23
Amity Business School SHRIKANT YADAV (D-38) CHAITANYA GANDHI (D-28) AKHIL SUNEJA (D-23) ANEESH BAJAJ (D-52) VAIBHAV SRIVASTAVA (D-59)

Rfid Ppt Final

Embed Size (px)

Citation preview

Page 1: Rfid Ppt Final

Amity Business School

SHRIKANT YADAV (D-38)CHAITANYA GANDHI (D-28)AKHIL SUNEJA (D-23)ANEESH BAJAJ (D-52)VAIBHAV SRIVASTAVA (D-59)

Page 2: Rfid Ppt Final

Amity Business SchoolIntroduction to RFIDIntroduction to RFID

Radio-frequency identification (RFID) is the use of an object (referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves.

Page 3: Rfid Ppt Final

Amity Business School

• Invented in 1948 by Harry Stockman.

• Initial application was during World War II-The United Kingdom used RFID devices to distinguish returning English airplanes from inbound German ones. RADAR was only able to signal the presence of a plane, not the kind of plane it was..

• Came into commercial use only in 1990s.

HISTORY OF RFIDHISTORY OF RFID

Page 4: Rfid Ppt Final

Amity Business School

RFID system contains three main components:

COMPONENTS OF RFID

Page 5: Rfid Ppt Final

Amity Business School

There are generally three types of RFID tags:

•Active RFID tags, which contain a battery and can transmit signals autonomously,

•Passive RFID tags, which have no battery and require an external source to provoke signal transmission, and

•Battery assisted passive (BAP) which require an external source to wake up but have significant higher forward link capability providing great read range.

TYPES OF RFID TAGS

Page 6: Rfid Ppt Final

Amity Business School

Page 7: Rfid Ppt Final

Amity Business SchoolREADER A device that is used to interrogate or read a Tag.

Basic components are: A scanning Antenna

A transceiver with a decoder to interpret data

Helps in personalizing data and sometimes even edit Tags as well.

Page 8: Rfid Ppt Final

Amity Business SchoolComponents of RFID(cont’d)Components of RFID(cont’d)

Page 9: Rfid Ppt Final

Amity Business SchoolRFID ARCHITECTURE

Tags Reader

Gateway

Database

Database

Application

User Interface

Backend

Fig.1. A General Overview of RFID Architecture

Scanned

Firstly items-tag are scanned by reader;

Secondly in backend transmitted data coming through antenna (RF-wave) are being recognized by RFID-based system PC. It acts as a middleware communication gateway among items, reader and system database;

And at the end it filters out and store data in RFID-databases for checking the data fault and relevant operation.

Page 10: Rfid Ppt Final

Amity Business School

Page 11: Rfid Ppt Final

Amity Business SchoolUses/Benefits of RFIDUses/Benefits of RFID

oTransportation paymentsoAsset Management,Warehousing

oProduct Tracking oReal-Time Location SystemsoSupply Chain Management(Inventory)

oVehicle IdentificationoPoint of Sale,RetailoCalculate the RACE timingoLibraries,School,Passport,Human implants

Page 12: Rfid Ppt Final

Amity Business School

• Benefits to retailers, manufactures etc.Reduced on-hand inventory and less use of “safety

stock”.Increased sales through reduced out-of- stocks.Increased stock visibility and availability.Reduced transportation cost and shipping volumes.More accurate forecasts and stock replenishment.Reduced shrink and theft in the supply chain.

• Benefits to customersBetter in-stock - product on the shelf when you want itImproved Product SelectionProduct Freshness for Dated GoodsEasier Identification on Recalls

Page 13: Rfid Ppt Final

Amity Business SchoolIssues / ConcernsIssues / Concerns

Page 14: Rfid Ppt Final

Amity Business SchoolIssues / ConcernsIssues / Concerns

Cost of RFID technology.Active RFID life – 2 to 4 years.Privacy concerns- consumer surveillance.Extreme weather.Security concerns-illicit tracking of RFID tags.Global standardization.Environmental concern- recycling.RFID systems are vulnerable to virus.

Page 15: Rfid Ppt Final

Amity Business SchoolRFID Vs Bar CodeRFID Vs Bar CodeRFID Barcode

Forging is difficult Forging is easy

Scanner not required. No need to bring the tag near the reader

Scanner needs to see the bar code to read it

RFID is comparatively fast Slow

Can read multiple tags Can read only one tag at a time

Relatively expensive as compared to Bar Codes

(Reader 250$, Tag 20 cents a piece)

Relatively Cheap and widely available

Can be reusable within factory premises

Cannot be reused

Page 16: Rfid Ppt Final

Amity Business SchoolVEHICLE IDENTIFICATION USING RFID

Page 17: Rfid Ppt Final

Amity Business School

• RFID Vehicle identification is mainly designed to track and manage vehicles in parking areas or toll plazas to allow for accurate vehicle tracking as well as easy in-and-out access for drivers.

• The setup includes passive UHF RFID windshield sticker tags attached to the windshields of vehicles, and readers (like DL910) installed on fixed overhead or roadside structures identifying cars in motion. With RFID, car information can be automatically gathered to enable efficient vehicle management, while maintaining high identification rate.

Page 18: Rfid Ppt Final

Amity Business School

• The RFID solution is supported by long range RFID readers with long read range of up to 15 meters depending on the tags, as well as smart card type tags or RFID labels used for drivers' licenses and access control tickets. And a unique identification code is established for each car via a tamper-resistant windshield sticker tag for the secure operation of the RFID vehicle tracking system. 

• Hands-free, long-distance, reliable and highly secure, the RFID meets the requirement of parking lot and gated communities, with nearly no human intervention and low operation cost.

Page 19: Rfid Ppt Final

Amity Business SchoolSWOT ANALYSISSTRENGTHS WEAKNESSES 1.Tags are cheap and can be easily fitted in the car.2.Tags can’t be easily tampered.3.It helps in identifying the car from a distance, which is important from security point of view.4.Ease of use as there is no hassle of opening and closing the gates manually.5.Automatic toll collection.6.Tracking and monitoring of the car is easier.7.Prevents theft.8.Is reliable with optimum cost and performance. 

 1.Initial cost incurred is high.2.Readers have high electricity requirement.3.Skilled personnel are required to handle the backend of the System.4.Lack of standards.

Page 20: Rfid Ppt Final

Amity Business School

  OPPORTUNITIES THREATS1. Market potential for the product is

good and is a new application in a developing technology.

2. RFID scanners can be used to ensure that proper key is used for starting the car.

3. Can be used by law enforcement to check that car is made of stolen or genuine parts.

4. License plates can be have embedded RFID tags.

5. Can be used on petrol pump to speed up the payment.

6. Tracking of rental cars can be done using satellite.

1. Other GPS applications are already present in market.

2. Bar codes are used extensively in market and have already dominated the market.

3. Security is always an issue, attacks like the one on Parliament can be easily replicated.

4. Privacy is a concern since one can be easily monitored or tracked.

 

Page 21: Rfid Ppt Final

Amity Business SchoolRFID OVER THE YEARS

Page 22: Rfid Ppt Final

Amity Business SchoolInitiatives in RFIDInitiatives in RFID

Patni Computer Systems Lab – Implemented Animal Tracking System

Wipro Technologies - Member of the Electronic Product Code (EPC)

- Setting up a lab to study RFID

- Working on pilot projects

Infosys Technologies – RFID consulting on logistics player in the RFID space.

TCS have tied up with Hyderabad university to produce RFID tagged mark sheets & degrees to deter use of fake degree.

Intellicon - pilot project for BEL Bangalore, tags installed on employee buses. Buses inside the BEL campus were tracked with the aim of gauging employee punctuality.

Page 23: Rfid Ppt Final

Amity Business School