RFID Attendance Full Document

Embed Size (px)

Citation preview

  • 8/18/2019 RFID Attendance Full Document

    1/53

    ABSTRACT :

      RFID is an acronym for Radio Frequency Identication. RFID is one

    member in the family of Automatic Identication and Data Capture (AIDC)

    technologies and is a fast and reliable means of identifying ust about any material

    obect. !his proect can be applied in real time applications such as for recording theattendance. !his system can be used in big companies" industries" colleges" schools"

    etc #here there are many numbers of candidates a$ailable. !his system helps us in

    recording the attendance of a person easily #ithin fraction of seconds. RFID is

    increasingly used #ith biometric technologies for security. %rimarily" the t#o main

    components in$ol$ed in a Radio Frequency Identication system are the !ransponder

    (tags that are attached to the obect) and the Interrogator (RFID reader).

    Communication bet#een the RFID reader and tags occurs #irelessly and generallydoesn&t require a line of sight bet#een the de$ices.

      RFID tags are categori'ed as either acti$e or passi$e. Acti$e RFID

    tags are po#ered by an internal battery and are typically read#rite" i.e." tag data can

    be re#ritten andor modied. An acti$e tags memory si'e $aries according to

    application requirements* some systems operate #ith up to +,- of memory. %assi$e

    RFID tags operate #ithout a separate eternal po#er source and obtain operating

    po#er generated from the reader. !his proect uses passi$e tags. Read/only tags are

    typically passi$e and are programmed #ith a unique set of data (usually 01 to +12

    bits) that cannot be modied. !he reader has three main functions3 energi'ing"

    demodulating and decoding. !he antenna emits radio signals to acti$ate the tag and

    to read and #rite data to it.

      In this proect" the RFID module reader typically contains a module

    (transmitter and recei$er)" a control unit and a coupling element (antenna). !his

    module is interfaced #ith the micro controller and #hen the card is brought near to

    the RFID module it reads the data in the card and displays on the 4CD.

    If the data in the card is matched #ith the data in the program memory

    then it compares #ith that ID code and displays as 5ID F678D9 along #ith hisher

    name on the 4CD. After it displays it records the time at #hich the person has entered

    into the premises using real time cloc: (R!C) D;/+0

  • 8/18/2019 RFID Attendance Full Document

    2/53

  • 8/18/2019 RFID Attendance Full Document

    3/53

    entering by the corresponding sta* here period #ise attendance is calculated. All

    students and sta attendance are $ie#ed by the department >6D&s.

    EXISTING SYSTEM

    Automated fngerprint identifcation

    Automated ngerprint identication is the process of automatically

    matching one or many un:no#n ngerprints against a database of :no#n and

    un:no#n prints. In this system" ngerprint is used in the identication system. A

    friction ridge or also :no#s as a raised protion of the epidermis on the palm or

    digits" is unique to each people. !he basic idea behind ngerprint identication

    is to capture and measure the pyshical dierence bet#een ridges and $alleys

    and thus help the system to identify the ngerprint. Automated ngerprint

    identication systems are primarily used by la#enforcement agencies for criminal identication initiati$es" the most important

    of #hich include identifying a person suspected of committing a crime or lin:ing a

    suspect to other unsol$ed crimes. 7sually" electronic hard#are is used to

    accompany the process of identifying ngerprint. 

  • 8/18/2019 RFID Attendance Full Document

    4/53

     

    Barcode !tem

    -arcode system consists of an electronic hard#are and soft#are for scanning a

    barcode and an optical machine/readable #hich represent certain data. 6ptical

    scanners or special soft#ares are used to scan and read the barcode. -arcode are

    #idely adopted by companies to mar: their products. 8o#adays" $arious soft#are to

    generate or read barcode eist in the mar:et. !his include the online #eb site that

    generate barcode according to the input :eyed in

    by the user. !here are also many alternati$es to read the barcode.

    For eample3

    7ser can ta:e a picture of the barcode" sa$e it in computer and using special

    soft#are" the barcode can be read. !his system is not rele$ant to be used in secured

    area as it can be easily fa:ed.

    PROPOSE" SYSTEM  Radio frequency identication (RFID) refers to the use of radio frequency #a$e

    to identify and trac: the tag implanted into an obect or a li$ing thing.It is a #ireless

  • 8/18/2019 RFID Attendance Full Document

    5/53

    mean of communication that use electromagnetic and electrostatic coupling in radio

    frequency portion of the spectrum to communicate bet#een reader and tag through a

    $ariety of modulation and encoding scheme .,odulation refers to the $ariation in the

    amplitude" frequency or phase of a high frequency carrier signal to con$ey

    information. ncoding is a process of con$erting

    information from one format to another. RFID system usually consists of RFID reader

    and tag. It is $ery useful because it can uniquely identify a person or a product based

    on the tag incorporated. It can be done quic:ly and this usually ta:es less than a

    second. A prototype of the system has been designed and fabricated. !he RFID reader

    used in the system is passi$e

    type #hich has maimum range of detection of around ?cm abo$e the reader. It

    operates at frequency of +1? :>' and +1E po#er supply. !he system has ability to

    uniquely identify and ta:e attendance for persons. !he users only need to place theirRFID tag on the reader to

    ta:e attendance. !hey do not need to go through the long list to loo: for their name.

    >ence" it is $ery time eBcient.Attendance #ill be ta:en if the encoded tag ID scanned

    matches the tag ID stored in the memory. 6ther#ise" an error message #ill be

    displayed. Attendance ta:en #ill be more accurate #ith the real time cloc: included in

    the system. R;101 and 7ni$ersal ;erial -us (7;-) port allo# the system to display the

    information and attendance of a particular person on%ersonal Computer (%C). !he In/Circuit ;erial %rogramming (IC;%) pins and serial

    programmer integrated in the system allo# update of microcontroller rm#are from

    time to time. !he po#er supply system designed #ill automatically s#itch to batteries

    po#er if 

    the ac po#er #as remo$ed. !he si'e of the de$ice is considered to be small. !hese

    t#o features ma:e the system portable to be carried to class or other places

    .

     A. Wiegand 26-bit Format 

      !he passi$e RFID reader implemented in the system uses iegand 1G/bit protocol

    format for !ransistortransistor 4ogic inputoutput communication. >ence" it can

    directly connect to the microcontroller. !here are t#o outputs and one input #ire from

    the RFID reader. !he t#o output #ires are DA!A< (usually green) and DA!A+ (usually

    #hite). !he card data are in binary

  • 8/18/2019 RFID Attendance Full Document

    6/53

    and the RFID reader ust recei$ed the radio frequency (RF) signal from the tag or card"

    translate it to iegand protocol and send the complete binary string to the

    microcontroller. !hen" the microcontroller #ill combine the strings of characters from

    both data lines into the original set of binary data. !he RFID reader performs no

    processing or quality chec:ing on the data recei$ed. It only recei$es RF signal from

    tags and con$erts it into iegand format data for transmission to the microcontroller.

     !he format of iegand 1G/bit and eample of output

    from RFID reader are sho#n in Fig. + and Fig. 1 respecti$ely. iegand refers to a

    specic reader to card interface" specic binary reader to controller interface"

    electronic signal carrying data" standard 1G/bit binary card data format"

    electromagnetic eect" or card technology. !he term iegand format actually refers to

    the general concept of security card data encoding card

    format is identical in both +1?:>' %roimity and +0.?G,>' card to ensure anycontroller capable of understanding data from +1?:>' and +0.?G,>' system. !here

    are 1?? possibilities for the facility code since the equi$alent decimal number for 2/bit

    binary #ith all $alue equal to one is 1??. !here can be up to G??0? card ID numbers

    since is equi$alent to G??0?.

     

    8ormally" there are t#o output data lines from the RFID reader. DA!A+ line indicates

    logic + bit #hile DA!A< indicates logic < bit. In their idle state" both lines are held high.

    During data transfer" the appropriate data line #ill be lo# for ?

  • 8/18/2019 RFID Attendance Full Document

    7/53

    sight #hile passi$e RFID reader can only detect passi$e RFID tag at a fe# centimeters

    from the reader. !he RFID reader used in the system is a lo# cost reader for reading

    passi$e RFID tags. It operates at frequency of +1? :>' and +1E po#er supply. !he

    eecti$e detection range of the reader is around ?cm from the antenna. !he RFID

    reader is constructed based on the ,H

  • 8/18/2019 RFID Attendance Full Document

    8/53

    6ur nal year proect is RFID based Attendance cum ;ecurity ;ystem. !his idea

    came to my mind #hen I sa# our lecturers ta:ing the attendance of +

  • 8/18/2019 RFID Attendance Full Document

    9/53

     

    SYSTEM ANA.YSIS:

    RFID is short for Radio Frequency Identication. Menerally a RFID system consists

    of 1 parts. A Reader" and one or more !ransponders" also :no#n as !ags. RFID

    systems e$ol$ed from barcode labels as a means to automatically identify and trac:

    products and people. Nou #ill be generally familiar #ith RFID systems as seen in3

    • Acce Contro%,

    RFID Readers placed at entrances that require a person to pass their proimity

    card (RF tag) to be Oread before the access can be made.

    • Contact %e Pa!ment S!tem,

    RFID tags used to carry payment information. RFIDs are particular suited to

    electronic !oll collection systems. !ags attached to $ehicles" or carried by

    people transmit payment information to a ed reader attached to a !oll station.

    %ayments are then routinely deducted from a users account" or information is

    changed directly on the RFID tag.

    • Product Trac/ing and In#entor! Contro%,

    RFID systems are commonly used to trac: and record the mo$ement of ordinary

    items such as library boo:s" clothes" factory pallets" electrical goods and

    numerous items.

    >o# do RFIDs #or:.

    ;ho#n belo# is a typical RFID system. In e$ery RFID system the transponder !ags

    contain information. !his information can be as little as a single binary bit " or be a

    large array of bits representing such things as an identity code" personal medical

    information" or literally any type of information that can be stored in digital binary

    format. ;ho#n is a RFID transcei$er that communicates #ith a passi$e !ag. %assi$e

    tags ha$e no po#er source of their o#n and instead deri$e po#er from the incident

    electromagnetic eld. Commonly the heart of each tag is a microchip. hen the !ag

    enters the generated RF eld it is able to dra# enough po#er from the eld to

    access its internal memory and transmit its stored information. hen the

  • 8/18/2019 RFID Attendance Full Document

    10/53

    transponder !ag dra#s po#er in this #ay the resultant interaction of the RF elds

    causes the $oltage at the transcei$er antenna to drop in $alue. !his eect is utili'ed

    by the !ag to communicate its information to the reader. !he !ag is able to control

    the amount of po#er dra#n from the eld and by doing so it can modulate the

    $oltage sensed at the !ranscei$er according to the bit pattern it #ishes to transmit.

    SYSTEM EN0IRONMENT:

    1ard+are Specifcation

    • Intel %entium IE

    • 1?G?+1 ,- RA,

    • + M- Free dis: space or greater

    • + M- on -oot Dri$e

    • +=9 PEMA display monitor

    •  + 8et#or: Interface Card (8IC)

    So2t+are En#ironment

    • ,; indo#s P%1

  • 8/18/2019 RFID Attendance Full Document

    11/53

    • ,; Dot 8et Frame#or: 1.<

    • Internet Information ;er$er (II;)

    • ,; ;Q4 ;er$er 1

  • 8/18/2019 RFID Attendance Full Document

    12/53

    signal. !he reader decodes the data encoded in the tags integrated circuit (silicon

    chip) and the data is passed to the host computer for processing.

    4, TAGS 5Tranponder6

    An RFID tag is comprised of a microchip containing identifying information and an

    antenna that transmits this data #irelessly to a reader. At its most basic" the chip #ill

    contain a seriali'ed identier" or license plate number" that uniquely identies that

    item" similar to the #ay many bar codes are used today. A :ey dierence" ho#e$er is

    that RFID tags ha$e a higher data capacity than their bar code counterparts. !his

    increases the options for the type of information that can be encoded on the tag"

    including the manufacturer" batch or lot number" #eight" o#nership" destination andhistory (such as the temperature range to #hich an item has been eposed). In fact"

    an unlimited list of other types of information can be stored on RFID tags" depending

    on application needs. An RFID tag can be placed on indi$idual items" cases or pallets

    for identication purposes" as #ell as on ed assets such as trailers" containers"

    totes" etc.

    Tag come in a #ariet! o2 t!pe& +it( a #ariet! o2 capa*i%itie, 7e! #aria*%e

    inc%ude:

    8Read'on%!8 #eru 8read'+rite8

  • 8/18/2019 RFID Attendance Full Document

    13/53

     !here are three options in terms of ho# data can be encoded on tags3 (+) Read/only

    tags contain data such as a seriali'ed trac:ing number" #hich is pre/#ritten onto them

    by the tag manufacturer or distributor. !hese are generally the least epensi$e tags

    because they cannot ha$e any additional information included as they mo$e

    throughout the supply chain. Any updates to that information #ould ha$e to be

    maintained in the application soft#are that trac:s ;7 mo$ement and acti$ity. (1)

    Orite onceO tags enable a user to #rite data to the tag one time in production or

    distribution processes. Again" this may include a serial number" but perhaps other

    data such as a lot or batch number. (0) Full Oread/#riteO tags allo# ne# data to be

    #ritten to the tag as neededSand e$en #ritten o$er the original data. amples for

    the latter capability might include the time and date of o#nership transfer or updating

    the repair history of a ed asset. hile these are the most costly of the three tag

    types and are not practical for trac:ing inepensi$e items" future standards forelectronic product codes (%C) appear to be headed in this direction.

     

    R$I" TAGS

    "ata capacit!

     !he amount of data storage on a tag can $ary" ranging from +G bits on the lo#

    end to as much as se$eral thousand bits on the high end. 6f course" the greater the

    storage capacity" the higher the price per tag.

    $orm 2actor

     !he tag and antenna structure can come in a $ariety of physical form factors

    and can either be self/contained or embedded as part of a traditional label structure

  • 8/18/2019 RFID Attendance Full Document

    14/53

    (i.e." the tag is inside #hat loo:s li:e a regular bar code labelSthis is termed a ;mart

    4abel) companies must choose the appropriate form factors for the tag $ery carefully

    and should epect to use multiple form factors to suit the tagging needs of dierent

    physical products and units of measure. For eample" a pallet may ha$e an RFID tag

    tted only to an area of protected placement on the pallet itself. 6n the other hand"

    cartons on the pallet ha$e RFID tags inside bar code labels that also pro$ide operators

    human/readable information and a bac:/up should the tag fail or pass through non

    RFID/capable supply chain lin:s.

    Pai#e #eru acti#e

    5%assi$e9 tags ha$e no battery and ObroadcastO their data only #hen energi'ed

    by a reader. !hat means they must be acti$ely polled to send information. OActi$eO

    tags are capable of broadcasting their data using their o#n battery po#er. In general"

    this means that the read ranges are much greater for acti$e tags than they are for

    passi$e tagsSperhaps a read range of +F) tags" use less po#er and are better

    able to penetrate non/metallic substances. !hey are ideal for scanning obects #ith

    high #ater content" such as fruit" at close range. 7>F frequencies typically oer better

    range and can transfer data faster. -ut they use more po#er and are less li:ely to

    pass through some materials. 7>F tags are typically best suited for use #ith or near

    #ood" paper" cardboard or clothing products. Compared to lo#/frequency tags" 7>F

    tags might be better for scanning boes of goods as they pass through a bay door into

    a #arehouse. hile the tag requirements for compliance mandates may be narro#ly

  • 8/18/2019 RFID Attendance Full Document

    15/53

    dened" it is li:ely that a $ariety of tag types #ill be required to sol$e specic

    operational issues. Nou #ill #ant to #or: #ith a company that is $ery :no#ledgeable

    in tag and reader technology to appropriately identify the right mi of RFID technology

    for your en$ironment and applications.

    EPC Tag

    %C refers to Oelectronic product code"O an emerging specication for RFID tags"

    readers and business applications rst de$eloped at the Auto/ID Center at the

    ,assachusetts Institute of !echnology. !his organi'ation has pro$ided signicant

    intellectual leadership to#ard the use and application of RFID technology. %C

    represents a specic approach to item identication" including an emerging standard

    for the tags themsel$es" including both the data content of the tag and open #irelesscommunication protocols. In a sense" the %C mo$ement is combining the data

    standards embodied in certain bar code specications" such as the 7%C or 7CC/+12

    bar code standards" #ith the #ireless data communication standards that ha$e been

    de$eloped by A8;I and other groups.

    R$ Trancei#er: !he RF transcei$er is the source of the RF energy used to acti$ate and po#er

    the passi$e RFID tags. !he RF transcei$er may be enclosed in the same cabinet as the

    reader or it may be a separate piece of equipment. hen pro$ided as a separate

    piece of equipment" the transcei$er is commonly referred to as an RF module. !he RF

    transcei$er controls and modulates the radio frequencies that the antenna transmits

    and recei$es. !he transcei$er lters and amplies the bac:scatter signal from a

    passi$e RFID tag.

    SO$T;ARE "ESCRIPTION:

    $RONT'EN"

    0B,NET

    Eisual -asic .8! is designed around the .8! Frame#or:" #hich pro$ides

    enhanced security" memory management" $ersioning" and deployment support.

     !he .8! Frame#or: also enables interoperability bet#een obects you create #ith

    any .8! programming language. !his means you can create obects #ith Eisual -asic

  • 8/18/2019 RFID Attendance Full Document

    16/53

    .8! that are easy to use from other .8! languages" and you can use obects from

    other .8! languages ust li:e you use obects created #ith Eisual -asic .8!.

      ASSEMB.IES

    Assemblies form the fundamental unit of deployment" $ersion control" reuse"

    acti$ation scoping" and security permissions for a .8!/based application. Assemblies

    ta:e the form of an eecutable (.ee) le or dynamic lin: library (.dll) le" and are the

    building bloc:s of the .8! Frame#or:. !hey pro$ide the common language runtime

    #ith the information it needs to be a#are of type implementations. Nou can thin: of an

    assembly as a collection of types and resources that form a logical unit of functionality

    and are built to #or: together.

    ith Eisual -asic .8!" you use the contents of assemblies" and add references

    to them" in much the same #ay as you use type libraries #ith pre$ious $ersions of Eisual -asic. hat ma:es assemblies dierent from .ee or .dll les in earlier $ersions

    of indo#s" ho#e$er" is that they contain all the information you #ould nd in a type

    library" plus information about e$erything else necessary to use the application or

    component.

      ASSEMB.Y MANI$EST

    ithin e$ery assembly is an assembly maniest . ;imilar to a table of contents" the

    assembly manifest contains the follo#ing3

    •  !he assemblys identity (its name and $ersion).

    • A le table describing all the other les that ma:e up the assembly" including"

    for eample" any other assemblies you created that your .ee or .dll le relies on"

    or e$en bitmap or Read me les.

    • An assembly reerence list " #hich is a list of all eternal dependencies S .dlls or

    other les your application needs that may ha$e been created by someone else.

    Assembly references contain references to both global and pri$ate obects. Mlobal

    obects reside in the global assembly cache" an area a$ailable to other

    applications" some#hat li:e the ;ystem01 directory. !he Microo2t,0iua%Baic

    namespace is an eample of an assembly in the global assembly cache. %ri$ate

    obects must be in a directory at either the same le$el as or belo# the directory in

    #hich your application is installed.

  • 8/18/2019 RFID Attendance Full Document

    17/53

  • 8/18/2019 RFID Attendance Full Document

    18/53

    namespace. !o use this constant in a program #ithout an alias" you #ould need to

    type the follo#ing code3

      ,sg-o (O;ome tetO X ,icrosoft.Eisual-asic.ControlChars.crlf Y 

      X O;ome more tetO)

    Import statements must al#ays be the rst lines immediately follo#ing any Optionstatements in a module. !he follo#ing code fragment sho#s ho# to import and assign

    an alias to the Microo2t,0iua%Baic,Contro%C(ar namespace3

    Imports CtrlChrsV,icrosoft.Eisual-asic.ControlChars

    Future references to this namespace can be considerably shorter3

    ,sg-o (O;ome tetO X CtrlChrs.crlf X O;ome more tetO)

    If an Import statement does not include an alias name" elements dened #ithin theimported namespace can be used in the module #ithout qualication. If the alias

    name is specied" it must be used as a qualier for names contained #ithin that

    namespace.

      NAMESPACES

    8amespaces organi'e the obects dened in an assembly. Assemblies cancontain multiple namespaces" #hich can in turn contain other namespaces.

    8amespaces pre$ent ambiguity and simplify references #hen using large groups of 

    obects such as class libraries.

    For eample" Eisual ;tudio .8! denes the .it Boo#e$er" if you #ant to use the Eisual ;tudio .8!

    .it Bo

  • 8/18/2019 RFID Attendance Full Document

    19/53

  • 8/18/2019 RFID Attendance Full Document

    20/53

      ATTRIB-TES

    Attributes are :ey#ord/li:e tags in #hich you can specify additional information

    about entities dened in Eisual -asic .8! applications. Attributes" #hich are sa$ed

    #ith an assemblys metadata" annotate programming elements such as types" elds"

    methods" and properties. 6ther applications" such as the Eisual -asic .8! or A;%.8!compilers" can refer to the information in attributes to determine ho# obects should

    be used.

     !he follo#ing sections pro$ide more information about attributes and ho# they

    are dened" applied" and retrie$ed.

     

    ATTRIB-TES O0ER0IE;

    Attributes are descripti$e tags that pro$ide additional information aboutprogramming elements such as types" elds" methods" and properties. 6ther

    applications" such as the Eisual -asic compiler" can refer to the etra information in

    attributes to determine ho# these items can be used.

     

    ATTRIB-TES AN" META"ATA

    Attributes are sa$ed #ith the metadata  of Eisual -asic .8! assemblies.

    ,etadata is information that describes e$ery element managed by the runtime. !hisincludes information required for debugging and garbage collection" as #ell as

    security attributes" marshaling data" etended class and member denitions" $ersion

    binding" and any other information the runtime requires.

    ith attributes" you specify the metadata in much the same #ay as you use

    :ey#ords li:e Pu*%ic  and Pri#ate  to pro$ide information about access le$els.

    >o#e$er" unli:e :ey#ords" most attributes are not language/specic. 7sing attributes"

    you can etend the capabilities of the Eisual -asic language #ithout requiring changes

    to the compiler.

      $-NCTIONA.ITY AN" CAPABI.ITIES O$ ATTRIB-TES

    ;ome :ey points about attributes include3

  • 8/18/2019 RFID Attendance Full Document

    21/53

    •  Nou can apply one or more attributes to entire assemblies" modules" or smaller

    program elements such as classes and properties.

    • Attributes can accept arguments in the same #ay as methods and properties.

    • Attributes fall into t#o groups3 those that are used by the .8! Frame#or: and

    Eisual -asic .8!" and custom attributes that are meaningful only to specic

    applications.

    • hile the .8! Frame#or: contains many useful attributes" you can dene your

    o#n custom attributes if necessary.

    • Custom attributes are dened in attribute classes based on the S!tem,

    Attri*ute  class. Attribute classes themsel$es use Attri*ute -age to pro$ide

    additional information about ho# the attribute can be used.

    •  !he process of retrie$ing metadata from attributes is called re#ection. ReJection

    in$ol$es using tools that allo# obects to retrie$e and eamine metadata about

    their o#n members.

    ABO-T OS

    ;IN"O;S XP PRO$ESSIONA. SP4

    Install ,icrosoft indo#s P% ;er$ice %ac: 1 (;%1) to better defend against

    $iruses" #orms" and hac:ers. Its enhanced security infrastructure pro$ides increased

    manageability and control for I! professionals and an impro$ed eperience

    for indo#s P% users.

    ,icrosoft indo#s P% ;er$ice %ac: 1 (;%1) pro$ides ne# proacti$e security

    technologies for indo#s P%" to better defend against $iruses" #orms" and hac:ers. In

    addition to a more robust security infrastructure" ;%1 impro$es the security

    conguration options of indo#s P%" and pro$ides better security information to help

    users faced #ith security decisions.

    TOP 3> REASONS TO "EP.OY ;IN"O;S XP SER0ICE PAC74

    I8!R6D7C!I68

  • 8/18/2019 RFID Attendance Full Document

    22/53

    %R6AC!IE %R6!C!I68

    C6,%A!I-I4I!N

    I,%R6ED ,A8AQA-I4I!N

    I8D6; FIRA44

    -46CI8M %6%/7%;

    I8!R8! P%46RR

    7%DA!;

    IR4;;

    ,6R 8 !C>8646MI;

      INTRO"-CTION

     !here&s a lot of information else#here on ,icrosoft.com" highlighting the

    business benets of indo#s P%" the consumer benets of ;%1" the important

    security enhancements it contains" and so on. -ut #hat seemed to be missing #as an

    article #ritten from the perspecti$e of the I! pro" on #hat admins and" #ell" 5non/

    casual9 users should epect from this super/si'e (1GG ,-Z) update. !his article loo:s

    at the changes in indo#s P% ;%1 that aect I! pros" and #hy #e thin: you #ill nd it

    a #orth#hile update. !his ser$ice pac: has an impact on e$erything from #eb

    bro#sing to #ireless net#or:ing. -ut ma:e no mista:e3 indo#s P% ;%1 is" rst and

    foremost" about helping you stay secure. ;o let&s start there.

      PROACTI0E PROTECTION

     Nou&$e probably heard the mar:eting message3 5;er$ice %ac: 1 for indo#s P%

    deli$ers proacti#e protection against malicious code by bloc:ing eploits at the

    point of entry as opposed to simply focusing on patching :no#n $ulnerabilities.9 For

    the technically inclined" this means that indo#s P% ;%1 recompiles many core

    system binaries #ith a ne# M; Jag that helps mitigate buer o$erruns. !his" in fact" is

    the main reason the ser$ice pac: is so bigSand the ne#ly compiled code optimi'es

    performance in many instances" as #ell. indo#s P% ;%1 introduces for the rst time"

    support for the 8P 5no/eecute9 Jag that" #ith a supported C%7 (currently" A,Ds 2

  • 8/18/2019 RFID Attendance Full Document

    23/53

    and Intel Itanium)" pro$ides enhanced protection against memory/based attac:s" by

    pre$enting code that has been inected $ia a buer o$errun attac: on a data page

    from eecuting.

     !here&s proacti$e protection aimed at users of more mainstream C%7s" too3

    indo#s P% ;%1 gets you all the bits for ;%+" as #ell as all ser$ice bulletin updates

    through ,;alo game. Fortunately" these issues ha$e already been resol$ed (see the products&

    respecti$e #ebsites)" as ha$e a fe# other snags #ith third/party re#alls and other

    tools. -ut the lesson remains3 I! pros need to be cautious and methodical #hen rolling

    out this" or any ne# soft#are update. Fortunately" #e&$e put together a terric library

    of documentation" no#ledge -ase articles and deployment guides to help you roll

    out indo#s P% ;%1 eBciently. -e sure to chec: out the I! %ro %ortal on !ech8et"

    #here these guides #ill help you get started.

     !he good ne#s is3 this ser$ice pac: has already been tested by literally

    hundreds of thousands of beta testers" in a $ast array of hard#are and soft#are

    en$ironments" and the feedbac: and es incorporated into the nal release. Indeed"

    many of the $ery best programmers at ,icrosoft #ere pulled o other proects to gi$e

    indo#s P% ;%1 the quality and polish it deser$es. ;ure" it #as delayed a fe# times.It&s no secret that recent rounds of #orms and net#or:/borne attac:s made this a top

  • 8/18/2019 RFID Attendance Full Document

    24/53

    priority for the company and" as a result" indo#s P% ;%1 e$ol$ed into a much more

    security/centric update than #as originally planned.

    As you might :no#" ,icrosoft has been encouraging its employees and partners

    to use the beta releases of indo#s P% ;%1 since the earliest release candidates

    became a$ailable. !he !ech8et team has been trac:ing user feedbac: about indo#s

    P% ;%1 for months and #e ha$e seen remar:ably fe# issues. Nou should still carefully

    test your mission/critical systems before rolling out indo#s P% ;%1 across your

    enterprise" but the feedbac: #e&$e recei$ed about the last fe# release candidates has

    been incredibly encouraging.

      IMPRO0E" MANA?EABI.ITY 

      indo#s P% ;er$ice %ac: 1 pro$ides impro#ed managea*i%it! o2 ecurit!

    etting  #ith G

  • 8/18/2019 RFID Attendance Full Document

    25/53

    Incidentally" the red 5alert9 shield that appears by default in the system tray

    #hen an unrecogni'ed anti/$irus pac:age is used" automatic updates are disabled or

    the re#all is turned o" can be recongured or disabled" if you #ish. >eres ho#3 Mo

    into the O;ecurity CenterO under the Control %anel. !here" you&ll nd a lin: on the left

    under OResourcesO that says OChange the #ay ;ecurity Center alerts me.O 7nchec: the

    appropriate alert type. !his feature" too" can be controlled or access to it disabled $ia

    Mroup %olicy.

      ;IN"O;S $IRE;A..

      !he ne# indo#s Fire#all is on by default and enabled e$en before the net#or:

    starts up" as indo#s P% ;%1 boots. It&s another important security feature that gains

    e$en more functionality in the domain en$ironment" #here re#all proles for mobile

    scenarios can be congured using Mroup %olicySa feature of indo#s 1

  • 8/18/2019 RFID Attendance Full Document

    26/53

    #hen it&s not recogni'ed by the ;ecurity Center" most third/party re#alls #ill #or: as

    they should.

    -y supporting the ne# ;ecurity Center A%Is in indo#s P% ;%1" security

    soft#are $endors can ma:e their products #or: e$en more seamlessly #ith the

    ;ecurity Center&s management interface. It&s also #orth mentioning that it&s possible

    to centrally congure indo#s Fire#all on all the #or:stations on your net#or:" to

    customi'e the operational mode and eception list entries.

    ;ee the indo#s Fire#all articles on our I! %ro %ortal page to learn more about

    this po#erful ne# feature and ho# to modify its settings before or after installation.

      B.OC7ING POP'-PS

    Automatic *%oc/ing o2 internet pop'up. %op/ups are more than a nuisance*

    they are another common attac: $ector and the pop/up bloc:ing capabilities of ;%1

    are important to maintain the security that is epected of ,icrosoft products.

     !he ne# %op/up ,anager feature in the indo#s P% ;er$ice %ac: 1 release of Internet

    plorer is turned o by default" but it&s a feature most users #ill probably #ant to

    enable.

      INTERNET EXP.ORER

    . indo#s P% ;%1 pro$ides enhanced protection against spoong and phishing

    attac:s #ith c(ange to Internet E

  • 8/18/2019 RFID Attendance Full Document

    27/53

      -P"ATES

    It&s easier to :eep indo#s up to date,  !here ha$e been signicant

    impro$ements to the Automatic 7pdates ser$ice and -ac:ground Intelligent !ransfer

    ;er$ice (-I!;) as used by the indo#s 7pdate eb site. !hese ser$ices are designed

    to minimi'e impact to the user&s computing eperience. Automatic 7pdates can

    automatically :eep a machine up to date #ith security updates" #hile -I!; enables

    bac:ground do#nloading of the updates to minimi'e band#idth impact on other

    Internet acti$ities. A couple of eamples of ho# the indo#s 7pdate eb site ta:es

    ad$antage of these ser$ices are to le$erage the do#nload that Automatic 7pdates has

    already startedcompleted and to resume a do#nload after an Internet connection #as

    dropped.

    indo#s 7pdate le$erages a secure connection o$er the Internet by sending

    data about the computer and recei$ing information about #hich updates are

    applicable to the computer o$er >!!%;. Further" these ser$ices do not ha$e remote/

    able interfaces nor do they listen on any ports.

      ;IRE.ESS

    Eaier +ire%e confguration, In $ersions of indo#s P% prior to ;%1" the

    #ireless conguration dialog boes only displayed the name of the net#or: and

    #hether it #as an infrastructure mode or ad hoc mode net#or:. 8o#" the

    conguration details are more disco$erable" and easier to manage.

    >o#e$er" some users mo$ing directly from the original release of indo#s P%

    might be disoriented by the many changes made in the #ireless conguration panels

    since that release. For eample" in indo#s P% #ith ;er$ice %ac: 1 (and indo#s P%

    #ith ;er$ice %ac: +)" the Aut(entication tab has been mo$ed to the properties of a#ireless net#or:. !o access it" do the follo#ing3

     

    MORE NE; TEC1NO.OGIES

      e ha$en&t touched upon many of the ser$ice pac:&s other components"

    including upport 2or ne+ tec(no%ogie such as DirectP .

  • 8/18/2019 RFID Attendance Full Document

    28/53

    the bits necessary to update the 6; on a !ablet %C to the !ablet %C 1

  • 8/18/2019 RFID Attendance Full Document

    29/53

    ;Q4 (;tructured Query 4anguage) is a synta for eecuting queries. -ut the ;Q4

    language also includes a synta to update" insert" and delete records.

    ;Q4 Data ,anipulation 4anguage (D,4)

    ;Q4 (;tructured Query 4anguage) is a synta for eecuting queries. -ut the ;Q4

    language also includes a synta to update" insert" and delete records.

     !he Result ;et

     !he result from a ;Q4 query is stored in a result/set. ,ost database soft#are systems

    allo# na$igation of the result set #ith programming functions" li:e3 ,o$e/!o/First/

    Record" Met/Record/Content" ,o$e/!o/8et/Record" etc.

    ;emicolon after ;Q4 ;tatements\

    ;emicolon is the standard #ay to separate each ;Q4 statement in database systems

    that allo# more than one ;Q4 statement to be eecuted in the same call to the ser$er.

    ;ome ;Q4 tutorials end each ;Q4 statement #ith a semicolon. Is this necessary\ e

    are using ,; Access and ;Q4 ;er$er 1

  • 8/18/2019 RFID Attendance Full Document

    30/53

    RD-,; #as in$ented by I-, in the early +=

  • 8/18/2019 RFID Attendance Full Document

    31/53

      !he transmitter output is up to 2m at H00.1,>' #ith a range of 

    approimately fe# meters

    (i) It accepts both linear and digital inputs(ii) It can operate from +.? to +1 Eolts/DC(iii) It is approimately the si'e of a standard postage stamp.

     

    Management Modu%e:  It is nothing but" our database" it&s de$eloped by $b .dotnet s]#

    and its

    6utput depends upon signals (RF) from our %C&s com port that is

    connected

    to RF reader^

     

    R$I" reader modu%e:

    ( i) It also operates at H00.1,>'" and has a sensiti$ity of 0uE.

    (ii) It operates from H.? to ?.? $olts/DC"

    (iii) It has both linear and digital outputs.

    SYSTEM TESTING AN" MAINTANENCE:

    RFID -ased Attendance ;ystem !est Result -ased on the design eplained in the

    ;oft#are De$elopment section" RFID -ased Attendance ;ystem&s initial state #ill be

    #aiting for the student to put hisher ID on the RFID Reader. !he 4CD #ill display a

    message 9%lease %ut your ID on the reader9 #hile #aiting for an input from the RFID

    Reader. !his state is called standby mode. It do nothing ecept #aiting for a signal

    from the RFID Reader.

  • 8/18/2019 RFID Attendance Full Document

    32/53

     

    Figure H.13 RFID -ased Attendance ;ystem ;tandby ,ode.

    H.0 !est 6n ;amples In ;tandby ,ode" the 7AR! Jag" RCIF is in acti$e lo#" #hich

    indicate that no signal is coming from the RFID Reader. hen a student put hisher

    card on the reader" the RCIF Jag #ill turn to acti$e high and the microcontroller #ill

    process the signal sent by the RFID Reader. During the process" the system #ill

    display a message 9Identfying" %lease ait9 on 4CD.

    Figure H.03 Identifying the ID.

    After the microcontroller processed and identify the data sent by the RFID reader" it

    #ill display the ID and name of the student on 4CD. If it doesn&t match any data stored

    inside the microcontroller" it #ill display a message 9ID 7n:no#n9. !he system is

    tested based on the samples sho#n in !able 0.H. An obser$ation on the accuracy of 

  • 8/18/2019 RFID Attendance Full Document

    33/53

  • 8/18/2019 RFID Attendance Full Document

    34/53

     

    Figure H.G3 Identifying ;ample 0.

     Figure H.=3 7n:no#n ID.

    -ased on the results" it can be said that RFID -ased Attendance ;ystem identify all of 

    the samples correctly.

    H.H -utton !ests

     !he net test is to chec: #hether the button 1 function" #hich is to display the

    absentees& data #or: properly. !his button #ill display the name of the absentees. In

    this test" the t#o absentees& #ill be sample + and sample 1. ;ample 0&s card #as put

    on the RFID Reader and thus" this means ;ample 0 attend the class. >ence" sample +

  • 8/18/2019 RFID Attendance Full Document

    35/53

    and sample 1 are the absentees. !he results are sho#n on Figure H.G and Figure H.=. If 

    all the students are present" the system #ill display a message 9All %resent9.

     

    Figure H.23 !he system sho#s absentee +.

     

    Figure H.3 !he system sho#s absentee 1.

  • 8/18/2019 RFID Attendance Full Document

    36/53

     

    Figure H.+

  • 8/18/2019 RFID Attendance Full Document

    37/53

  • 8/18/2019 RFID Attendance Full Document

    38/53

    CO"EAttendance

    Imports system.data

    Imports ;ystem.Data.;qlImports ;ystem.Data.;qlClientImports ;ystem.!hreading%ublic Class Form+

      Dim cn As ;qlConnection  Dim cmd As ;qlCommand  Dim dr" dr+ As ;qlDataReader  Dim ds As Data;et  Dim da As ;qlDataAdapter

      %ri$ate ;,;!hread As !hread

      %ri$ate Read!hread As !hread  ;hared YContinue As -oolean V False

      ;hared YCont;,; As -oolean V False  %ri$ate Yait As -oolean V False

    A mobile i/enabled RFID scanner de$ice #as designed and built and controlling soft/

    #are #as de$eloped. %rototypes for a full application soft#are suite #ere implemented.

    All hard#are requirements for the de$elopment of such a system #ere addressed. ,ostsoft#arerequirements #ere addressed" although only partial prototypes #ere #ritten in somecasesdue to time constraints.

     !esting and integration results sho# that the de$eloped modules satisfy the obecti$es

    of this pro ect" and are suitable for a practical application. !he hard#are de$elopedcan beused as/is in the eld if placed in a suitable enclosure.

     !he modular tree/le$el approach ta:en in synthesis and design of components allo#s

    components to be interchanged if upgrades or superior alternati$es become a$ailable.

     !hisapproach also allo#s for the system to be easily etended and additional functionalitaddedif required.

    Additional time may still be spent on rening and polishing the system in order for it to

    be introduced for use at the engineering faculty of ;tellenbosch in 1o#e$er" the manufacturingprocessesat the engineering faculty are su cient for surface mount component utilisation" and

    the use of surface mount components is recommended.

    -attery !emperature ,onitoring3 Additional functionality for monitoring battery tem/

    perature can be implemented.

    &!hin& Clients3 !he use of &thin/clients& must be in$estigated for application soft#areM7Is. !his refers to minimal client co de that etracts and presents M7I information from a

    central database.

    Access Control3 !his proect can easily be adopted for use in an e ecti$e #irelessaccesscontrol system.

  • 8/18/2019 RFID Attendance Full Document

    39/53

  • 8/18/2019 RFID Attendance Full Document

    40/53

      %ri$ate  ;ub  -uttonHYClic:(-yEal  sender As  ;ystem.6bect" -yEal  e As;ystem.$entArgs) >andles -uttonH.Clic:  pYadd.Eisible V False  pYdelete.Eisible V !rue  pYedit.Eisible V False   !ry  cn.6pen()  da V 8e# ;qlDataAdapter(Oselect RFIDno from studentinfo O" cn)  ds V 8e# Data;et  da.Fill(ds" OstudentinfoO)  cmbYname.Data;ource V ds.!ables(

  • 8/18/2019 RFID Attendance Full Document

    41/53

      %ri$ate  ;ub  cmdYdeleteYClic:(-yEal  sender As  6bect" -yEal  e As;ystem.$entArgs) >andles cmdYdelete.Clic:   !ry

      cn.6pen()  cmd V 8e#  ;qlCommand(Odelete from studentinfo #here RFIDnoVO  XcmbYname.!et X OO" cn)  cmd.ecute8onQuery()  ,sg-o(Osuccessfully DeletedZZZO)  cn.Close()  Catch  nd  !ry  nd ;ub

      %ri$ate  ;ub  RFIDYDataRecei$ed(-yEal  sender As  6bect" -yEal  e As;ystem.I6.%orts.;erialDataRecei$ed$entArgs)>andles RFID.DataRecei$ed  If  ;ystem.Date!ime.8o#() O?.

  • 8/18/2019 RFID Attendance Full Document

    42/53

      da.Fill(ds" OstudentinfoO)

      ith ;,;  .%ort8ame V +  .-audRate V +1

  • 8/18/2019 RFID Attendance Full Document

    43/53

  • 8/18/2019 RFID Attendance Full Document

    44/53

  • 8/18/2019 RFID Attendance Full Document

    45/53

  • 8/18/2019 RFID Attendance Full Document

    46/53

  • 8/18/2019 RFID Attendance Full Document

    47/53

  • 8/18/2019 RFID Attendance Full Document

    48/53

  • 8/18/2019 RFID Attendance Full Document

    49/53

  • 8/18/2019 RFID Attendance Full Document

    50/53

    Acti#it!:

    O*=ect

  • 8/18/2019 RFID Attendance Full Document

    51/53

    State

  • 8/18/2019 RFID Attendance Full Document

    52/53

  • 8/18/2019 RFID Attendance Full Document

    53/53

    "ata@o+

    ;tart