Chapter 11 Radio Frequency Identification and Near Field Communication

docx

School

University of Technology Sydney *

*We aren’t endorsed by this school

Course

31275

Subject

Electrical Engineering

Date

Oct 30, 2023

Type

docx

Pages

14

Uploaded by Anyoumus

Report
Chapter 11 Radio Frequency Identification and Near Field Communication What is RFID? Radio frequency identification (RFID) Technology similar to barcode labels Uses RF waves instead of laser light to read the product code Stores product information in electronic tags That contain an antenna and a chip EPCglobal Inc. Establishes RFID standards and services for real-time, automatic identification of information In the supply chain of any company - EPCglobal Inc. (cont’d) o Adopts the ISO 18000 series of standards for RFID Including the frequencies and PHY and MAC layer specifications o Concentrates on defining services and higher layer functions of the standards RFID System Components Components required to implement an RFID system: Tags Antennas Readers Software EPCglobal Network services Electronic Produce Code Electronic Product Code (EPC) Standardized numbering scheme Can be programmed in a tag and attached to any physical product Unique number or code associated with each item So that it can be identified electronically EPCs are usually represented in hexadecimal notation EPC is either 64 or 96 bits long RFID Tags RFID tags Commonly known as transponders
A combination of transmitter and responder Includes an integrated circuit Contains some non-volatile memory and a simple microprocessor Can store data that is transmitted in response to an interrogation from a reader Device that captures and processes the data received from the tags Basic types of tags Passive tags (most common type) They are small, can be produced in large quantities at low cost, and do not require battery power Use the electromagnetic energy in the RF waves Active tags Equipped with a battery Can transmit the signal farther away Have a limited life due to the battery Beacons transmit on a periodic basis Basic types of tags (cont’d) Semi-active tags Uses a built-in battery to power the circuit only when a reader first energizes the tag Size of the memory in a tag varies between 16 bits and hundreds of kilobits Tags are initially programmed with a unique identification code obtained from EPCglobal Smart labels Flexible RFID tag packages Smart labels (cont’d) Can be read regardless of their position or orientation Major advantage of RFID over bar codes 1-bit tags Passive devices used in retail stores Do not contain a unique identification code, a chip, or any memory Simply used to activate an alarm Chipless tags (known as RF fibers)
Use fibers or materials that reflect a portion of the reader’s signal back Sensory tags Can be equipped with various kinds of sensors to monitor and record environmental information Can monitor attempts to tamper with a product Cost of a tag can vary greatly Depending on type and number of tags purchased There are four classes of tags See table on following slide Readers (also called interrogators) Devices that connect with the company’s network and transfer data obtained from the tags to a computer Some readers can also write data onto tags Readers that work with passive tags also provide energy that activates the tags Read distance is determined by the size and location of the tag and the reader antennas As well as the amount of power transmitted
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Antennas RFID antennas used in tags may be limited in size due to the dimensions of the tag itself Types of antennas Linear: offer greater range but less accurate reads Circular: have greater read accuracy, especially in applications in which the orientation of the antenna varies Have a more limited range Larger antennas allow the tags to be read at greater distances As frequency increases, the wavelength gets smaller as does the antenna Higher frequency antennas can be made relatively small Still allow the tags to be read at greater distances Reader antennas have to be designed for the specific type of application No “typical” style of RFID antenna exists Software Type of software depends on the specific RFID application Categories of software components System software: used to control hardware functions, implement communication protocols, and control data flow between tags and readers Middleware: responsible for reformatting data from readers to business applications
Business application software: responsible for processing orders, inventory, shipments, invoices, etc. EFC Global Network Services EPCglobal Network Service EPC reduces need for cross-referencing Object Name Service (ONS) A mechanism for discovering information about a product and related services When a reader gets the EPC from a tag: Passes it to the company’s servers, which send it to ONS via the Internet ONS identifies the manufacturer and responds with the URL of the server where product information is stored EPC Information Services (EPCIS) Will enable large organizations to purchase, invoice, and track product orders over the Internet Will eliminate the need to send paper documents by mail or fax Similar to the Electronic Data Interchange (EDI) specifications that many large companies use to complete paperless transactions How RFID Works Tags and readers use different transmission mechanisms in each frequency band This section of the text introduces the technical details of how two of the most common types of passive tags and readers communicate UHF (400 to 900 MHz) HF (13.56 MHz) PHY Layer Coupling The connection between a passive tag and reader Two types of coupling Inductive or magnetic coupling: designed for tags that touch the surface of the antenna or are inserted in a slot in reader’s case
Backscatter coupling: designed for tags that can be read at distances from 3.3 feet up to 330 feet Backscatter is a reflection of radiation Continuous wave (CW) An unmodulated sine wave Used to supply power to the tag Backscatter modulation Based on ASK or a combination of ASK and PSK Reader has separate transmitter and receiver circuits Reader and tag modulate the signal in amplitude By as much as 100% or by as little as 10% Communications are always half-duplex (do not transmit and receive data simultaneously) To prevent interference issues To allow for environments in which multiple readers are installed in the same area Called dense interrogator environments EPCglobal standards also specify the use of: Frequency hopping spread spectrum (FHSS) Direct sequence spread spectrum (DSSS) Generally only used for advanced active tags HF Tag Communication HF RFID transmission uses a protocol called Slotted Terminating Adaptive Collection (STAC) Tags reply within randomly selected positions or time intervals (slots) Interrogator transmits signals to mark the beginning and end of each slot Slots are not equal in size Number of slots is regulated by the interrogator And is always a power of two UHF Tag Communication
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
UHF readers today support Generation 2 (Gen2) protocols The Gen2 protocol defines three techniques for communication between tags and readers First technique: reader selects tags by transmitting a bit mask that isolates a tag or group of tags Second technique: reader can inventory tags by isolating them using a repetitive process Third technique: reader can alternatively access each tag individually (once the EPC for a particular tag is known to the system) Tag Identification Layer Defines three methods to manage the population of tags within reach of reader’s signal Select Interrogator can send a series of commands to select a particular segment Inventory Interrogator sends out a series of query commands to get information from one tag at a time Access Interrogator can send one or more commands to multiple tags or a single tag at a time Minimum amount of information contained in a tag’s memory: EPC 16-bit cyclic redundancy check (CRC) Destroy password Destroy password Code programmed into the tag during manufacturing Once transmitted, tag is permanently disabled and can never be read or written to again Tags may respond to a reader at the same time Would result in collisions LF tags and readers do not support any collision-handling mechanism Tag collision handling in UHF Reader sends a VerifyID command Tags reply with EPC, CRC, and destroy password Reader proceeds to select a range of tags Process repeats until the reader has identified every group of tags Tag collision handling in HF Each tag uses its EPC, CRC, and destroy password To calculate a number that becomes the slot number in which each particular tag will reply Calculation based on parameters sent by the reader
Reader collisions If a reader does not receive any replies: It assumes a reader collision has occurred Backs off for a random period of time MAC Layer Responsible for establishing and communicating the transmission parameters, such as: Transmission bit rate Modulation type Operating frequency range Frequency hop channel sequence MAC layer parameters for different types of tags differ Data Rates Amount of data stored in a typical passive RFID tag is relatively small Data transmission rates for the tags are also low HF tag readers can read 200 tags per second For tags containing just an EPC, the actual rates will likely be between 500 and 800 tags per second UHF specifications define the tag-to-reader data rate as twice that of the reader-to-tag Tag-to-reader data rate can be up to 140.35 Kbps New Field Communication Near Field Communications (NFC) Technology that provides short-range wireless connectivity between devices such as smartphones and tablet computers Based on the ISO 18092 RFID technology standard and ISO 21481 (NFCIP-2) Requires little or no configuration by users Devices connect automatically as soon as they are within a minimum of 1.6 inches of each other Able to transfer data between devices or read passive tags at rates of 106 to 424 Kbps Near Field Communication Examples of NFC uses with handheld devices: MasterCard PayPass and Visa payWave transactions Electronic discount coupons Exchanging business cards, schedules, and maps Transferring images, videos, and other files Debit card or prepaid card transactions Electronic public transport system tickets Airline tickets Pairing Bluetooth devices without entering a PIN NFC Operation Modes Listen mode – initial mode of an NFC device Poll mode – probes for other devices within range Reader/writer mode – when an NFC device in Poll mode behaves like an interrogator
Card emulator mode – when an NFC device in Listen mode behaves like a smart card Initiator mode – when an NFC device in Poll mode changes the communication protocol to talk to another device Target mode – when an NFC device is the target of an initiator that can only use half-duplex mode NFC Tags and Devices NFC specifications define four types of tags Each type is designed for a different purpose Different tags communicate using slightly different frame formats, at different speeds, and use different digital encoding, synchronization, and modulation methods First thing an NFC-capable device in Poll mode needs to do Identify the type of tags or devices within range Memory on tags can be used to store URLS, business cards, pictures, brochures in PDF files Makes NFC more flexible, useful, and accurate than Quick Response (QR) codes NFC tags can store anywhere from 48 bytes to 32 KB of information NFC Communications NFC-capable devices transmit in the 13.56 MHz unlicensed frequency band Modulate the signal using ASK or a combination of ASK and PSK Modulation varies between 10 percent and 100 percent To transfer data between two smartphones or tablet computers, NFC employs the Data Exchange Protocol (NFC-DEP) RFID Impact on Corporate Networks One of the major challenges for the implementation of RFID systems: The impact of the volume of data on a company’s network RFID systems are usually implemented so that inventory can be counted by simply activating the tags Some systems may direct readers to interrogate all RFID tags every 5 minutes or so
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
This scanning can add a lot of traffic to a network Network Availability in RFID Network availability is a serious factor in the store’s ability to serve its customers To increase service and reduce costs, greater network bandwidth must be available and the network must be reliable Storage Requirements for RFID The huge volume of data that can be generated by RFID systems significantly increases the need to store information accurately and reliably Large banks and corporations have to archive tremendous amounts of historical data New laws designed to protect investors and consumers require companies to accumulate and store even more information RFID Device Management Even without RFID in place, businesses find it a challenge to manage the huge numbers of devices on their networks The need to remotely monitor and manage RFID readers from a central location becomes a critical factor Add to this the task of managing and tracking millions of RFID tags Managing RFID systems can become a very complex and costly job Security Considerations for RFID and NFC Use of RFID devices has generated a large number of security and privacy concerns In the United States, in particular, the concerns are centered on privacy Security related to RFID readers falls under the wired network security policy Reader-to-tag communications have the same vulnerabilities as any wireless network Passive tags do not support authorization or encryption security methods Data in tags can be locked Require a password for the tag to be used again Blocker tag Device that can be used to simulate the presence of a virtually infinite number of tags Can disable unauthorized readers from accessing the information from a selective group of tags Summary Radio frequency identification (RFID) stores information in electronic tags Standards being published by EPCglobal Inc. will allow RFID to be used worldwide
RFID systems components: electronic tags, readers, antennas, software, and EPCglobal network services RFID tags are also known as transponders Tags can be produced in flexible packages called smart labels 1-bit tags are passive devices used in retail stores to prevent theft Sensory tags are equipped with thermal, smoke, or other type of sensors A reader or interrogator communicates with both the tags and the corporate network Two types of tag antennas: linear and circular RFID software includes system software, middleware, and business applications Coupling: connection between a reader and a tag In HF, the tags use time slots to communicate with the reader RFID has the potential for significantly increasing the amount of traffic and storage requirements NFC allows enabled devices to communicate in short distances There are many security and privacy concerns with RFID and NFC Which of the following is a type of coupling designed for tags that can be read at distances of more than 5 meters? Backscatter Which of the following is NOT an NFC device operation mode? Active What can be transmitted to a tag that permanently disables it? Destroy password Which mode of communication is used between a passive RFID tag and a reader? Half duplex What protocol does NFC use to transfer data between two smartphones Data exchange protocal Electronic product codes(EPCs) are usually represented in decimal notation False Backscatter modulation is typically based on variations of amplirtude shif keying, or a combination of ASK and PSK True Which of the following is true about RFID antennas? Larger antennas allow tags to be read at greater distances
An RFID system typically does NOT include Access point which of the following is true about 1-bit tags? They do not carry any information about the product. Which of the following is an important characteristic of UHF passive tag? They work a greater distances than most other tags. What type of coupling is used when an RFID card is inserted in a card reader? Inductive
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
lar

Browse Popular Homework Q&A

Q: A recipe for 1 cup of hollandaise sauce calls for ½ cup of butter, ¼ cup of hot water, 4 egg yolks,…
Q: Using Cramer's rule compute the solution of the system 3 1-9 = 2 1 2 0 0 2 1 -3 -3 0 X1 X2 X3
Q: Define substance addiction (two paragraphs).     2. Discuss some of the consequences of substance…
Q: Evaluate sine, cosine, and tangent for the angle = -600°. Use the reference angle, 8, and write your…
Q: A nutritionist wants to determine how much time nationally people spend eating and drinking. Suppose…
Q: To what extent did the experience of the American Revolution and the creation of a new national…
Q: What methods are there for ensuring data security on a local level?
Q: Find the unit vector u which points in the direction of the vector v = TOE Enter the vector u in the…
Q: 2. Solid CaCO3 upon heating decomposes to solid CaO and CO₂ gas. If the pressure &molot sealed…
Q: Why do you believe some parents are against vaccinating their children? Explain your answer
Q: Which equation below best represents the equation of a sine function with the given characteristics?…
Q: Alfonso Inc. acquired 100 percent of the voting shares of BelAire Company on January 1, 2020. In…
Q: Calculate the pH of each of the following strong acid solutions. (a) 0.000468 M HNO3 pH =  ______…
Q: Find the minimum angular separation resolvable with 633-nm. laser light passing through a circular…
Q: 33. State whether each of the following conversions is possible or impossible and WHY. For any…
Q: For each of the following, state whether the quantity described is a parameter or a statistic, and…
Q: What is the connection between user-centered design and the software development lifecycle?
Q: X D-12 = Z Consider the transformation Ty #¹] x + 2y + 3z + 2y - 3x + z • (a) Determine if T is a…
Q: Calculate [OH -] and pH for each of the following solutions. (a) 0.0017 M CsOH [OH-] =  M pH =…
Q: find the distance between the points (-2,3) and (-4,1)
Q: The quadriceps tendon attaches to the tibia at a 30° angle 4 cm from the joint center at the knee.…
Q: An unlevered firm has a value of $700 million. An otherwise identical but levered firm has $160…