Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID)

The term Radio Frequency Identification is used for automatically identifies an object that transmits the identification (within the form of a novel serial number) of an object wirelessly, using radio waves.

Radio Frequency IDentification abbreviated, as RFID is a Dedicated Brief Range Communication (DSRC) technology. It is extremely just like Barcode identification methods but it acquired a serious difference. RFID does not require line-of-sight access however bar code scanning it is must.
RFID technologies are grouped underneath the more generic Automatic Identification (Auto ID) technologies. The existing Identification methods are not adequate for at present use as their low storage capability and the another undeniable fact that they can't be reprogrammed.
A possible solution is placing the information on silicon chips and Blog phone less transfer of data between the information carrying gadget and its reader. The ability required to operate the data-carrying machine would also be switchred from the reader by contact less technology. These all lead to the event of RFID devices.

RFID TECHNOLOGY AND ARCHITECTURE: In an RFID system, the RFID tag, which incorporates the tagged information of the article, generates a signal containing the respective info, which is read by the RFID reader, which then may pass this information to a processor for processing the obtained info for that exact application.

With RFID, the electromagnetic or electrostatic coupling in the RF (radio frequency) portion of the electromagnetic spectrum is used to transmit signals. An RFID system consists of an antenna and a transceiver, which read the radio frequency and transfer the knowledge to a processing machine (reader) and a transponder, or RF tag, which accommodates the RF circuitry and knowledge to be transmitted. The antenna gives the means for the integrated circuit to transmit its info to the reader that converts the radio waves mirrored back from the RFID tag into digital info that can then be passed on to receivers in which it could possibly analyze the data.

Thus, an RFID System would following three parts:

RFID tag or transponder

RFID reader or transceiver

Data processing subsystem

The transponder, or RF tag tags might be either energetic or passive. While the energetic tags have on-chip power, passive tags use the power induced by the magnetic discipline of the RFID reader. Thus passive tags are cheaper nevertheless it acquired a limitation that, it work in a limited range (RFID Frequencies: RFID systems are differentiated based on the frequency range it works. The different ranges are Low-Frequency (LF: 125 - 134.2 kHz and 140 - 148.5 kHz), High-Frequency (HF: 13.56 MHz) and Ultra-High-Frequency (UHF: 850 MHz - 950 MHz and 2.four GHz - 2.5 GH).

RFID, Tag, transponder, Radio, Frequency, Identification

Ultra-High-Frequency RFID systems offer transmission ranges of more than 90 feet. However wavelengths in the 2.four GHz range are absorbed by water, which includes the human body, which gives some limitations of its use.

The requirements utilized in RFID: RFID requirements mainly confused in the following areas

Air Interface Protocol - which offers with the way in which in which tags and readers communicate

Data Content - Organizing of data in the Tags

Conformance - Tests that required for the products to check that, it meet the standards

EPC requirements for Tags:

Class 1: a simple, passive, read-solely backscatter tag with one-time, area-programmable non-volatile memory.

Class 0: read-solely tag that was programmed on the time the microchip was made

Completely different purposes of RFID: Some other areas the place passive RFID has been applied in current previous are:-Person Identification, Identification of location of a person, Animal/Pet Identification, Meals Production Management, Vehicle Parking Management/Monitoring, Poisonous Waste Monitoring, Valuable Objects Insurance Identification, Asset Management, Stock tracking, Entry Management etc

RFID Security:The fundamental privateness considerations associated with an RFID system is the flexibility of unauthorized tracking of anybody with out consent. These are the methods in which RFIDs can be utilized to bypass personal privacy. By inserting RFID tags hidden from eyes, and utilizing it for stealth tracking or using the unique identifiers supplied by RFID for professionalfiling and figuring out client sample and behavior or utilizing hidden readers for stealth tracking and getting personal information.
Because of those reasons some makes an attempt are made to maintain privateness and reduces the above disadvantages.
Back to top