./ atul pardhi +,,,,,-0,1.
It is certified that all corrections 5 suggestions indicated for internal
assessent for Internal assessent ha(e been incorporated in the report. It
has been appro(ed as it satisfies the acadeic re!uireents in respect of
project work prescribed for the said degree.
Mr$ San"eeta Na-hate Dr. KA)ITA K*ARE
+Professor. +Professor.
#C# "epartent #C# "epartent
Ac-n.le+"e'ent
3
It gi(es us an iense pleasure to e6press our deepest sense of gratitude
and sincere thanks to our highly respected and esteeed guide Dr. Kavita
Khare /E&E +e,art'ent0 MANIT Bhopal/ for her (aluable guidance/
encourageent and help for copleting this work. 7er useful suggestions
for this whole work and co8operati(e beha(ior is sincerely
acknowledged.
9e would like to e6press our sincere thanks to Mr$ San"eeta Na-hate
/E&E De,art'ent0 MANIT / Bhopal for gi(ing us this opportunity to
undertake this project. 9e would also like to thank "r. :.R.'iga/
principal for whole hearted support.
9e also wish to e6press our indebtedness to our parents as well as our
faily eber whose blessings and support always helped us to face the
challenges ahead.
%t the end we would like to e6press our sincere thanks to all our friends
and others who helped us directly or indirectly during this project work.
Place 1 Bh,al Pr2ect A$$ciate$
Date1 3453657386 9a$ha Ka($hal 888886868
A+it#a ,atel 88888638:
At(l ,ar+hi 88888637;
A#($hi ch(+har# 8888863:4
TAB<E OF &ONTENTS
;
&*APTER 8 INTROD=&TION
,., 97%T I: R<I"=
,.3 7>9 IT 9>R*:
,.; T)P#: >< R<I"
,.- R<I" <R#?U#'CI#:
,.@ PR#:#'T %PPAIC%TTI>':
,.1 R<I" (5s B%RC>"#:
&*APTER 7 &OMPONENTS E>P<AINATION
-., MICR>C>'TR>AA#R %TM#B% C%
-.3 R#A%)
-.; #M,C R<I" C%R" R#%"#R
-.- R<I" T%B
-.@ P>A)#:T#R C%P%CIT>R:
-.1 TR%':I:T>R BC@-2
-.2 P>9#R R#:I:T>R
&*APTER 7 BASI& B<O&K DIAGRAM
&*APTER ? &IR&=IT REPRESENTATION AND WORKING OF PRO@E&T
@., CIRCUIT "I%BR%M
@.3 9>R*I'B >< M>"#A
&*APTER : A<GORIT*M AND F<OW &*ART DIAGRAM
1., <A>9 C7%RT <>R R<I" :):T#M
&*APTER 4 &ON&<=SION
&*APTER A F=T=RE EN*AN&EMENT
&*APTER ; REFEREN&ES
AB$tract
-
The primary objective of any project in any undergraduate course is to implement
the concepts that we have studied in our curriculum. Apart from that it is the sole
responsibility of every student to mae a project which could serve the society or
at least his ! her almighty institute" with these points in our mind we started to
build a #$%D &A'ED ()*E# +A,A-E+E,T '.'TE+. %n the project we have
designed and implemented a #$%D/based power access control. %t grants
0()*E# ACCE''1 only to the persons intended lie 0TE,A,T1 or renter via a
uni2ue identification card in order to avoid power thefts and burglary/ which is
most common in today3s scenario of semi developed areas. The secured power
distribution can be e4tended from a single room to an entire hostel or home area.
$rom the hardware we are only showing the basic switching that illustrates the
woring principle.
A very uni2ue implementation can be done when interfaced with the (Cs in the
offices "clubs or highly secured areas. ,o e4ternal user can even turn on the
power supply until a valid card is swapped against the reader.
'imilarly entire room can be made secured by completely limiting all the power
driven appliances being accessed by the user only.
Even if a few number of socets are to be made access controlled5 that can also
be done by attaching the relay only to the particular pins rather than affecting the
entire power supply .
(ower burglary can easily be deterrent by such a system. The relay will not allow
the power supply to get in directly even if connected until the card is used. 6ence
the security to the electricity supplies is made.
+(is basic circitry is &ery economica, and can be c,ean,y inter)ered wit(
any o) t(e present,y wor'ing de&ices t(at need to get P-./R 011/##
1-*+R-22/D rat(er t(an password contro,,ed w(ic( can easi,y be
(ac'ed$
@
&*APTER 8
INTROD=&TION
RFID BASED POWER MANAGEMENT
1
8. INTROD=&TION
,., 97%T I: R<I"
RFID is a tracking technology used to identify and authenticate tags that are applied to
any product/ indi(idual or anial. Ra+i !reC(enc# I+enti!icatin an+ Detectin is a
general ter used for technologies that ake use of radio wa(es in order to identify
objects and people.
ABO=T RFID
Purpose of Radio fre!uency Identification and "etection syste is to facilitate data
transission through the portable de(ice known as tag that is read with the help of RFID
readerD and process it as per the needs of an application. Inforation transitted with the
help of tag offers location or identification along with other specifics of product tagged E
purchase date/ color/ and price. Typical RFID tag includes icrochip with radio antenna/
ounted on substrate.
The R<I" tags are configured to respond and recei(e signals fro an R<I" transcei(er.
This allows tags to be read fro a distance/ unlike other fors of authentication
technology. The R<I" syste has gained wide acceptance in businesses/ and is gradually
replacing the barcode syste.

2
8.7 *OW RFID WORKS
Basic R<I" consists of an antenna/ transcei(er and transponder. To understand the
working of a typical R<I" syste/ check the following aniation.
%ntenna eits the radio signals to acti(ate tag and to read as well as write inforation to
it. Reader eits the radio wa(es/ ranging fro one to ,00 inches/ on the basis of used
radio fre!uency and power output. 9hile passing through electronic agnetic &one/
R<I" tag detects acti(ation signals of readers.
Powered by its internal battery or by the reader signals/ the tag sends radio wa(es back to
the reader. Reader recei(es these wa(es and identifies the fre!uency to generate a uni!ue
I". Reader then decodes data encoded in integrated circuit of tags and transits it to the
coputers for use.
C
Powered by its internal battery or by the reader signals/ the tag sends radio wa(es back to
the reader. Reader recei(es these wa(es and identifies the fre!uency to generate a uni!ue
I". Reader then decodes data encoded in integrated circuit of tags and transits it to the
coputers for use.
Powered by its internal battery or by the reader signals/ the tag sends radio wa(es back to
the reader. Reader recei(es these wa(es and identifies the fre!uency to generate a uni!ue
I". Reader then decodes data encoded in integrated circuit of tags and transits it to the
coputers for use.
8.D T9PES OF RFID

%cti(e and passi(e R<I" are different technologies but are usually e(aluated together.
#(en though both of the use the radio fre!uency for counication between tag and
reader/ eans of pro(iding power to tags is different. %cti(e R<I" akes use of battery
4
within tag for pro(iding continuous power to tag and radio fre!uency power circuitry.
Passi(e R<I" on the other hand/ relies on energy of radio fre!uency transferred fro
reader to tag for powering it.

Passi(e R<I" needs strong signals fro reader but signal strength bounced fro tag is at
low le(els. %cti(e R<I" recei(es low le(el signals by tag but it can create higher le(el
signals to readers. This type of R<I" is constantly powered/ whether in or out of the
readerFs field. %cti(e tags consist of e6ternal sensors for checking huidity/ teperature/
otion as well as other conditions.

8.6 RFID FREE=EN&IES
Gust like you can tune a radio in (arious fre!uencies for listening to different channels/
R<I" readers and tags need to be tuned in to a sae fre!uency for counication. R<I"
,0
syste uses (arious fre!uencies but ost coon and popularly used fre!uency is low/
high and ultra high fre!uency. Aow fre!uency is around ,3@ *7&/ high is around ,;.@1
M7& and ultra high (aries between C108410 M7&. :oe applications also ake use of
icrowa(e fre!uency of 3.-@ B7&. It is iperati(e to choose right fre!uency for an
application as radio wa(es work different at (arious fre!uencies.
8.? RFID APP<I&ATIONS

The role of R<I" is not just confined to %ircraft identification anyoreD it is also lending
a hand in (arious coercial uses. %sset tracking is one of the ost popular uses of
R<I". Copanies are using R<I" tags on the products that ight get stolen or
isplaced. %lost each type of Radio fre!uency Identification and "etection syste can
be used for the purpose of asset anageent.

,,
Manufacturing plants ha(e also been using R<I" fro a long tie now. These systes
are used for tracking parts and working in process for reduction of defects/ anaging
production of (arious (ersions and increasing output. The technology has also been
useful in the closed looped supply chains for years. More and ore copanies are
turning to this technology for tracking shipents aong the supply chain allies. 'ot just
anufacturers but retailers also are using this R<I" technology for proper placeent of
their products and ipro(eents in the supply chain.

R<I" also plays an iportant role in the access and security control. The newly
introduced ,;.@1 M7& R<I" systes pro(ide long range readings to the users. The best
part is that R<I" is con(enient to handle and re!uires low aintenance at the sae tie.
8.: RFID v5$ Bar &+e$
,3
R<I" definitely has an edge o(er con(entional technology of bar codes. R<I" reader
easily pulls data fro tag at greater distances as copared to barcodes. Range
in case of R<I" is around ;00 feet as against ,@ feet of barcodes. :o R<I" tags can be
read uch faster as copared to barcodes. 9hile reading the barcodes is tie
consuing/ R<I" readers can interrogate rates of ore than -0 tags in a second.

'eed of line of sight in case of barcodes restricts reusability and ruggedness of the
barcodes. R<I"/ on the other hand are rugged/ since its coponents are protected in
plastic co(er. The Radio fre!uency Identification and "etection can also be fitted within
the products for ensuring greater reusability and ruggedness. Unlike barcodes/ R<I" tags
can be used as write and read de(ices. >ne can use R<I" tags for counicating with
the tag and for altering the inforation stored on it.
,;



&*APTER 7
&OMPONENTS E>P<ANATION
,-
8.8 MI&RO&ONTRO<<ER
0tmega 30 4P5
,@
1$ Genera, description
Featres
7 6igh/performance" 8ow/power A9#: ;/bit +icrocontroller
7 Advanced #%'C Architecture
< =>? (owerful %nstructions < +ost 'ingle/cloc Cycle E4ecution
< >@ 4 ; -eneral (urpose *oring #egisters
< $ully 'tatic )peration
< Ap to =B +%(' Throughput at =B +6C
< )n/chip @/cycle +ultiplier
7 6igh Endurance ,on/volatile +emory segments
< ;D &ytes of %n/'ystem 'elf/programmable $lash program memory
< E=@ &ytes EE(#)+
< =D &yte %nternal '#A+
< *rite!Erase CyclesF =?"??? $lash!=??"??? EE(#)+
< Data retentionF @? years at ;EGC!=?? years at @EGC(=)
< )ptional &oot Code 'ection with %ndependent 8oc &its
7 %n/'ystem (rogramming by )n/chip &oot (rogram
7 True #ead/*hile/*rite )peration
< (rogramming 8oc for 'oftware 'ecurity
7 (eripheral $eatures
< Two ;/bit Timer!Counters with 'eparate (rescaler" one Compare +ode
< )ne =B/bit Timer!Counter with 'eparate (rescaler" Compare +ode" and
Capture
+ode
,1
< #eal Time Counter with 'eparate )scillator
< Three (*+ Channels
< ;/channel ADC in TH$( and H$,!+8$ pacage
7 Eight Channels =?/bit Accuracy
< B/channel ADC in (D%( pacage
7 'i4 Channels =?/bit Accuracy
< &yte/oriented Two/wire 'erial %nterface
< (rogrammable 'erial A'A#T
< +aster!'lave '(% 'erial %nterface
< (rogrammable *atchdog Timer with 'eparate )n/chip )scillator
< )n/chip Analog Comparator
7 %!) and (acages
< @> (rogrammable %!) 8ines
< @;/lead (D%(" >@/lead TH$(" and >@/pad H$,!+8$
7 )perating 9oltages
< @.I / E.E9 for ATmega;A
7 'peed -rades
< ? / =B +6C for ATmega;A
7 (ower Consumption at J +hC" >9" @EGC
< ActiveF >.B mA
< %dle +odeF =.? mA
< (ower/down +odeF ?.E KA
1$2 Pin Descriptions
@.@.= 9CC
Digital supply voltage.
@.@.@ -,D
-round.
@.@.> (ort & ((&IF(&?) < LTA8=!LTA8@!T)'C=!T)'C@
(ort & is an ;/bit bi/directional %!) port with internal pull/up resistors (selected for
each bit). The
(ort & output buffers have symmetrical drive characteristics with both high sin
and source
capability. As inputs" (ort & pins that are e4ternally pulled low will source current
if the pull/up
resistors are activated. The (ort & pins are tri/stated when a reset condition
becomes active"even if cloc is not running.
@.@.J (ort C ((CEF(C?)
(ort C is an I/bit bi/directional %!) port with internal pull/up resistors (selected for
each bit). The
,2
(ort C output buffers have symmetrical drive characteristics with both high sin
and source
capability. As inputs" (ort C pins that are e4ternally pulled low will source current
if the pull/up
resistors are activated. The (ort C pins are tri/stated when a reset condition
becomes active"
even if the cloc is not running.
@.@.I #E'ET
#eset input. A low level on this pin for longer than the minimum pulse length will
generate a
reset" even if the cloc is not running. The minimum pulse length is given in Table
@E/> on page
@JI. 'horter pulses are not guaranteed to generate a reset.
A#E$
A#E$ is the analog reference pin for the A!D Converter.
2$ !,oc' diagram
,C
,4
3$ Pinning in)ormation
1.2 RELAY (HL jqc 3fc dc)
Features
30
6igh Current Contacts
#o6' Compliant
Compact 'iCe
Economically (riced
Specifcations
1oi, Data
1oi, Power" >B?m*
*omina, 6o,tage" @J9dc
Pic'-5p 6o,tage" =;.?9dc
Drop--t 6o,tage" @.J9dc
Ma7imm 6o,tage" >=.@9dc
1oi, Resitance" =B??ohm
1ontact Data
1ontact Rating" =?A @II9ac ! @;9dc
Ma7imm #witc(ing 6o,tage" @II9ac ! >?9dc
Ma7imm #witc(ing 1rrent" =? A
Ma7imm #witc(ing Power" @II?9A ! @=?*
Mec(anica, /ndrance" =?"???"??? )perations
/,ectrica, /ndrance" =??"??? )perations (,) Contact)
Ma7imm +rn--n +ime" =? ms
Ma7imm +rn--)) +ime" E ms
Genera,
Die,ectric #trengt( 8!etween 1ontacts9" IE? 9AC = min
Ins,ation Resistance" =?? +ohmME?? 9DC
0mbient -perating +emperatre Range" /J?GC to N;EGC
.eig(t" =?.?g
Ro:# 1omp,iant" .es
3,

in !a"out circuit
dia#ra$

6.D RFID rea+er '+(le
The EM-18 RFID Reader module operating at 125kHz is an inepensi!e solution
"or #our RFID $ased appli%ation& The Reader module %omes 'ith an on-%hip
antenna and %an $e po'ered up 'ith a 5( po'er suppl#& )o'er-up the module
and %onne%t the transmit pin o" the module to re%ie!e pin o" #our
mi%ro%ontroller& *ho' #our %ard 'ithin the reading distan%e and the %ard
num$er is thro'n at the output& +ptionall# the module %an $e %on"igured "or
also a 'eigand output&
33
Features,
Reading Distance, --1. %m
Dimesntion: /.mm2.mm8mm 01H23
Frequency:125kHz
Compatible Card codes:Man%hester-/-$it4modules-/
Current Rating: 55m6 0Ma3
Operating Voltage:/&-( - 5&/(D7
RFID systems detect the coded information in tags via readers. A Passive
Reader Active Tag (PRAT) system has a passive reader which only receives
radio signals from active tags (battery operated, transmit only). The reception
range of a PRAT system reader can be adjusted from 12,000 feet (0.30
609.60 m)
]
, allowing fexibility in applications such as asset protection and
supervision.
An Active Reader Passive Tag (ARPT) system has an active reader, which
transmits interrogator signals and also receives authentication replies from
passive tags.
An Active Reader Active Tag (ARAT) system uses active tags awoken with an
interrogator signal from the active reader. A variation of this system could also
use a Battery-Assisted Passive (BAP) tag which acts like a passive tag but has a
small battery to power the tag's return reporting signal.
Fixed readers are set up to create a specifc interrogation zone which can be
tightly controlled. This allows a highly defned reading area for when tags go in
and out of the interrogation zone. Mobile readers may be hand-held or mounted
on carts or vehicles.
6.6 RFID TAG
3;
A radio-frequency identifcation system uses tags, or labels attached to the
objects to be identifed. Two-way radio transmitter-receivers
called interrogators or readers send a signal to the tag and read its response.
RFID tags can be either passive, active or battery-assisted passive. An active tag
has an on-board battery and periodically transmits its ID signal. A battery-
assisted passive (BAP) has a small battery on board and is activated when in the
presence of an RFID reader. A passive tag is cheaper and smaller because it has
no battery. However, to start operation of passive tags, they must be illuminated
with a power level roughly three magnitudes stronger than for signal
transmission. That makes a diference in interference and in exposure to
radiation.
Tags may either be read-only, having a factory-assigned serial number that is
used as a key into a database, or may be read/write, where object-specifc data
can be written into the tag by the system user. Field programmable tags may be
write-once, read-multiple; "blank" tags may be written with an electronic product
code by the user. A tag with no inherent identity is always threatened to get
manipulated.
RFID tags contain at least two parts: an integrated circuit for storing and
processing information, modulating and demodulating a radio-frequency (RF)
signal, collecting DC power from the incident reader signal, and other specialized
functions; and an antenna for receiving and transmitting the signal. The tag
information is stored in a non-volatile memory. The RFID tag includes either a
chip-wired logic or a programmed or programmable data processor for
processing the transmission and sensor data, respectively.
An RFID reader transmits an encoded radio signal to interrogate the tag. The
RFID tag receives the message and then responds with its identifcation and
other information. This may be only a unique tag serial number, or may be
3-
product-related information such as a stock number, lot or batch number,
production date, or other specifc information.
TAGS /Tran$,n+er$0
%n RFID ta" is coprised of a icrochip containing identifying inforation and an
antenna that transits this data wirelessly to a reader. %t its ost basic/ the chip will
contain a seriali&ed identifier/ or license plate nuber/ that uni!uely identifies that ite/
siilar to the way any bar codes are used today. % key difference/ howe(er is that R<I"
tags ha(e a higher data capacity than their bar code counterparts. This increases the
options for the type of inforation that can be encoded on the tag/ including the
anufacturer/ batch or lot nuber/ weight/ ownership/ destination and history +such as
the teperature range to which an ite has been e6posed.. In fact/ an unliited list of
other types of inforation can be stored on R<I" tags/ depending on application needs.
%n R<I" tag can be placed on indi(idual ites/ cases or pallets for identification
purposes/ as well as on fi6ed assets such as trailers/ containers/ totes/ etc.
Ta"$ c'e in a variet# ! t#,e$, .ith a variet# ! ca,aBilitie$. Ke# variaBle$ incl(+e1
FRea+Gnl#F ver$($ Frea+G.riteF
There are three options in ters of how data can be encoded on tagsH +,. Read8only tags
contain data such as a seriali&ed tracking nuber/ which is pre8written onto the by the
tag anufacturer or distributor. These are generally the least e6pensi(e tags because they
cannot ha(e any additional inforation included as they o(e throughout the supply
chain. %ny updates to that inforation would ha(e to be aintained in the application
software that tracks :*U o(eent and acti(ity. +3. I9rite onceI tags enable a user to
write data to the tag one tie in production or distribution processes. %gain/ this ay
include a serial nuber/ but perhaps other data such as a lot or batch nuber. +;. <ull
Iread8writeI tags allow new data to be written to the tag as neededJand e(en written
o(er the original data. #6aples for the latter capability ight include the tie and date
of ownership transfer or updating the repair history of a fi6ed asset. 9hile these are the
ost costly of the three tag types and are not practical for tracking ine6pensi(e ites.

RFID TAGS
3@
Data capacity
The aount of data storage on a tag can (ary/ ranging fro ,1 bits on the low end to as
uch as se(eral thousand bits on the high end. >f course/ the greater the storage capacity/
the higher the price per tag.
Form )actor
The tag and antenna structure can coe in a (ariety of physical for factors and can
either be self8contained or ebedded as part of a traditional label structure +i.e./ the tag is
inside what looks like a regular bar code labelJthis is tered a K:art AabelK. copanies
ust choose the appropriate for factors for the tag (ery carefully and should e6pect to
use ultiple for factors to suit the tagging needs of different physical products and units
of easure. <or e6aple/ a pallet ay ha(e an R<I" tag fitted only to an area of
protected placeent on the pallet itself. >n the other hand/ cartons on the pallet ha(e
R<I" tags inside bar code labels that also pro(ide operators huan8readable inforation
and a back8up should the tag fail or pass through non R<I"8capable supply chain links.
6.? Pl#e$ter &a,acitr$
833 .att ? vlt$ ca,acitr in $erie$ .ith rela# ($e+ t $(,,re$$ heav# vlta"e +r,$
acr$$ the rela# .hen $.itche+ t the ac $(,,l# ! 773 vlt$.
It helps in
,.Managing #lectroagnetic Interference
3.Control Inducti(e Aoads with a Induction :uppression Capacitor
;.Capacitor %bsorbs the 7igh Loltages Benerated by Inducti(e Aoads
-.% Capacitor Ipro(es the Aifespan of the Relay and Reliability of the Board
5.Handling Inductive Loads
Perhaps the ost o(erlooked aspect of relay control is proper handling of inducti(e loads.
Inducti(e loads can best be defined as anything with a agnetic coil/ such as a otor/
solenoid/ or a transforer. Controlling a inducti(e load using our relay controllers
31
re!uires the use of induction suppression capacitors. The purpose of this capacitor is to
absorb the high (oltages generated by inducti(e loads/ blocking the fro the contacts of
the relay. 9ithout this capacitor/ the lifespan of the relay will be greatly reduced.
Induction can be so se(ere that it electrically interferes with the icroprocessor logic of
our controllers/ causing relay banks to shut thesel(es down une6pectedly. In the case of
U:B de(ices/ custoers ay e6perience loss of counications until the de(ice is
reconnected to the U:B port.
6.: I& 4A3?
It is sed to reg,ate t(e 12 &o,ts spp,y )rom adapter to ; &o,ts spp,y
sitab,e )or t(e )nctioning o) t(e microcontro,,er and remaining circit
pto re,ay$
<30; is a &o,tage reg,ator integrated circuit. %t is a member of I;44 series of
fi4ed linear voltage regulator %Cs. The voltage source in a circuit may have
fluctuations and would not give the fi4ed voltage output. The &o,tage reg,ator
I1 maintains the output voltage at a constant value. The 44 in I;44 indicates the
fi4ed output voltage it is designed to provide. I;?E provides NE9 regulated power
supply. Capacitors of suitable values can be connected at input and output pins
depending upon the respective voltage levels.

Pin
*o
Fnction *ame
= %nput voltage (E9/=;9) %nput
32
@ -round (?9) -round
> #egulated output5 E9 (J.;9/E.@9) )utput
6.4 Tran$i$tr B& ?64
It is sed to amp,i)y t(e crrent reac(ing re,ay sc( t(at abo&e a certain
t(res(o,d t(e re,ay is dri&en by t(e crrent otpt spp,ied by t(e
microcontro,,er in presence o) a &a,id r)id card swap$ 52* 2000 can a,so be
sed$
!1;4< is an ,(, bi/polar junction transistor. A transistor" stands for transfer of
resistance" is commonly used to amplify current. A small current at its base
controls a larger current at collector O emitter terminals.
!1;4< is mainly used for amplification and switching purposes. %t has a
ma4imum current gain of ;??. %ts e2uivalent transistors are &CEJ; and &CEJP.
The transistor terminals re2uire a fi4ed DC voltage to operate in the desired
region of its characteristic curves. This is nown as the biasing. $or amplification
applications" the transistor is biased such that it is partly on for all input
conditions. The input signal at base is amplified and taen at the emitter. &CEJI
3C
is used in common emitter configuration for amplifiers. The voltage divider is the
commonly used biasing mode. $or switching applications" transistor is biased so
that it remains fully on if there is a signal at its base. %n the absence of base
signal" it gets off.
6.A Electrl#tic ca,acitr
An electrolytic capacitor is a capacitor that uses an electrolyte (an ionic
conducting liquid) as one of its plates to achieve a larger capacitance per unit
volume than other types. The large capacitance of electrolytic capacitors makes
them particularly suitable for passing or bypassing low-frequency signals and
storing large amounts of energy. They are widely used in power supplies,and
interconnecting stages of amplifers at audio frequencies. An electrolytic
capacitor will generally have higher leakage current than a comparable (dry)
capacitor, and may have siginifcant limitations in its operating temperature range,
parasitic resistance and inductance, and the stability and accuracy of its
capacitance value.
34
6.; P.er Re$i$tance / ?W 83 h'$0
the power resistor is used in series with the such that the current reaching the
relay is limited and could not damage it. #elays has a ma4imum current rating of
= ampere and the supply may damage its woring. ,ormal resistors cant be used
as they possess very low power rating (?.@E w) and may burn out at higher
currents
;0

&*APTER 7
BASI& B<O&K DIAGRAM
;,
8. APP<I&ATION B<O&K DIAGRAM
MICR>C>'TR>AA#R
+%TM#B%CP.
M#M>R)
R<I" Reader
%"%PT#R
R#A%)
P>9#R
:UPPA)
%PPAI%'C#:
T> C>'TR>A
;3
7. TOP <E)E< B<O&K DIAGRAM
;;
&*APTER ?
&IR&=IT REPRESENTATION AND
WORKING OF PRO@E&T
;-
?.8 &IR&=IT DIAGRAM
;@
?.7 WORKING OF RFID
%s soon as :hown below is a typical R<I" syste. In e(ery R<I" syste the
transponder Tags contain inforation. This inforation can be as little as a single
binary bit / or be a large array of bits representing such things as an identity
code/ personal edical inforation/ or literally any type of inforation that can be
stored in digital binary forat.
;1
:hown is a R<I" transcei(er that counicates with a passi(e Tag. Passi(e tags ha(e
no power source of their own and instead deri(e power fro the incident
electroagnetic field. Coonly the heart of each tag is a icrochip. 9hen the Tag
enters the generated R< field it is able to draw enough power fro the field to access its
internal eory and transit its stored inforation.
9hen the transponder Tag draws power in this way the resultant interaction of the R<
fields causes the (oltage at the transcei(er antenna to drop in (alue. This effect is
utili&ed by the Tag to counicate its inforation to the reader. The Tag is able to
control the aount of power drawn fro the field and by doing so it can odulate
the (oltage sensed at the Transcei(er according to the bit pattern it wishes to transit.
In the circ(it $h.n .henever a vali+ ($er .ith r!i+ ta" $.a,$ it acr$$ the r!i+
rea+er H a ,(l$e $i"nal i$ "enerate+ B# the hin+erance ! the 'a"netic !iel+ acr$$
the ta" rea+er r 're ,reci$el# B# !l(I chan"e an e'! i$ in+(ce+ in the ta" circ(it
.hich enaBle$ it an+ it tran$'it$ it$ $erial car+ n('Ber t the r!i+ receiver. I!
veri!ie+ .ith the $erial n('Ber e'Be++e+ in the 'icrcntrllerJ$ 'e'r#,it
$.itche$ the rela# n an+ the attache+ a,,liance .ill "et the ,.er $(,,l#.
;2

&*APTER D
PROB<EM FORM=<ATION AND
SOFTWARE
;C
SOFTWARE USED : Arduino
The open-source Arduino environment makes it easy to write code and
upload it to the i/o board. It runs on Windows, Mac O !, and "inu#.
The environment is written in $ava and based on %rocessin&, avr-&cc,
and other open source so'tware.
The program feeded in the atmega is as follows:
#include <avr/pgmspace.h>
// Tags include the two CRC bytes (14 bytes total)
String Card = "08006A60282A";
prog_char tag_0[] PROGMEM = "08006A60282A"; //add your tags here
PROGMEM const char *tag_table[] =
{
tag_0
};
//----
String tagString;
char tagNumber[14];
boolean receivedTag;
int lockPIN=4; // pin 7 is controls
;4
int led = 13;
void setup() {
pinMode(led, OUTPUT);
pinMode(lockPIN,OUTPUT);
Serial.begin(9600);
digitalWrite(led, LOW);
}
void loop()
{
receivedTag=false;
while (Serial.available()){
int BytesRead = Serial.readBytesUntil(3, tagNumber, 15);
receivedTag=true;
}
if (receivedTag){
tagString=tagNumber;
Serial.println();
Serial.print("Tag Number: ");
Serial.println(tagString);
if (tagString.equals(Card)) {
Serial.println("Tag Authorized");
Power();
}
else{
Serial.print("Unauthorized Tag: ");
// Serial.println(tagString);
delay(50);
digitalWrite(lockPIN,LOW);
-0
delay(1500); // a delay of 1500ms and a fush() seems to stop tag repeats
Serial.fush();
}
memset(tagNumber,0,sizeof(tagNumber)); //erase tagNumber
}
}
// ----
// checkTag function (give it the tag string complete with SOT and EOT)
// compares with tags in tag_table
// and returns true if the tag is in the list
boolean checkTag(String tag){
char testTag[14];
for (int i = 0; i < sizeof(tag_table); i++)
{
strcpy_P(testTag, (char)pgm_read_word(&(tag_table[i])));
if(tag.substring(1,13)==testTag){//substring function removes SOT and
EOT
return true;
break;
}
}
return false;
} //----
void Power(){
Serial.print("Unlocking...");
digitalWrite(lockPIN,HIGH);
digitalWrite(led,HIGH);
delay(1500);// a delay of 1500ms and a fush() seems to stop tag repeats
-,
digitalWrite(led,LOW);
Serial.fush();
}
&*APTER :
A<GORIT*M AND F<OW
&*ART DIAGRAM
-3
:.8 F<OW &*ART
<low Chart is a basic and siple procedure for the e6planation of any prograing
procedure. It e6plains how the prograing part is working with siplicity and ease.
<low chart consists of initiali&ation of (ariables in the preset period of
icrocontroller.
Then coes the two separate loops naely
Registration
Lerification
Registration includes whether user want to add or delete the I"s.
Lerification includes scanning then coparing with stored I" if it is atch then
access granted else display the user is unauthori&ed.
-;
Initiali&e Lariables
:T%RT
#'"
Lerification
Copare I" with stored
I"s
Relay unaffected
"isplay %ccess granted/
and turn the relay on
Bulb glows
)#:
'>
--
&*APTER 4
&ON&<=SION
-@
&ON&<=SION
R<I" is an e(ol(ing technology which has a great future scope with its ad(ance
technology access. The role of R<I" is not just confined to %ircraft identification
anyoreD it is also lending a hand in (arious coercial uses. %lost each type of Radio
fre!uency Identification and "etection syste can be used for the purpose of asset
anageent. Manufacturing plants ha(e also been using R<I" fro a long tie now.
These systes are used for tracking parts and working in process for reduction of defects/
anaging production of (arious (ersions and increasing output. The technology has also
-1
been useful in the closed looped supply chains for years. More and ore copanies are
turning to this technology for tracking shipents aong the supply chain allies. 'ot just
anufacturers but retailers also are using this R<I" technology for proper placeent of
their products and ipro(eents in the supply chain. The best part is that R<I" is
con(enient to handle and re!uires low aintenance at the sae tie.
Inno&ati&eness and 5se),ness
$or mutual power sharing" entire rights are to the owner without the legal
instalment of electric meter.
Along with homes these can also be used at hotels" hostels" haats" bans"
offices etc. to provide controlled power access to various sections.
Due to the uni2ueness of #$%D tag" the power consumption data and
outage information of customers can all be recorded and then be identified
in the rear/end processing system
The system is fully automated" once installed it does not re2uire human
intervention for its processing.
%t is practically implementable and economical.
-2
&*APTER A
F=T=RE EN*AN&EMENT

-C
F=T=RE EN*AN&EMENT
Present trends point towards the fast growth of R<I" in the ne6t decade. 9ith around 100
illion R<I" tags sold in the year 300@ alone/ (alue of arket including systes/
ser(ices and hardware is likely to grow by factor of ,0 between years 3001 830,1. It is
e6pected that total nuber of R<I" tags deli(ered in the year 30,1 will be around -@0
ties as copared to the ones deli(ered in the year 3001.
Coercial applications using Radio <re!uency Identification and "etection like
logistics/ transport/ supply chain super(ision/ processing/ anufacturing/ edicine/
access control are also likely to grow by leaps and bounds. But this sart technology will
influence consuer sectors and go(ernent too. Barcodes and R<I" will coe6ist for
years to coe/ although the latter is e6pected to replace the forer in any sectors.
-4
&*APTER ;
REFEREN&ES
@0
;. REFEREN&E
httpF!!discovery.bits/pilani.ac.in!)ther!ceeai!sample/project/
synopsis.pdf
httpF!!arduino.cc!en!main!software
httpF!!www.electronicsforu.com!newelectronics!defaultcampaign.asp
httpF!!www.efymag.com!admin!issuepdf!#$%D/&ased/'ecurity/
'ystem.Cip
httpF!!www.electronicsforu.com!electronicsforu!circuitarchives!viewQarti
cle.aspRsnoSJE;OidSJI?J
httpF!!grietinfo.in!projects!+%,%!EEE!D)C/&.=>/#$%DT@?based
T@?securedT@?AccessT@?system.pdf
'icrcntrller an+ e'Be++e+ $#$te' B# MaKi+i
....electrnic$!r('.c'
NSK Electrnic$
@,
All +ata$heet$ !r' ....+ata$heetcatal".c'
AB(t ATMEGA AAGP= !r' ....at'el.c'
An+ ....triin+ia.c.in
AB(t DS8A73 !r' ....+alla$.c'
@3

You might also like