Sie sind auf Seite 1von 41

by-

ARPIT GOSWMAI
ELECTRONICS & COMM. ENGG.
PANJAB UNIVERSITY
INDIA
Circuit
Diagram

Power
Supply
and RFID
reader

2
 RFID stands for Radio Frequency
identification.

 Radio Frequency means radio waves


are used as
carrier for transmission of data over
wireless medium.

3
•The system is based on Radio Frequency
Identification (RFID) technology and consists of a
passive RFID tag.

•The passive micro transponder tag collects power


from the 125 KHz magnetic field generated by the base
station, gathers information about the Tag ID and
sends this information to the base station.

•The base station receives, decodes and checks the


information available in its database.

4
• Base Station is built by using the Popular 8051 family
Microcontroller.

•It gets the tag ID and if the tag ID is stored in its


memory then the microcontroller will allow the person
inside.

•RFID Reader Module, are also called as interrogators.


•They convert radio waves returned from the RFID tag
into a form that can be passed on to Controllers, which
can make use of it.
5
•RFID tags and readers have to be tuned to the same
frequency in order to communicate.

•RFID systems use many different frequencies


but the most commonly used Reader frequency
is 125khz.

6
Micro
controller
Circuitry

7
RFID’s other uses
 Radio Frequency Identification (RFID) is a
system
that facilitates the tracking of objects,
primarily for inventory tracking, via a three
part
technology comprised of a reader, a
transceiver with decoder and a transponder
(RF tag).
 The reader emits a radio signal that
activates
the tag and reads and writes data to it.

8
 As products are shipped, received or
stored, the information (encoded on a
bar code like tag) can be read and
received by the reader, which is
attached to a computer.

 RFID has been integrated into the EPC


global
network and uses the EPC (Electronic
Product Code).
9
 The EPC is a unique number that identifies a
specific
item in the supply chain. The EPC is stored on a
RFID
tag , which combines a silicon chip and a reader.

 Once the EPC is retrieved from the tag, it can be


associated with dynamic data such as the origin
of an
item or the date of its production.

10
11
History
 The development of RFID was spurred
by the need to enhance tracking and
access applications in the 1980’s in
manufacturing and other hostile
environments. This non contact means
of gathering and tracking information
proved to be resilient. RFID is now an
established part of specific business
processes in a variety of markets.
12
 Passive tags can be low frequency (LF) or
high frequency (HF).

 LF tags operate at 125 KHz, are relatively


expensive, and have a low read range
(less than 0.5 meters).

 RFID readers or receivers are composed of


a radio frequency module, a control unit
and an antenna to interrogate electronic
tags via radio frequency (RF)
communication.
13
 Many also include an interface that
communicates with an application (such
as the library’s circulation system).

 Readers can be hand-held or mounted in


strategic locations so as to ensure they
are able to read the tags as the tags pass
through an “interrogation zone.”

 The interrogation zone is the area within


which a reader can read the tag.

14
 Thesize of the interrogation zone
varies depending on the type of tag
and the power of the reader.

 Passivetags, with shorter read ranges,


tend to operate within a smaller
interrogation zone

15
 Itconsists of a RFID reader IC which is used
to read tag.

A coil is used to generate magnetic field


which powers up RFID tag.

 Ituses one of its pin to transmit data serially


to microcontroller.

16
 The microcontroller then cross
examines it with ID’s present in its
database .

 Ifit is a valid ID then microcontroller


allows access to a person.

 If
it is not a valid ID then
microcontroller sounds alarm .
17
RFID Reader Circuit

18
Power Supply

19
 Power Supply is derived from 230V ac supply.

 It is stepped down to 12V using step down


transformer.

 By the use of 4 IN4007 diodes the ac voltage


is rectified to DC voltage.

 Using a 7805 regulator IC 5V is regenerated


which is used as a power source for 8051µc
and rfid reader.

20
21
22
23
24
25
26
27
 The antenna in an
RFID tag is a
conductive element
that permits the tag to
exchange data with
the reader.
 Passive RFID tags
make use of a coiled
antenna that can
create a magnetic
field using the energy
provided by the
reader's carrier signal.

28
A passive tag is an RFID tag that does
not contain a battery; the power is
supplied by the reader. When radio
waves from the reader are encountered
by a passive rfid tag, the coiled
antenna within the tag forms a
magnetic field. The tag draws power
from it, energizing the circuits in the
tag. The tag then sends the
information encoded in the tag's
memory.
29
o The tag functions without a battery;
these tags have a useful life of twenty
years or more.
 The tag is typically much less expensive
to manufacture
 The tag is much smaller (some tags are
the size of a grain of rice). These tags
have almost unlimited applications in
consumer goods and other areas.

30
 The tag can be read only at very short
distances, typically a few feet at most.
This greatly limits the device for certain
applications.
 It may not be possible to include sensors
that can use electricity for power.
 The tag remains readable for a very long
time, even after the product to which the
tag is attached has been sold and is no
longer being tracked.

31
 IM283 is a fully-integrated 125 kHz
RFID reader circuit. It is specially
designed for being a space and cost
efficient kernel IC of an RFID reading
and writing base station.

 IM283 is accessible by a standard


micro - controller as an intelligent front
- end peripheral device.
32
 Low-voltage circuit.
 Read and Write
capabilities
 Supports most 125kHz
tags on the market.
 Supported frequency
range: 100 to 150 kHz
 Operating temperature
range: -40 to +125°C

33
 Reader collision occurs in RFID systems
when the coverage area of one RFID reader
overlaps with that of another reader.
This causes two different problems:
• Signal interference
The RF fields of two or more readers may
overlap and interfere. This can be solved by
having the readers programmed to read at
fractionally different times.

34
• Multiple reads of the same tag
The problem here is that the same tag
is read one time by each of the
overlapping readers. The only solution
is to program the RFID system to make
sure that a given tag (with its unique ID
number) is read only once in a session.

35
 Tag collision in RFID systems happens when
multiple tags are energized by the RFID tag
reader simultaneously, and reflect their
respective signals back to the reader at the
same time.

 This problem is often seen whenever a large


volume of tags must be read together in the
same RF field. The reader is unable to
differentiate these signals; tag collision
confuses the reader.

36
 Different systems have been invented to
isolate individual tags; the system used
may vary by vendor.
For example, when the reader recognizes
that tag collision has taken place, it sends a
special signal (a "gap pulse").
 Upon receiving this signal, each tag
consults a random number counter to
determine the interval to wait before
sending its data. Since each tag gets a
unique number interval, the tags send their
data at different times.

37
 Dead areas and orientation problems -
RFID works similar to the way a cell phone
or wireless network does. Just like these
technologies, there may be certain areas
that have weaker signals or interference.
In addition, poor read rates are
sometimes a problem when the tag is
rotated into an orientation that does not
align well with the reader. These issues
can usually be minimized by properly
implementing multiple readers and using
tags with multiple axis antennas.

38
 Security concerns - Because RFID is not a
line of sight technology like bar coding,
new security problems could develop. For
example, a competitor could set up a high
gain directional antenna to scan tags in
trucks going to a warehouse. From the
data received, this competitor could
determine flow rates of various products.
Additionally, when RFID is used for high
security operations such as payment
methods, fraud is always a possibility.

39
 Ghost tags - In rare cases, if multiple tags are
read at the same time the reader will
sometimes read a tag that does not exist.
Therefore, some type of read verification, such
as a CRC, should be implemented in either the
tag, the reader or the data read from the tag.
 Proximity issues - Tags cannot be read well
when placed on metal or liquid objects or when
these objects are between the reader and the
tag. Nearly any object that is between the
reader and the tag reduces the distance the tag
can be read from.

40
 High cost - Because this technology is new,
the components and tags are expensive
compared to barcodes. In addition, software
and support personnel that are needed to
install and operate the RFID reading systems
(in a warehouse for example) may be more
costly to employ.
 Vulnerable to damage - Water, static
discharge or high power magnetic surges
(such as from a close lightning strike) may
damage the tags.

41

Das könnte Ihnen auch gefallen