Radio Frequency Identification RFID
Radio Frequency Identification RFID
Radio Frequency Identification RFID
Contents
CONCLUSION
References
A new technology the Radio Frequency Identification, similar
to LAN, WLAN, SAN, MAN, the RFID has the capability to
exchange information with each other.
Our project is divided into three chapters; each chapter
explains a part of the RFID technology.
In chapter 1, we are giving a brief introduction of RFID
infrastructure and we will explain each infrastructure elements
and how they interact together to obtain a scalable and reliable
network , we’ll also talk about the protocols that manage the
RFID operations , RFID use specific protocols and standards
in the process of exchanching information to ensure that the
messages are received and understood, these protocols are
implemented in software and hardware that is loaded on each
network device and network path .
At the end of the first chapter we’ll talk about the RFID
interference and the problems that affect the message in its way
to the destination.
Chapter 2 explains the RFID application in libraries; this
chapter includes a general view of RFID application in
libraries, and a particular example of a library that uses 6
phases of identifications.
Finally the last chapter introduces the future and the biggest
picture toward an internet of things and shows how RFID
becomes a principle element in many future technologies.
Chapter 1: Introduction to Radio Frequency Identification
RFID was developed out of the radar experiments and development during
the Second World War. The actual date of invention is 1948 but this was
followed by decades of development and experimentation before commercial
applications were implemented.
In the 1980s and 1990s , RFID becomes commercial the united states
included transportation and personnel access ,while European countries
were interested in short range systems for tracking animals, industrial and
business applications.
Transponder/Tag
Historically, an RFID device that did not actively transmit to a reader was
known as a tag. An RFID device that actively transmitted to a reader was
known as a transponder (transmitter + responder). However, it has become
common within the industry to interchange the terminology and refer to
these devices as either tags or transponders. For the purposes of this
overview, an RFID device that actively transmits to a reader is termed an
“active” tag; an RFID device that only reflects or backscatters transmission
from a reader is termed “passive.”
The tags are programmed with data that identifies the item to which the
tag is attached. Tags can be either read-only, volatile read/write, or
write one/read many (WORM) and can be either active or passive.
RFID tags come in a variety of different types according to their
functionality, and these types have been defined in an RFID Class
Structure by the Auto-ID Center (and later through EPC Global)
(Engel’s and Sarma, 2005), which has been subsequently refined and
built on. The basic structure defines five classes in ascending order as
follows:
Passive tags
Passive RFID tags have no internal power supply. The minute electrical
current induced in the antenna by the incoming radio frequency signal
provides just enough power for the CMOS integrated circuit in the tag to
power up and transmit a response. Most passive tags signal by
backscattering the carrier wave from the reader. This means that the
antenna has to be designed both to collect power from the incoming
signal and also to transmit the out band backscatter signal. The
response of a passive RFID tag is not necessarily just an ID number; the
tag chip can contain non-volatile, possibly writable EEPROM for
storing data.
Passive tags have practical read distances ranging from about 10 cm.
(ISO 14443) up to a few meters (Electronic Product Code (EPC) and
ISO 18000-6), depending on the chosen radio frequency and antenna
design/size. But thanks to deep-space technology, that distance is now
600 feel. Due to their simplicity in design they are also suitable for
manufacture with a printing process for the antennas. The lack of an
onboard power supply means that the device can be quite small:
commercially available products exist that can be embedded in a sticker,
or under the skin in the case of low frequency (Low FID) RFID tags.
In 2007, the Danish Company RFIDsec developed a passive RFID with
privacy enhancing technologies built-in including built-in firewall
access controls, communication encryption and a silent mode ensuring
that the consumer at point of sales can get exclusive control of the key to
control the RFID. The RFID will not respond unless the consumer
authorizes it, the consumer can validate presence of a specific RFID
without leaking identifiers and therefore the consumer can make use of
the RFID without being track able or otherwise leak information that
represents a threat to consumer privacy.
In 2006, Hitachi, Ltd. developed a passive device called the µ-Chip
measuring 0.15×0.15 mm (not including the antenna), and thinner than
a sheet of paper (7.5 micrometers). Silicon-on-Insulator (SOI)
technology is used to achieve this level of integration. The Hitachi µ-
Chip can wirelessly transmit a 128-bit unique ID number which is hard
coded into the chip as part of the manufacturing process. The unique ID
in the chip cannot be altered, providing a high level of authenticity to the
chip and ultimately to the items the chip may be permanently attached or
embedded into. The Hitachi µ-Chip has a typical maximum read range
of 30 cm (1 foot). In February 2007 Hitachi unveiled an even smaller
RFID device measuring 0.05×0.05 mm, and thins enough to be
embedded in a sheet of paper.[9] The new chips can store as much data as
the older µ-chips, and the data contained on them can be extracted from
as far away as a few hundred meters. The ongoing problems with all
RFIDs are that they need an external antenna which is 80 times bigger
than the chip in the best version thus far developed. As silicon prices are
reduced and new more economic methods for manufacturing inlays and
tags are perfected in the industry, broader adoption and item level
tagging along with economies of scale production scenarios; it is
expected to make RFID both innocuous and commonplace much like
Barcodes are presently.
Non-silicon tags made from polymer semiconductors are currently being
developed by several companies globally. Simple laboratory printed
polymer tags operating at 13.56 MHz were demonstrated in 2005 by
both PolyIC (Germany) and Philips (The Netherlands). If successfully
commercialized, polymer tags will be roll-printable, like a magazine,
and much less expensive than silicon-based tags. The end game for most
item-level tagging over the next few decades may be that RFID tags will
be wholly printed – the same way a barcode is today – and be virtually
free, like a barcode. However, substantial technical and economic
hurdles must be surmounted to accomplish such an end: hundreds of
billions of dollars have been invested over the last three decades in
silicon processing, resulting in a per-feature cost which is actually less
than that of conventional printing.
Active tags
Unlike passive RFID tags, active RFID tags have their own internal
power source, which is used to power the integrated circuits and to
broadcast the response signal to the reader. Communications from active
tags to readers is typically much more reliable (i.e. fewer errors) than
from passive tags due to the ability for active tags to conduct a "session"
with a reader.
Active tags, due to their on board power supply, also may transmit at
higher power levels than passive tags, allowing them to be more robust
in "RF challenged" environment with humidity and spray or with
dampening targets (including humans/cattle, which contain mostly
water), reflective targets from metal (shipping containers, vehicles), or
at longer distances: Generating strong responses from weak reception is
a sound approach to success. In turn, active tags are generally bigger,
caused by battery volume, and more expensive to manufacture, caused
by battery price. However, their potential shelf life is comparable, as self
discharge of batteries competes with corrosion of aluminates printed
circuits.
Many active tags today have operational ranges of hundreds of meters,
and a battery life of up to 10 years. Active tags may include larger
memories than passive tags, and may include the ability to store
additional information received from the reader.
Special active RFID tags may include temperature sensors. Temperature
logging is used to monitor the temperature profile during transportation
and storage of perishable goods as fresh produce or certain
pharmaceutical products. Other sensor types are combined with active
RFID tags, including humidity, shock/vibration, light, radiation,
temperature, pressure and concentrations of gases like ethylene.
The United States Department of Defense (DOD) has successfully used
active tags to reduce search and loss in logistics and improve supply
chain visibility for more than 15 years.
Semi-passive tags
Semi-passive tags are similar to active tags in that they have their own
power source, but the battery only powers the microchip and does not
power the broadcasting of a signal. The response is usually powered by
means of backscattering the RF energy from the reader, where energy is
reflected back to the reader as with passive tags. An additional
application for the battery is to power data storage.
If energy from the reader is collected and stored to emit a response in the
future, the tag is operating active.
Whereas in passive tags the power level to power up the circuitry must
be 100 times stronger than with active or semi-active tags, also the time
consumption for collecting the energy is omitted and the response comes
with shorter latency time. The battery-assisted reception circuitry of
semi-passive tags leads to greater sensitivity than passive tags, typically
100 times more. The enhanced sensitivity can be leveraged as increased
range (by one magnitude) and/or as enhanced read reliability (by
reducing bit error rate at least one magnitude).
The enhanced sensitivity of semi-passive tags place higher demands on
the reader concerning separation in more dense population of tags.
Because an already weak signal is backscattered to the reader from a
larger number of tags and from longer distances, the separation requires
more sophisticated anti-collision concepts, better signal processing and
some more intelligent assessment which tag might be where. For passive
tags, the reader-to-tag link usually fails first. For semi-passive tags, the
reverse (tag-to-reader) link usually collides first.
Semi-passive tags have three main advantages:
1) Greater sensitivity than passive tags
2) Longer battery powered life cycle than active tags
3) Can perform active functions (such as temperature logging) under its
own power, even when no reader is present for powering the circuitry.
Given below are the primary differences between a Passive and Active
RFID tags:
RFID Readers
The reader is a handheld or fixed unit that can interrogate nearby RFID
tags and obtain their ID numbers using radio frequency (RF)
communication (i.e. the process does not require contact). When a
passive tag is within range of a reader, the tag’s antenna absorbs the
energy being emitted from the reader, directs the energy to ‘fire up’ the
integrated circuit on the tag, which then uses the energy to beam back
the ID number and any other associated information.
There are two main classes of RFID readers: read-only, an example
being those that operate with the purely passive EPC Class 1 tags, and
read/write, which can write new information back to a tag that has been
equipped with a read/write memory. The readers are becoming
increasingly sophisticated, acting as gateways into the network centric
communication systems of modern enterprises by supporting
communication protocols such as TCP/IP and network technologies
such as DHCP, UDP/IP and Ethernet or 802.11x (for wirelessly sending
data back to the enterprise). Many models of reader are handheld
devices and resemble the pricing guns or barcode scanners used in
supermarkets, but readers can also be fixed in place (e.g. in doorways or
at
Vehicle toll gateways) and even hidden, e.g. embedded into walls.
There are also readers that can be incorporated into handheld devices
such as PDAs and mobile phones (e.g. Nokia 5140, Nokia 3220) .
The figure below shows some of the common and less-common frequency
bands in which RFID systems operate. Also shown is the corresponding
wavelength - the distance between points at which the field has a fixed
value when the signal moves at the velocity of light.
Several issues are involved in choosing a frequency of operation. The
most fundamental, as indicated in the diagram, is whether inductive or
radiative coupling will be employed. The distinction is closely related to
the side of the antennas to be used relative to the wavelength. When the
antennas are very small compared to the wavelength, the effects of the
currents flowing in the antenna cancel when viewed from a great
distance, so there is no radiation. Only objects so close to the antenna
that one part of the antenna appears significantly closer than another
part can feel the presence of the current. Thus, these systems, which are
known as inductively-coupled systems, are limited to short ranges
comparable to the size of the antenna. In practice, inductive RFID
systems usually use antenna sizes from a few cm to a meter or so, and
frequencies of 125/134 KHz (LF) or 13.56 MHz (HF). Thus the
wavelength (respectively about 2000 or 20 meters) is much longer than
the antenna.
The number and use of standards within RFID and its associated
industries is quite complex, involves a number of bodies and is in a
process of development. Standards have been produced to cover four key
areas of RFID application and use: air interface standards (for basic
tag-to-reader data communication), data content and encoding
(Numbering schemes), conformance (testing of RFID systems) and
interoperability between applications and RFID systems.
There are several standards bodies involved in the development and
definition of RFID technologies including:
• International Organization of Standardization (ISO)
• EPCglobal Inc
• European Telecommunications Standards Institute (ETSI)
• Federal Communications Commission (FCC)
It has been suggested that IPv6 could be used in conjunction with RFID,
leaving the EPC™ redundant, and the US Department of Defense has
already mandated that its battlefield network should use IPv6 by the end
of 2006 .
However, Daniel Engels of the Auto-ID Center (2002) believes that 'the
requirement to interpret an IPv6 identifier as an address for IP
communication prevents its use as a permanently assigned identifier on
mobile objects. In addition, due to the development of standards and the
fragmentation of the RFID market (in terms of both technologies and
applications) it is unlikely that IPv6 currently holds a direct threat to the
adoption of the EPC™.
b) Tag placement.
Depends on the product being tagged, e.g. metallic products compared
to liquid. Bear in mind impact potential!
Automatic tag placement ensures uniform positioning, hand placement is
too inaccurate. (Joe Jiner, The Kennedy Group)
Slap and Ship placement
May result in retailers charging back for the cost of unreadable tags.
When a wave hits a solid object, the object may absorb some/all of the
wave’s energy. If the object is small, the wave may pass through but will
have less power
Reflection / Nulling
Where a signal wave collides with a reflected wave which is out of phase
(exactly opposite), the effect is a cancellation of both waves energy
Where a signal wave collides with a reflected wave which is in-phase
(exactly the same), the effect is a boost in wave energy.
Data encoded in the carrier may be affected by reflected data though.
Electrical Interference
Electrical interference can come from various sources such as vacuum
cleaners, starter motors, power cables (pylons) or other
domestic/industrial electrical equipment nearby.
It is more likely to cause problems with Low-Frequency RF equipment.
There are two main types of system that can be used in libraries, both of
which involve each book being tagged with an RFID chip which either
contains bibliographic data (bibliographic method) or a simple
reference to detailed bibliographic information held off-chip in the
library databases ('name plate' or 'license plate' systems). At the
moment, the bibliographic system is not used very much in the UK,
although there are discussions taking place around possible data objects
for encoding selected bibliographic data within library tags.
An RFID tag is the most important link in any RFID system. It has the
ability to store information relating to the specific item, to which they are
attached,
Rewrite again without any requirement for contact or line of sight. Data
within a tag may provide identification for an item, proof of ownership,
original storage location, loan status and history.
RFID tag consists of an integrated circuit and an antenna combined to form
a transponder.
RFID tags collect the energy to operate from a radio frequency field emitted
by a reader device; therefore they do not need a battery. When energized by
a radio signal from a fixed position reader or handheld scanner, the tags
returns the stored information in order that the item to which it is attached
can be easily located.
The chip also has a “multi-read” function, which means that several tags
can be read at once.
RFID tags have been specifically designed to be affixed into library media,
including books, CDs, DVDs and tapes.
It is thin, flexible and turns can be laminated between paper and plastic.
With special method to attach books, patron is totally unaware that the tag is
there.
KEY BENEFITS:
- No line of sight needed
- Allows to check-out and check-in several items simultaneously
- Information directly attached to product
- Performing both identification and antitheft in one single operation
- Different shape and sizes available
- Able to tag almost anything
- Accelerate scanning and identifying
2. Counter Station
The patron then confirms that he has finished the check-out process and a
receipt is printed, showing which books have been borrowed and the return
date. The RFID tag in the book is set on quiet as a result no alarm will go
off at the EAS gates.
It is also possible to use the station for check-in (return) of books. In this
case the patron identifies herself, chooses return and then puts one book or
a stack of books onto the reader. She will receive a receipt. If the books were
to be taken through the gate now, an alarm would sound.
One important point for library productivity is that the whole process is
significantly less time consuming than with barcode and magnetic strip
system; therefore long lines are avoided and fewer stations are needed for
the same process.
Key benefits:
to librarian:
_ speeds up book check-in /check-out
_frees staff to better service patrons
_better space planning
_increases membership rate
to patrons:
_ easy to use: books can be read in any orientation
_ reduces queuing time
_ provides patron privacy
_ encourages patrons to come back
Patrons insert the library item into the slot. The reader captures the
electronic signature and sends to backend system for loan cancellation.
Patron is acknowledged by beeping sound and flashlight. Patron’s
record is updated immediately> this is possible due to the seamless link
between LibBest RFID management system and the host computer
system. As such, users who have reached their loan quota can start
browsing items once they have returned them through the Book Drop.
Key benefits
Options
-Accept special design
-Able to integrate with auto-sorting system.
5 Shelf management
Key benefits
- Change inventory process
- No more book handling: just pass the reader across shelved books to
perform an instant inventory.
- Accurancy: Book identification numbers are registered in the Shelf-
Management Reader. The data is then downloaded to the center database
The fastest inventory you have ever made: 20 books per second
- Notifications: books to be pulled are up-loaded to the reader for quick
identification .
User friendly
- Light weight
- Wands allows easy reading from high and low shelves
RFID EAS Gate is the anti-theft part of the RFID Library Management
System using the RFID tags embedded in the library items. Each lane is able
to track items of 1 meter or more and would trigger the alarm system when
an un-borrowed item passed through them. The alarm will sound and lights
on the gate will flash as patron through with the library material
The EAS Anti-Theft Gate is used to detect RFID tag that is equipped with
EAS (Electronic Article Surveillance). it can detect the RFID within 1 meter
range without interference of magnetic items, upon detecting of armed RFID
tags, the alarm will sound the gate . it has option to trigger a camera to
record patrons who trigger the alarm to the surveillance station.
the detection is an integral feature of the chip within the tag. it is a stand-
alone technology, which operates independently of the library database.
FEATURES :
- detect EAS Armed RFID tags
- Multi-item detection
- Able to integrate camera with the gate (option)
- gale to integrate with surveillance station (option)
KEY BENEFITS :
- Single technology is required for both inventory and theft
management of the library.
- Library staff are alerted immediately when un-borrowed items passes
through the theft detection gates.
- Number of patrons passing through the gantry is captured by a
counter on the gates Alarm volume can be easily controlled.
CHAPTER 3. THE FUTURE AND THE BIGGER PICTURE:
TOWARDS AN INTERNET OF THINGS
3.1 Introduction
RFID systems are part of a bigger picture and are potentially a key
stepping-stone in the development towards the vision of ubiquitous
computing. In the ubiquitous or pervasive computer vision there will be
a multitude of computationally capable, small - sometimes invisible to
the human eye - devices that will be scattered throughout our
environments, operating silently and largely unseen as they go about
their individual tasks to support our daily activities. This will be a
device-centric future with highly distributed network control.
In a step-change that will be orders of magnitude greater when
compared to today’s computing power, a bewildering population of
heterogeneous sensors, computers and actuators will be operating.
A key concept in this development trajectory is the Internet of Things. A
term first coined by RFID developers in the Auto-ID Center in the late
1990s, it is also sometimes referred to as the Product Internet, T2T
(Thing to Thing) network, or the M2M (Machine to Machine) network.
In this vision, increasingly large numbers of our everyday objects will
have some kind of simple communication technology embedded into
them, allowing them to be connected to each other within local networks
and, ultimately, connected to the wider network of networks – the
Internet. In a sense this is a process of extending the Internet beyond
computational devices down to a lower layer in the hierarchy of
machines – to that of simpler devices and individual items.
In order to facilitate this process, three areas need to be developed.
Firstly, each of these items must be able to identify itself to other items
and to the network in general. This is provided for by the introduction
and development of RFID technology. Secondly, these items should
include some element of embedded computational power in order to act
with some level of ‘intelligence’. Thirdly, they will need to have some
sense of their physical environment and geographical location.
Continuing developments in computational science and electronics,
particularly work on miniaturization, tiny operating systems and
wireless communication will make this vision increasingly realistic. The
basic RFID system of transponder and interrogator is an important
starting point in the process.
3.1 From identification to Wireless Sensor Networks
At the lower (passive) end of RFID technology the systems simply
provide a tag that can remotely identify an object by returning an ID
when interrogated over short ranges. As RFID systems are introduced
and find acceptance in business and other environments the functionality
provided by these low cost tags will be increasingly seen as insufficient
as new applications are developed.
There is likely to be a natural progression for RFID that includes the
widespread incorporation of sensor functionality. Such devices will be
able to make measurements concerning their surroundings and physical
location about such variables as pressure, temperature, flow rate, speed,
vibrations etc.
They will be networked either through RF technologies or through other
wireless communications systems and these developments are often
referred to as sensor nets, integrated on-chip radios, or wireless
networked sensors (WNS).
These RFID-based sensors will need to communicate in order to
participate in the network of things. However, other computational
devices within the likely ubicomp will not necessarily be using radio
frequency for communication. Other protocols currently proposed or
developed include ZigBee, Near Field Communication Technologies
(NFC), Bluetooth and Wifi – all systems that offer local and personal
area networks (LANs and PANs). Zigbee is focused on individual devices
(such as smoke alarms, lamps and consumer electronics) that need a
robust, low bandwidth, low cost, low power, peer-to-peer
communication. NFC is designed for very short-range communication
(devices have to almost touch for the signalling systems to work). The
applications being developed for NFC to date revolve around situations
where it is intuitive for devices to touch in order to communicate e.g.
allowing mobile phones to act as electronic tickets or electronic cash
wallets when pressed against a suitable reader .
Some commentators see these developments as tending towards a form
of ubiquitous wireless communications network which encompasses low-
bandwidth systems such as RFID, computational and peripheral device
networking through ZigBee, NFC and Bluetooth (e.g. digital cameras
and printers), and higher bandwidth (telecommunication) devices
through 4G cellular and WiMax.
3.2 Spatial identifiers – GPS
Such networking is part of a wider technological development as fixed
networks move to wireless networks, ad hoc networks, and meshes .
In the latter, mobile communicating devices form ad hoc networks (in a
peer-to-peer fashion) with nearby devices to form meshes of
communication that have varying topologies. The development of these
kinds of networks will facilitate the increased use of spatial annotation
(e.g. leaving personal messages or information within a given space).
Most technological projects exploring spatial annotation use GPS
(Global Positioning System) and the use of RFID in conjunction with
GPS could allow for another layer of context-specific information.
RFID used in libraries can save patrons' time and increase library
work efficiency; can lessen staff injures; and can do inventory
automatically. The greatest advantage of RFID tracking system is its ability
to scan books/items on the shelves without tipping them out or removing
them.
To date, between 300 and 350 RFID systems have been installed in
libraries around the world. More than 50 libraries in the U.S. and Canada
currently use RFID. Regarding the use of RFID, some of the libraries have
given detailed guidelines.
2-http://en.wikipedia.org/wiki/RFID
3-http://www.slais.ubc.ca/COURSES/libr500/04-05-
wt1/www/L_Zhang/conclusion.htm
4-http://www.rfidjournal.com/article/articleview/207#Anchor-What-36
5-http://www.ncsl.org/programs/lis/privacy/idfall05.htm
6-http://www.rfid-library.com/images/rfid_e01.jpg
- Articles
1- IEEE magazine
Applications and practice RFID
paul Hartman, RF SAW inc.
Daniel W.engels , university of texas at Arlington
Tom kerr, vocollect,inc.
Matt ward
Department of design
University of London