IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007), Dr. M.G.R. University, Chennai, Tamil Nadu, India. Dec. 20-22, 2007. pp.697-700.

REALIZATION AND SIMULATION OF THE HARDWARE FOR RFID SYSTEM AND ITS PERFORMANCE STUDY Debdoot Sheet*, Atul Kumar*, Agnibesh Dutta*, Samrat Dasgupta*, Tirthankar Datta*, Subir Kr. Sarkar† †

*

Department of Electronics and Telecommunication Engineering, Jadavpur University, Kolkata, India. Institute of Engineering and Management, Salt Lake, Kolkata, India

Keywords: Wireless Communication, Read Only Tags, Encryption, Decryption, RFID Reader.

single technology standard (EPC global’s Electronic Product Code standard).

Abstract

2 Architecture of an RFID System

Radio frequency identification and detection (RFID) technology is a wireless communication technology that enables users to uniquely identify tagged objects or people. RFID is rapidly becoming a cost-effective technology. RFID can be supplied as read only or read/write, does not require contact or line of sight to operate, can function under a variety of environmental conditions, and provides a high level of data integrity. Hence in the present work we seek to do comprehensive studies on the performance of the simulated hardware RFID system (operated in the range of frequency 120-130 MHz).

An RFID system is composed of three basic components: a tag, a reader, and a host computer. RFID tags contain tiny semiconductor chips and miniaturized antennas inside some form of packaging. They can be uniquely identified by the reader/host pair and, when applied or fastened to an object or a person, that object or person can be tracked and identified wirelessly. RFID tags come in many forms. For example, some look like paper labels and are applied to boxes and packaging; others are incorporated into the walls of injection molded plastic containers; and still others are built into wristbands and worn by people.

1 Introduction

There are many types of RFID tags. Some include miniature batteries that are used to power the tag, and these are referred to as active tags. Those that don’t include an onboard battery have power “beamed” to them by the reader and are called passive tags. In addition, some tags have memories that can be written to and erased, like a computer hard disk, while others have memories that can only be read, like a CD-ROM; these are referred to as “smart” and readonly tags, respectively. The cost and performance of tags can vary widely depending on which of these features are included in their design.

Radio Frequency Identification (RFID) consisting of a reader, tag and wireless channel, is a flexible wireless communication technology that is convenient, easy to use, and well suited for automatic operation. It combines advantages not available with other identification technologies. This is in large part due to the efforts of WalMart and the Department of Defense (DoD) to incorporate RFID technology into their supply chains. This drive to incorporate RFID technology into their supply chains is motivated by the increased shipping, receiving and stocking efficiency and the decreased costs of labor, storage, and product loss that pallet-level visibility of inventory can offer. Wal-Mart and the DoD are, respectively, the world’s largest retailer and the world’s largest supply chain operator. Due to the combined size of their operations, the RFID mandates are spurring growth in the RFID industry and bringing this emerging technology into the mainstream. The costs of employing RFID are falling as a result of the mandates also, as an economy of scale is realized. Lastly, the mandates appear to have united the industry behind a

RFID readers are composed of an antenna and an electronics module. The antenna is used for communicating with RFID tags wirelessly. The electronics module is most often networked to the host computer through cables and relays messages between the host computer and all the tags within the antenna’s read range. The electronics module also performs a number of security functions such as encryption/decryption and user authentication, and another critical function called anti-collision, which enables one reader to communicate with hundreds of tags simultaneously. 697

IET-UK International Conference on Information and Communication Technology in Electrical Sciences

The main feature of RFID technology is its ability to identify, locate, track, and monitor people and objects without a clear line of sight between the tag and the reader. Addressing some or all of these functional capabilities ultimately defines the RFID application to be developed in every industry, commerce, and service where data needs to be collected.

The reader comprises of the transmitter stage, the filter stage and the data generation stage. All three components when properly connected form the successful system as the RFID Reader block-set (Fig. 2). The primary function of the system on being switched on is to transmit a query to the tag and switch back to the receiver mode for reading the tag-id being transmitted by the tag.

3 RFID System Modelling for Simulation

The Reader structurally does not directly represent an antenna in the circuit design. However the effect created by the antenna is served by the equivalent inductor of 1.62mH.

Based on the basic RFID system architecture, we have proposed here to develop a system (Fig. 1) complying to the standards and also able to be practically realizable.

B. Transmitter stage The transmitter basically consists of an R-L-C tank circuit (Fig. 3) which is used to shape a 125 kHz square wave to sine wave of same frequency. The sine wave is then fed to a voltage amplifier cascaded to a half bridge amplifier which basically works on the topology of class D power amplifier. It amplifies the power of the sine wave sufficient to the threshold required for transmission through an antenna.

Figure 1: RFID System Architecture The system proposed over here comprised of the blocks performing the functions accordingly for integration of the total functioning of an RFID system as a whole. The Host Computer being implemented over here using the Microcontroller serves the basic purpose of establishing a communication link between the RFID reader & the Computer Database for further task in the Network Enterprise system. A. Reader

Figure 3: RLC Tank Circuit For building the circuit for half bridge amplifier we have used matched transistors 2N3904 and 2N3906 which are readily available in laboratory. The wave thus produced is transmitted through the antenna which in turn is used to excite the tag as well as send a query. C. Filter stage Before feeding the signal to the filter stage it is first demodulated using an envelop detector. The demodulator consists of a diode, resistor and capacitor network. Our interest basically lies in envelop of the signal as it contains all the required information. The demodulator also rectifies the signal which makes our work further easier.

Figure 2: RFID Reader 698

Realization and Simulation of the Hardware for RFID System and its Performance Study

In order to distinguish the square waves corresponding to logic 1 and 0 we are using a decade counter with two sets of D flip flops. The comparator output is fed to the clock of one of the D flip flop whose input is always kept high so that the output obtained is also high across the Q output. This Q is fed to the reset of the decade counter. So the decade counter gets reset with every rising edge of the comparator output. Here the decade counter is basically acting as a Johnson counter. If we look at the pin 0 to 9 of the counter we are getting a logic 1 after every ten cycles. By checking the output across the pin no. 9 we can determine whether we are getting logic 0 or 1 as output. The output of pin no. 9 is then fed into the second D flip flop whose output will correspond to the desired output data which we are receiving from the tag.

Figure 4: Filter Stage The information signal is then allowed to pass through a series of filter. The first two filters used are Twin-T filters. Twin-T filters are very useful as a notch filter. Twin-T provides a large degree of rejection at a particular frequency. This filter can be useful in rejecting unwanted signals that are of a particular frequency. In this case filter mostly isolates the pass band (10-20 kHz) from all the other frequencies while the second Butterworth Low pass Filter provides further corrected information.

E. Tag In this case for the simulation of the tag (fig. 6) we have used two different frequency values to represent logic 1 or 0 for the bit-stream containing the information regarding the tag id. For logic 1:: 12.5 kHz For logic 0:: 15.625 kHz

After this signal is fed to a TL084CN comparator which basically works as a Smith-trigger and converts the incoming signal to a square wave. The frequency corresponding to the logic 1 and logic 0 are obtained from the filter and are fed to the data generation stage. D. Data generation The actual Tag Id which remains hidden within the square waves of 12.5 kHz & 15.625 kHz needs to be deciphered efficiently. The Data Generator provides a novel approach to this problem solution.

Figure 6: Simulation of Tag We are using frequency shift key technique of modulation. Further the signals are Amplitude Modulated with a carrier wave of high frequency in order to obtain faithful transmission over the range. In the simulation we are manually selecting whether 1 or 0 is to be sent using a key. At one position we select 12.5 kHz and at the other position we select 15.625 kHz and correspondingly at the output we get either 1 or 0 respectively. F. Final circuit Figure 5: Data Generation In the final circuit (Fig. 7) we have attached the reader and the tag together. The tag will transmit the tag id and it will 699

IET-UK International Conference on Information and Communication Technology in Electrical Sciences

be received by the reader. The received data can be seen in the oscilloscope. The media for transmission has been fixed as the wired path for the time being.

purpose of shaping this signal from Filter stage to be fed appropriately to the Data Generator stage. The output of the Data Generator stage contains the appropriate keyed in information.

5. Conclusion In brief, the use of RFID technology is expected to grow significantly in the next five years, and it is predicted that someday RFID tags will be as pervasive as bar codes. While bar code tags and bar code systems are much less expensive than RFID at present, RFID provides many benefits that bar code systems cannot, such as:  The ability to both read and write to tags.  Higher data rate and larger memory size.  The ability to function without a direct line of sight between tag and reader.  The ability to communicate with more than one tag simultaneously.  Greater data security (through greater complexity and encryption).  Greater environmental durability (in the presence of dirt, water, etc.)

Figure 7: Total RFID Circuit

4 Experimental Test Results The following results were obtained from the simulation of the designed system as shown in fig. 8.

Figure 8 (a): Modulated FSK transmitted from Tag to Reader

RFID technology makes immediate economic sense in areas where the cost of failure is great. Homeland security is one area where a high premium can be placed on preventing problems before they occur. Accordingly, for the foreseeable future, developing effective homeland security RFID applications will continue to be a stimulus and driver in RFID technology development.

Figure 8 (b): Output of Filter Stage

References [1] Hunt, Puglia & Puglia. RFID – A Guide to Radio Frequency Identification. Wiley, 2007. [2] Richard Boss. Library RFID technology, Library Technology Reports, Nov/Dec2003. [3] Vinod Chachra and Daniel McPherson. Personal privacy and use of RFID technology in libraries, October2003. http://www.vtls.com/documents/privacy.pdf. [4] Klaus Finkenzeller, RFID Handbook. John Wiley and Sons, 2003. [5] Simson Garfinkel. Adapting fair information practices to low cost RFID systems. In Privacy in Ubiquitous Computing Workshop, 2002. http://www.simson.net/clips/academic/ 2000_Ubicomp_RFID.pdf. [6] IBM WebSphere RFID Handbook: A Solution Guide (www. ibm. com/redbooks). [7] K. Finkenzeller: RFID Hand book: John willy Leipzig dritte edition, 2003. [8] Wal-Mart’s RFID Edict Ripples Through IT, Info World, November 21, 2003. [9] Wal-Mart updates RFID roadmap, revises for ’05 deadline: Computer World, May 19, 2004.

Figure 8 (c): Comparator Output (fed to Data Generator)

Figure 8 (d): Bit stream containing Tag-id (sent from Reader to Host computer) The results are obtained by the keying in of a bit-stream manually at the Tag. The keyed bit-stream is hence transmitted as a Modulated FSK as an AM wave from the Tag to the Reader. The Filter stage in the Reader provides the filtered signal consisting of either 12.5 kHz or the 15.625 kHz signals. The Comparator hence serves the 700

ictes 2007

technology is a wireless communication technology that enables users to uniquely ... It combines advantages not available with other identification technologies.

219KB Sizes 12 Downloads 307 Views

Recommend Documents

ictes 2007
IET-UK International Conference on Information and Communication Technology in Electrical .... Further the signals are Amplitude Modulated with a carrier.

ictes 2007
IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007), ... contact or line of sight to operate, can function under a .... voltage amplifier cascaded to a half bridge amplifier which.

2007-Brochure-FVD-2007-DEF.pdf
Editorial Connaître & faire H valoir ses droits. Page 3 of 40. 2007-Brochure-FVD-2007-DEF.pdf. 2007-Brochure-FVD-2007-DEF.pdf. Open. Extract. Open with.

january 2007 february 2007
TUESDAY. WEDNESDAY. THURSDAY. FRIDAY. SATURDAY. 1. 2. 3. Round Table. B-day K. Jenkins. New Leaders. B-day Je. Bauer. Essentials Trng. 4. 5. 6. 7. 8. 9. 10. Scout meeting. ELECTION DAY. Dues. 11. 12. 13. 14. 15. 16. 17. VETERAN'S. Swim. Committee Mtg

EPI-Marker 2007- 11, 3, July 2007+ FOTO
Jul 12, 2007 - Iodide, which acts as a primitive electron-donor ..... and peroxidase, and the remaining iodine atom readily iodinates tyrosine, histidine or ...

Velo-city 2007 - ExtraEnergy.org
Jun 15, 2007 - Partners. The Velo-city Conference in Munich is made ... conference in Munich are currently being lob- ... “Call a Bike”, the digital bicycle map of.

Template COBEM 2007 - ABCM
of the capillarity of the system of transport and distribution grows and .... Some problems appear with the conversion of a conventional vehicle for ... also a negative factor that can provoke greater costs of maintenance in average stated period.

March 2007
Mar 1, 2007 - Sunday. Monday. Tuesday. Wednesday. Thursday. Friday. Saturday. 1. K-Bar. 2. 3. 4. Teacher. Workday. 5. 6. Reading Test. 7. 8. K-Bar. 9. 10. 11. Brantley's. Birthday!! 12. 13. 14. Project Due. 15. K-Bar. 16. 17. 18. Spring. Break. 19. S

icecs 2007
Call for Papers. ICECS 2007 ... Design Automation of Electronics & Systems ... symbolize its importance as the center of Morocco ever since it was a trading and.

2007.broadnets.pdf
research has been done on improving web access performance. over Internet. Optimization techniques such as caching web- proxies ([1], [2], [3]), persistent ...

2007 January
13. HW: RP 14.91-95,. 103-109 all odd. 14. Turn in 1/8-1/12 HW. Tuesday, 1/16. 15. Martin Luther King. Day: No School. 16. MMFPD lab. HW: Thinking it through 12.1,4,12,16. 17. MMFPD lab. HW: Thinking it through 14.8-10, 16. 18. Review of colligative

2007.pdf
PREFEITURA MUNICIPAL DE SAO BENTO DO SUL. Processo Conta ... Try one of the apps below to open or edit this item. 2007.pdf. 2007.pdf. Open. Extract.

Velo-city 2007 - ExtraEnergy.org
Jun 15, 2007 - Economic business. Federal Minister ... means and strategies worthy of emulating for the implementa- tion of our ... Alongside the Munich Cycling Network. (1,400 km) ... and administrative arena for the successful promotion of ...

2007.pdf
Giuliani Jacopo USA. Stanga Elia USA ... Palermi Mauro. Baertschi ... Grossi Simone USA. U10 Uomini (300 m). Page 3 of 24. 2007.pdf. 2007.pdf. Open. Extract.

2007.pdf
Page 1 of 67. -. I. I. I. I. 'I. f. I. J. I. I. I. I. I. I. I. I. I. I. I. I. I. I. I. l. ' l. PGKI. Booklet Series rn ~:~L~------------------~'. Time Allowed : S Bourw I. 2007. GENERAL KNOWLEDGE. [ Mnimum Marks ; 300. Read tho follo~ l.natructlona c

Transformer 1 2007
Bigmen dvd.086644884790537.540p splitscenes.Download Transformer 1 2007 - Bates haunting ... Windows 7 pdf.Songs of desert.Gamesimulator truck 2.In.

The darkness 2007
Inspirations magazine[issue 87].pdf. ... Big pun 2.853382061. ... big.The 100 s02 1080.The physicaleffects oftwo much dopecan result in bloodshoteyes,a ...

Hindi songs 2007
Czechcasting anna 7462. Hindisongs 2007 - Download.Hindisongs 2007.Free pdf. convertercrack.Hindisongs 2007.Hindisongs 2007.Windows xp service pack 3 greek.Ellen 2015 11 09. Greysanatomy s10e07 xvid.831672080.Ikissgirls 14 05 10 evaloviaand riley rei

CAT 2007 Solutions.pdf
irrespective of the behaviour of the stock market. So right. option for questions number 13 is (0.20%) and question number. 14 is (36% in option B and 64% in ...

Fall 2007.pdf
Southport Chronology Vol.1 *. Southport Chronology Vol.2*. Southport Chronology Vol.3*. Southport Choronolgy Vol.4*. Three Southern Families. Retail Price.

elBulli 2007 Survey.pdf
1394 Mackerel sweetbreads with egg yolk, sesame oil capsules. 1395 Goose barnacles in their jus, velvet horn and pepper dulse seaweed and caviar. 1396 Huitlacoche with sweetcorn albondigas and melted cheese. 1397 Tender sweetcorn risotto in its jus P

Winter Issue 2007
springing life from winter death for youth to finally flourish, though not untold the truth of old which haunts the young and wounded, experience survives the cold,.

STY_RED 2007.pdf
have more than the old. The same is true, therefore, ... This is a central intuition of our paper. Idiosyncratic risk matters ... STY_RED 2007.pdf. STY_RED 2007.pdf.