Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

6.chapter 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

CHAPTER 2

LITERATURE REVIEW

2.1. Radio Frequency Identification


In this world, there are a lot of methods can be used to transfer a data. One
of them is using radio frequency electromagnetic field. The famous tools that use
this method is Radio Frequency Identification (RFID). It is the wireless non-
contact devices created for the purpose of automatically identifying and tracking
the information inside programmable tags or card. The tags or card have an ability
to read at a short range via magnetic field that also call as electromagnetic
induction. Then, it will act as a passive transponder to emit microwaves or UHF
radio waves.
On the other hand, the limitation of other automatic identification approach
which are used light to communicate (infrared and bar codes technology) can be
overcomes from this technology. It is proven when the RFID tag or card are
invisible to the eye and can be used in dirty environment. Without labor-intensive
manual scanning, RFID readers can be set to remotely and automatically read.
Radio frequency of this system can be categorized into four basic range and are
given in Table 2.1 below:
Table 2.1. Basic range of RFID

Symbol Type of Frequency Range Uses

LF Low Frequency 30KHz to 300 KHz 125KHz

HF High Frequency 3MHz to 300 MHz 13.56MHz


Very High Not used for
VHF 30MHx to 300MHz
Frequency RFID
Ultra High 866MHz,
UHF 300MHz to 3GHz
Frequency 915MHz
6

Basically, there are two components that involve in RFID system which are
RFID reader and RFID tags. The system contain a coil that act as antenna for
transmitting and receiving signal as shown in Figure 3. In the same time, the signal
can store maximum 2 kilobytes of data. Similar concept are implemented for all
type of RFID system. At first, radio wave will be generated from RFID reader and
after that, the RFID tag will reflect back the radio waves by using backscatter
technology. From that, data has been sent to the reader by combining them with
the radio waves through modulation.
The substances used to store some additional information and unique serial
number is a silicon microchip that fabricate inside the majority of RFID tags or
transponders. RFID system can be categories into two part which are passive
(Figure 2.1) and active (Figure 2.2). There are a fundamentally different
technologies in Active RFID and Passive RFID but both of them used the same
medium to communicate between a reader and a tag or card which is radio
frequency energy. It’s different can be seen in the method of powering the tag or
card. For Active RFID, internal power source are used to continuously power the
tag and its RF communication circuitry, whereas Passive RFID totally used the RF
energy transferred from reader to the tag. So that, stronger signal are required from
reader for Passive RFID in order to increase the signal strength returned from the
tag. So that, stronger signal are required from reader for Passive RFID in order to
increase the signal strength returned from the tag. On the other hand, Active RFID
have more effective tag that can generate high level signal back to the reader and
also continuously powered whether in reader field or not.

Figure 2.1. Passive RFID System


7

Figure 2.2. Active RFID System

2.2. RFID History


The RFID thought isn't new yet rather has been around for an impressive
time span; really, it was first observed in WWII by the Air-Force to recognize
companion flying planes to that of rival plane using radars (table 2.2 underneath
shows brief of the recorded setting of RFID development). Starting now and into
the foreseeable future, this creation has been used for various corner applications,
for instance retail industry, monitoring merchandise against robbery structures,
equip following in air terminals, electronic tolls, and numerous others. This was
the beginning time of RFID innovation time.

Table 2.2. History of RFID Systems Date Event

1930 to 1940 IFF framework was made by an exploration research


center
1940 to 1950 It was then used to distinguish companion or foe in
WWII
1950 to 1960 Present day air traffic additionally utilized the
distinguish companion or foe ideas.
Bit by bit RFID ideas were connected to military
divisions. It was utilized in research labs.
8

1960 to 1970 SENSOR frameworks that utilized RFID innovation


started in this timeframe.

1970 to 1980 Uninvolved labels were presented for the first run
through in this period. RFID was currently utilized in
zoos and national parks to monitor creatures.
1980 to 1990 RFID frameworks were currently made in an expansive
scale. Programmed installment at toll doors application
started in this period.
1990 to 2000 Between operable hardware with RFID innovation was
created.

2003 EPC worldwide was presently MIT's auto-ID focus.

2005 EPC was propelled by Walmart.

2.3. Embedded System


IC designers state that microprocessor based design is an important design
discipline since 1990s. According to Moore’s Law, 16-bits and 32-bits
microprocessor chips that already had been used in board-level design have a large
enough to include both a CPU and other subsystem. Resulting from that, two
classes of problem have been identify which are the software must become a first
class component in chip design and large predesigned of CPU must be handled by
the system design methodologies. Hence, the root of Hardware/Software Co-
design had been formed from the development done by the researchers in basic
approaches to the design of embedded software running on CPU.

Embedded system can be defined as ‘hardware embedded with software’.


All the hardware components are controlled by a microcontroller with a special
9

software. Traditionally, there are three phases on designing an embedded systems.


First, decomposing and allocating the system into two parts which are hardware
and software. Second, separate hardware and software design team according to
their specialization and lastly, integrating both hardware and software
simultaneously. This separation of design task can prevent any mistakes in
designing until integration phase happen where each mistakes are very costly and
difficult to correct.

Based on the paper written by Claudio Talarico, Aseem Gupta, Ebenezer


Peter, and Jerzy W. Rozenblit with title Embedded System Engineering Using
C/C++ Based Design Methodologies, for describing hardware and software, they
had addressed this issue by using the same high level language which are C and
C++ in order to keep both design activities tightly coupled. Moreover, a lot of
complex systems can be built by using hardware/software co-design technique. In
any co-design tool or platform, the important thing need to do and sometimes
called as primary task is divided a given application specification between
hardware (typically ASIC or FPGA) and software (mapped to the CPU). From
that, the application at hand blends best with the ideal custom architecture will be
obtained. Figure 2.3 shows a summary of embedded system design process.

Figure 2.3. Embedded System Design Process


10

In this project, technique used for the software part is event-driven


programming where finate state machine act as its tool. Basically, in event-driven
model based program contains two types of objects which are passive and active
object. Both of them have different function and characteristics. For passive
objects, they run and generate message only when receiving some messages,
whereas the actives objects are always running and can generate message without
receiving any messages. Usually, hardware supported interrupt service routine can
be categorized in active objects. If there is a case of external or internal interrupt
event, the interrupt service routine will be called by the processors interrupt
periphery. One of internal hardware event is a timer end analog-digital conversion.
Using a program based on traditional event-driven model will gives an advantage
which is automatic control of processor power consumption included in the model.
From that, the response time of program will become the message processing plus
the answer generation time if the message comes when the event queue is empty.

2.4. What is RFID Attendance Systems?


We needn't bother with any presentation in regards to the RFID based
participation frameworks; it is being utilized in universities, office, libraries to
know how frequently an individual or what number of number of individuals has
come in and out at what time.

In this venture we will build a most straightforward RFID based


participation framework which does not overcomplicate the undertaking.

In this task we will utilize RTC module, which is used for empowering and
incapacitating the participation framework inside a given day and age, with the
goal that we can keep the late comers under control. The RFID module "RFID-
RC522" which can do peruse and compose tasks on NXP based RFID labels. NXP
is lead maker of RFID labels on the planet and we can get them on the web and
disconnected stores effortlessly. A 16 x 2 LCD show is utilized, which is to
grandstand data, for example, time, date, number of participation, and so on.
11

Lastly an Arduino board is used which is the mind of the task. You may pick any
adaptation of board. Presently how about we proceed onward to schematic
outlines.

2.5. Storage On SD
In data storage application, flash memory which is one of non-volatile
devices are most widely used today. Its abilities in fast accessing, multiple write
characteristics, low-power consumption and also compact are the reasons why this
type of memory have been chosen. Based on a comparison between flash memory
and mechanical magnetic or optical media is carried out by researcher in the past,
flash memory is much better because they do not have all of these desired features.
Besides, due to its portable design, stored data in flash memory can be transferred
to a personal computer easily. It is also capable on storing sensitive data because
of its security features inherent in the SD card.

MicroSD is one of removable flash memory card with smallest size (about
the size of fingernail) that used for storing data. Its size also can be equated as
quarter size of a normal SD card and have a read/write speed between 3 to 5
MBps. In application, transflash and microSD are in the same proceedings but
microSD has support Secured Digital Input Output (SDIO) mode. From that, non-
memory card like near field communication (NFC), Bluetooth and Global
Positioning System (GPS) devices to use the card also.

Normally, Serial Peripheral Interface (SPI) is used by SD card as its


communication protocol with embedded microcontroller because it supports only a
3.3-volt interface and also does not require a host license. This protocol
communicates in master/slave mode where the master initiates the data frame. The
presence of individual slave select lines can allowed the functioning of multiple
slave devices. Occasionally, four-wire serial bus, contrasting with three-, two-, and
one-wire serial bus also referred to SPI. There are a few numbers of standard SPI
interface structure used which are SDO (Serial Data Out/ Error), SDI (Serial data
12

in), SCK (Serial Clock) signal line and CSN (Chip Select Not). Figure 6 shows
SPI bus with single master and single slave.

Figure 2.4. SPI BUS ( single master and single slave )

You might also like