Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

MINI PROJECT REPORT ON SIMULATION OF IoT BASED ELECTRONIC TOLL COLLECTION (ETC) SYSTEM USING RFID

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

C18651-WIRELESS NETWORKS LABORATORY

MINI PROJECT REPORT ON


SIMULATION OF IoT BASED
ELECTRONIC TOLL COLLECTION
(ETC) SYSTEM USING RFID
Submitted by

A. BALA GANESH 19DC03


M. KALIRAJ 19DC09
E. RAJASURYA 19DC19

Faculty Incharge
Ms.D. Priya
C18651-WIRELESS NETWORKS LABORATORY
SIMULATION OF IoT BASED ELECTRONIC TOLL COLLECTION
(ETC) SYSTEM USING RFID
MINI PROJECT REPORT

Submitted by

A. BALA GANESH 19DC03


M. KALIRAJ 19DC09
E. RAJASURYA 19DC19

Under the guidance of


Ms.D. Priya

In partial fulfilment of the requirements for the award of


DIPLOMA IN COMPUTER NETWORKING
STATE BOARD OF TECHNICAL EDUCATION
GOVERNMENT OF TAMILNADU

May 2021-2022
DEPARTMENT OF COMPUTER
NETWORKING PSG POLYTECHNIC
COLLEGE
(Autonomous and an ISO 9001 certified Institution)
COIMBATORE -641 004
TABLE OF CONTENT

1. Abstract
2. Introduction
3. Block Diagram
4. Working Principle
5. Advantages
6. Simulation
7. Result
8. Conclusion
ABSTRACT
Electronic Toll Collection is a generally mature technology that allows for
electronic payment of highway tolls. It takes advantages of vehicle-to-roadside
communication technologies to perform an electronic monetary transaction between a
vehicle passing through a toll station and the toll agency. This system is implemented using
the innovative technology of Radio Frequency Identification (RFID).
Radio-frequency identification (RFID) is a technology that uses
communication via electromagnetic waves to exchange data between a terminal and an
electronic tag attached to an object, for the purpose of identification and tracking.
Each vehicle will be provided with an RFID tag. This tag stores the unique ID
of the vehicle and related information. When interrogated by a reader, it responds with that
data over a radio frequency link. The readers are fixed in the toll gates. So, when the
vehicle comes near the reader, the data from the tags can be easily read by the readers.
This data is passed to the computer and thus the cash can be deducted from the user's
account.
SIMULATION OF IoT BASED ELECTRONIC TOLL
COLLECTION (ETC) SYSTEM USING RFID
INTRODUCTION
Electronic Toll Collection system is implemented using the technology of
Radio Frequency Identification (RFID). RFID is a wireless link to uniquely identify tags.
These systems communicate via radio signals that carry data either unidirectional or
bidirectional. The tag is energized by a time-varying electromagnetic radio frequency (RF)
wave that is transmitted by the reader. This RF signal is called carrier signal. When tag is
energized the information stored in the tag is transmitted back to the reader. This i often
called backscattering. By detecting the backscattering signal, the information stored in the
tag can be fully identified. RFID systems are comprised of two main components RF reader
and RF Tag.
RF TAG
The RFID tag, or transponder, is located on the object to be identified and is
the data carrier in the RFID system. Typical transponders (transmitters/responders) consist
of a microchip that stores data and a coupling element, such as a coiled antenna, used to
communicate via radio frequency communication. Transponders may be either active or
passive. Active transponders have an on-tag power supply (such as a battery) and actively
send an RF signal for communication while passive transponders obtain all of their power
from the interrogation signal of the transceiver and either reflect or load modulate the
transceiver's signal for communication. Most transponders, both passive and active,
communicate only when they are interrogated by a transceiver.

Fig.1.Fastag card details


Active RFID and Passive RFID are fundamentally different technologies.
While both use radio frequency energy to communicate between a tag and a reader, the
method of powering the tags is different. Active RFID uses an internal power source
(battery) within the
tag to continuously power the tag and its RF communication circuitry, whereas Passive
RFID relies on RF energy transferred from the reader to the tag to power the tag. While this
distinction may seem minor on the surface, its impact on the functionality of the system is
significant.
Passive RFID either (1) Reflects energy from reader or (2) Absorbs and
temporarily stores a very small amount of energy from the reader's signal to generate its
own quick response.
In either case passive RFID operation requires very strong signals from the
reader and the signal strength required from the tag is constrained to very low levels by the
limited energy. On the other hand, active RFID allows very low level signals to be received
by the tag, and the tag can generate high level signals back to the reader, driven from its
internal power source. Active RFID tag is continuously powered, whether in the reader field
or not.
RF READER
The interrogator consists of a reader and data processing subsystem. The
RFID reader, or transceiver, which may be able to both read data from and write data to a
transponder. The data processing subsystem which utilizes the data obtained from the
transceiver in some useful manner.
Typical transceivers (transmitter/receivers), or RFID readers, consist of a
radio frequency module, a control unit, and a coupling element to interrogate electronic tags
via radio frequency communication. In addition, many transceivers are fitted with an
interface that enables them to communicate their received data to a data processing
subsystem, e.g., a database running on a personal computer. The use of radio frequencies
for communication with transponders allows RFID readers to read passive RFID tags at
small to medium distances and active RFID tags at small to large distances even when the
tags are located in a hostile environment and are obscured from view. The figure shows
handheld and stationary reader module.
All objects to be identified are physically tagged with transponders. The type
of tag used and the data stored on the tag varies from application to application.
The RF field generated by a tag reader (the energy transmitter) has three purposes:
1. Induce enough power into the tag coil to energize the tag:
2. Provide a synchronized clock source to the tag:
3. Act as a carrier for return data from the tag:
BLOCK DIAGRAM:

Fig.2.Block diagram for ETC System


WORKING OF ETC SYSTEM:
ETC system relies on four major components: automated vehicle identification
(AVI), automated vehicle classification (AVC), transaction processing, and violation
enforcement.

Fig.3.Working of Fastag
(i) Vehicle identification: When a vehicle approaches the ETC lane, the
system installed at the plaza communicates with Fastag and checks for card validity and
account balance. Vehicles with valid tag (Tag registered with ETC program) and positive
account balance are allowed to cross the intersection.
● Other vehicles entering ETC lanes are guided out via ejection lane
mechanism to adjacent manual cash lanes, where they would be allowed to pass after
paying toll fee and a penalty.
(ii) Vehicle classification: Toll charges levied on a vehicle depend on its
class Car/Jeep/Van, Truck, Bus, LCV, Multi Axle vehicles. AVC (automatic vehicle
classification) is a key element for assessment of the correct toll tax at toll plazas and
ensures accurate vehicle detection and classification.
The classification is based on axles, distance between axles, single and
double wheels and multiple vehicle heights. This is done using infra-red sensors installed at
the toll plaza.

Fig.4.Components of ETC system


If the AVC class matches the vehicle class associated with that FASTag the
vehicle is successfully classified, else there is a class mismatch. Class mismatch is verified
by looking at video recording captured by lane camera.
(ii) Transaction Processing: This requires setting up of a Central
Clearing House (CCH) for clearing and settlement of toll transactions.
• ETC transaction file is generated for all vehicles that cross the plaza with
valid tag and positive account balance. These ETC transaction files are relayed to CCH
(Central Clearing House) for debiting appropriate toll fee from the pre-paid account of
registered vehicle and crediting the same to respective toll collection agency.
• Text message is sent to the vehicle owner for each transaction.
(iv) Violation handling: Stolen vehicles, vehicles with class mismatch,
vehicles with insufficient balance and those that run through (cross without payment in
cash lane) are blacklisted. List of blacklisted vehicles is shared with all toll plazas. These
vehicles are stopped when they cross the next toll collection point and appropriate steps
are taken.

Fig.5.RFID Reader
ADVANTAGES:
 Entire process takes a matter of seconds to complete.
 Electronic system records transaction, including the time, date, and
plaza and toll charge of each vehicle.
 Allow drivers to pass through the system at 55 miles per hour (88 kph).
 99.95% accuracy as said by toll plaza authority.
 Vehicles equipped with ETC require less time than all other vehicles to
conduct a toll transaction.
 An increase in a toll lane service rate causes a decrease in the
average waiting time of vehicles at the toll plaza.
 Vehicle emissions are reduced because vehicle speeds through the toll
plaza are increased and accelerations and decelerations reduced.
 ETC requires far less roadside infrastructure than manual tollbooths.
SIMULATION OF RFID BASED DOOR LOCKING SYSTEM:
COMPONENTS REQUIRED:
S.No. Name of the Components Quantity

1. A PC System 1

2. Cisco Packet Tracer Software 1

3. Router 3

4. Switch 4

5. Server 2

6. RFID Tag 8

7. RFID Reader 2

8. Door 2

ADDRESSING TABLE:
Device name Interface IP Address Subnet Mask

Router0 Gig0/0 192.168.1.1 255.255.255.0

Gig0/1 10.0.0.1 255.0.0.0

Router1 Gig0/0 10.0.0.2 255.0.0.0

Gig0/1 20.0.0.1 255.0.0.0

Router2 Gig0/0 192.168.2.1 255.255.255.0

Gig0/1 20.0.0.2 255.0.0.0

Server0 Fa0 192.168.1.50 255.255.255.0

Server1 Fa0 192.168.2.50 255.255.255.0


PROCEDURE:
PART A: CREATING NETWORK TOPOLOGY

Fig.6.Network topology
STEP 1: Open packet tracer from start menu.
STEP 2: Drag and place the router, switch, server, RFID tag, RFID reader, and Door.
STEP 3: Configuring IP address and subnet mask for server, router.
STEP 4: Create a network topology as shown in fig.6.
PART B: CONFIGURING
Configuring DCN department
STEP 1: Open RFID reader, go to “advanced option” click on “config” tab now select IoT
server as remote server and enter the IP address, username and password of the server
and press connect.
STEP 2: Open door, go to “advanced option” click on “config” tab now select IoT server
as remote server and enter the IP address, username and password of the server and
press connect.
STEP 3: Open server and go to “IoT monitor” option and log on to your account by
entering username and password.

Fig.7.Logging into server


STEP 4: Now click on “Add” button and add the conditions for the IoT devices and save.

Fig.8.Adding Conditions
Configuring IT department
STEP 1: Open RFID reader, go to “advanced option” click on “config” tab now select IoT
server as remote server and enter the IP address, username and password of the server
and press connect.
STEP 2: Open door, go to “advanced option” click on “config” tab now select IoT server
as remote server and enter the IP address, username and password of the server and
press connect.
STEP 3: Open server and go to “IoT monitor” option and log on to your account by
entering username and password.
STEP 4: Now click on “Add” button and add the conditions for the IoT devices and save.
PART C: TESTING
STEP 1: Take “RFID card dcn student” tag and scan it on the “DCN” department, green
light will be blinked on the DCN door and door opens.
STEP 2: Take “RFID card dcn student” tag and scan it on the “IT” department, doesn’t
respond.
STEP 3: Take “RFID card it student” tag and scan it on the “IT” department, green light
will be blinked on the “it” door and door opens.
STEP 4: Take “RFID card it student” tag and scan it on the “DCN” department, doesn’t
respond.
TESTING:

Fig.9.Permission granted Fig.10.Permission denied

RESULT:
Thus, we have simulated RFID based door locking system and tested it successfully.

You might also like