Академический Документы
Профессиональный Документы
Культура Документы
Abhishek Gupta
MBA Tech (Telecommunication) Arjit Johri
MPSTME, NMIMS MBA Tech (Telecommunication)
abhi.gupta18@yahoo.com MPSTME, NMIMS
arjitalokjohri@gmail.com
Applying RFID technology strategically to business The tag and the interrogator communicate
challenges and leveraging its data has the potential to information between one another via radio waves.
optimize critical processes, enhance business When a tagged object enters the read zone of an
interrogator, the interrogator signals the tag to - Write data to the tag (in the case of smart
transmit its stored data. Tags can hold many kinds of tags)
information about the objects they are attached to,
including serial numbers, time stamps, configuration - Relay data to and from the controller
instructions, and much more. Once the interrogator
- Power the tag (in the case of passive tags)
has received the tag’s data, that information is
relayed back to the controller via a standard network RFID interrogators are essentially small computers.
interface, such as ether net LAN or even the internet. They are also composed of roughly three parts: an
The controller can then use that information for a antenna, an RF electronics module, which is
variety of purposes. For instance, the controller could responsible for communicating with the RFID tag,
use the data to simply inventory the object in a and a controller electronics module, which is
database, or it could use the information to redirect responsible for communicating with the controller. In
the object on a conveyor belt system. An RFID addition to performing the four basic functions above,
system could consist of many interrogators spread more complex RFID interrogators are able to perform
across a warehouse facility or along an assembly line. three more critical functions:
However, all of these interrogators could be
networked to a single controller. Similarly, a single - Implementing anti-collision measures to
interrogator can communicate with more than one tag ensure simultaneous RW communication
simultaneously. In fact, at the present state of with many tags
technology, simultaneous communication at a rate of
1,000 tags per second is possible, with an accuracy - Authenticating tags to prevent fraud or
that exceeds 98%.8 Finally, RFID tags can be unauthorized access to the system
attached to virtually anything, from a pallet, to a
- Data encryption to protect the integrity of
newborn baby, to a box on a store shelf.
data.
2.1. RFID Transponder
2.3. RFID Controller
The basic function of an RFID transponder (tag) is to
RFID controllers are the “brains” of any RFID
store data and transmit data to the interrogator. At its
system. They are used to network multiple RFID
most basic, a tag consists of an electronics chip and
interrogators together and to centrally process
an antenna encapsulated in a package to form a
information. The controller in any network is most
usable tag, such as a packing label that might be
often a PC or a workstation running database or
attached to a box. Generally, the chip contains
application software, or a network of these machines.
memory where data may be stored and read from and
The controller could use information gathered in the
sometimes written, too, in addition to other important
field by the interrogators to:
circuitry. Some tags also contain batteries, and this is
what differentiates active tags from passive tags. - Keep inventory and alert suppliers when
Another differentiating factor between tags is new inventory is needed, such as in a
memory type. There are roughly two kinds: read-only retailing application
(RO) and read/write (RW).
- Track the movement of objects throughout a
2.2. RFID Interrogator system, and possibly even redirect them,
such as on a conveyor belt in a
An RFID interrogator (reader) acts as a bridge
manufacturing application
between the RFID tag and the controller and has just
a few basic functions. - Verify identity and grant authorization, such
as in keyless entry systems
- Read the data contents of an RFID tag
- Debit an account, such as in Point of Sale Active tags can be used to track high-value assets
(POS) applications such as rail cars and cargo containers that need to be
read from large distances. Since active tags have the
ability to initiate communication, they can be further
divided into two subtypes:
5. Other Applications
6. Conclusion
RFID finds applications in a number of scenarios
ranging from tracking laptops to tracking people.
RFID has been a huge success in inventory control.
Various other applications have also been successful
while some have not been so much of a success. The
scope and expectancy of this technology depends on