Вы находитесь на странице: 1из 76

RFIDLIBRARY MANAGEMENT SYSTEM

Project Supervisors: Dr. Fawad Rauf

Project Members:
Asif Ali -------------------------------------------------------- (L2f07bsee0508) Asad Shafiq --------------------------------------------------- (L2f07bsee0552) Asadullah Mahmud ------------------------------------------ (L2f07bsee0558)

Session 2011 FACULTY OF ENGINEERING UNIVERSITY OF CENTRAL PUNJAB LAHORE, PAKISTAN

RFID LIBRARY MANAGEMENT SYSTEM

Thi proj t thesis is submitted to the faculty of engineering, Uni ersity of Central Punjab, Lahore, Pakistan, for the partial fullfillment of requirments for the degree Of Bacholar Of Science In Electrical Engineering

Approved on ________________

Internal Examiner: Sign: ____________________________________ (Project supervisor): Name: Dr. Fawad Rauf ____________________________________

External Examiner: Sign: ____________________________________ Name: ____________________________________

Session 2011 FACULTY OF ENGINEERING UNIVERSITY OF CENTRAL PUNJAB LAHORE, PAKISTAN

DEDICATED TO:

Dedicated to our kind teachers Dr. Fawad Rauf & Mohammad Yaqoob Javaid & Our Parents Who cultivate our mind with SKILLS, Sow the Seeds of KNOWLEDGE & SHED some LIGHT to let it GROW So that we could have a BRIGHT FUTURE

ACKNOWLEDGEMENT

Engineering is not only hard work and perseverance; it is imagination, motivation, dedication; it is keenness to learn and desire to excel; it is planning and managing; and above all it is activity with insight.

Planning is vital for any project. During our project several problems of technical nature emerged but by the grace of ALLAH ALMIGHTY, they were overcome and this project was concluded in time. In this regard, guidance and suggestions of our Project Supervisor Dr. Fawad Rauf proved to be a beacon of light throughout the project.

We would like to express our appreciation to Dr. Fawad Rauf who guided us throughout the project.

Finally, we are also thankful to our Parents for their love, support and prayers without which we could not have put our best in the project.

ABSTRACT

RFID is a technology that is sparking interest in the library community because of its applications that promise to increase efficiency, productivity and enhance user satisfaction. A library stacked with books and other information dissemination processes, has a physical presence. A library is an institution of knowledge acquisition and learning; it provides invaluable service to its members, patrons and to a wider local community.

In this study we propose an affordable RFID based library management system by enhancing the current library management system. Current library management systems use barcode technology and security strips. Using barcodes, a library management system can keep records of lending, borrowing and shelving status of items such as books, audio or video tapes, CDs, DVDs, etc. Security strips on library items tag thei r movements. But barcodes and security strips (electronic article surveillance or EAS) have their limitations. They are slow to read and are prone to sabotaging by thieves. All these lead to irreparable loss to a library and its valuable inventory stock. This is where RFID technology can come to the aid of library managers and users.

The following are the tasks to be performed in the library.

y Circulation: handling user accounts and issuing/returning and shelving of materials. y Collection, development, order materials, maintain materials budgets. y Technical Services work behind the scenes cataloguing and processing new materials and de accessioning weeded materials.
5

Basic tasks in library management include the planning of acquisitions of materials, arranging the acquired materials according to the library classification, preservation of materials the de accessioning of materials, patron borrowing of materials, and developing and administering library computer systems. These are the advantages that will we get after implementing the proposed library management system.

y RFID technology will make the present system fully automated approximately at the maximum level. y RFID technology will make the manual check in/out system as an automation check in/out system y RFID technology will also make the issue and returning of books automated and easy than it is implemented in present library y RFID technology will make the security automated at the entry or exit point. y RFID technology will overcome the problem of time consuming y RFID technology makes the work of librarians easier than ever and reliable.

CONTENTS

Chapter # 1 ~ RFID ................................ .................... Error! Bookmark not defined. RFID Library Management System ................................ ................................ ....... 1 RFID Library Management System ................................ ................................ ....... 2 DEDICATED TO: ................................ ................................ ................................ .. 3 Acknowledgement ................................ ................................ ................................ ... 4 Abstract ................................ ................................ ................................ ................... 5 Chapter # 1 ~ RFID ................................ ................................ ................................ 15 History and technology background ................................ ................................ ..16 Current uses of rfid ................................ ................................ ................................ 22 Electronic Vehicle Registration ................................ ................................ ..........23 Transportation payments ................................ ................................ ...................23 Asset management and retail sales ................................ ................................ .....23 Transportation and logistics ................................ ................................ ...............23 Animal identification................................ ................................ ........................... 24 RFID mandates ................................ ................................ ................................ ...24 Wal-Mart mandate................................ ................................ .............................. 25 Promotion tracking ................................ ................................ ............................. 25
7

Passports ................................ ................................ ................................ ..............26 Schools and universities ................................ ................................ ...................... 26 Social retailing ................................ ................................ ................................ .....27 Human implants ................................ ................................ ................................ ..27 Potential uses ................................ ................................ ................................ .......28 Complement to barcode ................................ ................................ ...................... 28 Regulation and standardization................................ ................................ ..........29 Data flooding ................................ ................................ ................................ .......31 Security concerns ................................ ................................ ................................ 31 cOmpARING rfid WITH OTHER WIRELSS DEVICES ................................ 31 Libraries ................................ ................................ ................................ ..............32 CHAPTER # 2 ~ PRESENT LIBRARY SYSTEM ................................ ......36 WORKING OF PRESENT LIBRARY SYSTEM ................................ .....41 DRAW BACKS OF THE IMPLEMENTED SYSTEM IN LIBRARY AT PRESENT ................................ ................................ ..............41 LIBRARY DEMANDS ................................ ................................ .................... 42 SOLUTION USING RFID TECHNOLOGY................................ ..............44 SOLUTION DETAILS USING RFID TECHNOLGY ............................. 44 BAR CODE VS RFID ................................ ................................ ..................... 42 Chapter # 4 ~ Arduino ................................ ................................ ........................... 50 History ................................ ................................ ................................ .................51 Hardware................................ ................................ ................................ .............52 Software ................................ ................................ ................................ ...............53 Official hardware ................................ ................................ ................................ 54 Open hardware and open source ................................ ................................ ........55 Accessory hardware ................................ ................................ ............................ 55
8

Arduino-compatible boards ................................ ................................ ................55 How it can be used with our rfid library system ................................ ................56 Chapter # 5 ~ Weigand 26 protocol ................................ ................................ .......65 Pyramid Series Wiegand Data Format ................................ .............................. 65 Wiegand Connections ................................ ................................ ......................... 65 Data Signals ................................ ................................ ................................ .........66 Wiegand Formats ................................ ................................ ................................ 67 Pyramid Wiegand Format ................................ ................................ ..................68 Custom Wiegand Formats ................................ ................................ ..................69 The 8-bit Burst Format of the P-600 Rocky Proximity Reader and Keypad ....69 Weigand Format ................................ ................................ ................................ .70 Refernces ................................ ................................ ................................ .............75

CHAPTER #1 INTRODUCTION

10

CHAPTER # 1 ~ INTRODUCTION

Radio Frequency Identification (RFID) is a new generation of Auto Identification and Data collection technology which helps to automate business processes and allows identification of large number of tagged objects like books, using radio waves. RFID based Library Management system (LMS) would allow fast transaction flow for the library and will prove immediate and long term benefits to library in traceability and security. We proposed a library system using low frequency , 125KHz RFID reader (CR 362) at gates and transaction sections and library cards containing RFID transponder/tags (EM 4100) also placed on books and different library items e.g audio tapes, CDs, LPs, cassettes, videotapes, and DVDs. Libraries have materials arranged in a specified order according to a library classification system, so that items may be located quickly and collections may be browsed efficiently. Block diagram of our proposed RFID system is shown below which explains the working of the system RFID reader is ON all the time and whenever a tag comes in range of RFID reader it energize its circuit using the readers emitted field and the information (unique identification number) from memory is sent to control circuit from where it is sent to reader through encoder. The reader on the other end receives the RF signal and through decoder sent it to temporary storage memory and towards the controller through communication interface. The controller used is Arduino board to interface the reader with the system having database and software installed to perform the following tasks
y y y

Self chekin/checkout Return of book Anti theft

11

Fig 1.1 block diagram of proposed RFID Library system

12

Fig 1.2 component diagram of proposed RFID librar s stem

13

14

CHAPTER # 1 ~ RFID

Radio-frequency identification (RFID) is a technology that uses communication through the use of radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking. It is possible in the near future, RFID technology will continue to proliferate in our daily lives the way that bar code technology did over the forty years leading up to the turn of the 21st century bringing unobtrusive but remarkable changes when it was new. RFID makes it possible to give each product in a grocery store its own unique identifying number, to provide assets, people, work in process, medical devices etc. all with individual unique identifiers - like the license plate on a car but for every item in the world. This is a vast improvement over paper and pencil tracking or bar code tracking that has been used since the 1970s. With bar codes, it is only possible to identify the brand and type of package in a grocery store, for instance. Furthermore, passive RFID tags (those without a battery) can be read if passed within close enough proximity to an RFID reader. It is not necessary to "show" the tag to the reader device, as with a bar code. In other words it does not require line of sight to "see" an RFID tag, the tag can be read inside a case, carton, box or other container, and unlike barcodes RFID tags can be read hundreds at a time. Bar codes can only read one at a time. Some RFID tags can be read from several meters away and beyond the line of sight of the reader. The application of bulk reading enables an almost-parallel reading of tags. Radio-frequency identification involves the hardware known as interrogators (also known as readers), and tags (also known as labels), as well as RFID software or RFID middleware. Most RFID tags contain at least two parts: one is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions; the other is an antenna for receiving and transmitting the signal.

15

HISTORY AND TECHNOLOGY BACKGROUND

Fig 1.1 An RFID tag used for electronic toll collection.

In 1945 Lon Theremin invented an espionage tool for the Soviet Union which retransmitted incident radio waves with audio information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator, which modulated the reflected radio frequency. Even though this device was a covert listening device, not an identification tag, it is considered to be a predecessor of RFID technology, because it was likewise passive, being energized and activated by waves from an outside source.[1] The initial device was passive, powered by the interrogating signal, and was demonstrated in 1971 to the New York Port Authority and other potential users and consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission media. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates, surveillance) and medical (identification, patient history).[2] An early demonstration of reflected power (modulated backscatter) RFID tags, both passive and semi-passive, was performed by Steven Depp, Alfred Koelle, and Robert Freyman at the Los Alamos National Laboratory in 1973.[3] The portable system operated at 915 MHz and used 12-bit tags. This technique is used by the majority of today's UHFID and microwave RFID tags.[4]

16

RFID TAG

RFID tag is the chip based electronic circuit having an integrated antenna and it communicates via radio waves. It is also called transponder. It holds the information about the object. An RFID tag is comprised of a microchip containing identifying information and an antenna that transmits this data wirelessly to a reader. At its most basic, the chip will contain a serialized identifier, or license plate number, that uniquely identifies that item, similar to the way many bar codes are used today. A key difference, however is that RFID tags have a higher data capacity than their bar code counterparts. This increases the options for the type of information that can be encoded on the tag, including the manufacturer, batch or lot number, weight, ownership, destination and history (such as the temperature range to which an item has been exposed). In fact, an unlimited list of other types of information can be stored on RFID tags, depending on application needs. An RFID tag can be placed on individual items, cases or pallets for identification purposes, as well as on fixed assets such as trailers, containers, totes, etc. Tags come in a variety of types, with a variety of capabilities. Key variables include: "Read-only" versus "read-write" There are three options in terms of how data can be encoded on tags: (1) Read-only tags contain data such as a serialized tracking number, which is pre written onto them by the tag manufacturer or distributor. These are generally the least expensive tags because they cannot have any additional information included as they move throughout the supply chain. Any updates to that information would have to be maintained in the application software that tracks SKU movement and activity. (2) "Write once" tags enable a user to write data to the tag one time in production or distribution processes. Again, this may include a serial number, but perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new data to be written to the tag as neededand even written over the original data. Examples for the latter capability might include the time and date of ownership transfer or updating the repair history of a fixed asset. While these are the most costly of the three tag types and are not practical for tracking inexpensive items, future standards for electronic product codes (EPC) appear to be headed in this direction.

17

Fig 1.2 RFID Tag Data capacity The amount of data storage on a tag can var , ranging from 16 bits on the low end to as much as several thousand bits on the high end. The greater the storage capacit , the higher the price per tag.
TYPES OF TAGS

1. Active Tags 2. Passive Tags


ACTIVE T AGS
An RFID tag is an active tag when it is equipped with a battery that can be used as a partial or complete source of power for the tag's circuitry and antenna. Some active tags contain replaceable batteries for years of use; others are sealed units

Fig 1.3 Internal diagram of active tag


18

PASSIVE T AGS

A passive tag is an RFID tag that does not contain a batter ; the power is supplied b the reader. When radio waves from the reader are encountered b a passiveRFID tag, the coiled antenna within the tag forms a magnetic field. The tag draws power from it, energizing the circuits in the tag. The tag then sends the i formation encoded in the n tag s memor .

Fig 1.4 Internal diagram of passive tag

19

COMPARISON BETWEEN ACTIVE RFID TAGS AND PASSIVE RFID TAGS

Attribute Tag power source Tag battery Availability of power Required signal strength to tag Range Multi tag reading

Active RFID Tags Internal to tag Yes Continuous Very low Up to 500m 1000s of tags recognizedup to 100mph 128 bytes of read/write 2 to 7 years 10$ to 30$ HF (303,433 MHz) Microwave (2.4 GHz)

Passive RFID Tags Energy transferred using RF from reader No Only in field of reader Very high Less than 1m Few hundred within 3m of reader Up to 128Kb Unlimited 0.1$ to 10$ LF (125 KHz), HF (13.56 MHz), UHF (868968 MHz)

Data storage Life Cost Frequency

20

FREQUENCIES

Like all wireless communications, there are a variety of frequencies or spectra through which RFID tags can communicate with readers. Again, there are trade-offs among cost, performance and application requirements. For instance, low-frequency tags are cheaper than ultrahigh-frequency (UHF) tags, use less power and are better able to penetrate non-metallic substances. They are ideal for scanning objects with high water content, such as fruit, at close range. UHF frequencies typically offer better range and can transfer data faster. But they use more power and are less likely to pass through some materials. UHF tags are typically best suited for use with or near wood, paper, cardboard or clothing products. Compared to low-frequency tags, UHF tags might be better for scanning boxes of goods as they pass through a bay door into a warehouse. While the tag requirements for compliance mandates may be narrowly defined, it is likely that a variety of tag types will be required to solve specific operational issues. You will want to work with a company that is very knowledgeable in tag and reader technology to appropriately identify the right mix of RFID technology for your environment and applications.

EPC TAGS

EPC refers to "electronic product code," an emerging specification for RFID tags, readers and business applications first developed at the Auto-ID Center at the Massachusetts Institute of Technology. This organization has provided significant intellectual leadership toward the use and application of RFID technology. EPC represents a specific approach to item identification, including an emerging standard for the tags themselves, including both the data content of the tag and open wireless communication protocols. In a sense, the EPC movement is combining the data standards embodied in certain bar code specifications, such as the UPC or UCC-128 bar code standards, with the wireless data communication standards that have been developed by ANSI and other groups.

21

RFID READER

An RFID reader is a device that is used to interrogate a RFID tag. The reader has an antenna that emits radio waves to get the data information from RFID tag and decodes the data and sends it to the host system by using interfaces. A number of factors can affect the distance at which a tag can be read (the read range). The frequency used for identification, the antenna gain, the orientation and polarization of the reader antenna and the transponder antenna, as well as the placement of the tag on the object to be identified will all have an impact on the RFID systems read range.

CURRENT USES OF RFID

In 2010 three key factors drove a significant increase in RFID usage: decreased cost of equipment and tags, increased performance to a reliability of 99.9% and a stable international standard around UHF passive. At RFID Journal Live 2010 in Orlando, Airbus detailed 16 active projects, IBM andmost recently added to the teamCSC. The two other areas of significant use are financial services for IT asset tracking and healthcare with more than 60% of the top medical device companies using passive UHF RFID in 2010. RFID is becoming increasingly prevalent as the price of the technology decreases. The Japanese HIBIKI initiative aims to reduce the price to 5 Yen (4 eurocents). In January 2009 Envego announced a 5.9 cent tagand in March 2010 a Korean laboratory successfully created a printed chip using carbon nanotubes that would halve the price of a passive UHF RFID tag to about three cents by late 2011.

22

ELECTRONIC VEHICLE R EGISTRATION

With security of cars being a major concern in many countries, RFID technology is being leveraged by government for Vehicle Registration. This helps detected stolen cars and in their retrieval. In Mexico - Neology is working on various such initiatives. This technology is likely to see further implementations in countries such as India also.
TRANSPORTATION PAYMENTS

Governments use RFID applications for traffic management, while automotive companies use various RFID tracking solutions for product management. Many of these solutions may work together in the future, though privacy regulations prevent many initiatives from moving forward at the same pace that technology allows.
ASSET MANAGEMENT AND RETAIL SALES

RFID combined with mobile computing and Web technologies provide a way for organizations to identify and manage their assets. It was initially introduced to major retail by Craig Patterson, Knoxville. Mobile computers, with integrated RFID readers, can now deliver a complete set of tools that eliminate paperwork, give proof of identification and attendance. This approach eliminates manual data entry. Web based management tools allow organizations to monitor their assets and make management decisions from anywhere in the world. Web based applications now mean that third parties, such as manufacturers and contractors can be granted access to update asset data, including for example, inspection history and transfer documentation online ensuring that the end user always has accurate, real-time data.

TRANSPORTATION AND LOGISTICS

Logistics and transportation are major areas of implementation for RFID technology. For example, yard management, shipping and freight and distribution centers are some areas where RFID tracking technology is used. Transportation companies around the world value RFID technology due to its impact on the business value and efficiency.

23

ANIMAL IDENTIFIC ATION

Fig 1.2 A sheep with an ear tag.

Fig 1.3 Animal management using RFID technology. Santa Gertrudis cattle: The calf has an electronic ear tag and herd management tag (yellow). RFID tags for animals represent one of the oldest uses of RFID technology. Originally meant for large ranches and rough terrain, since the outbreak of mad-cow disease, RFID has become crucial in animal identification management.An implantable variety of RFID tags or transponders can also be used for animal identification. The transponders are more well-known as passive RFID technology, or simply "chips" on animals.[5]. The Canadian Cattle Identification Agency began using RFID tags as a replacement for barcode tags. The tags are required to identify a bovine's herd of origin and this is used for tracing when a packing plant condemns a carcass. Currently CCIA tags are used in Wisconsin and by US farmers on a voluntary basis. The USDA is currently developing its own program. .
RFID MANDATES

Wal-Mart and the United States Department of Defense have published requirements that their vendors place RFID tags on all shipments to improve supply chain management. Due to the size of these two organizations, their RFID mandates impact thousands of companies worldwide. The deadlines have been extended several times because many vendors face significant difficulties implementing RFID systems.

24

W AL-MART MAND AT E

Fig 1.4 An EPC RFID tag used b Wal-Mart. In Januar 2005, Wal-Mart required its top 100 suppliers to appl RFID labels to all shipments. To meet this requirement, vendors use RFID printer/encoders to label cases and pallets that require EPC tags for Wal-Mart. These smart labels are produced b embedding RFID inla s inside the label material, and then printing bar code and other visible information on the surface of the label. In October 2005 the Universit of Arkansas Information Technolog Research Institute released a report on its preliminar stud of the impact of RFI on reducing D -RFID retail out-of-stocks and concluded that RFID reduced OOS b 21% over non based stores.[6] Two ears later the Wall Street Journal published an article titled "Wal-Mart s RadioTracked Inventor Hits Static." The articles stated that the RFID plan set forth b Wal-Mart was "showing signs of fizzling" due to a lack of progress b WalMart -existent incentives executives to introduce the technolog to its stores and to the non for suppliers.

PROMOTIO N TRACKING

Manufacturers of products sold through retailers promote their products b offering discounts for a limited period on products sold to retailers with the expectation that the retailers will pass on the savings to their customers. However, retailers t picall engage in f w buyi , purchasing more product during the discount period than the intend to sell during the promotion period.To combat this practice, manufacturers are exploring the use of RFID tags on promoted merchandise so that the can track [7] exactl which product has sold through the suppl chain at full discounted prices.

25

PASSPORTS

The first RFID passports ("E-passport") were issued by Malaysia in 1998. In addition to information also contained on the visual data page of the passport, Malaysian epassports record the travel history (time, date, and place) of entries and exits from the country. Standards for RFID passports are determined by the International Civil Aviation Organization (ICAO), and are contained in ICAO Document 9303, Part 1, Volumes 1 and 2 (6th edition, 2006). ICAO refers to the ISO/IEC 14443 RFID chips in e-passports as "contactless integrated circuits". ICAO standards provide for epassports to be identifiable by a standard e-passport logo on the front cover.

Fig 1.5 RFID passport

SCHOOLS AND UNIVERSITIES

School authorities in the Japanese city of Osaka are now chipping children's clothing, back packs, and student IDs in a primary school.[62] A school in Doncaster, England is piloting a monitoring system designed to keep tabs on pupils by tracking radio chips in their uniforms.[8]St Charles Sixth Form College in west London, England, started September, 2008, is using an RFID card system to check in and out of the main gate, to both track attendance and prevent unauthorized entrance. Similarly, Whitcliffe Mount School in Cleckheaton, England uses RFID to track pupils and staff in and out of the building via a specially designed card. In the Philippines, some schools already use RFID in IDs for borrowing books and also gates in those particular schools have RFID ID scanners for buying items at a school shop and canteen, library and also to sign in and sign out for student and teacher's attendance.

26

SOCIAL RETAILING

When customers enter a dressing room, the mirror reflects their image and also images of the apparel item being worn by celebrities on an interactive display. A webcam also projects an image of the consumer wearing the item on the website for everyone to see. This creates an interaction between the consumers inside the store and their social network outside the store. The technology in this system is an RFID interrogator antenna in the dressing room and Electronic Product Code RFID tags on the apparel item.[9]

HUMAN IMPLANTS

Fig 1.6 Hand with the planned location of the RFID chip.

Fig 1.7 Just after the operation to insert the RFID tag was completed. The yellow is from the iodine disinfection before inserting the chip. Implantable RFID chips designed for animal tagging are now being used in humans. An early experiment with RFID implants was conducted by British professor of cyberneticsKevin Warwick, who implanted a chip in his arm in 1998. In 2004 Conrad Chase offered implanted chips in his night clubs in Barcelona[10] and Rotterdam to identify their VIP customers, who in turn use it to pay for drinks. In 2004, the Mexican Attorney General's office implanted 18 of its staff members with the Verified chip to control access to a secure data room.[11]
27

Security experts have warned against using RFID for authenticating people due to the risk of identity theft. For instance, a man-in-the-middle attack would make it possible for an attacker to steal the identity of a person in real-time.[clarification needed ] Due to the resource constraints of RFIDs, it is virtually impossible to protect against such attack models as this would require complex distance-binding protocols.[12][13][14][15] Privacy advocates have protested against implantable RFID chips, warning of potential abuse and denouncing these types of RFID devices as "spychips", and that use by governments could lead to an increased loss of civil liberties and would lend itself too easily to abuse. One such case of this abuse would be in the microchip's dual use as a tracking device. Such concerns were justified in the United States, when the FBI program COINTELPRO was revealed to have tracked the activities of high profile political activist and dissident figures.
POTENTIAL USES

RFID can be used in a variety of applications,[16][17] such as:


y y y y y y y y

Access management Tracking of goods and RFID in retail Tracking of persons and animals Toll collection and contactless payment Machine readable travel documents Smart dust (for massively distributed sensor networks) Tracking sports memorabilia to verify authenticity Airport baggage tracking logistics[18]

COMPLEMENT TO BARCODE

RFID tags are often a complement, but not a substitute, for UPC or EAN barcodes. They may not ever completely replace barcodes, due in part to their higher cost and the advantage of multiple data sources on the same object. Also, unlike RFID labels, barcodes can be generated and distributed electronically, e.g. via e-mail or mobile phone, for printing and/or display by the recipient. An example is airline boarding passes. The new EPC, along with several other schemes, is widely available at reasonable cost. The storage of data associated with tracking items will require many terabytes. Filtering and categorizing RFID data is needed to create useful information. It is likely that goods will be tracked by the pallet using RFID tags, and at package level with Universal Product Code (UPC) or EAN from unique barcodes. The unique identity is a mandatory requirement for RFID tags, despite special choice of the numbering scheme. RFID tag data capacity is large enough that each individual tag will have a unique code, while current bar codes are limited to a single type code for a particular product. The uniqueness of RFID tags means that a product may be
28

tracked as it moves from location to location, finally ending up in the consumer's hands. This may help to combat theft and other forms of product loss. The tracing of products is an important feature that gets well supported with RFID tags containing a unique identity of the tag and also the serial number of the object. This may help companies to cope with quality deficiencies and resulting recall campaigns, but also contributes to concern about tracking and profiling of consumers after the sale. An FDA-nominated task force concluded, after studying the various technologies currently commercially available, which of those technologies could meet the pedigree requirements. Amongst all technologies studied including bar coding, RFID seemed to be the most promising and the committee felt that the pedigree requirement could be met by easily leveraging something that is readily available. (More details see RFID-FDA-Regulations)
REGULATION AND STANDARDIZATION

There is no global public body that governs the frequencies used for RFID. In principle, every country can set its own rules for this. The main bodies governing frequency allocation for RFID are:
y y y

y y y y y y y y y y

USA: FCC (Federal Communications Commission) Canada: Industry Canada - Spectrum Management Branch Europe: ERO, CEPT, ETSI, and national administrations (note that the national administrations must ratify the usage of a specific frequency before it can be used in that country) Malaysia: Malaysian Communications and Multimedia Commission (MCMC) Japan: MIC (Ministry of Internal Affairs and Communications) China: Ministry of Information Industry Taiwan: NCC (National Communications Commission) South Africa: ICASA South Korea: Ministry of Knowledge Economy Australia: Australian Communications and Media Authority. New Zealand: Ministry of Economic Development Singapore: Infocomm Development Authority of Singapore Brazil: Anatel (Agncia Nacional de Telecomunicaes)

Low-frequency (LF: 125134.2 kHz and 140148.5 kHz) (Low RFID) tags and highfrequency (HF: 13.56 MHz) (High RFID) tags can be used globally without a license. Ultra-high-frequency (UHF: 868928 MHz) (Ultra-High RFID or UHFID) tags cannot be used globally as there is no single global standard. In North America, UHF can be used unlicensed for 902928& MHz (13 MHz from the 915 MHz center frequency), but restrictions exist for transmission power. In Europe, RFID and other low-power radio applications are regulated by ETSI recommendations EN 300 220 and EN 302 208, and ERO recommendation 70 03, allowing RFID operation with somewhat complex band restrictions from 865868 MHz. Readers are required to monitor a channel before transmitting ("Listen Before Talk"); this requirement has led to some restrictions on performance, the resolution of which is a subject of current
29

research. These frequencies are known as the ISM bands (Industrial Scientific and Medical bands). The return signal of the tag may still cause interference for other radio users.Some standards that have been made regarding RFID technology include:
y y

y y

y y

ISO 14223 Radiofrequency [sic] identification of animals Advanced transponders ISO/IEC 14443: This standard is a popular HF (13.56 MHz) standard for High RFIDs which is being used as the basis of RFID-enabled passports under ICAO 9303. The Near Field Communication standard that lets mobile devices act as RFID readers/transponders is also based on ISO/IEC 14443. ISO/IEC 15693: This is also a popular HF (13.56 MHz) standard for High RFIDs widely used for non-contact smart payment and credit cards. ISO/IEC 18000: Information technologyRadio frequency identification for item management: o Part 1: Reference architecture and definition of parameters to be standardized o Part 2: Parameters for air interface communications below 135 kHz o Part 3: Parameters for air interface communications at 13.56 MHz o Part 4: Parameters for air interface communications at 2.45 GHz o Part 6: Parameters for air interface communications at 860960 MHz o Part 7: Parameters for active air interface communications at 433 MHz ISO/IEC 18092 Information technologyTelecommunications and information exchange between systemsNear Field Communication Interface and Protocol (NFCIP-1) ISO 18185: This is the industry standard for electronic seals or "e-seals" for tracking cargo containers using the 433 MHz and 2.4 GHz frequencies. ISO/IEC 21481 Information technologyTelecommunications and information exchange between systemsNear Field Communication Interface and Protocol -2 (NFCIP-2) ASTM D7434, Standard Test Method for Determining the Performance of Passive Radio Frequency Identification (RFID) Transponders on Palletized or Unitized Loads ASTM D7435, Standard Test Method for Determining the Performance of Passive Radio Frequency Identification (RFID) Transponders on Loaded Containers ASTM D7580 Standard Test Method for Rotary Stretch Wrapper Method for Determining the Readability of Passive RFID Transponders on Homogenous Palletized or Unitized Loads

30

DATA FLOODING

Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concept have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data.

SECURITY CONCERNS

A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defense's recent adoption of RFID tags for supply chain management.[19]
COMPARING RFID WITH OTHER WIRELSS DEVICES

Wireless Devices

Frequencies used (Hz)

Signal Medium Radio M I Visibl R e W

U V

XRa y

Modulation Technique F A FS QPS M M K K

RFID Tags Car remote keys TOYS

2.5G,865M,125 K TX 315M, RX 433M TX 38.5K, RX 40.5K

Cordless Phones TV remotes

GSM (900M/1800M) CDMA 2.5G 433M,38.5K, 37.1K,32.7K,40 K

31

LIBRARIES

Fig 1.5 RFID tags used in libraries: square book tag, round CD/DVD tag and rectangular VHS tag. Among the many uses of RFID technology is its deployment in libraries. This technology has slowly begun to replace the traditional barcodes on library items (books, CDs, DVDs, etc.). The RFID tag can contain identifying information, such as a book's title or material type, without having to be pointed to a separate database (but this is rare in North America). The information is read by an RFID reader, which replaces the standard barcode reader commonly found at a library's circulation desk. The RFID tag found on library materials typically measures 5050 mm in North America and 5075 mm in Europe. It may replace or be added to the barcode, offering a different means of inventory management by the staff and self-service by the borrowers. It can also act as a security device, taking the place of the more traditional electromagnetic security strip.[20] While there is some debate as to when and where RFID in libraries first began, it was first proposed in the late 1990s as a technology that would enhance workflow in the library setting. Singapore was certainly one of the first to introduce RFID in libraries and Rockefeller University in New York may have been the first academic library in the United States to utilize this technology, whereas Farmington Community Library in Michigan may have been the first public institution, both of which began using RFID in 1999. In Europe, the first public library to use RFID was the one in Hoogezand-Sappemeer, the Netherlands, in 2001, where borrowers were given an option. To their surprise, 70% used the RFID option and quickly adapted, including elderly people. Worldwide, in absolute numbers, RFID is used most in the United States (with its 300 million inhabitants), followed by the United Kingdom and Japan. It is estimated that over 30 million library items worldwide now contain RFID tags, including some in the Vatican Library in Rome.[21] At the time of 2010, the largest RFID implementation in academic library is the University of Hong Kong Libraries which have over 1.20 million library items contain RFID tags;[22] whereas the largest
32

implementation for public institution has been installed in Seattle Public Library in the United States. RFID has many library applications that can be highly beneficial, particularly for circulation staff. Since RFID tags can be read through an item, there is no need to open a book cover or DVD case to scan an item. This could reduce repetitive-motion injuries. Where the books have a barcode on the outside, there is still the advantage that borrowers can scan an entire pile of books in one go, instead of one at a time. Since RFID tags can also be read while an item is in motion, using RFID readers to check-in returned items while on a conveyor belt reduces staff time. But, as with barcode, this can all be done by the borrowers themselves, meaning they might never again need the assistance of staff. Next to these readers with a fixed location there are also portable ones (for librarians, but in the future possibly also for borrowers, possibly even their own general-purpose readers). With these, inventories could be done on a whole shelf of materials within seconds, without a book ever having to be taken off the shelf.[23] In Ume, Sweden, RFID is being used to assist visually impaired people in borrowing audiobooks.[24] In Malaysia, Smart Shelves are used to pinpoint the exact location of books in Multimedia University Library, Cyberjaya.[56] In the Netherlands, handheld readers are being introduced for this purpose. The Dutch Union of Public Libraries ('Vereniging van Openbare Bibliotheken') is working on the concept of an interactive 'context library', where borrowers get a reader/headphones-set, which leads them to the desired section of the library (using triangulation methods, rather like GPS) and which they can use to read information from books on the shelves with the desired level of detail (e.g. a section read out loud), coming from the book's tag itself or a database elsewhere, and get tips on alternatives, based on the borrowers' preferences, thus creating a more personalised version of the library. This may also lead them to sections of the library they might not otherwise visit. Borrowers could also use the system to exchange experiences (such as grading books). This is already done by children in the virtual realm at mijnstempel.nl, but the same could be done in physical form. Borrowers can grade the book at the return desk. However, as of 2008 this technology remains too costly for many smaller libraries, and the conversion period has been estimated at 11 months for an average-size library. A 2004 Dutch estimate was that a library which lends 100,000 books per year should plan on a cost of 50,000 (borrow- and return-stations: 12,500 each, detection porches 10,000 each; tags 0.36 each). RFID taking a large burden off staff could also mean that fewer staff will be needed, resulting in some of them getting fired,[22] but that has so far not happened in North America where recent surveys have not returned a single library that cut staff because of adding RFID. In fact, library budgets are being reduced for personnel and increased for infrastructure, making it necessary for libraries to add automation to compensate for the reduced staff size. Also, the tasks that RFID takes over are largely not the primary tasks of librarians. A finding in the Netherlands is that borrowers are pleased with the fact that staff are now more available for answering questions.

33

A concern surrounding RFID in libraries that has received considerable publicity is the issue of privacy. Because RFID tags candepending on the RFID transmitter & readerbe scanned and read from up to 350 feet or 100 m (eg Smart Label RFID's), and because RFID utilizes an assortment of frequencies (both depending on the type of tag, though), there is some concern over whether sensitive information could be collected from an unwilling source. However, library RFID tags do not contain any patron information,[23] and the tags used in the majority of libraries use a frequency only readable from approximately ten feet.[21] Also, libraries have always had to keep records of who has borrowed what, so in that sense there is nothing new. However, many libraries destroy these records once an item has been returned. RFID would complicate or nullify this respect of readers' privacy. Further, another non-library agency could potentially record the RFID tags of every person leaving the library without the library administrator's knowledge or consent. One simple option is to let the book transmit a code that has meaning only in conjunction with the library's database. Another step further is to give the book a new code every time it is returned. And if in the future readers become ubiquitous (and possibly networked), then stolen books could be traced even outside the library. Tag removal could be made difficult if the tags are so small that they fit invisibly inside a (random) page, possibly put there by the publisher.

34

CHAPTER #3 RFID Library Management System

35

CHAPTER # 2 ~ RFID LIBRARY MANAGEMENT SYSTEM

A library is a collection of information, sources, resources, books, and services, and the structure in which it is housed. Apart from books many libraries are now also repositories and access points for maps, prints, or other documents on various storage media such as microform (microfilm/microfiche), audio tapes, CDs, LPs, cassettes, video tapes, and DVDs. Libraries have materials arranged in a specified order according to a library classification system, so that items may be located quickly and collections may be browsed efficiently. Reference stacks are different which has only reference books and only selected members.
y y y

Circulation: handling user accounts and issuing/returning and shelving of materials. Collection, development, order materials, maintain materials budgets. Technical Services work behind the scenes cataloguing and processing new materials and de accessioning weeded materials.

Basic tasks in library management include the planning of acquisitions of materials, arranging the acquired materials according to the library classification, preservation of materials the de accessioning of materials, patron borrowing of materials, and developing and administering library computer systems. Among these, the proposed system will automate the following tasks using RFID technology,
y y y y

Accessing number of books at a time Searching a particular book to check its presence in the library Locating the physical location of the book Accounting/Stock verification of the materials

The RFID based LMS facilitates the fast issuing, reissuing and returning of books with the help of RFID enabled modules. It directly provides the book information and library member information to the library management system and does not need the manual typing. It also provides monitoring and searching system. The monitoring module will continuously monitor the movement of books across the gates, so that the books taken out without prior issuing will be traced out easily and will alarm the librarians. The searching module provides the fast searching of books using RFID handheld reader. The physical location of the books can be easily located using this module.

Utmost care has been taken to provide following features to the Library using RFID technology:
36

y To remove manual book keeping of records y Traceability of books and library members as they move y Improved utilization of resources like manpower, infrastructure etc. Less time consumption as line of sight and manual interaction are not needed for RFID-tag reading. y To provide 2 meters read range antennas y To minimize the manual intervention y To minimize the manual errors y To provide the long lasting labels y To provide fast searching of books

DEMONSTRATION OF RFID LIBRARY MANAGEMENT SYSTEM

37

THE PROCESS

y y y y y

y y y

Whenever a new book is acquired by the library, an RFID tag is attached into the book with the relevant information like, call number, accession number, book number, etc. The detailed information regarding the book is also captured in the compute database. The computer database also stores all information for individual users (patrons) of the library. Each patron is supplied with a smart card. These smart cards carry identification data for each patron. The efficacy of the above smart system is best utilized while searching for a book or while issuing or returning a book: When a patron needs to get a book issued, he can get it done without any manual intervention. He walks to the issue kiosk, flashes his smart card and the system automatically opens his login account page. He then places the selected books, one by one on the RFID scanner. The computer records all these data against his name. When a patron wants to return books, he simply places the books in the book drop counter and the books automatically are adjusted for return against the patrons name. Such a system is very useful for searching - any patron is able to search for a book from any networked computer. He/she is also able to get all information regarding how many copies of a book are presently available and when the book will be again available for circulation.

38

HOW RFID TECHNOLOGY WORKS IN LIBRARY MANAGEMENT

A RFID tag is an important part of the RFID library management. RFID library systems consist of an integrated circuit and an antenna, which enables it to function as a transponder. It can be attached to any item with the information about the item stored in it. Details such as name, origin, price, ownership of an item etc. can be a part of the information stored in a RFID tag's microchip. When a RFID reader tries to read data from a tag, its antenna emits electromagnetic energy which is received by RFID tag's antenna. The tag's microchip uses this energy to emit a radio signal using the tag's antenna. The RFID reader receives and interprets this signal and passes interpreted information to a computer network. This computer network can provide information about the items carrying the RFID tag and their present status to a pc user.

RFID library management, using RFID tags library, is easy and convenient. A RFID library management system consists of books, each attached with an RFID tag, RFID reader, computer network and software. Library staff handle lending, returning, sorting, tagging etc. of books, using RFID tags in this library system. A person can locate RFID library books marked with a RFID tags, using the RFID reader which identifies and locates the book. When the book is carried to the counter, the library staff can either activate or deactivate the electronic article surveillance bit in the book's tag. If a book is borrowed, then the surveillance bit is deactivated. The main entrance of the library is equipped with a RFID antenna which receives radio signals from every book's tag being carried out of the library. It signals a warning, in case a book that is carried outside, with a surveillance bit in its RFID tag active. In this way a RFID equipped library system controls the inflow or outflow of tagged library books and prevents the theft of books. When a book is returned, the surveillance bit in its tag is activated, and the book cannot be taken past the entrance of the library, without an alarm being sounded. Borrowing and returning of books can be fully automatized with the help of self check-in/out systems. This system involves installation of a special software. A person using this system to borrow books, is presented with options on a computer screen. The person has to identify himself with a code, which is preferably a personal identification number, or any form of unique identity code. Books selected by the person are identified by the system's built-in RFID reader. And, the surveillance bit in
39

the book's tag is deactivated by the system. When a book is returned, the check-in/out system activates the surveillance bit.

CHAPTER #4 Proposed RFID Library Management System


40

CHAPTER #3 ~ PROPOSED RFID LIBRARY MANAGEMENT SYSTEM

Barcode system is implemented right now in the library of UCP. It is based on the software named LMS which is all internally designed and controlled and designed by TOWER TECH CO. It is also internally connected with the web portal of the University of Central Punjab (UCP).
WORKING OF PRESENT LIBRARY SYSTEM (UCP)

There are five professional staff in the library and overall of 15 people are working in library. There is a librarian which sits on the table inside library on where the book or any material of the library is issued or returned. First Of all, a student who has to issue a book from the library show his University ID card which has barcode strip on it. Then the book which is to be issued by the student has following identification characteristics.
y Unique Accessation Number y Call Number By the help of barcode reader, the identification is done on the behalf of these numbers which is sticked on every book or material place in the library. Each book has unique accessation number on which it is categorized in the shelves. And there is a call number which is to be identified the topics of the books. Then by bar-coding, the university ID card of the student, all the data come up on the system display which is controlled by librarian and the software is all internally designed by TOWER TECH CO. then the book is issued by identified the accessation number of the book and manually work is done. Then librarian stamped the card inside the book and take the signature of the student which is all manually and time consuming too. Only one book at a time is issued or returned in the present system of library at the Check in/out station. On the basis of security, there is a staff member which sits at the exit and entry point of the gate of library, who manually checks the students bag and card.
DRAW BACKS OF THE IMPLEMENTED SYSTEM IN LIBRARY AT PR ESENT

y y y y

It is not an automated system in a true sense. It is an automation only in barcoding. It is very much time consuming system. There is not automation on the behalf of security purposes at the entry and exit points. There is no hard and fast rule on the basis of holidays or other special off day events which affect the library system.

41

Line of sight is required for the bar-coding and one person at a time can only issue or return the book.

LIBRARY DEMANDS

y y y

There should be an automation in the security at exit and entry points. Manual work should be minimized. Problem of time consuming should be overcome.

BAR CODE VS RFID

RFID

Barcode

Technology

RF (Radio Frequency)

Optical (Laser)

Read/Write Capability

More than just reading. Ability to Read only. Ability to read read, write, modify, and update. items and nothing else.

Read Rate

High throughput. Multiple (>100) Very low throughput. Tags tags can be read simultaneously. can only be read manually, one at a time.

Read Range

Passive UHF RFID: Several inches up to several - Up to 40 feet (fixed readers) feet - Up to 20 feet (handheld readers) Active RFID: - Up to 100 s of feet or more

Durability

High. Much better protected, and can Low. Easily damaged or even be internally attached, so it can removed; cannot be read if be read through very harsh dirty or greasy. environments.

Line of Sight

Not required. Items can be oriented in Definitely required. Scanner any direction, as long as it is in the must physically see each item
42

read range, and direct line of sight is directly to scan, and items never required. must be oriented in a very specific manner.

Human Capital

Virtually none. Once up and running, Large requirements. Laborers the system is completely automated. must scan each tag.

Security

High. Difficult to replicate. Data can Low. Much easier be encrypted, password protected, or reproduce or counterfeit. include a kill feature to remove data permanently, so information stored is much more secure.

to

Event Triggering

Capable. Can be used to trigger Not capable. Cannot be used certain events (like door openings, to trigger events. alarms, etc.).

Interference

Like the TSA (Transportation Obstructed barcodes cannot Security Administration), some RFID be read (dirt covering frequencies dont like Metal and barcode, torn barcode, etc.) Liquids. They can interfere with some RF Frequencies.

Automation

Most fixed readers dont require Most barcode scanners human involvement to collect data require a human to operate (automated) (labor intensive) Table 2.1 Barcode VS RFID

43

SOLUTION USING RFID TECHNOLOGY

y y y y y y

RFID technology will make the present system fully automated approximately at the maximum level. RFID technology will make the manual check in/out system as an automation check in/out system RFID technology will also make the issue and returning of books automated and easy than it is implemented in present library RFID technology will make the security automated at the entry or exit point. RFID technology will overcome the problem of time consuming RFID technology makes the work of librarians easier than ever and reliable.

SOLUTION DETAILS USING RFID TECHNOLGY

RFID technology will make the manual check in/out system as an automation check in/out system. It will be done as the RF reader and the system link with database LMS are available at the library. There is no line of sight needed in this process. The student or person who wants to issue a book in the library will come to the check in/out station and shows the identification card which is bar-coding or it may be implemented on the RFID Technology that a tag is stickered inside the id card. Well, in the library, reader detects the card and information of the student is displayed on the screen to the staff and the book which is to be issue is also scanned by reader and it will be issued on the name of that particular student by the database which is all internally designed by TOWER TECH CO. It is less time consuming and it can issue number of books at a time. RFID technology will also make the issue and returning of books automated and easy than it is implemented in present library. It is doing by having a book drop station where the process is carry on for the returning of the books and it works as the book come in the range of RF Reader and returning of book is done by dropping the book into the box RFID technology will make the security automated at the entry or exit point. It is doing so by having the window at the exit point where reader or anti theft detector is there and it automatically detects the wrong book going outside the library or theft which will happen if any. It will work as overall security and it will be all automation and it overcomes the manual work.

44

PROPOSED RFID TAG

Specifications
y y y y y y y EM 4100 card Frequency = 125 kHz (LF) Card type Read only Memory 64 bit Protocol ASK, Manchester Transmission Passive Dimensions = 86*54*0.8mm

Fig 3.1 Proposed RFID Tag (EM-4100)

45

PROPOSED RFID READER

Specifications

y y y y y y y y y y y y

Frequency = 125 kHz Built in integrated antenna Power = 7.5 to 13.6V DC, 300mA typical & 200mA(7.5V) Read Range up to 110cm(~1m) Weatherproof Cable :- 10 way, 1m long Supported EM4100 tags Interface Weigand (26) Robust casing for harsh environment LED and beeper indication Permanent reading and sending of ID numbers Dimensions = 240*240*50mm

Fig 3.2 Proposed RFID Reader


46

WORKING OF PROPOSED RFID LIBRARY MANAGEMENT SYSTEM

Functions of components of proposed library system 1. 2. 3. 4. RFID Tag RFID Reader Arduino System (Database)

RFID Tag An RFID tag is the most important link in any RFID system. It has the ability to store information relating to the specific item to which they are attached, rewrite again without any requirement for contact or line of sight. Data within a tag may provide identification for an item, proof of ownership, original storage location, loan status and history. RFID Tag consists of an integrated circuit and an antenna combined to form a transponder. RFID tags collect the energy to operate from a Radio Frequency (RF)
47

field emitted by a reader device; therefore they do not need a battery. When energized by a radio signal from a fixed position reader or handheld scanner, the tag returns the stored information in order that the item to which it is attached can be easily located. The chip also has a "multi-read" function, which means that several tags can be read at once. RFID tags have been specifically designed to be affixed into library media, including books, CDs, DVDs and tapes.

RFID Reader An RFID reader is a device that is used to interrogate a RFID tag. The reader has an antenna that emits radio waves to get the data information from RFID tag and decodes the data and sends it to the host system by using interfaces. In this case, RFID reader reads the RFID tag when RFID tag comes in its range, and as it is transmitting RF signals all the time, so whenever RFID tag comes in range of reader, it will get the information of tag and send it to system having database through controller (Arduino). Arduino Arduino is an open-source single-board microcontroller, descendant of the opensource Wiring platform, designed to make the process of using electronics in multidisciplinary projects more accessible. The hardware consists of a simple open hardware design for the Arduino board with an Atmel AVR processor and on-board I/O support. The software consists of a standard programming language compiler and the boot loader that runs on the board. In this case, Arduino is used as a controller to interface RFID reader with the system.

System It consists of a database that has information and records about the books and users. We built database using Microsoft Access

48

CHAPTER #5 ARDUINO

49

CHAPTER # 4 ~ ARDUINO

Fig 4.1 A screenshot of the Arduino IDE showing a simple example program.

Fig 4.2 Arduino compared to a human hand Arduino is an open-source single-board microcontroller, descendant of the opensource Wiring platform[1][2], designed to make the process of using electronics in multidisciplinary projects more accessible. The hardware consists of a simple open hardware design for the Arduino board with an Atmel AVR processor and on-board I/O support. The software consists of a standard programming language compiler and the boot loader that runs on the board.[3] Arduino hardware is programmed using a Wiring-based language (syntax + libraries), similar to C++ with some simplifications and modifications, and a Processing-based IDE.[3]
50

Currently shipping versions can be purchased pre-assembled; hardware design information is available for those who would like to assemble an Arduino by hand. Additionally, variations of the Italian-made Arduinowith varying levels of compatibilityhave been released by third parties. The Arduino project received an honorary mention in the Digital Communities category at the 2006 Prix Ars Electronica.[4][5] The name is an Italian masculine first name, meaning "strong friend". The English pronunciation is "Hardwin", a namesake of Arduino of Ivrea.[6]

HISTORY

The project began in Ivrea, Italy (a town that, as site of Olivetti, hosted an extraordinary concentration of IT professionals since as early as 1950), in 2005 to make a device for controlling student-built interaction design projects less expensively than other prototyping systems available at the time. As of February 2010 more than 120,000 Arduino boards had been shipped.[7] Founders Massimo Banzi and David Cuartielles named the project after Arduin of Ivrea, the main historical character of the town.[8] The Arduino project is a fork of the open-source Wiring platform[4]. Wiring was created by Colombian artist and programmer Hernando Barragn as a master's thesis at the Interaction Design Institute Ivrea, under the supervision of Massimo Banzi and Casey Reas. Conversely, Wiring is based on Processing and its integrated development environment created by Casey Reas and Ben Fry.[9]

Arduino was built around the Wiring project of Hernando Barragan. Wiring was Hernando's thesis project at the Interaction Design Institute Ivrea. It was intended to be an electronics version of Processing that used our programming environment and was patterned after the Processing syntax. It was supervised by myself and Massimo Banzi, an Arduino founder. I don't think Arduino would exist without Wiring and I don't think Wiring would exist without Processing. And I know Processing would certainly not exist without Design By Numbers and John Maeda.[1]

51

HARDW ARE

Fig 4.3 An official Arduino Duemilanove (rev 2009b). An Arduino board consists of an 8-bit Atmel AVR microcontroller with complementary components to facilitate programming and incorporation into other circuits. An important aspect of the Arduino is the standard way that connectors are exposed, allowing the CPU board to be connected to a variety of interchangeable addon modules (known as shields). Official Arduinos have used the megaAVR series of chips, specifically the ATmega8, ATmega168, ATmega328, and ATmega1280. A handful of other processors have been used by Arduino compatibles. Most boards include a 5 volt linear regulator and a 16 MHz crystal oscillator (or ceramic resonator in some variants), although some designs such as the LilyPad run at 8 MHz and dispense with the onboard voltage regulator due to specific form-factor restrictions. An Arduino's microcontroller is also pre-programmed with a boot loader that simplifies uploading of programs to the on-chip flash memory, compared with other devices that typically need an external chip programmer. At a conceptual level, when using the Arduino software stack, all boards are programmed over an RS-232 serial connection, but the way this is implemented varies by hardware version. Serial Arduino boards contain a simple inverter circuit to convert between RS-232-level and TTL-level signals. Current Arduino boards are programmed via USB, implemented using USB-to-serial adapter chips such as the FTDI FT232. Some variants, such as the Arduino Mini and the unofficial Boarduino, use a detachable USB-to-serial adapter board or cable, Bluetooth or other methods. (When used with traditional microcontroller tools instead of the Arduino IDE, standard AVR ISP programming is used.) The Arduino board exposes most of the microcontroller's I/O pins for use by other circuits. The Diecimila, now superseded by the Duemilanove, for example, provides 14 digital I/O pins, six of which can produce PWM signals, and six analog inputs. These pins are on the top of the board, via female 0.1 inch headers. Several plug-in application "shields" are also commercially available.

52

SOFTWARE

The Arduino IDE is a cross-platform application written in Java, and is derived from the IDE for the Processing programming language and the Wiring project. It is designed to introduce programming to artists and other newcomers unfamiliar with software development. It includes a code editor with features such as syntax highlighting, brace matching, and automatic indentation, and is also capable of compiling and uploading programs to the board with a single click. There is typically no need to edit makefiles or run programs on the command line. The Arduino IDE comes with a C/C++ library called "Wiring" (from the project of the same name), which makes many common input/output operations much easier. Arduino programs are written in C/C++, although users only need define two functions to make a runnable program:
y y

setup() a function run once at the start of a program that can initialize settings loop() a function called repeatedly until the board powers off

A typical first program for a microcontroller simply blinks a LED (light-emitting diode) on and off. In the Arduino environment, the user might write a program like this:
#define LED_PIN 13 void setup () { pinMode (LED_PIN, OUTPUT); // enable pin 13 for digital output } void loop () { digitalWrite (LED_PIN, HIGH); // turn on the LED delay (1000); // wait one second (1000 milliseconds) digitalWrite (LED_PIN, LOW); // turn off the LED delay (1000); // wait one second }

The above code would not be seen by a standard C++ compiler as a valid program, so when the user clicks the "Upload to I/O board" button in the IDE, a copy of the code is written to a temporary file with an extra include header at the top and a very simple main() function at the bottom, to make it a valid C++ program. The Arduino IDE uses the GNU toolchain and AVR Libc to compile programs, and uses avrdude to upload programs to the board.

53

OFFICIAL HARDW ARE

Fig 4.4 The LilyPad Arduino is designed for flexibility so that it is easier to wear The original Arduino hardware is manufactured by the Italian company Smart Projects. Some Arduino-branded boards have been designed by the American company SparkFun Electronics. Thirteen versions of the Arduino hardware have been commercially produced to date: 1. The Serial Arduino, programmed with a DE-9 serial connection and using an ATmega8 2. The Arduino Extreme, with a USB interface for programming and using an ATmega8 3. The Arduino Mini, a miniature version of the Arduino using a surfacemounted ATmega168 4. The Arduino Nano, an even smaller, USB powered version of the Arduino using a surface-mounted ATmega168 (ATmega328 for newer version) 5. The LilyPad Arduino, a minimalist design for wearable application using a surface-mounted ATmega168 6. The Arduino NG, with a USB interface for programming and using an ATmega8 7. The Arduino NG plus, with a USB interface for programming and using an ATmega168 8. The Arduino Bluetooth, with a Bluetooth interface for programming using an ATmega168 9. The Arduino Diecimila, with a USB interface and utilizes an ATmega168 in a DIL28 package (pictured) 10. The Arduino Duemilanove ("2009"), using the ATmega168 (ATmega328 for newer version) and powered via USB/DC power, switching automatically 11. The Arduino Mega, using a surface-mounted ATmega1280 for additional I/O and memory.[11] 12. The Arduino Uno, uses the same ATmega328 as late-model Duemilanove, but whereas the Duemilanove used an FTDI chipset for USB, the Uno uses an ATmega8U2 programmed as a serial converter. 13. The Arduino Mega2560, uses a surface-mounted ATmega2560, bringing the total memory to 256 kB. It also incorporates the new ATmega8U2 USB chipset.

54

OPEN HARDW ARE AND OPEN SOURCE

The Arduino hardware reference designs are distributed under a Creative Commons Attribution Share-Alike 2.5 license and are available on the Arduino Web site. Layout and production files for some versions of the Arduino hardware are also available. The source code for the IDE and the on-board library are available and released under the GPLv2 license.
ACCESSORY HARDW ARE

Fig 4.5 A prototyping shield, mounted on an Arduino Arduino and Arduino-compatible boards make use of shields, which are printed circuit boards that sit atop an Arduino, and plug into the normally supplied pinheaders. These are expansions to the base Arduino. There are many functions of shields, from motor controls, to breadboarding (prototyping).[3] For example:
y y y y y y y

Arduino Ethernet Shield XBee Shield TouchShield from Liquidware Datalog Shield: RTC, SD card storage, temperature sensing, etc. From NuElectronics USB Host Shield from Circuits@Home Cosmo WiFi Connect from JT5 Cosmo GSM Connect from JT5

ARDUINO-COMPATIBLE BOARDS
55

Although the hardware and software designs are freely available under copyleft licenses, the developers have requested that the name "Arduino" be exclusive to the official product and not be used for derivative works without permission. The official policy document on the use of the Arduino name emphasizes that the project is open to incorporating work by others into the official product.[3] As a result of the protected naming conventions of the Arduino, a group of Arduino users forked the Arduino Diecimila, releasing an equivalent board called Freeduino. The name "Freeduino" is not trademarked and is free to use for any purpose. Several Arduino-compatible products commercially released have avoided the "Arduino" name by using "-duino" name variants.

Arduino footprint-compatible boards

Fig 4.7 Example of a Arduino-compatible board: the Free-tronics TwentyTen


HOW IT CAN BE USED W ITH OUR RFID LIBRARY SYSTEM
/**

* */ #define RFID_ENABLE 2 //to RFID ENABLE #define CODE_LEN 10 //Max length of RFID tag

#define VALIDATE_TAG 1 //should we validate tag? #define VALIDATE_LENGTH 200 //maximum reads b/w tag read and validate

56

#define ITERATION_LENGTH 2000 //time, in ms, given to the user to move hand away #define START_BYTE 0x0A #define STOP_BYTE 0x0D

char tag[CODE_LEN];

void setup() { Serial.begin(2400); pinMode(RFID_ENABLE,OUTPUT); }

void loop() { enableRFID(); getRFIDTag(); if(isCodeValid()) { disableRFID(); sendCode(); delay(ITERATION_LENGTH); } else { disableRFID(); Serial.println("Got some noise"); } Serial.flush(); clearCode(); }

/** * Clears out the memory space for the tag to 0s. */ 57

void clearCode() { for(int i=0; i<CODE_LEN; i++) { tag[i] = 0; } }

/** * Sends the tag to the computer. */ void sendCode() { Serial.print("TAG:"); //Serial.println(tag); for(int i=0; i<CODE_LEN; i++) { Serial.print(tag[i]); } }

/**************************************************************/ /******************** RFID Functions ***********************/ /**************************************************************/

void enableRFID() { digitalWrite(RFID_ENABLE, LOW); }

void disableRFID() { digitalWrite(RFID_ENABLE, HIGH); }

58

/** * Blocking function, waits for and gets the RFID tag. */ void getRFIDTag() { byte next_byte; while(Serial.available() <= 0) {} if((next_byte = Serial.read()) == START_BYTE) { byte bytesread = 0; while(bytesread < CODE_LEN) { if(Serial.available() > 0) { //wait for the next byte if((next_byte = Serial.read()) == STOP_BYTE) break; tag[bytesread++] = next_byte; } } } }

/** * Waits for the next incoming tag to see if it matches * the current tag. */ boolean isCodeValid() { byte next_byte; int count = 0; while (Serial.available() < 2) { //there is already a STOP_BYTE in buffer delay(1); //probably not a very pure millisecond if(count++ > VALIDATE_LENGTH) return false; } Serial.read(); //throw away extra STOP_BYTE 59

if ((next_byte = Serial.read()) == START_BYTE) { byte bytes_read = 0; while (bytes_read < CODE_LEN) { if (Serial.available() > 0) { //wait for the next byte if ((next_byte = Serial.read()) == STOP_BYTE) break; if (tag[bytes_read++] != next_byte) return false; } } } return true; } ..

using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Text; using System.Windows.Forms;

namespace SimpleSerial { 60

public partial class Form1 : Form { // Add this variable

string RxString;

public Form1() { InitializeComponent(); }

private void buttonStart_Click(object sender, EventArgs e) { serialPort1.PortName = "COM1"; serialPort1.BaudRate = 9600;

serialPort1.Open(); if (serialPort1.IsOpen) { buttonStart.Enabled = false; buttonStop.Enabled = true; textBox1.ReadOnly = false; } }

private void buttonStop_Click(object sender, EventArgs e) { if (serialPort1.IsOpen) { 61

serialPort1.Close(); buttonStart.Enabled = true; buttonStop.Enabled = false; textBox1.ReadOnly = true; }

private void Form1_FormClosing(object sender, FormClosingEventArgs e) { if (serialPort1.IsOpen) serialPort1.Close(); }

private void textBox1_KeyPress(object sender, KeyPressEventArgs e) { // If the port is closed, don't try to send a character.

if(!serialPort1.IsOpen) return;

// If the port is Open, declare a char[] array with one element. char[] buff = new char[1];

// Load element 0 with the key character.

buff[0] = e.KeyChar;

// Send the one character buffer. serialPort1.Write(buff, 0, 1);

62

// Set the KeyPress event as handled so the character won't // display locally. If you want it to display, omit the next line. e.Handled = true; }

private void DisplayText(object sender, EventArgs e) { textBox1.AppendText(RxString); }

private void serialPort1_DataReceived (object sender, System.IO.Ports.SerialDataReceivedEventArgs e) { RxString = serialPort1.ReadExisting(); this.Invoke(new EventHandler(DisplayText)); } } }

63

CHAPTER #6 Weigand 26 Protocol

64

CHAPTER # 5 ~ WEIGAND 26 PROTOCOL

PYRAMID SERIES WIEGAND DATA FORMAT

Pyramid Series Proximity readers can communicate via Wiegand 1 or Magnetic Stripe data formats.Wiegand is a commonly used interface between readers and control panels used in access control,security, time and attendance, and other related industries. Pyramid Series readers follow the Wiegand standard specified by the Security Industry Associations (SIA) Access Control Standard Protocol for the 26Bit Wiegand Reader Interface document. Manufacturers have adopted the Wiegand standard to establish a common Wiegand interface. This provides a level of compatibility and interoperability for readers and control panels that can be used by consultants, specifiers, and end users when setting product design or system installation criteria. To this end the Pyramid Series offers several approaches for implementing the Wiegand format.

WIEGAND CONNECTIONS

Pyramid Series readers can be connected to virtually any control panel that conforms to Wiegand format standards. All connections between the reader and control panel are made through the readers cable. Consult Table 1 and Figure 1 for wiring instructions.

Table 5.1 - Wiring Connections


65

Figure 5.1 - Wiring Connections

DATA SIGNALS

Figure 2 displays the timing pattern for data bits sent by the reader to the access control panel. This timing pattern falls within the Wiegand guidelines as proscribed by the SIAs Access Control Standard Protocol for the 26-Bit Wiegand Reader Interface (a Pulse Width time between 20 uS and 100 uS, and a Pulse Interval time between 200 uS and 20 mS).

The Data 1 and Data 0 signals are held at a logic high level (above the Voh level) until the reader is ready to send a data stream. The reader places data as asynchronous low-going pulses (below the Vol level) on the Data 1 or Data 0 lines to transmit the data stream to the access control panel (the "saw-teeth" in Figure 2). The Data 1 and Data 0 pulses will not overlap or occur simultaneously.

66

Figure 5.2 - Data Bit Timing Pattern&Table 5.2 - Pulse Times

Table 5.2 - provides the minimum and maximum allowable pulse width times (the duration of a pulse) and pulse interval times (the time between pulses) for Pyramid Series Readers.
WIEGAND FORMATS

Pyramid Series readers feature pass-through technology. This means that any reader will read any and all formatting data programmed to any of the Pyramid Series credentials. Pyramid Series readers can be shipped from stock because unlike other proximity manufacturers, there is no format matching between readers and credentials. 26-Bit Wiegand Format The composition of the open de facto industry standard 26 Bit Wiegand format contains 8 bits for the facility code field and 16 bits for the ID number field. Mathematically these 8 facility code bits allow for a total of just 256 (0 to 255) facility codes, while the 16 ID number bits allow for a total of only 65,536 (0 to 65,535) individual IDs within each facility code. Due to the mathematical limitations of the 26-bit Wiegand format, code duplication might occur. Table 3 provides a summary the 26-bit Wiegand format.

67

Table 5.3 - 26-bit Wiegand Format

PYRAMID WIEGAND FORMAT

Several alternatives exist for customers who require more codes. The first is to switch to Keris standard 39 bit Pyramid format. This 39 bit Wiegand format contains 17 bits for the facility code field and 20 bits for the ID number field. Mathematically these 17 facility code bits allow for a total of 131,072 (0 to 131,071) facility codes, while the 20 ID number bits allow for a total of 1,048,576 (0 to 1,048,575) individual IDs within each facility code. Since there are so many facility codes in the Pyramid format, a new facility code may be selected for each project. Additionally the large number of IDs per facility code makes the Pyramid format ideal for very large projects. For added security, Keri Systems tracks credential coding to ensure that no duplication occurs. Table 4 provides a summary of the Pyramid Wiegand format.

Table 5.4 - Pyramid Wiegand Format

68

CUSTOM WIEGAND FORMATS

The second alternative is to create a custom Wiegand format. Typically, up to 64 bits are available for creating a custom Wiegand format. With certain limitations, formats with greater than 64 bits may be created. If a customer currently has a custom Wiegand format from Wiegand or from other proximity manufacturers, Keri can normally match that format. Although the customer is primarily responsible for custom format card coding, as an added benefit Keri Systems tracks card coding for additional security.

Table 5.5 provides an example of one possible custom Wiegand format.

THE 8-BIT BURST FORMAT OF THE P-600 ROCKY PROXIMITY READER AND KEYPAD

The P-600 reader is capable of transmitting data in the 26-bit Wiegand format described above, but its default data transmission configuration is Wiegand 8-bit burst. The timing pattern for data bits generated in the 8-bit burst format follows the pattern described in the Data Signals section beginning on page 2. In 8-bit burst mode, each keystroke prompts the reader to transmit 8 bits of data according to Table 6.

Table 6 Wiegand interface 8-bit burst data format


69

WEIGAND FORMAT

A Wiegand reader is one of the earliest types of ID card, it was a crude type of magnetic swipe card. The card consisted of a series of small embedded magnets in two parallel stripe, one stripe containing the zeros in the number and the other containing the ones. Therefor the output of the reader consisted of two signals, one pulsing to indicate a one and the other pulsing to indicate a zero. Although cards like this are long since gone, the concept lives on in the two signal pulse format known as a Wiegand format output. The term Wiegand 26 refers to the fact that there are 26 bits that make up the transmitted number. The first bit is a odd parity bit for the first half of the number and the last bit is an even parity bit for the second half of the number. However I am not too concerned with this because for any given card the parity bits are always going to be the same and so they can be considered to be just bits in the unique number. In an access control situation there are also different fields in the Wiegand number that can be used to indicate things like a site code, issue code and ID number. Again, for this project it is is not an issue as we will take the number as a whole. Sometimes the term Wiegand reader is wrongly applied to any reader with a Wiegand output. However, a Wiegand output is easy to handle with an Arduino as there is xx mS between each pulse and the reader produces the code only once when it is presented to the reader. If the card is held against the reader then no further outputs occur, which is exactly what we want for this application.

Figure 5.6 Weigand Format

70

CHAPTER # 7 ~ DATABASE AND SOFTWARE

books table

71

Students table

72

Composite table

73

CHAPTER # 8 ~ CONCLUSION

It is quite clear from the above discussion that an RFID system may be a comprehensive system that addresses both the security and materials tracking needs of a library. RFID in library is not a threat if best practices guidelines followed religiously, that it speeds up book borrowing and inventories and frees staff to do more user-service tasks. The technology saves a money too and quickly gives a return on investment.

OBJECTIVES ACHIEVED
y y y y

Understanding of RFID system its main components, types and applications Weigand interface Database LMS system to perform required functions

FURTHER ENHANCEMENTS
y y y

Tracking of books inside and outside the library Drop sections in the premises of the campus Automatic sorting of books using PLC based system

74

REFERNCES

1. ^Hacking Exposed Lin x: Lin x Sec rit Secrets & Sol tions (third ed.). McGraw-Hill Osborne Media. 2008. p. 298. ISBN 978-0-07-226257-5. 2. ^ Cardullo et al. "Transponder apparatus and system" U.S. Patent 3,713,148 (1973) 3. ^"Real Time Location Systems". clarinox. Retrieved 2010-08-04. 4. ^ Charles A. Walton "Portable radio frequency emitting identifier" U.S. Patent 4,384,288 issue date May 17, 1983 5. ^RFID's Second Wave, BusinessWeek 6. ^ Radio Frequency Identification: An Introduction for Library Professionals. Alan Butters. Australasian Public Libraries v19.n4(2006) pp.2164174. 7. ^ "The State of RFID Applications in Libraries." Jay Singh et al. Information Technolog & Libraries no.1(Mar.2006) pp.2432. 8. ^ S. Hsi en H. Fait, "RFID enhances visitors Museum Experience at the Exploratorium," Communications of the ACM 48, 9 (2005): 60 9. ^Social Shopping in a Fully Enabled RFID Store, RFID Radio 10. ^Vail Resorts Launches Epic Mix | SNOWBOARD MAGAZINE. Snowboard-mag.com. Retrieved on 2010-11-08. 11. ^High-tech cloning 12. ^Vericip hacked press release, Spychips 13. ^"Demo: Cloning a Verichip". Retrieved 2007-02-03. 14. ^"VeriChips Implanted at CityWatcher.com". Compliance and Privacy. Retrieved 2007-02-03. "No one I spoke with at Six Sigma Security or at CityWatcher knew that the VeriChip had been hacked. They were also surprised to hear of VeriChip's downsides as a medical device. It was clear they weren't aware of some of the controversy surrounding the implant. (Liz McIntyre)" 15. ^CASPIAN Special Report, October 19, 2004: FDA Letter Raises Questions about VeriChip Safety, Data Security and Rosenberg, Isaac B. (2008). Involuntar Endogenous RFID Compliance Monitoring as a Condition of Federal Supervised Release - Chips Aho ?. 10. Yale Journal of Law & Technology. p. 331 16. ^ Martein Meints (2007), D3.7 A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID), FIDIS deliverable 3(7), June 2007. [1] 17. ^Paolo Magrassi (2001). "A World Of Smart Objects: The Role Of Auto Identification Technologies". Retrieved 2007-06-24.

75

18. ^ Pete Harrison (2009-07-28). "EU considers overhauling rules for lost air luggage". Reuters. Retrieved 2009-09-09. 19. ^Ohio Boutique Takes a Unique Approach to RFID. RFID Journal. Retrieved on 2010-11-08. "RFID Privacy and Security". RSA Laboratories. 20. ^ "Keeping Track of Promotion Progress: How Marketing Will Become the Greatest Advocate of RFID". Consumer Goods Technology. Retrieved 200804-10. 21. ^ Radio Frequency Identification: An Introduction for Library Professionals. Alan Butters. Australasian Public Libraries v19.n4(2006) pp.2164174. 22. ^ "The State of RFID Applications in Libraries." Jay Singh et al. Information Technology & Libraries no.1(Mar.2006) pp.2432. 23. ^ Making RFID work: The World's largest University Library RFID Implementation, Center of Asia Business Cases, The University of Hong Kong, (09/451), 2009. 24. ^ "Radio Frequency Identification." Rachel Wadham. "Library Mosaics" v14 no.5 (S/O 2003) pg.22.

76

Вам также может понравиться