22-10-2012, 12:39 PM
RFID -RADIO FREQUENCY IDENTIFICATION
[attachment=36978]
WHY RFID ?
1. ‘ Internet Of Things’- locate items easily
2. No LOS required
3. Bulk reading enables almost parallel reading of data.
4. Replication difficult.
5. Rewritable tag without having to see the tag.
6. Usable in hostile , rugged environments
7. Ability to monitor the shelf life of perishable goods (drugs and eatables)
TAG PROTOCOLS
The most common protocols include –
Slotted Aloha
Adaptive Binary Tree
Slotted Terminal Adaptive Collection
New EPC Gen2 Specification
ALOHA PROTOCOL
Used extensively for radio packet communication.
With this procedure, tags begin broadcasting their IDs as soon as the reader’s field energizes them. Each tag, sends its entire ID and then waits for a pseudorandom period of time before broadcasting again. The reader simply receives the ID depending on chance to ensure that each tag will eventually broadcast during a period when all other tags are quiet.The reader doesn’t respond to the tag in any way.
APPLICATIONS
RFID enabled refrigerator
RFID enabled accounting in malls
RFID enabled car locks –blocked until it senses the owner’s driving license
Speedpass or E- tag ( automated toll pay systems)
Barcodes replaced
Knowing exactly what you own, where everything is, and be reminded when you run out of it – It becomes an ‘ Internet of Things ’ .
CONCLUSION
Clearly, ‘rules of engagement’ are needed for the RFID revolution that is now dawning.
It is time for us all to wake up and become more aware of this new technology.
[attachment=36978]
WHY RFID ?
1. ‘ Internet Of Things’- locate items easily
2. No LOS required
3. Bulk reading enables almost parallel reading of data.
4. Replication difficult.
5. Rewritable tag without having to see the tag.
6. Usable in hostile , rugged environments
7. Ability to monitor the shelf life of perishable goods (drugs and eatables)
TAG PROTOCOLS
The most common protocols include –
Slotted Aloha
Adaptive Binary Tree
Slotted Terminal Adaptive Collection
New EPC Gen2 Specification
ALOHA PROTOCOL
Used extensively for radio packet communication.
With this procedure, tags begin broadcasting their IDs as soon as the reader’s field energizes them. Each tag, sends its entire ID and then waits for a pseudorandom period of time before broadcasting again. The reader simply receives the ID depending on chance to ensure that each tag will eventually broadcast during a period when all other tags are quiet.The reader doesn’t respond to the tag in any way.
APPLICATIONS
RFID enabled refrigerator
RFID enabled accounting in malls
RFID enabled car locks –blocked until it senses the owner’s driving license
Speedpass or E- tag ( automated toll pay systems)
Barcodes replaced
Knowing exactly what you own, where everything is, and be reminded when you run out of it – It becomes an ‘ Internet of Things ’ .
CONCLUSION
Clearly, ‘rules of engagement’ are needed for the RFID revolution that is now dawning.
It is time for us all to wake up and become more aware of this new technology.