Vous êtes sur la page 1sur 11

PRESENTED BY

T.MOHANAPRIYAA-III EEE
P.PRIYA-III CSE
M.KUMARASAMY COLLEGE OF ENGINEERING
THALAVAPALAYAM
KARUR.
ABSTRACT

This paper explores the applications and future commercial impacts of radio frequency
identification RFID technology. Its objective is to summarize the ways in which
organizations and academics are thinking about these technologies and to stimulate
strategic thinking about their possible uses and implications. It first provides an overview
of this technology and how it works. Then it explores the surprisingly wide variety of
current applications of RFID. Next it looks at several classes of potential RFID
applications and how these might affect how organizations work. Finally, it examines the
cost and implementation considerations of this technology. The paper concludes that
RFID is a viable technology with many possible applications. However, only some of the
impacts on organizations and society can be anticipated at present

INTRODUCTION
ABOUT EMBEDDED SYSTEM

Embedded systems are the prime focus in the electronic era. The embedded are actually refer
to hidden processor inside a system for performing the special function. It is an electronic system
that includes a microcontroller to perform a specific dedicated application. The embedded system
has microcontroller and memory that employ embedded microcomputers.
NEED OF EMBEDDED SYSTEM
High reliability
Flexibility
Accuracy
The throughput of the system is very high
The response is dynamic
RFID OVERVIEW
Radio frequency identification or RFID is a generic term for technologies that use radio
waves to automatically identify people or objects.RF (Radio Frequency) communication occurs by
the transference of data over electromagnetic waves.
An RFID System can be visualized as the sum of the following three components:
• RFID tag or transponder
• RFID reader or transceiver
• Data processing subsystem

RFID READER
An RFID reader is a device that is used to interrogate an RFID TAG . The reader has an
antenna that emits radiowaves .The tag responds by sending back its data.

RFID TAG
An RFID tag is composed of a microchip that stored data and a coupling element, such as
coiled antenna, used to communicate via radio frequency communication. Most tags communicate
only when they are interrogated by a RFID reader.

TYPES OF TAGS
Tags are categorized into three types,
Active tags
Passive tags
Semipassive tags

ACTIVE TAGS
Active RFID tags contain a battery, which is used to drive the microchip's circuitry and to
broadcast the signal to a reader (the way a cell phone transmits signals to a base station).

PASSIVE TAGS
Passive tags use the power induced by the magnetic field of the RFID reader. Moreover passive
tags are cheaper and more sensitive to regulatory and environmental constraints, as compared to active
tags. The limited resources of a passive tag require it to both harvest its energy and communicate with
a reader within a narrow frequency as permitted by regulatory agencies. Passive tags typically obtain
their power from the communication signal either through inductive coupling or far field energy
harvesting.

INDUCTIVE COUPLING
Inductive coupling uses the magnetic field generated by the communication signal to induce a
current in its coupling element (usually a coiled antenna and a capacitor). The current induced in the
coupling element charges the on-tag capacitor that provides the operating voltage, and power required
for the tag. Thus the inductively coupled systems behave mostly like loosely coupled transformers. So
this type of inductive coupling works well in the near-field of the communication signal.
FAR FIELD ENERGY HARVESTING
Far field energy harvesting uses the energy from the interrogation signal’s far field signal to
power the tag. The far field begins where the near field ends, at a distance of 1/ (2пf) from the emitting
antenna. The signal incident upon the tag antenna induces a voltage athe input terminals of the tag.
This voltage is detected by the RF front-end circuitry of the tag and is used to charge a capacitor that
provides the operating voltage for the tag.

SEMI-PASSIVE TAGS
Semi-passive tags use a battery to drive the chip and communicate by drawing power from the
reader. Active and semi-passive tags are useful for tracking high-value goods that are needed to be
scanned over long ranges, such as railway cars on a track, but they cost a dollar or more, making
them too expensive to put on low-cost items.
RFID Vs BARCODE
RFID is not necessarily "better" than bar codes.
The big difference between the two is bar codes are line-of-sight technology.
RFID tags can be read as long as they are within range of a reader.
In barcodes if a label is ripped, soiled or falls off, there is no way to scan the item.
Standard bar codes identify only the manufacturer and product, not the unique item.
RFID Vs SMART CARD
Smart Cards cannot be used for products.
Smart Cards are cheaper than RFID tags.
There is no range of coverage for Smart Cards as RFID tags. So we can’t track the supplier chain.
There should be a physical contact between the reader and the Smart Card.
The durability of the Smart Cards is less
EXISTING SYSTEM
At present, the attendance for students in schools and colleges are taken manually. It is smartcard
very tedious to maintain the records of all the students of various classes. Even though had replaced
the existing manual system. It has the disadvantage that not more than one smartcard can be
scratched simultaneously.
NEED FOR THE SYSTEM
The existing system is taking more time. It has been overcome by our system ‘Student
attendance maintenance system using RFID’ in which the attendance will be marked in the database
while the student with the RFID tag enters near the reader. Also in the RFID system there is no line of
sight technology.

SYSTEM OPERATION
The unique ID is stored in the RFID tag which is possessed by the student. After the tag senses
the interrogation signal from the reader while entering the classroom, it responds by transmitting the
ID stored in it to the system buffer through RS232 cable .Then the received ID will be verified with
the database and if it is found correct, the attendance will be marked in the database by using visual
basic.
BLOCK DIAGRAM

RF TAG

MICROCONTROLLER RF TRANSMITTER

RF RECEIVER

BLOCKDIAGRAM FOR RECEIVER

MICROCONTROLLER RF TRANSMITTER

RF RECEIVER

PC INTERFACING PC
CIRCUIT

HOW RFID WORKS?


An RFID system consists of a tag, which is made up of a microchip with
an antenna, and an interrogator or reader with an antenna. The reader sends out electromagnetic
waves. The tag antenna is tuned to receive these waves. A passive RFID tag draws power from
field created by the reader and uses it to power the microchip’s circuits. The chip then modulates
the waves that the tag sends back to the reader and the reader converts the new waves into digital
data.The current consumption is typically 2milliampere. It executes each instruction within 0.2us.
DESCRIPTION
Student can give their attendance using their own RFID card.
The project contains a database, which holds details about date all the seven hours,
number of days attended and number of days absent.
When the student enters the class the system reads the card number.
The card number is verified with the database.
The database contains all the details about the cards and the owner of the card.
The attendance will be marked by checking the time of entrance.

FREQUENCIES AND REGULATIONS


The operation of RFID systems worldwide is regulated by local government
bodies which control the electromagnetic spectrum in a region. Most RFID systems operate in so-
called Industrial-Scientific-Medical (ISM) bands. These bands are freely available for use by low-
power, short-range systems. The ISM bands are designated by the International
Telecommunications Union (ITU).The most commonly used ISM frequencies for RFID are 13.56
MHz and 902-928 MHz.
READER ANTI-COLLISSION
Reader collision occurs when the signals from two or more readers overlap.The tag is unable to
respond simultaneous queries.
This can be solved by having the readers programmed to read fractionally different times.
This is achieved by using the technique Time Division Mutiple Access-TDMA or Anti-collision
technique can still result in the same tag being read twice.
RFID TAG ANTI COLLISION
TAG COLLISION happens when multiple tags are energized by the RFID tag reader
simultaneously, and reflect their respective signals back to the reader at the same time. This
problem is often seen whenever a large volume of tags must be read together in the same RF field.
The reader is unable to differentiate these signals; tag collision confuses the reader.
Different systems have been invented to isolate individual tags; the system used may vary
by vendor. For example, when the reader recognizes that tag collision has taken place, it sends a
special signal (a "gap pulse"). Upon receiving this signal, each tag consults a random number
counter to determine the interval to wait before sending its data. Since each tag gets a unique
number interval, the tags send their data at different times.
RFID SECURITY BENEFITS AND THREATS
Universally deploying RFID tags offers many potential security benefits, yet may expose
new privacy threats. Because RF communication is non-contact and non-line-of-sight, whereas
other means of identification are either contact-based or require line-of-sight.
Otherwise intrusive or cumbersome security practices, such as airline passenger and
baggage tracking, can be made practical by using RFID systems. Authentication systems always
take advantage of RFID technology, for example car key-less entry systems.

SOME APPROACHES TO RFID PROTECTION

RFID tag can operate in either locked or unlocked state.


While, locked a tag responds to all queries with the current ID value and restricts all other
functionality.
While, unlocked, the full functionality and memory of the tag are available to anyone in the
interrogation zone.
To unlock a tag, the owner sends the original key value to the tag. The tag then hashes this value
and compares it to the lock stored under the ID. If the value matches, the tag unlocks
In the event of power loss or transmission interruption, tags will return to a default locked state
ADVANTAGES
Automated record keeping increases accuracy.
Increased security.
Better time management.
Reduction in maintainence.
Greater control over inventory.
Transmit and receive information without wires.
Reduces paper work.
DISADVANTAGES
Cost is higher than smartcard.
APPLICATIONS
Database management
Library systems
Airport baggage handling
Electronic payment
Retail theft management
Automotive manufacturing
Homeland security
Postal services
parking

CONCLUSION
In order to reduce the complexity in giving attendance , the smart cards and RFID tags are
used. The RFID has many advantages over smart cards. It overcomes the need for physical contact
between the card and the reader. Also only one smart card can be scratched at a time.
The project contains a database, which holds details about day attendance, hour attendance ,
number of days attended and number of days absent. The options are separated for staffs as well as
the students such as daily attendance, Class attendance and reports are also for staffs and students
separately. This will reduce the work load for staffs. Also the students will be aware of their
attendance percentage. The student can check his individual performance and the staff can check
the overall attendance percentage of the class.
.

Vous aimerez peut-être aussi