Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

RFID Vasu

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

Radio Frequency Identification technology dates back to World

War II. Attempting to reduce incidents of “friendly fire,” radio signals from
one aircraft were beamed towards an approaching aircraft’s transponder; a
corresponding signal from the second plane identified it as a friendly
aircraft. Sixty some years later RFID has finally begun to gain widespread
popularity, primarily because of recent reductions in size and cost, as well
as more sophisticated functionality. This has led to the widespread
applications making it prominent.

This report on the study of RFID comprises of the following topics;


Introduction to RFID, Description of devices, Operating frequencies,
Working of the devices, Antenna and tag orientation concepts, Tag classes,
Communication standards, RFID Middleware, Stage by stage explanation of
a real time application example.
1. Introduction to RFID

!" " ""


# $ "
% & !"
" '
$

This is a flexible technology that is convenient, easy to use, and well-suited for
automatic operation. It combines advantages not available with other identification
technologies. It can be supplied as read-only or read/write, does not require contact or line-
of-sight to operate, can function under a variety of environmental conditions, and provides
a high level of data integrity. In addition, because the technology is difficult to counterfeit,
RFID provides a high level of security.

RFID is similar in concept to bar coding. Bar code systems use a reader and coded
labels that are attached to an item, whereas RFID uses a reader and special RFID devices
that are attached to an item. Bar code uses optical signals to transfer information from the
label to the reader; RFID uses RF signals to transfer information from the RFID device to
the reader.

1.1 Components of RFID System

The principal components that constitute an RFID system are:

• RFID tag
• Interrogator
• Middleware
1.2.1 RFID Tag

RFID tags consist of a microchip and a coupling element - an antenna. Most tags
are only activated when they are within the interrogation zone of the interrogator; outside
they "sleep". Tags can be both read-only (programmed during manufacture) or, at higher
complexity and cost, read-write, or both. The tags contain memory. The size of the tag
depends on the size of the antenna, which increases with range of tag and decreases with
frequency.

1.2.2 Interrogator

Depending on the application and technology used, some interrogators not only
read, but also remotely write to, the tags. For the majority of low cost tags (tags without
batteries), the power to activate the tag microchip is supplied by the reader through the tag
antenna when the tag is in the interrogation zone of the reader, as is the timing pulse - these
are known as passive tags.

1.2.3 Middleware

Middleware is the interface needed between the interrogator and the existing
company databases and information management software.

System Overview
2. Description of devices and Operating frequencies
2.1 RFID tags

The Tags form the preliminary or the first stage of an RFID system. This in lot of
applications initiates the working of the system. The tags are of various kinds and posses
respective features which are adopted based on the applications. They are affixed over the
item to be identified.

The basic constituents of an RFID tag are a microchip embedded with a unique
code called as the Electronic product code (EPC) and an antenna. The presence of the EPC
over the tags facilitates the identification process in the system. The EPC is unique for each
tag being manufactured and is embedded onto the chip during manufacturing and cannot be
tampered with after production.

In action, the tags communicate with the interrogators or RFID readers using the
antenna and transmit the EPC which is used to identify the item. Based on their ability to
communicate they are classified as Active, Passive and Semi-passive.

• Passive tags use the reader field as a source of energy for the chip and for
communication from and to the reader. The available power from the reader field,
not only reduces very rapidly with distance ,but is also controlled by strict
regulations, resulting in a limited communication distance of 4 - 5m when using the
UHF frequency band (860 Mhz – 930 Mhz).

• Semi-Passive (battery assisted backscatter) tags have built in batteries and therefore
do not require energy from the reader field to power the chip. This allows them to
function with much lower signal power levels, resulting in greater distances of up
to 100 meters. Distance is limited mainly due to the fact that tag does not have an
integrated transmitter, and is still obliged to use the reader field to communicate
back to the reader.

• Active tags are battery powered devices that have an active transmitter onboard.
Unlike passive tags, active tags generate RF energy and apply it to the antenna. This
autonomy from the reader means that they can communicate at distances of over
several kilometers.

Passive tags are supposed to be the cheapest to produce, and must be within 4 feet
of the reader. Like active tags, semi-passive tags also contain a battery, but the tag lies
dormant until receiving a signal from the reader. This has the desirable effect of conserving
battery power.
Both active and passive tags possess either read/write or read-only functionality.
Read-only tags usually function like license plates by identifying the object and pointing to
more specific information stored in a database. Read/write tags allow the information
stored on the tag to be edited, locked or completely erased, which makes them re-usable.
Read/write tags also store more information on the tag and may not require a database
lookup or any contact with an external system

The three operating frequency bands of the RFID system are LF, HF and UHF.
RFID tags can also be classified by frequency band used. The following table summarizes
the characteristics and example applications of each band.

Frequency band Frequency being Characteristics Typical


used applications
LF - 100-500 kHz 125, 134 kHz Short to medium Access control
read range Animal
Inexpensive identification
low reading speed Inventory control
Car immobilizer

HF - 10-15 MHz 13.56 MHz Short to medium Access control


read range Smart cards
potentially
inexpensive
medium reading
speed

UHF - 850-950 Dependent on Long read range Railroad car


MHz country High reading speed monitoring
2.4-5.8 GHz Line of sight Toll collection
required systems
Expensive

The tags are manufactured in various sizes and form to suite various applications. Some of
the different formats are:
• Credit card size flexible labels with adhesive backs
• Tokens and coins
• Embedded tags – injection molded into plastic products such as cases
• Wrist band tags
• Hard tags with epoxy case
• Key fobs
• Tags designed specially for Palettes and cases
• Paper tags
2.2 RFID Tag Packaging

An ideal case of a Passive RFID tag in the form of a card is considered to explain
the packaging process.

The basic assembly process consists of first a substrate material (Paper, PVC,
PET...), upon which an antenna made from one of many different conductive materials
including Silver ink, Aluminum and copper is deposited. Next the Tag chip itself is
connected to the antenna, using techniques such as wire bonding or flip chip. Finally a
protective overlay made from materials such as PVC lamination, Epoxy Resin or Adhesive
Paper, is optionally added to allow the tag to support some of the physical conditions found
in many applications like abrasion, impact and corrosion.

2.3 RFID tag IC’s


RFID tag IC’s are designed and manufactured using some of the most advanced and
smallest geometry silicon processes available. The result is impressive, when you consider
that the size of a UHF tag chip is around 0.3 mm2

In terms of computational power, RFID tags contain basic logic and state machines
capable of decoding simple instructions. The challenges in designing are factors such as,
achieving very low power consumption, managing noisy RF signals and keeping within
strict emission regulations. Other important circuits allow the chip to transfer power from
the reader signal field, and convert it via a rectifier into a supply voltage. The chip clock is
also normally extracted from the reader signal. Most RFID tags contain a certain amount of
NVM (Non volatile Memory) like EEPROM in order to store data. The amount of data
stored depends on the chip specification, and can range from just simple Identifier numbers
of around 96 bits to more information about the product with up to 32 Kbits. However,
greater data capacity and storage (memory size) leads to larger chip sizes, and hence more
expensive tags.

2.4 Tag communication

In order to receive energy and communicate with a reader, passive tags use one of
the two following methods. These are near field which employs inductive coupling of the
tag to the magnetic field circulating around the reader antenna (like a transformer), and far
field which uses similar techniques to radar (backscatter reflection) by coupling with the
electric field. The near field is generally used by RFID systems operating in the LF and HF
frequency bands, and the far field for longer read range UHF and microwave RFID
systems. The theoretical boundary between the two fields depends on the frequency used,
and is in fact directly proportional to l/2p where l = wavelength. This gives for example
around 3.5 meters for an HF system and 5 cm for UHF, both of which are further reduced
when other factors are taken into account

2.4.1 Inductive coupling (Near fields)


LF and HF tags use inductive coupling between two coils (reader antenna and tag
antenna) in order to supply energy to the tag and send information. The coils themselves
are actually tuned LC circuits, which when set to the right frequency (ex; 13.56 MHz) will
maximize the energy transfer from reader to tag. The higher the frequency the less turns
required (13.56 MHz typically uses 3 to 5 turns). Communication from reader to tag occurs
by the reader modulating (changing) its field amplitude in accordance with the digital
information to be transmitted (base band signal). The result is the well known technique
called AM or Amplitude Modulation. The tags receiver circuit is able to detect the
modulated field, and decode the original information from it.

However, while the reader has the power to transmit and modulate its field, a
passive tag does not. The communication being achieved back from tag to reader is similar
to a transformer, when the secondary coil (tag antenna) changes the load and the result is
seen in the Primary (reader antenna).The tag chip accomplishes this same effect by
changing its antenna impedance via an internal circuit, which is modulated at the same
frequency as the reader signal. In fact it’s a little more complicated than this because, if the
information is contained in the same frequency as the reader, then it will be swamped by it,
and not easily detected due to the weak coupling between the reader and tag. To solve this
problem, the real information is often instead modulated in the side-bands of a higher sub-
carrier frequency which is more easily detected by the reader.
2.4.2 Backscatter reflection

Passive tags operating at the UHF and higher frequencies use similar modulation
techniques (AM) as lower frequency tags, and also receive their power from the reader
field. What is different however is the way that energy is transferred is, and the design
of the antennas required to capture it. At this point, there is no further possibility of
inductive coupling like in HF systems, because the magnetic field is no longer linked to the
antenna. Transmission of this wave in the far field is the basis of all modern radio
communication. In some systems such as transmission lines (coaxial cables), the
propagation of these waves is restricted as much as possible via special shielding as they
constitute a power loss. For antennas its the inverse, propagation is encouraged. When the
propagating wave from the reader collides with a tag antenna in the form of a dipole, part
of the energy is absorbed to power the tag and a small part is reflected back to the reader in
a technique known as back-scatter. For the optimal energy transfer the length of the dipole
must be equal to l/2, which gives a dimension of around 16 cm. The dipole is made up of
two l/4 lengths.

Just as for lower frequency tags using near field inductive coupling, a passive UHF
tag does not have the power to transmit independently. Communication from tag to reader
is achieved by altering the antenna input impedance in time with the data stream to be
transmitted. This results in the power reflected back to the reader being changed in time
with the data i.e. it is modulated.

From an applications point of view, using the technique of far field back-scatter
modulation introduces many problems that are not so prevalent in HF and lower frequency
systems. One of the most important of these is due to the fact that the field emitted by the
reader is not only reflected by the tag antenna, but also by any objects with dimensions in
the order of the wavelength used. These reflected fields, if superimposed on the main
reader field can lead to damping and even cancellation.
3. Antenna and Tag orientation
The Antennas form an integral part of the RFID system. The parameter of the
antennas being employed decides the operational features of the system. The entire
working of the system can be modeled basing the antenna parameters.

Antennas are found on the Tags and Interrogators in various forms and adhere to
several factors such as frequency, polarization, medium of operation, antenna material,
application, etc. They usually enhance the communication distance between the tags and
the interrogators. Antennas on the tags are used for communication data stored on them,
whereas the antennas on Interrogators are used for identifying the tags. Hence the
orientation of the tags and the antennas at the read location matters to the application.

Here is described a case of tag orientation for HF tags and antennas at a read
location for an Interrogator.

This case requires the tag to be parallel to the antenna as shown above for it to be
identified and read by the Interrogator.
Here a Phase splitter is employed for two antenna structures being fed by a signal
which is 90 degree out of phase with the original. This makes the tag readable in both
directions.

This is the 3D case where tags are read in almost all the directions.
4. RFID Tag classes
The Auto-ID center at MIT is the body that ratifies standards for all RFID tags. The
group called as EPC-Global defines the classes. Based on the ability of tags to read and
write data. Currently, several classes of tags fall under the EPC global defined library. The
difference between Class 0 and Class 1 is in the data structure and operation. Class 0 tags
are read only. Class 1 tags are one-time writeable.

The EPC standards call for 5 classes of tags over time. The following table outlines the
roadmap for the EPC tag class type:

Class type Features Tag type

Class 0 Read Only Passive (64 bit only)

Class 1 Write Once, Read Many Passive (96 bit min.)


(WORM)

Class 2 (Gen 2) Read Many (WORM) Passive (96 bit min.)


Passive (96 bit min.)
Class 2 (Gen2)

Class 3 Read/Write with battery Semi-Active


power to enhance range

Class 4 Read/Write active Active


transmitter

CLASS 0 – READ ONLY. – Factory programmed


These are the simplest type of tags, where the data, which is usually a simple ID number,
(EPC) is written only once into the tag during manufacture. The memory is then disabled
from any further updates. Class 0 is also used to define a category of tags called EAS
(electronic article surveillance) or anti-theft devices, which have no ID, and only announce
their presence when passing through an antenna field.

CLASS 1 – WRITE ONCE READ ONLY (WORM) – Factory or User programmed


In this case the tag is manufactured with no data written into the memory. Data can then
either be written by the tag manufacturer or by the user – one time. Following this no
further writes are allowed and the tag can only be read. Tags of this type usually act as
simple identifiers
CLASS 2 – READ WRITE
This is the most flexible type of tag, where users have access to read and write data into the
tags memory. They are typically used as data loggers, and therefore contain more memory
space than what is needed for just a simple ID number.

CLASS 3 – READ WRITE – with on board sensors


These tags contain on-board sensors for recording parameters like temperature, pressure,
and motion, which can be recorded by writing into the tags memory. As sensor readings
must be taken in the absence of a reader, the tags are either semi-passive or active.

CLASS 4 – READ WRITE – with integrated transmitters.


These are like miniature radio devices which can communicate with other tags and devices
without the presence of a reader. This means that they are completely active with their own
battery power source.

The chip manufacturer can only program the Class 0 tag; the Class 1 Version 1 tag
can be programmed on the factory floor.

While functionally equivalent under the EPC global classification system, Class 0
and Class 1 use different hardware technologies to implement the Identity tag functionality.
Class 0 tags are programmed when they are manufactured (referred to as “Read-Only” or
“R/O”), assuring uniqueness of the tag ID. Class 1 tags can be programmed once, referred
to as “Write Once Read Many” or “WORM”, by the user, providing operational flexibility.

Class 0 and Class 1 tags also use different protocols, or “air interfaces” to
communicate. So, while both Identity tag implementations perform the required functions,
they cannot communicate with each other. Tags of both classes can coexist in an
environment, but require readers that “speak their language” to be identified.
4.1 EPC structure

As described above each tag contains a unique code facilitating the identification
process known as EPC. The structure of this code been embedded is described below.

The EPC is a number made up of a header and three sets of data. The header
identifies the EPC'
s version number, allowing for different lengths or types of EPC later on.

• The second part of the number identifies the EPC Manager, most likely the
manufacturer of the product.

• The third, called object class refers to the exact type of product, most often the
Stock Keeping Unit (SKU).

• The fourth is the serial number unique to the item, which can tell us, for example,
exactly to which 330 ml can of Diet Coke we are referring. This makes it possible
to quickly find products that might be nearing their expiration date.

Example of EPC 01.115A1D7.28A1E6.421CBA30A

01 Version of EPC ( 8 bit header)


115A1D7 Manufacturer Identifier
28 bits
28A1E6 Product Identifier
24 bits
421CB30A Item serial number
36 bits
5. RFID standards

The international organization for standards has ratified standards for the RFID
tags. The compliance depends on factors such as the operating frequency, type of tag and
area of application.

ISO Standards for Proximity Cards:


ISO 14443 for “proximity” cards and ISO 15693 for “vicinity” cards both recommend
13.56 MHz as its carrier frequency. These standards feature a thinner card, higher memory
space availability and allow numerous cards in the field to be read almost simultaneously
using anti-collision, bit masking and time slot protocols.

• ISO 14443 proximity cards offer a maximum range of only a few inches. It is
primarily utilized for financial transactions such as automatic fare collection,
bankcard activity and high security applications. These applications prefer a very
limited range for security.

• ISO 15693 vicinity cards, or Smart Tags, offer a maximum usable range of out to
28 inches from a single antenna or as much as 4 feet using multiple antenna
elements and a high performance reader system.

ISO Standards for RFID Air interface.


The ISO 18000 series is a set of proposed RFID specifications for item management that
could be ratified as standards during 2004. The series includes different specifications that
cover all popular frequencies, including 135 KHz, 13.56 MHz, 860-930 MHz and 2.45
GHz.

• 18000 – 1 Part 1 – Generic Parameters for Air Interface Communication for


Globally Accepted Frequencies
• 18000 - Part 2: Parameters for Air Interface Communications below 135 KHz
o ISO standard for Low Frequency
• 18000 - Part 3: Parameters for Air Interface Communications at 13.56 MHz
o ISO standard for High Frequency
o Read \ Write capability
• 18000 - Part 4: Parameters for Air Interface Communications at 2.45 GHz
o ISO standard for Microwave Frequency
o Read \ Write capability
• 18000 - Part 5: Parameters for Air Interface Communications at 5.8 GHz
• 18000 - Part 6: Parameters for Air Interface Communications at 860 – 930 MHz
o ISO standard for UHF Frequency
o Read \ Write capability
o Targeted for same markets as EPC standards.
• 18000 – Part 7: Parameters for Air Interface Communications at 433.92 MHz
o Manifest tag for Department of Defense (DOD)
ISO Standards for Animal Identification

• ISO 11748 / 11785: Standard for Animal Identification

ISO Supply Chain Standards


These are used to identify different types of logistics containers and packaging, in addition
to individual items.

• ISO 17358 - Application Requirements, including


• Hierarchical Data Mapping
• ISO 17363 - Freight Containers
• ISO 17364 - Returnable Transport Items
• ISO 17365 - Transport Units
• ISO 17366 - Product Packaging
• ISO 17367 - Product Tagging (DoD)
• ISO 10374.2 - RFID Freight Container Identification
6. RFID Interrogator or Reader

Readers or interrogators are a key element in any RFID system, and will therefore
be part of the product evaluation and selection process.

6.1 Main Criteria for readers


• Operating Frequency (HF or UHF) – some companies are developing Multi
frequency readers
• Protocol Agility – Support for different Tag Protocols (ISO, EPC, proprietary) –
• Different regional regulations
- UHF frequency agility 902 – 930 MHz in the US and 869 MHz in Europe
- Power Regulations: 4 Watts in the US and 500mW in Europe
- Manage Frequency Hopping in the US and Duty Cycle in Europe
• Networking to host capability:
- TCP/IP
- Wireless LAN (802.11)
- Ethernet LAN (10base T)
- RS 485
• Ability to network many readers together
- Via concentrators
- Via middleware
• Ability to upgrade the reader Firmware in the field
- via internet
- via Host interface
• Managing multiple antennas
- Typically 4 antennas/reader
- How antennas are polled or multiplexed
• Adapting to antenna conditions
- Dynamic auto-tuning
• Interface to middleware products
• Digital I/O for external sensors and control circuits

6.2 RFID Reader Antennas

In an RFID system, reader antennas are supposed to be tougher in designing since they are
subjected to various elements which govern their operation. For low power proximity range
(< 10cm) HF applications such as access control, antennas tend to be integrated in with the
reader. For longer range HF (10cm < 1m) or UHF (< 3m) applications, the antenna is
nearly always external and connected at some distance to the reader via a shielded and
impedance matched coaxial cable.
6.2.1 Design

Antenna principles and designs are radically different in LF, HF frequency range
than in UHF. In fact it’s not strictly true that inductive coupled systems like HF use
antennas, because they work in the near field where there is no Electromagnetic
propagation.

The majority of the RFID antennas need to be tuned to the resonance of the
operating frequency. This leaves them prone to many external effects, which can seriously
impact the communication distance by de-tuning the antenna. Causes vary depending on
the operating frequency and can be due to anything from;
• RF variations
• Skin-effects
• Losses due to metal proximity
• Antenna cabling losses
• Signal fading
• Proximity of other reader antennas
• Environmental variations,
• Harmonic effects
• Interference from other RF sources
• Eddy fields
• Signal reflections
• Cross talk
The problem of antenna de-tuning caused by the effects mentioned above, can be corrected
by dynamic auto-tuning circuits which work with feedback from the antennas resonance
tuning parameters. This scheme guarantees stability and maximum performance for the
selected frequency.

6.2.2 Performance

Designing antennas with optimal performance in terms of communication distance will


need to take into account the following main parameters;
• Operating frequency range
• Impedance (typically, 50 Ohms)
• Maximum allowed power
• Gain
• Radiation pattern (polarization XY, circular)
These are the key elements which create the RF field strength and field patterns (read
zones) which are in turn affected by the efficiency, and type of coupling used (Inductive,
Radiation...) between reader and tag.
6.2.3 Types

RFID antennas used generally are classified into following types:

• Gate antennas (orthogonal use)


• Patch antennas
• Circular polarized
• Omni directional antennas
• Stick antennas (directional)
• Di-pole or multi-pole antennas
• Linear polarized
• Adaptive, beam-forming or phased array element antennas
7. RFID Middleware
The RFID tags would deliver a huge volume of data which needs to be processed.
This would slow down or crash a system running enterprise software. RFID middleware
acts as a tool that is used to manage the data. They serve as a software buffer which sits
almost invisible between the RFID readers, and the servers storing the product information.

RFID middleware consists of a set of software components that acts as bridge


between RFID system components (tags and readers) and the host application software. It
performs two primary functions:

• Monitors the device


• Manages RFID specific infrastructure and data flow

It allows companies to process relatively unstructured tag data taken from many RFID
readers, and direct it to the appropriate information systems.

They are able to perform many different operations, such as


• Monitor the RFID reader, devices.
• Manage false reads
• Cache data
• Query an Object Naming Service (ONS)
8. Description of a Real time Example – Access control system

Access control is one of the simple and effective applications using RFID. It
provides lot many features to the end users because of its simplicity to use and handle the
data which serves as a source for other application other than access control.

A diagrammatic description of the system is shown below.

The system comprises of the following devices:

• Proximity card
• Interrogator
• Control device
• Server
The function of the system is to provide a definite access control in an area of
applications such as office buildings. The employees would be provided with the proximity
cards which would be programmed with respective access privileges. The system is a smart
sentinel. It not only performs access control but the data derived out can be used for other
administrative purposes.

• The user would need to present the proximity cards to the interrogators at the
point of entry to the interrogators.

• The interrogators would read the EPC from the cards and would forward the
code to the decision making device.

• A database is maintained in a central server, which stores all the user details
corresponding to the assigned EPC codes and defined access points.

• The control device communicates with the server for authentication process; the
user is provided access as per the defined privileges.

• Correspondingly a different database would be updated with details such as


entry time, exit time, point of entry, etc. The details could be used for other
applications such as in a payroll calculation.

The proximity cards would be an LF or an HF smart cards operating at 134 kHz or


13.56 MHz respectively. Based on the application suitable card is selected and a
corresponding ISO standard is adopted.

The system is a security device along with access control, since all users would need to
present the proximity cards and an addition of a secondary device such as biometric device
or even a keypad ensures a definite security cover.

In the case of a larger area, the interrogators at different locations are capable of
forming a network and communicate with each other for authentication process. A
middleware handles the data being obtained. More advanced interrogators have wireless
connectivity and are capable of relaying data over the web.

You might also like