Вы находитесь на странице: 1из 6

Review Paper on RFID and its Application in Laptop Tracking

Abhishek Gupta
MBA Tech (Telecommunication) Arjit Johri
MPSTME, NMIMS MBA Tech (Telecommunication)
abhi.gupta18@yahoo.com MPSTME, NMIMS
arjitalokjohri@gmail.com

Abstract: intelligence, and improve collaboration across


industries.
RFID technology is being used for asset tracking and
supply chain management. It is considered as a RFID Technology has been steadily growing at a
replacement to bar-code systems. Unlike supply steady pace. With a momentum that is replacing
chain management solutions, embedded scenarios earlier methods of tagging and tracking, at all levels,
require intimate knowledge of the environment and ranging from supply chain management to asset
use case in order to optimize a manufacturer’s return management. Although the technology might have
on investment. This paper explores the capability of some disadvantages that may prevent it from being
RFID technology in Laptop tracking system globally appreciated; its steady growth has already
compared to conventional manual Laptop tracking created quite a revolution in the field of electronics
system, which involves frisking of bags and personal and telecommunication.
belongings. The paper is based on the live experience
of Implementation of the laptop tracking solution at 2. Technology1:
L&T. Regardless of passive or active RFID, the
An RFID system uses wireless radio communication
service offered should be affordable to all industries.
technology to uniquely identify tagged objects or
There are many new solutions, new income
people. There are three basic components to an RFID
opportunities and sometimes-complicated business
system.
models for each type of RFID Solution. In this paper,
we have also discussed the application of RFID in 1. A tag (also called a transponder), which is
asset management and attendance systems. The composed of a semiconductor chip, an antenna, and
different architectures of RFID Solutions have been sometimes a battery
examined and we propose an economical and viable
infrastructure for deploying RFID. 2. An interrogator (also called a reader or a read/write
device), which is composed of an antenna, an RF
Keywords: RFID (Radio Frequency electronics module, and a control electronics module
Identification), Replacement, Laptop
Tracking System 3. A controller (also called a host), which most often
takes the form of a PC or a workstation running
database and control (often called middleware)
1. Introduction: software

Applying RFID technology strategically to business The tag and the interrogator communicate
challenges and leveraging its data has the potential to information between one another via radio waves.
optimize critical processes, enhance business When a tagged object enters the read zone of an
interrogator, the interrogator signals the tag to - Write data to the tag (in the case of smart
transmit its stored data. Tags can hold many kinds of tags)
information about the objects they are attached to,
including serial numbers, time stamps, configuration - Relay data to and from the controller
instructions, and much more. Once the interrogator
- Power the tag (in the case of passive tags)
has received the tag’s data, that information is
relayed back to the controller via a standard network RFID interrogators are essentially small computers.
interface, such as ether net LAN or even the internet. They are also composed of roughly three parts: an
The controller can then use that information for a antenna, an RF electronics module, which is
variety of purposes. For instance, the controller could responsible for communicating with the RFID tag,
use the data to simply inventory the object in a and a controller electronics module, which is
database, or it could use the information to redirect responsible for communicating with the controller. In
the object on a conveyor belt system. An RFID addition to performing the four basic functions above,
system could consist of many interrogators spread more complex RFID interrogators are able to perform
across a warehouse facility or along an assembly line. three more critical functions:
However, all of these interrogators could be
networked to a single controller. Similarly, a single - Implementing anti-collision measures to
interrogator can communicate with more than one tag ensure simultaneous RW communication
simultaneously. In fact, at the present state of with many tags
technology, simultaneous communication at a rate of
1,000 tags per second is possible, with an accuracy - Authenticating tags to prevent fraud or
that exceeds 98%.8 Finally, RFID tags can be unauthorized access to the system
attached to virtually anything, from a pallet, to a
- Data encryption to protect the integrity of
newborn baby, to a box on a store shelf.
data.
2.1. RFID Transponder
2.3. RFID Controller
The basic function of an RFID transponder (tag) is to
RFID controllers are the “brains” of any RFID
store data and transmit data to the interrogator. At its
system. They are used to network multiple RFID
most basic, a tag consists of an electronics chip and
interrogators together and to centrally process
an antenna encapsulated in a package to form a
information. The controller in any network is most
usable tag, such as a packing label that might be
often a PC or a workstation running database or
attached to a box. Generally, the chip contains
application software, or a network of these machines.
memory where data may be stored and read from and
The controller could use information gathered in the
sometimes written, too, in addition to other important
field by the interrogators to:
circuitry. Some tags also contain batteries, and this is
what differentiates active tags from passive tags. - Keep inventory and alert suppliers when
Another differentiating factor between tags is new inventory is needed, such as in a
memory type. There are roughly two kinds: read-only retailing application
(RO) and read/write (RW).
- Track the movement of objects throughout a
2.2. RFID Interrogator system, and possibly even redirect them,
such as on a conveyor belt in a
An RFID interrogator (reader) acts as a bridge
manufacturing application
between the RFID tag and the controller and has just
a few basic functions. - Verify identity and grant authorization, such
as in keyless entry systems
- Read the data contents of an RFID tag
- Debit an account, such as in Point of Sale Active tags can be used to track high-value assets
(POS) applications such as rail cars and cargo containers that need to be
read from large distances. Since active tags have the
ability to initiate communication, they can be further
divided into two subtypes:

- Active transponders these tags are activated only


when they receive a signal from a reader. This way
the tags prolong their battery life. These tags can be
used in applications such as toll collection systems
and checkpoint control systems.
3. Working of active RFID tags2:
- Beacons A beacon is a tag that emits a signal at
An active tag is a tag that has its own power source predetermined intervals.
such as a battery and can initiate communication by
sending its own signal. It does not rely on the power Beacons are mostly used in real-time locating
from the reader to run its circuitry or to create the systems (RTLS). Possible application for beacons
signal. It does not need a wakeup call from the includes the following:
reader. The characteristics of an active tag include the
- Tracking parts in large manufacturing facilities
following:
- Marine and aircraft rescue operations
- Operation: Because an active tag has its own power
source, it has the choice of staying up all the time or
4. Case study3:
waking up when a signal is received. A tag that is
operating all the time can broadcast its location at Laptops are an important asset to industries, and
predetermined intervals. industries have always faced the problem of laptop
thefts. To overcome this, the company issues a
- Size: Because of their power sources (batteries),
document to each employee carrying the laptop. The
active tags are the largest in size. Typical sizes are
document bears the validation period for the laptop,
(1.5 x 3) x 0.5 inch3. However, with the advancement
the details of the laptop and the id of the laptop
of technology, the smallest active tags could be the
bearer. At the security checkpoint, the security
size of a coin.
checks the document, the laptop and the identity of
- Read range: Because an active tag has its own the laptop bearer. This process of laptop tracking is
power source for circuitry and for generating signals, tiresome, inefficient and inconvenient to employees.
it can achieve the greatest read range. Some active
tags have the ability to send a signal across a distance
of 1 km. However, confined to standards and
regulations, many active tags have read ranges of tens
of meters. Due to its larger read range, an active tag
can be integrated with a global positioning system
(GPS) to pinpoint the exact location of an object.

- Lifespan: Finite but long enough battery lifetime. It


can be as long as 3-5 years.

- Memory: The memory capacity of passive tags


varies and can be greater than that of passive and
semi passive tags, partly due their larger size (more
room for components) and batteries.
GRE Global Systems has designed a laptop tracking - Active reader (uses frequency, 866Mhz)
system using active RFID reader and tags. The read
range of the reader is approximately 30 meters. An - Active Tags
active tag is affixed on every laptop to be monitored.
The ID in the tag is linked to the employee to whom - External Antenna
the laptop has been issued. Whenever the laptop
comes into the vicinity of the reader, the image of the - Ethernet cable
assigned employee is displayed on a display unit at
the security gate. The security personnel check the - System (computer)
image and “OK’s” each display. The user id and the
date and time of authenticating the laptop is saved in
the system. If the security finds a problem, they
physically verify the laptop and the person carrying 4.3. Software specifications:
it. The screen is refreshed every 15 secs, which is
parametric and can be adjusted. The deployment uses There is a module for the administrator to create
UHF readers and tags and is running successfully for users and assign them passwords with a validity
the past 10 months.
period. The users can then log into the application
and view the images of the laptop owners. The
administrator can also set up parameters like the
screen refresh period, days after which tag data can
be flushed out of the system etc. There is be one
computer installed at the security where the database
in MySQL (or SQL Server) is installed and the RFID
reader is connected to its Ethernet serial port. The
module to read the tags and filter the data runs on this
machine. A windows based application in VB.Net
also runs on this machine and displays the employee
data for each tagged laptop as it comes in the vicinity
of the reader. The security personnel will have to
click on the “OK” button on each display image to
remove it in the next refresh cycle. The image will
4.1. Overall Architecture:
not be cleared till the security physically clicks on the
“OK” button.

If the application has to be run on other machines,


they will have to be networked with the main
machine and the database will have to be multi-user.

Middle-ware software sits between the reader and the


database on main computer. It handles operations like
Reader Co-ordination, Data reading/writing, Anti-
collision.

Instant Display System (IDS): The IDS runs on a PC


connected to the reader. The IDS may also be put on
the LAN. When ever an ID card is detected by the
reader the user Id is sent by recorder module to IDS
Figure 1. Overall Architecture using RS232 protocol. On start-up of IDS it loads all
the user personal details in the memory of the PC
4.2. Hardware specifications: from the local server. Once the tag ID is received by
the IDS it searches for the same in the memory. If the
searching is successful, it acknowledges the user laptop will not be tracked.
presence by displaying the user name, image and
current time. The system can display maximum 25 - Excessive moisture or stray radiations may
user’s images at a time. The program displays the affect reader efficiency.
images one by one (in serial fashion) i.e. the tag - Tag may run out of battery.
which is detected first is displayed first. The display
area window holds images multiple persons and is 4.6. Future Trends:
limited to 25 images. In case of more than 25 images - RFID tag can be integrated in the laptop
they are cleared on a FIFO basis. The system also while manufacturing. This will reduce the
checks for ID card expiry date. The user name, image risk of employee peeling off the tag.
and current time are not displayed after the expiry
- Software can be made web-based so that
date of the card instead the detail is logged in for
other security points within the campus as
further reference. The files are updated automatically well as other branches of the organization
every day. are connected over internet. They can have a
common server to store the data. Thus a
uniform system can be implemented across
the organization and employees can be
tracked in all its branches across all the
offices anywhere on the globe

5. Other Applications

5.1. Asset Management4

Companies across a broad spectrum of industries rely


on critical assets to drive their business.
Manufacturing companies rely on equipment
availability and uptime to keep production lines
moving and meet production goals. Transport
companies rely on fleets and containers for timely
cargo delivery. Financial services companies depend
on computer and networking systems to manage
transactions and keep customer data secure. And
Figure 2. GRE Global Systems Application Software while the asset types across industries may be varied,
there is still a common need for effective
4.4. Advantages:
management. Any item that is a part of the work
- More ethical and efficient way to track
laptop movement in industry campus. process but does not leave as part of a finished
product is a candidate for intelligent asset
- Validity of laptop assigned to particular management with RFID. RFID can help enterprises
employee can be verified automatically track and secure these assets — with
very little human intervention.
- Larger population of employees carrying
laptops can be tracked simultaneously Advantages of RFID in Asset Management:
- Database can be recorded in relational - Increased productivity — employees spend less
database. Therefore record maintenance is
time tracking down missing or misplaced
easy.
equipment
4.5. Limitations:
- Employee may peel off the tag. in this case,
- Improved asset maintenance and assured in depth study of the requirement considering the
adherence to critical and routine maintenance pros and cons of RFID. The scope of RFID largely
procedures such as calibration depends on the innovativeness of people.

- Secure, around-the-clock access to stock rooms 7. References


for improved efficiency — without human
[1]. V. Daniel Hunt, Albert Puglia, Mike Puglia,
intervention RFID: A Guide to Radio Frequency
Identification, Wiley Publishing, Inc.
- Increased utilization — improvements in asset [2]. Paul Sanghera, RFID+, Syngress Publishing
visibility and utilization reduce the need to [3]. GRE Project Manual for Laptop tracking, GRE
Global Systems
purchase or lease spare parts and equipment
[4]. RFID Asset Management Solutions, Motorola
Corp.
- Reduced capital and operational costs — the [5]. Atul Gupta, Introduction to RFID Technology
reduction in the loss of assets reduces the need to
purchase and manage additional assets

5.2. Attendance System5:

The management of workplace attendance is an


important aspect of supervision in the workplace.
The cost of absenteeism is greater than the direct
payment of wages and benefits paid during the
absence. Organizations must also consider the
indirect costs of staffing, scheduling, re-training, lost
productivity, diminished moral, turnover, and
opportunity cost. The indirect costs often exceed the
direct cost of absenteeism. Effective supervisory
efforts to manage attendance will affect a relatively
small percentage of employees, but will result in
substantial savings, increased productivity and
morale.

Attendance plays a very important role for any


student to go in for any examination. It takes a lot of
tracking to find out the attendance details in
practicals, theory lectures or library. RFID based
attendance systems solve lot of such problems.

Using RFID based Attendance Systems, the complete


staff data along with payroll system is managed
effectively. It is an efficient way of class allotment
and to know the academic details of all students.

6. Conclusion
RFID finds applications in a number of scenarios
ranging from tracking laptops to tracking people.
RFID has been a huge success in inventory control.
Various other applications have also been successful
while some have not been so much of a success. The
scope and expectancy of this technology depends on

Вам также может понравиться