صفحه 1:
صفحه 2:
صفحه 3:
‘pi
strip on the back of a credit card or
ATM @arhh itrpgovidessaamiqae
.ridentifier for thateebject. Une
im |
00"06200
صفحه 4:
RFID Reader Antenna) جک
Energy
Application
ول
RFID Middleware 0
صفحه 5:
صفحه 6:
صفحه 7:
Human
Trackin
صفحه 8:
5م
Tracking
صفحه 9:
=
3
زحم
ب
0
wn
ها
.2
0
Fo
Ww
صفحه 10:
Doors and
Garages
Security
Pa,
صفحه 11:
Product
Monitor
ing and
Control.
صفحه 12:
صفحه 13:
رت
RFID tagging system for your clothing life
صفحه 14:
Electro
nic
صفحه 15:
1 0۳۵5
A es
payment
صفحه 16:
صفحه 17:
صفحه 18:
Radio Frequency
Identification (RFID, for short) is
similar to barcode technology in
that it employs coded labels to
communicate information about a
specific item (a library book or
DVD, for instance) to a central
server. However, since RFID uses
radio frequencies to communicate
with items' attendant labels rather
than scanning barcodes with a
laser, the RFID reader does not
require a direct line of sight to the
label to read it, can read multiple
gms at once, and can read
lugh physical tissue such as a
cover or DVD case.
SmartRF
Lib =>
LACKAWANNA COUNTY LIBRARY SYSTEM
WLAN
صفحه 19:
Advantages of RFID in Library
Checkout Settings
RFID technology's ability to read ID tags regardless of position or
orientation, as well as detect signals through physical materials, is
particularly advantageous for library circulation processes. Since
several items can be read at once, checkout procedures can be
accomplished much more rapidly than with barcode technology, which
requires that each item be handled individually. For these reasons,
222۲2 ۹ agif-checkout much n more cH as well.
libraries generally leads to S
greatly-reduced queues at the
checkout counter, enhanced
customer service, and less
repetitive stein ومع مج نس
library
صفحه 20:
Checkin
RFID can be equally advantageous
for checkin processes. In addition
to being able to check in multiple
items simultaneously, RFID
readers can be affixed to book
return slots, effectively checking
in items as they pass through the
slot. A conveyor carries items past
an RFID reader, which checks
them in and then sorts them by
category into bins or onto carts.
The time saving potential of an
RFID implementation can be
substantial.
asa set ©
صفحه 21:
Inventory
RFID also has had a significant impact on inventory
processes in libraries. With a full hand-held wand which
is passed alongside the books on the shelves; by tagged
collection, inventory can be taken with a portable, he
reader picks up the individual signals from each item's
tag, without needing to remove or even tip the books
outward from the shelves. With “RFID “ not only does the
cost of doing an inventory in the library go down, the
odds of actually completing regular inventories goes up. |i
Inventory with RFID has also proven to be extremely 1
useful and cost-effective in terms of locating lost or اس ددند
helved items. Even Searching for books by just typing its
asa ABA ص ©
صفحه 22:
Security
Item security is another
area in which RFID
technology can benefit a
library. RFID tags can be
enabled with a theft-
detection bit that is
deactivated upon proper
checkout, allowing the
materials to which they
have been affixed to pass
freely through an RFID-
powered security gate. As
the items pass an RFID
reader upon being checked
back in, the security bits
are reactivated.
ss © سم
صفحه 23:
صفحه 24:
How it works? - simpie i
Example -
The transponder could be 1 i
really simple, like those in
clothing price tags, consisting
of just an antenna and diode.
When irradiated, the diode
rectifies the incoming carrier
and the frequency-doubled
signal is radiated back to the
reader which responds with an
alarm if you try to leave the
store without paying for the
product.
asa set ©
صفحه 25:
صفحه 26:
FirstTags transmission
Essentially, tag data transmission is achieved by
switching a low resistance across the antenna coil.
Loading the coil in this way causes a corresponding
dip in the peak voltage across the reader's coil. In
other words, the change in voltage across the tag's
coil is reflected back to the reader's coil. This is often
referred to as "backscatter".
The serial data stream from ROM (and/or
EEPROM/FRAM) memory does not directly drive the
coil-loading switch. Instead, the switch is driven by a
low-frequency clock source. This effectively
superimposes a weaker "subcarrier" on the main
carrier signal. Modulating this subcarrier performs
actual data transmission.
Without going into lengthy technical discussions, we
can tell you that the modulation method may be ASK
(amplitude shift keying), PSK (phase shift keying) or
FSK (frequency shift keying). Serial data is typically
Bi-phase, Manchester or Miller-encoded before بوسحم سس
صفحه 27:
How passive systems work
We will worPRattbteevtayags usually
consist of just a single IC and an
antenna (coil). Currently, most
passive tags operate below 100MHz
and rely on the magnetic field
produced by the reader for both
power and communication.
The reader generates a carrier signal
and this induces a voltage across the
coil of the tag. This voltage is
rectified and filtered to become the
power supply for the IC. Some tags
also divide down the carrier signal
and use it as the clock for on-board
logic, whereas others generate their
own clock signal.
sen سس
صفحه 28:
Secon Reader tedeptinansmission
d:
5 ۳ كناك 28 583 رمك وزع ةد بره دع : ای اا اها
Pee aR ee ل
FRC RM ite ipa BYove
ananlitude, fe sins a F WERE RE PALS BTROSHIO Rmuch)
carrier signal.
و09
ft ۲۲20۴0۴۵60۵ 0 ری کل
ae nob fe et
ent 000
wae
ana ina 0 8
ی ( sat
9 ally, all es fda functions are performed by a
AGFA ECS 3 dE sve} 9
ong). IF اه
Fife aera aa then aeramitted 1
۳ 70 اع ri Sire detection and host
۳۱5 یواوه و2019 on
0 Lege a 9۵فا و هورق و Ic
(available for... 22۲ امه رید
(Rea asic 1) sea range and enables smaller tag
صفحه 29:
set © 6 سس
“Antenna
Low
Noise
amp
Am
7
صفحه 30:
7
dst conve
کشت سید اج
مره
سب aI. ane
face |*—] «CODER ]>*| سکف
a
cot,
ANTENNA
“TYPICAL LOW-FREGUENCY BAD TAG READER/ WRITER (FOR RECENING AMPLTUDE MODULATED TRANSPONDER DATA)
set © 6 سس
صفحه 31:
COMMAND & CONTROL UNTT
oman oeconet
OATAIN "SGHNGNDEECTON
"MEMORY ACCESS
MENORY ARRAY
TYPICAL LOW FREQUENCY RFID READ/WRITETAG |AMPUTUDE- MODULATED DATA TRANSMISSION
set © 6 سس
con,
[ANTENNA
صفحه 32:
Thank
?
Questions
www.Rj12.net ©
www.Rj12.net ©
Stand for
Radio FrequencyIdentificati
on
Operate at different
The RFID devicedepending
serves the same
frequencies
on
purpose as a bar code or a magnetic
the
application
strip on the back of a credit card or
ATM card; it provides a unique
identifier for that object.
www.Rj12.net ©
Three parts to an RFID implementation
Tag (Transponder) Reader
Database &
software
Passive RFID
Active RFID
An RFID
reader
is
a
device that
is used to
An RFID tag is a microchip
combined
with
interrogate
an RFID
tag. The package;
reader has
an
anPower
antenna
in a
compact
the
Tag
Internal
to tag
Energy
transferred
antenna
that
emits
radio
waves;
the
tag
packaging is structured to allowusing
theRF
RFID
Source
from
responds
by
sending
back
its
data.
tag to be attached to an object to
be
reader
A number
of factorsstands
can affect
the distance
at
tracked.
for Radio
Frequency
Tag
Battery "RFID"Yes
No
which
a tag can be read (the read range). The
Identification.
frequency
used
for
identification,
the
antenna
Required
signal
Very
Low up signals
Very
High
The tag's
antenna
picks
from
gain,
orientation
polarization
of the
strength
anthe
RFID
reader orand
scanner
and then
reader
antenna
and the
transponder
antenna,
returns
the signal,
usually
with some
Up
to 100m
Up
3-5m, usually
asRange
well
as the data
placement
the tag
onto the
additional
(like
a of
unique
serial
less impact
object
to beor
identified
will all have
an
number
other customized
information).
onMulti-tag
the
read
range.
reading
1000’s
ofsmall
tags
Few
hundred
RFIDRFID
tagssystem’s
can be
very
- the
size
of awithin
recognized
up to be 3m
reader
large rice grain.
Others– may
theofsize
of
100mph
a small paperback book.
Data Storage
Up to 128 Kb or
read/ write & search
128 bytes of
read/write
www.Rj12.net ©
Basic Operational Principles
Backscatter
Inductive Coupling
Reader
Reader
N
TAG
TAG
S
•
•
•
Near field (LF, HF): inductive coupling of tag to magnetic field
Far
field (UHF,
microwave):
Use a
backscattering
which means
circulating
around
antenna (like
transformer Varying
magnetic
"reflecting"
the
carrier
wave
and
putting
a
signal
into
that
reflection.
flux induces current in tag. Modulate tag load to communicate
Absorption
with readerby non-conductive materials significant problem for
microwave frequencies
www.Rj12.net ©
www.Rj12.net ©
Human
Trackin
g
www.Rj12.net ©
Animals
Tracking
www.Rj12.net ©
Shops
Securit
y
www.Rj12.net ©
Doors and
Garages
Security
www.Rj12.net ©
Product
Monitor
ing and
Control
www.Rj12.net ©
Shoppi
ng
www.Rj12.net ©
www.Rj12.net ©
Electro
nic
Passpor
t
www.Rj12.net ©
Contactless
payment
www.Rj12.net ©
Civil liberties groups (among others) have
become increasingly concerned about the use of
RFIDs to track the movements of individuals. For
example, passports will soon be required to
contain some sort of RFID device to speed border
crossings. Scanners placed throughout an
airport, for example, could track the location of
every passport over time, from the moment you
left the parking lot to the moment you got on
your plane.
There are also concerns about the fact that, even
after you leave the store, any RFID devices in the
things you buy are still active. This means that a
thief could walk past you in the mall and know
exactly what you have in your bags, marking you
as a potential victim. A thief could even circle
your house with an RFID scanner and pull up data
on what you have in your house before he robs it.
Military hardware and even clothing make use of
RFID tags to help track each item through the
supply chain. Some analysts are concerned that,
if there are particular items associated with highlevel officers, roadside bombs could be set to go
off when triggered by an RFID scan of cars going
by.
There was a recent report revealing clandestine
tests at a Wal-Mart store where RFID tags were
"Imagine an Internet of
things, where everyday
objects, rooms, and
machines are
connected to one
another and to the
larger digital world.”
- Business 2.0
www.Rj12.net ©
Our
Proje
ct
Library RFID_WMV V9.wmv
Radio Frequency
Identification (RFID, for short) is
similar to barcode technology in
that it employs coded labels to
communicate information about a
specific item (a library book or
DVD, for instance) to a central
server. However, since RFID uses
radio frequencies to communicate
with items' attendant labels rather
than scanning barcodes with a
laser, the RFID reader does not
require a direct line of sight to the
label to read it, can read multiple
items at once, and can read
through physical tissue such as a
book cover or DVD case.
www.Rj12.net ©
Checkout
Advantages of RFID in Library
Settings
RFID technology's ability to read ID tags regardless of position or
orientation, as well as detect signals through physical materials, is
particularly advantageous for library circulation processes. Since several
items can be read at once, checkout procedures can be accomplished
much more rapidly than with barcode technology, which requires that
each item be handled individually. For these reasons, patrons can
accomplish
self-checkout
Implementation
of RFID inmuch more efficiently, as well.
libraries generally leads to
greatly-reduced queues at the
checkout counter, enhanced
customer service, and less
repetitive strain injuries for
library staff .
www.Rj12.net ©
Checkin
RFID can be equally advantageous
for checkin processes. In addition
to being able to check in multiple
items simultaneously, RFID
readers can be affixed to book
return slots, effectively checking
in items as they pass through the
slot. A conveyor carries items past
an RFID reader, which checks
them in and then sorts them by
category into bins or onto carts.
The time saving potential of an
RFID implementation can be
substantial.
www.Rj12.net ©
Inventory
RFID also has had a significant impact on inventory
processes in libraries. With a full hand-held wand which
is passed alongside the books on the shelves; by tagged
collection, inventory can be taken with a portable, he
reader picks up the individual signals from each item's
tag, without needing to remove or even tip the books
outward from the shelves. With “RFID “ not only does the
cost of doing an inventory in the library go down, the
odds of actually completing regular inventories goes up.
Inventory with RFID has also proven to be extremely
useful and cost-effective in terms of locating lost or miss
helved items. Even Searching for books by just typing its
name on the Reader .
www.Rj12.net ©
Security
Item security is another
area in which RFID
technology can benefit a
library. RFID tags can be
enabled with a theftdetection bit that is
deactivated upon proper
checkout, allowing the
materials to which they
have been affixed to pass
freely through an RFIDpowered security gate. As
the items pass an RFID
reader upon being checked
back in, the security bits
are reactivated.
www.Rj12.net ©
T1
T2
How it works?
– Simple
Example -
The transponder could be
really simple, like those in
clothing price tags, consisting
of just an antenna and diode.
When irradiated, the diode
rectifies the incoming carrier
and the frequency-doubled
signal is radiated back to the
reader which responds with an
alarm if you try to leave the
store without paying for the
product.
T1 = 1/2 T2
= 2 f2
f1
www.Rj12.net ©
www.Rj12.net ©
FirstTags
Tag transmission
:
s
Essentially, tag data transmission is achieved by
switching a low resistance across the antenna coil.
Loading the coil in this way causes a corresponding
dip in the peak voltage across the reader's coil. In
other words, the change in voltage across the tag's
coil is reflected back to the reader's coil. This is often
referred to as "backscatter".
The serial data stream from ROM (and/or
EEPROM/FRAM) memory does not directly drive the
coil-loading switch. Instead, the switch is driven by a
low-frequency clock source. This effectively
superimposes a weaker "subcarrier" on the main
carrier signal. Modulating this subcarrier performs
actual data transmission.
Without going into lengthy technical discussions, we
can tell you that the modulation method may be ASK
(amplitude shift keying), PSK (phase shift keying) or
FSK (frequency shift keying). Serial data is typically
www.Rj12.net ©
Bi-phase, Manchester or Miller-encoded before
How passive systems work
We will work
Passive
with
tags
Passive
tags
usually
consist of just a single IC and an
antenna (coil). Currently, most
passive tags operate below 100MHz
and rely on the magnetic field
produced by the reader for both
power and communication.
The reader generates a carrier signal
and this induces a voltage across the
coil of the tag. This voltage is rectified
and filtered to become the power
supply for the IC. Some tags also
divide down the carrier signal and use
it as the clock for on-board logic,
whereas others generate their own
clock signal.
www.Rj12.net ©
Secon Reader
Read
to
reception
tag transmission
d:
er
For
two-way
(read/write)
systems,
the reader
In order
to receive
tag data
transmissions,
themust
also
be able
to transmit
data
the tag (tobyupdate
reader's
antenna
signal is
firsttoprocessed
analog
the
EEPROM/FRAM).
This
is typically
by
front-end
circuitry. Its
main
functionsachieved
are to remove
amplitude,
pulse-width
or pulse-position
the carrier signal
and then
amplify the (much)
modulation
of the carrier signal.
smaller sub-carrier.
In
itsresultant
simplestsignal
form, from
transmission
to thedetection,
tag is
The
the envelope
performed
switching stages
the carrier
signal up
on with
and a
filtering andbyamplifying
is cleaned
off
(100%
amplitude
modulation).
"gap detect"
Schmitt
trigger
and pumped
into aAdigital
logic block,
circuit
in
the
tag
serialises
and
demodulates
the a
where the original data is reconstructed through
"gaps"
and "noand/or
gaps" decoding
to reconstruct
the original
demodulation
process.
data.
Typically, all of these functions are performed by a
Once
complete
data
received,
it is
singleaIC,
supported
byframe
a few is
external
(passive)
checked
for validity
(usingan
a CRC
polynomial).
components
and perhaps
antenna
power If
sufficient
available,
it is such
then committed
amplifier. power
Higherislevel
functions,
as data
to
memory.
encryption/decryption,
collision detection and host
In
some systems,
the carrier
is notby
switched
on
interfacing
are usually
performed
a
and
off but is modulated
at a particular
"depth"
microcontroller,
which is interfaced
to the
reader IC
(about
10%).serial
This makes
more
power available forwww.Rj12.net ©
via a simple
or parallel
interface.
tag use, extending range and enables smaller tag
www.Rj12.net ©
www.Rj12.net ©
www.Rj12.net ©
Thank
You..
Questions
www.Rj12.net ©