cd-20-doc batch 14

82
ACCESS CONTROL USING RFID AND ARDIUNO B.Tech. Project Report A.PAVITHRA M.KALAVATHI S.KEERTHI SK.SABIRUNNISA DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING GOKARAJU RANGARAJU INSTITUTE OF ENGINEERING AND TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University) HYDERABAD 500 090 2013

Upload: khawlamanaa

Post on 19-Dec-2015

17 views

Category:

Documents


1 download

DESCRIPTION

rf

TRANSCRIPT

  • ACCESS CONTROL USING RFID AND ARDIUNO

    B.Tech. Project Report

    A.PAVITHRA

    M.KALAVATHI

    S.KEERTHI

    SK.SABIRUNNISA

    DEPARTMENT OF ELECTRONICS AND

    COMMUNICATION ENGINEERING

    GOKARAJU RANGARAJU INSTITUTE OF

    ENGINEERING AND TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University)

    HYDERABAD 500 090

    2013

  • ACCESS CONTROL USING RFID AND ARDIUNO

    Project Report Submitted in Partial Fulfillment of

    the Requirements for the Degree of

    Bachelor of Technology

    in

    Electronics and Communication Engineering

    by

    A.PAVITHRA (Roll No. 10245A0401)

    M.KALAVATHI (Roll No. 10245A0408)

    S.KEERTHI (Roll No. 10245A0411)

    SK.SABIRUNNISA (Roll No. 10245A0412)

    DEPARTMENT OF ELECTRONICS AND

    COMMUNICATION ENGINEERING

    GOKARAJU RANGARAJU INSTITUTE OF

    ENGINEERING AND TECHNOLOGY (Affiliated to Jawaharlal Nehru Technological University)

    HYDERABAD 500 090

    2013

  • Department of Electronics and Communication Engineering

    Gokaraju Rangaraju Institute of Engineering and Technology (Affiliated to Jawaharlal Nehru Technological University)

    Hyderabad 500 090

    2013

    Certificate

    This is to certify that this project report entitled Access Control Using Rfid

    and Ardiuno by A. Pavithra (Roll No. 10245A0401), M. Kalavathi(Roll No.

    10245A0408), S. Keerthi (Roll No. 10245A0411) and SK. Sabirunnisa(Roll No.

    10245A0412), submitted in partial fulfillment of the requirements for the degree of

    Bachelor of Technology in Electronics and Communication Engineering of the

    Jawaharlal Nehru Technological University, Hyderabad, during the academic year

    2012-13, is a bonafide record of work carried out under our guidance and

    supervision.

    The results embodied in this report have not been submitted to any other

    University or Institution for the award of any degree or diploma.

    (Guide) (External Examiner) (Head of Department)

    N.ome Ravi Billa

  • ACKNOWLEDGMENT

    It is a pleasure to express thanks to Mr. N.Ome, Associate professor, GRIET,

    Hyderabad, who is instrumental for the successful completion of this project with

    his constant guidance and able supervision throughout the course of this project.

    We would like to express our sincere gratitude Mr. Ravi Billa , Head of the

    E.C.E Department, GRIET, Hyderabad, for being co-operative and encouraging

    during the tenure of the project.

    Finally I thank all the ICS staff and E.C.E Department Staff who have been

    supportive and extended their timely help for the completion of this project.

    A.Pavithra ________________________

    M.Kalavathi ________________________

    S.Keerthi ________________________

    SK.Sabirunnisa ________________________

  • Abstract

    The concept of access control using Arduino &RFID technology is that to control the Door

    automatically. In this method RFID reader& Arduino board is placed far away to the door,

    whenever person (he is having RFID card)comes nearer to the Reader, RFID reader reads the

    data from his RFID tag. This data is send to the Arduino board, which is basically

    Microcontroller based board. Arduino board receives that number and compares with valid

    numbers .If that number is valid send 1to the zigbee modem and send 0 if that received

    number is invalid. Zigbee modem Transmit corresponding data( 0 or 1) to the coordinator.

    On the receiving side Depending on the Zigbee received data, the arduino will control the door,

    if zigbee 0 is received , the arduino will send Logic HIGH signal to the POWER transistor,

    then power tr. is ON ,magnetic lock also on then door is closed. if zigbee 1 is received , the

    arduino will send Logic LOW signal to the POWER transistor, then power transistor is off,

    Magnetic lock doesnt conduct then door is open.

    BLOCK DIAGRAM: Transmitter

    Receiver

    Hardware Required:

    Arduino uno board

    RFID Reader

    RFID card

    Magnetic lock& Z44Transistor

    Software Required:

    Arduino, XCTU Software to Configure the XBEE Modems.

    i

    RFID CARD Arduino uno board

    RFID READER

    Zigbee module

    Magnetic

    lock(Door)

    MAGNETIC LOCK

    (DOOR)

    RELAY Zigbee module

    ZIGBEE MODULE

    Arduino uno board

    ARDUINO UNO BOARD

  • List of figures 3. Arduino 5 3.1 Arduino board 5

    4. RFID technology 23 4.1 RFID reader 23

    4.2 Block diagram of RFID system 23

    4.3 RFID tag diagram 24

    4.4 RFID tag 24

    4.5 Application diagram of RFID tag 38

    4.6 Materials tracking using RFID tag 38

    4.7 Automatic payment RFID card 39

    4.8 Automatic gate check post using RFID technology 39 5.ZIGBEE 41 5.1 zigbee pin diagram 41

    5.2 XCTU user interface 43

    5.3 PC settings 47

    5.4 Com test/query modem 47

    5.5 Modem configuration as coordinator 49

    5.6 To read source address 49

    5.7 Modem configuration as router 50

    5.8 To set destination address 51

    5.9 open up serial port in the arduino IDE 52

    5.10Router should connect to the coordinator 53 6. Magnetic lock 54 6.1 Magnetic lock 54

    6.2 Basic magnetic wiring diagram 55

    7. Implementation of access control using RFID and arduino 56 7.1 Block diagram of transmitter 56

    7.2 Block diagram of receiver 56

    7.3 Flow chart of transmitter 59

    7.4 Flow chart of receiver 60

    7.5 transmitter 65

    7.6 receiver 66

    7.7 Components used in the project 67

    7.8 Normally when door is closed 68

    7.9 Door closed message on serial port 68

    7.10 when otherised person enter into door 70

    7.11 Door open message display on serial port 71

    7.12 Door closed for unauthorized persons 72

    7.13 serial port displays that the person is unauthorized

    ii

  • List of tables

    4.RFID TECHNOLOGY 27 4.1 Comparison between active and passive tags 27

    5.ZIGBEE 42 5.1 Pin description 42

    iii

  • CONTENTS Abstract i

    List of figures ii

    List of tables iii

    1 Introduction 1

    1.1 Background 1

    1.2 Aim of this Project 2

    1.3 Methodology 2

    1.4 Significance of this Work 3

    1.5 Outline 3

    1.6 Conclusion 3

    2. Literature Review 4

    3.Arduino 5

    3.1 introduction to arduino Uno 5

    3.2 Features of Arduino Uno 6

    3.3 Pins description 6

    3.4 communication 8

    3.5 Arduino Uno Programming 8

    4. RFID TECHNOLOGY 21

    4.1 Definition of RFID Technology 21

    4.2 Automatic identification and data capture(AIDC) 21

    4.3 components RFID system 22

    4.4 RFID frequency 24

    4.5 RFID TAG 24

    4.6 Classification of tags 25

    4.6.1 Passive Tags 25

    4.6.2 Active Tags 26

    4.6.3 Technical charecteirstics of active and passive RFID tags 26

    4.6.4 Functional capabilities of active and passive RFID tags 28

    4.6.5 semipassive RFID tags 30

    4.6.6 Read only tag 30

    4.6.7 Read write tag 30

    4.6.8 Write once read many times tag 30

    4.7 The RFID reader 31

  • 4.8 Data base 31

    4.9 Radio frequency for RFID system 31

    4.10 Tag-Reader communication 33

    4.11 Multiple set of standards guide RFID technology 34

    4.12 Multiple organizations develop RFID standards 35

    4.13 Application of RFID technology 36

    4.14 conclusion 40

    5.ZIGBEE 41

    5.1 introduction 41

    5.2 Network concepts 42

    5.2.1 Personal area networks 43

    5.3 XCTU 43

    5.4 Testing the zigbee 51

    6.Basic magnetic door lock system 54

    6.1 Electromagnetic locks 54

    6.2 System overview 54

    6.3 System example 55

    6.4 Simple wiring diagram 55

    7. Implementation of access controle using RFID and Arduino 56

    7.1 Block diagram 56

    7.1.1 Block diagram of Transmitter 56

    7.1.2 Block diagram of Reciever 56

    7.2 Flow chart of transmitter 59

    7.3 Flow chart of receiver 60

    7.4 Code 61

    7.4.1 Transmitter code 61

    7.4.2 Receiver code 63

    7.5 Components used 67

    7.6 Result 68

  • 1

    Chapter 1

    INTRODUCTION

    1.1 Background:

    Even we having the barcode technology, Wi-Fi or Bluetooth and another microcontroller like 8051 we dont require to do that all things, we may use simple and advanced techniques to replace above things efficiently. The advanced and improve version we are using

    they are RFID, Arduino and zigbee instead of barcode,8051 and Wi-Fi.

    RFID has a wide and growing range of potential uses throughout industry,

    commerce, education and the public sector more widely. The main driver for the development of

    the technology is the capability to identify and track the movement of products through supply

    chain. The current method of product tracking with in supply chains is the barcode, but passive

    RFID tags provides some simple, but fundamental, advantages. Firstly, barcodes are usually

    printed on paper labels or packaging, and are therefore prone to damage. Secondly although

    barcodes can provide inventory data to the level of product category, they can not provide

    additional data such as sell by dates; this type of extra functionality has the potential to be developed further for things like home automation, where, for example, RFID tags embedded in

    clothes may, in the future, be able to provide washing instruction to washing machines. Also,

    because RFID systems use radio frequencies to communicate, they are able to identify an object

    without a line of sight. This means that RFID tags can be identified while they are attacked to

    items inside boxes or even behind wall.

    The Arduino Uno is a microcontroller board based on the ATmega328 . It has 14

    digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz

    ceramic resonator, a USB connection, a power jack, an ICSP header, and a reset button. It

    contains everything needed to support the microcontroller; simply connect it to a computer with

    a USB cable or power it with a AC-to-DC adapter or battery to get started. It has more

    advantages over 8051 they are firstly, in this instead of using different peripherals registers so as

    to access a peripheral we can directly use predefined instruction to do so. Secondly we have 10

    bit ADC, it occupies less space, so simple to program, it has 2K SRAM, 1K EPROM and 32K

    flash memory.

    Zigbee is a wireless communication protocol like Wi-Fi and Bluetooth. Why we

    use this zigbee is it has more advantages than wi-fi and Bluetooth. They are low power

    consumption, low cost, wireless network proprietary standard. The low cost allows the

    technology to be widely deployed in wireless control and monitoring applications, the low power

  • 2

    usage allows longer life with smaller batteries, and the mesh networking provides high reliability

    and large range. Zigbee operating frequency is 2.4 GHz.

    1.2 Aim of this Project:

    The main aim of our project is to allow the otherised persons into the room

    and it will not allows the unauthorized persons and it displays that whether the persons is

    unauthorized or unauthorized.

    The concept of access control using Arduino &RFID technology is that to

    control the Door automatically. In this method RFID reader& Arduino board is placed far away

    to the door, whenever person (he is having RFID card)comes nearer to the Reader, RFID reader

    reads the data from his RFID tag. This data is send to the Arduino board, which is basically

    Microcontroller based board. Arduino board receives that number and compares with valid

    numbers .If that number is valid send some command(1) to the zigbee modem and send another

    command(0) if that received number is invalid. Zigbee modem Transmit corresponding data to

    the coordinator.

    On the receiving side Depending on the Zigbee received data, the arduino

    will control the door, if zigbee 0 is received , the arduino will send Logic HIGH signal to the

    POWER transistor, then power tr. is ON ,magnetic lock also on then door is closed. if zigbee 1

    is received , the arduino will send Logic LOW signal to the POWER transistor, then power

    transistor is off, Magnetic lock doesnt conduct then door is open.

    1.3 Methodology:

    In our project we are giving an authorized ID to the arduino board, when the

    person having RFID tag comes near to the RFID reader at the door, then the ID num on the tag is

    given to the arduino board through the reader, arduino board compares the valid ID with received

    ID, if the ID is valid then, magnetic lock allows the person into door otherwise not allows.

  • 3

    1.4 Significance of this Work:

    The advantage of our project is security purpose, that means the person who

    has authentication to allow to the industry or any other use, that particular persons only allows

    our technology and do not allow the persons who doesnt have authentication.

    1.5 Outline of this Report:

    In our project chapter1 includes introduction of our project, chapter2 includes

    literature review, chapter3 includes arduino, chapter4 includes RFID technology, chapter5

    includes Zigbee, chapter6 includes implementation of our project.

    1.6 Conclusion

    To allow otherised person only, Lack of standardization, high costs of

    implementation, slow technology development, and the elimination of unskilled labor are all

    contributors currently preventing the adoption of new this technologies.

  • 4

    Chapter 2

    LITERATURE REVIEW

    Firstly we did work in transmitter side, in our project we study and implemented

    about RFID technology, we tested that the RFID identifies the RFID tags or not, if identified

    then we can able to know by indicating LED glow and buzzer sound. Then we proceed with the

    arduino, we wrote program in our arduino board that check the received ID number is valid or

    not by comparing with the valid ID number which already stored in arduino board. Then we

    observed that when we placing RFID near to the reader then the arduino board checks the

    received data and we can see the received ID is valid or not in serial port. Then we set the

    settings of zigbee by using XCTU tool. We are using two zigbee modules for serial

    communication one is at receiver side and another is at transmitter side, we set transmitter zigbee

    as a router and receiver zigbee as a coordinator.

    Now at receiver side the zigbee receives the data and gives it to the arduino board

    at the receiver side. In this arduino board we wrote a code that the if received data is valid then

    send LOW logic signal to the magnetic lock through the IRFZ44 MOSFET otherwise sends

    HIGH logic to magnetic lock, we wrote this code and checked it is working or not. Then we

    connected the IRFZ44 MOSFET to the magnetic lock through 12V battery, then we checked that

    if it receives valid ID then door is open or not, and also checked that when it received invalid

    data then the door is closed or not.

    Finally we implemented the whole thing in our kit and saw the result successfully.

  • 5

    Chapter 3

    ARDUINO

    3.1 INTRODUCTION:

    The Arduino Uno is a microcontroller board based on the ATmega328 . It has

    14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz

    ceramic resonator, a USB connection, a power jack, an ICSP header, and a reset button. It

    contains everything needed to support the microcontroller; simply connect it to a computer with

    a USB cable or power it with a AC-to-DC adapter or battery to get started.

    The Uno differs from all preceding boards in that it does not use the FTDI

    USB-to-serial driver chip. Instead, it features the Atmega16U2 (Atmega8U2 up to version R2)

    programmed as a USB-to-serial converter.:

    "Uno" means one in Italian and is named to mark the upcoming release of

    Arduino 1.0. The Uno and version 1.0 will be the reference versions of Arduino, moving

    forward. The Uno is the latest in a series of USB Arduino boards, and the reference model for the

    Arduino platform; for a comparison with previous versions..

    Fig.3.1 Arduino board

  • 6

    3.2 Features of Arduino Uno:

    Microcontroller ATmega328

    Operating Voltage 5V

    Input Voltage (recommended) 7-12V

    Input Voltage (limits) 6-20V

    Digital I/O Pins 14 (of which 6 provide PWM output)

    Analog Input Pins 6

    DC Current per I/O Pin 40 mA

    DC Current for 3.3V Pin 50 mA

    Flash Memory 32 KB (ATmega328) of which 0.5 KB used by bootloader

    SRAM 2 KB (ATmega328)

    EEPROM 1 KB (ATmega328)

    Clock Speed 16 MHz

    3.3 PINS DESCRIPTION:

    Power

    The Arduino Uno can be powered via the USB connection or with an external

    power supply. The power source is selected automatically.

    External (non-USB) power can come either from an AC-to-DC adapter (wall-

    wart) or battery. The adapter can be connected by plugging a 2.1mm center-positive plug into the

    board's power jack. Leads from a battery can be inserted in the Gnd and Vin pin headers of the

    POWER connector.

    The board can operate on an external supply of 6 to 20 volts. If supplied with less

    than 7V, however, the 5V pin may supply less than five volts and the board may be unstable. If

    using more than 12V, the voltage regulator may overheat and damage the board. The

    recommended range is 7 to 12 volts.

    The power pins are as follows:

    VIN. The input voltage to the Arduino board when it's using an external power source (as

    opposed to 5 volts from the USB connection or other regulated power source). You can

    supply voltage through this pin, or, if supplying voltage via the power jack, access it

    through this pin.

  • 7

    5V.This pin outputs a regulated 5V from the regulator on the board. The board can be

    supplied with power either from the DC power jack (7 - 12V), the USB connector (5V),

    or the VIN pin of the board (7-12V). Supplying voltage via the 5V or 3.3V pins bypasses

    the regulator, and can damage your board. We don't advise it.

    3V3. A 3.3 volt supply generated by the on-board regulator. Maximum current draw is 50

    mA.

    GND. Ground pins.

    IOREF. This pin on the Arduino board provides the voltage reference with which the

    microcontroller operates. A properly configured shield can read the IOREF pin voltage

    and select the appropriate power source or enable voltage translators on the outputs for

    working with the 5V or 3.3V.

    Memory

    The ATmega328 has 32 KB (with 0.5 KB used for the bootloader). It also has 2 KB of SRAM

    and 1 KB of EEPROM.

    Input and Output

    Each of the 14 digital pins on the Uno can be used as an input or output, using pinMode(),

    digitalWrite(), and digitalRead() functions. They operate at 5 volts. Each pin can provide or

    receive a maximum of 40 mA and has an internal pull-up resistor (disconnected by default) of

    20-50 kOhms. In addition, some pins have specialized functions:

    Serial: 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL serial data.

    These pins are connected to the corresponding pins of the ATmega8U2 USB-to-TTL

    Serial chip.

    External Interrupts: 2 and 3. These pins can be configured to trigger an interrupt on a

    low value, a rising or falling edge, or a change in value.

    PWM: 3, 5, 6, 9, 10, and 11. Provide 8-bit PWM output with the analogWrite() function.

    SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13 (SCK). These pins support SPI

    communication using the SPI library.

    LED: 13. There is a built-in LED connected to digital pin 13. When the pin is HIGH

    value, the LED is on, when the pin is LOW, it's off.

    The Uno has 6 analog inputs, labeled A0 through A5, each of which provide 10 bits of resolution

    (i.e. 1024 different values). By default they measure from ground to 5 volts, though is it possible

    to change the upper end of their range using the AREF pin and the analogReference() function.

    Additionally, some pins have specialized functionality:

    TWI: A4 or SDA pin and A5 or SCL pin. Support TWI communication using the Wire

    library.

  • 8

    There are a couple of other pins on the board:

    AREF. Reference voltage for the analog inputs. Used with analogReference().

    Reset. Bring this line LOW to reset the microcontroller. Typically used to add a reset

    button to shields which block the one on the board.

    3.4 Communication:

    The Arduino Uno has a number of facilities for communicating with a computer, another

    Arduino, or other microcontrollers. The ATmega328 provides UART TTL (5V) serial

    communication, which is available on digital pins 0 (RX) and 1 (TX). An ATmega16U2 on the

    board channels this serial communication over USB and appears as a virtual com port to

    software on the computer. The '16U2 firmware uses the standard USB COM drivers, and no

    external driver is needed. The Arduino software includes a serial monitor which allows simple

    textual data to be sent to and from the Arduino board. The RX and TX LEDs on the board will

    flash when data is being transmitted via the USB-to-serial chip and USB connection to the

    computer (but not for serial communication on pins 0 and 1).

    A Software Serial library allows for serial communication on any of the Uno's digital pins.

    The ATmega328 also supports I2C (TWI) and SPI communication. The Arduino software

    includes a Wire library to simplify use of the I2C bus. For SPI communication, use the SPI

    library

    3.5 Arduino Uno Programming:

    The Arduino Uno can be programmed with the Arduino software . Select "Arduino Uno from the

    Tools > Board menu (according to the microcontroller on your board).

    The ATmega328 on the Arduino Uno comes preburned with a boot loader that allows you to

    upload new code to it without the use of an external hardware programmer. It communicates

    using the original STK500 protocol.

    Arduino programs can be divided in three main parts: structure, values (variables and constants),

    and functions.

    Structure

    An Arduino program runs in two parts:

    Void setup()

    Void loop()

    setup() is preparation, and loop() is execution. In the setup section, always at the top of your

    program, you would set pin Modes, initialize serial communication, etc. The loop section is the

    code to be executed -- reading inputs,

  • 9

    Triggering outputs, etc.

    Setup()

    Loop()

    Setup()

    The setup() function is called when a sketch starts. Use it to initialize variables, pin

    modes, start using libraries, etc. The setup function will only run once, after each power up or

    reset of the Arduino board. Loop()

    After creating a setup() function, which initializes and sets the initial values, the loop() function

    does precisely what its name suggests, and loops consecutively, allowing your program to

    change and respond. Use it to actively control the Arduino board.

    Example

    int buttonPin = 3;

    // setup initializes serial and the button pin

    Void setup()

    {

    Serial.begin(9600);

    pinMode(buttonPin, INPUT);

    }

    // loop checks the button pin each time,

    // and will send serial if it is pressed

    Void loop()

    {

    if (digitalRead(buttonPin) == HIGH)

    serialWrite('H');

    else

    serialWrite('L');

    delay(1000);}

    Variables

    Variables are expressions that you can use in programs to store values, such as a sensor reading

    from an analog pin.

    Constants

    Constants are particular values with specific meanings.

    HIGH | LOW

    INPUT | OUTPUT

  • 10

    true | false

    Integer Constants

    Data Types

    Variables can have various types. They are Boolean,char,byte,int,unsigned

    int,long,unsigned long,float,double,string,array

    Functions

    Digital I/O

    pinMode()

    digitalWrite()

    digitalRead()

    pinMode()

    Description

    Configures the specified pin to behave either as an input or an output. See the description of

    digital pins for details on the functionality of the pins.

    Syntax

    pinMode(pin, mode)

    Parameters

    pin: the number of the pin whose mode you wish to set

    mode: INPUT, OUTPUT, or INPUT_PULLUP. (see the digital pins page for a more complete

    description of the functionality.)

    digitalWrite()

    Description

    Write a HIGH or a LOW value to a digital pin.

    If the pin has been configured as an OUTPUT with pinMode(), its voltage will be set to the

    corresponding value: 5V (or 3.3V on 3.3V boards) for HIGH, 0V (ground) for LOW.

    If the pin is configured as an INPUT, writing a HIGH value with digitalWrite() will enable an

    internal 20K pullup resistor (see the tutorial on digital pins). Writing LOW will disable the

    pullup. The pullup resistor is enough to light an LED dimly, so if LEDs appear to work, but very

    dimly, this is a likely cause. The remedy is to set the pin to an output with the pinMode()

    function.

  • 11

    Syntax

    digitalWrite(pin, value)

    Parameters

    pin: the pin number

    value: HIGH or LOW

    Example

    int ledPin = 13; // LED connected to digital pin 13

    void setup()

    {

    pinMode(ledPin, OUTPUT); // sets the digital pin as output

    }

    void loop()

    {

    digitalWrite(ledPin, HIGH); // sets the LED on

    delay(1000); // waits for a second

    digitalWrite(ledPin, LOW); // sets the LED off

    delay(1000); // waits for a second

    }

    Sets pin 13 to HIGH, makes a one-second-long delay, and sets the pin back to LOW.

    digitalRead()

    Description

    Reads the value from a specified digital pin, either HIGH or LOW.

    Syntax

    digitalRead(pin)

  • 12

    Parameters: pin: the number of the digital pin you want to read (int)

    Returns HIGH or LOW

    Analog I/O

    analogReference()

    analogRead()

    analogWrite() - PWM

    Configures the reference voltage used for analog input (i.e. the value used as the top of the input

    range). The options are:

    DEFAULT: the default analog reference of 5 volts (on 5V Arduino boards) or 3.3 volts

    (on 3.3V Arduino boards)

    INTERNAL: an built-in reference, equal to 1.1 volts on the ATmega168 or ATmega328

    and 2.56 volts on the ATmega8 (not available on the Arduino Mega)

    analogRead()

    Description

    Reads the value from the specified analog pin. The Arduino board contains a 6 channel (8

    channels on the Mini and Nano, 16 on the Mega), 10-bit analog to digital converter. This means

    that it will map input voltages between 0 and 5 volts into integer values between 0 and 1023.

    This yields a resolution between readings of: 5 volts / 1024 units or, .0049 volts (4.9 mV) per

    unit. The input range and resolution can be changed using analogReference().

    It takes about 100 microseconds (0.0001 s) to read an analog input, so the maximum reading rate

    is about 10,000 times a second.

    Syntax analogRead(pin)

    Parameters pin: the number of the analog input pin to read from (0 to 5 on most boards, 0 to 7

    on the Mini and Nano, 0 to 15 on the Mega)

    Returns

    int (0 to 1023)

  • 13

    analogWrite()

    Description

    Writes an analog value (PWM wave) to a pin. Can be used to light a LED at varying brightnesses

    or drive a motor at various speeds. After a call to analogWrite(), the pin will generate a steady

    square wave of the specified duty cycle until the next call to analogWrite() (or a call to

    digitalRead() or digitalWrite() on the same pin). The frequency of the PWM signal is

    approximately 490 Hz.

    Syntax analogWrite(pin, value)

    Parameters pin: the pin to write to. value: the duty cycle: between 0 (always off) and 255

    (always on).

    delay()

    Description

    Pauses the program for the amount of time (in miliseconds) specified as parameter. (There are

    1000 milliseconds in a second.)

    Syntax delay(ms)

    Parameters ms: the number of milliseconds to pause (unsigned long)

    Serial communication functions

    Used for communication between the Arduino board and a computer or other devices. All

    Arduino boards have at least one serial port (also known as a UART or USART): Serial. It

    communicates on digital pins 0 (RX) and 1 (TX) as well as with the computer via USB. Thus, if

    you use these functions, you cannot also use pins 0 and 1 for digital input or output.

    You can use the Arduino environment's built-in serial monitor to communicate with an Arduino

    board. Click the serial monitor button in the toolbar and select the same baud rate used in the call

    to begin().

    Serial.available()

    Serial.begin()

    Serial.print()

    Serial. println()

    Serial read()

    Serial.write()

  • 14

    Serial.begin()

    Description

    Sets the data rate in bits per second (baud) for serial data transmission. For communicating with

    the computer, use one of these rates: 300, 1200, 2400, 4800, 9600, 14400, 19200, 28800, 38400,

    57600, or 115200. You can, however, specify other rates - for example, to communicate over

    pins 0 and 1 with a component that requires a particular baud rate.

    Syntax

    Serial.begin(speed)

    Parameters

    speed: in bits per second (baud) - long

    Returns

    nothing

    Serial.available()

    Description

    Get the number of bytes (characters) available for reading from the serial port. This is data that's

    already arrived and stored in the serial receive buffer (which holds 64 bytes).

    Syntax

    Serial.available()

    Parameters

    none

    Returns

    the number of bytes available to read

  • 15

    read()

    Description

    Reads incoming serial data.

    Syntax

    Serial.read()

    Parameters

    None

    Returns

    the first byte of incoming serial data available (or -1 if no data is available) - int

    write()

    Description

    Writes binary data to the serial port. This data is sent as a byte or series of bytes; to send the

    characters representing the digits of a number use the print() function instead.

    Syntax

    Serial.write(val)

    Serial.write(str)

    Serial.write(buf, len)

    Arduino Mega also supports: Serial1, Serial2, Serial3 (in place of Serial)

    Parameters

    val: a value to send as a single byte

    str: a string to send as a series of bytes

    buf: an array to send as a series of bytes

    len: the length of the buffer

  • 16

    Returns

    byte

    write() will return the number of bytes written, though reading that number is optional

    Example

    print()

    Description

    Prints data to the serial port as human-readable ASCII text. This command can take many forms.

    Numbers are printed using an ASCII character for each digit. Floats are similarly printed as

    ASCII digits, defaulting to two decimal places. Bytes are sent as a single character. Characters

    and strings are sent as is. For example:

    Serial.print(78) gives "78"

    Serial.print(1.23456) gives "1.23"

    Serial.print('N') gives "N"

    Serial.print("Hello world.") gives "Hello world."

    An optional second parameter specifies the base (format) to use; permitted values are BIN

    (binary, or base 2), OCT (octal, or base 8), DEC (decimal, or base 10), HEX (hexadecimal, or

    base 16). For floating point numbers, this parameter specifies the number of decimal places to

    use. For example:

    Serial.print(78, BIN) gives "1001110"

    Serial.print(78, OCT) gives "116"

    Serial.print(78, DEC) gives "78"

    Serial.print(78, HEX) gives "4E"

    Serial.println(1.23456, 0) gives "1"

    Serial.println(1.23456, 2) gives "1.23"

    Serial.println(1.23456, 4) gives "1.2346"

    You can pass flash-memory based strings to Serial.print() by wrapping them with F(). For

    example :

    Serial.print(F(Hello World))

    To send a single byte, use Serial.write().

    Syntax

    Serial.print(val)

    Serial.print(val, format)

  • 17

    Parameters

    val: the value to print - any data type

    format: specifies the number base (for integral data types) or number of decimal places (for

    floating point types)

    Returns

    size_t (long): print() returns the number of bytes written, though reading that number is optional

    println()

    Description

    Prints data to the serial port as human-readable ASCII text followed by a carriage return

    character (ASCII 13, or '\r') and a newline character (ASCII 10, or '\n'). This command takes the

    same forms as Serial.print().

    Syntax

    Serial.println(val)

    Serial.println(val, format)

    Parameters

    val: the value to print - any data type

    format: specifies the number base (for integral data types) or number of decimal places (for

    floating point types)

    Returns

    size_t (long): println() returns the number of bytes written, though reading that number is

    optional

    Arduino Libraries

    Arduino support many libraries ,using these we can easily write the programs for any

    applications in arduino.Libraries provide extra functionality for use in sketches, e.g. working

    with hardware or manipulating data. To use a library in a sketch, select it from Sketch > Import

    Library.

    Standard Libraries

    EEPROM- reading and writing to "permanent" storage

  • 18

    Ethernet- for connecting to the internet using the Arduino Ethernet Shield

    Firmata - for communicating with applications on the computer using a standard serial

    protocol.

    LiquidCrystal- for controlling liquid crystal displays (LCDs)

    SD - for reading and writing SD cards

    Servo - for controlling servo motors

    SPI - for communicating with devices using the Serial Peripheral Interface (SPI) Bus

    SoftwareSerial - for serial communication on any digital pins

    Stepper- for controlling stepper motors

    Wire - Two Wire Interface (TWI/I2C) for sending and receiving data over a net of

    devices or sensors.

    In our project we are using SoftwareSerial library for serial communication on any digital pins

    SoftwareSerial Library

    The Arduino hardware has built-in support for serial communication on pins 0 and 1 (which also

    goes to the computer via the USB connection). The native serial support happens via a piece of

    hardware (built into the chip) called a UART. This hardware allows the Atmega chip to receive

    serial communication even while working on other tasks, as long as there room in the 64 byte

    serial buffer.

    The SoftwareSerial library has been developed to allow serial communication on other digital

    pins of the Arduino, using software to replicate the functionality (hence the name

    "SoftwareSerial"). It is possible to have multiple software serial ports with speeds up to 115200

    bps. A parameter enables inverted signaling for devices which require that protocol.

    . SoftwareSerial(rxPin, txPin)

    Description

    A call to SoftwareSerial(rxPin, txPin) creates a new SoftwareSerial object, whose name you need

    to provide as in the example below.

    You need to call SoftwareSerial.begin() to enable communication.

    Parameters

    rxPin: the pin on which to receive serial data

    txPin: the pin on which to transmit serial data

  • 19

    SoftwareSerial: available()

    Description

    Get the number of bytes (characters) available for reading from a software serial port. This is

    data that's already arrived and stored in the serial receive buffer.

    Syntax mySerial.available()

    Parameters none

    Returns

    the number of bytes available to read

    SoftwareSerial: begin(speed)

    Description

    Sets the speed (baud rate) for the serial communication. Supported baud rates are 300, 1200,

    2400, 4800, 9600, 14400, 19200, 28800, 31250, 38400, 57600, and 115200.

    Parameters speed: the baud rate (long)

    Returns none

    SoftwareSerial: read

    Description

    Return a character that was received on the RX pin of the software serial port. Note that only one

    SoftwareSerial instance can receive incoming data at a time (select which one with the listen()

    function).

    Parameters none

    Returns

    the character read, or -1 if none is available

  • 20

    SoftwareSerial: listen()

    Description

    Enables the selected software serial port to listen. Only one software serial port can listen at a

    time; data that arrives for other ports will be discarded. Any data already received is discarded

    during the call to listen() (unless the given instance is already listening).

    Syntax mySerial.listen()

    Parameters mySerial:the name of the instance to listen

    Returns None

    SoftwareSerial: isListening()

    Description

    Tests to see if requested software serial port is actively listening.

    Syntax mySerial.isListening()

  • 21

    Chapter 4

    RFID TECHNOLOGY

    4.1 Definition of RFID technology:

    RFID stands for Radio Frequency Identification. it uses radio waves to automatically

    identify people or objects. RFID is an automated data-capture technology that can be used to

    electronically identify, track, and store information contained on a tag. A radio frequency reader

    scans the tag for data and sends the information to a database, which stores the data contained on

    the tag.

    4.2 Automatic Identification and Data Capture (AIDC) Technology

    Identification processes that rely on AIDC technologies are significantly more reliable

    and less expensive than those that are not automated. The most common AIDC technology is bar

    code technology, which uses optical scanners to read labels. Most people have direct experience

    with bar codes because they have seen cashiers scan items at supermarkets and retail stores. Bar

    codes are an enormous improvement over ordinary text labels because personnel are no longer

    required to read numbers or letters on each label or manually enter data into an IT system; they

    just have to scan the label. The innovation of bar codes greatly improved the speed and accuracy

    of the identification process and facilitated better management of inventory and pricing when

    coupled with information systems.

    RFID represents a technological advancement in AIDC because it offers advantages that are not

    available in other AIDC systems such as bar codes. RFID offers these advantages because it

    relies on radio frequencies to transmit information rather than light, which is required for optical

    AIDC technologies. The use of radio frequencies means that RFID communication can occur:

    Without optical line of sight, because radio waves can penetrate many materials,

  • 22

    At greater speeds, because many tags can be read quickly, whereas optical technology

    often requires time to manually reposition objects to make their bar codes visible, and

    Over greater distances, because many radio technologies can transmit and receive signals

    more effectively than optical technology under most operating conditions

    The ability of RFID technology to communicate without optical line of sight and over greater

    distances than other AIDC technology further reduces the need for human involvement in the

    identification process. For example, several retail firms have pilot RFID programs to determine

    the contents of a shopping cart without removing each item and placing it near a scanner, as is

    typical at most stores today. In this case, the ability to scan a cart without removing its contents

    could speed up the checkout process, thereby decreasing transaction costs for the retailers. This

    application of RFID also has the potential to significantly decrease checkout time for consumers.

    RFID products often support other features that bar codes and other AIDC technologies do not have, such

    as rewritable memory, security features, and environmental sensors that enable the RFID technology to

    record a history of events. The types of events that can be recorded include temperature changes, sudden

    shocks, or high humidity. Today, people typically perceive the label identifying a particular object of

    interest as static, but RFID technology can make this label dynamic or even smart by enabling the label

    to acquire data about the object even when people are not present to handle it.

    4.3 COMPONENTS OF RFID SYSTEM

    Radio frequency identification (RFID) is a technology that allows automatic identification an

    data capture by using radio frequencies. The salient features of this technology are that they

    permit the attachment of a unique identifier and other information using a micro-chip to any

    object, animal or even a person, and to read this information through a wireless device.

    RFIDs are not just "electronic tags" or "electronic barcodes". When linked to databases and

    communications networks, such as the Internet, this technology provides a very powerful way of

    delivering new services and applications, in potentially any environment

  • 23

    The main technology components of an RFID system are a tag, reader, and database. A radio

    frequency reader scans the tag for data and sends the information to a database, which stores the

    data contained on the tag.

    Fig: 4.1 RFID reader

    Fig:4.2 Block diagram of RFID system

  • 24

    4.4 RFID FRQUENCIES:

    RFID tags and readers must be tuned into the same frequency to enable

    communications. RFID systems can use a variety of frequencies to communicate, but because

    radio waves work and act differently at different frequencies, a frequency for a specific RFID

    system is often dependant on its application. High frequency RFID systems (850 MHz to 950

    MHz and 2.4 GHz to 2.5 GHz) offer transmission ranges of more than 90 feet, although

    wavelengths in the 2.4 GHz range are absorbed by water, which includes the human body, and

    therefore has limitations.

    4.5 RFID tag:

    An RFID tag, or transponder, consists of a chip and an antenna .A chip can store a unique

    serial number or other information based on the tags type of memory, which can be read-only,

    read-write, or write-once read-many. The antenna, which is attached to the microchip, transmits

    information from the chip to the reader. Typically, a larger antenna indicates a longer read range.

    The tag is attached to or embedded in and object to be identified, such as a product, case, or

    pallet, and can be scanned by mobile or stationary readers using radio wave

    Fig:4.3 RFID tag diagram

    Fig:4.4 RFID tag

  • 25

    4.6 Classifications of Tags

    Tags are classified into different types based on battery and memory. They are

    Passive tags

    Active tags

    Semi passive tags

    Read only tags

    Read write tags

    Write once read many times tags

    4.6.1 PASSIVE TAGS

    The simplest version of a tag is a passive tag. Passive tags do not contain their own power

    source, such as a battery, nor can they initiate communication with a reader. Instead, the tag

    responds to the readers radio frequency emissions and derives its power from the energy waves

    transmitted by the reader.

    A passive tag contains, at a minimum, a unique identifier for the individual item attached to the

    tag. Depending on the storage capacity of the tag, additional data can be added. Under perfect

    conditions, the tags can be read from a range of about 10 to 20 feet. The cost of passive tags

    ranges from 20 cents to several dollars. Costs vary based on the radio frequency used, amount of

    memory, design of the antenna, and packaging around the transponder, among other tag

    requirements.

    Passive tags can operate at low, high, ultrahigh, or microwave frequency . Examples of passive

    tag applications include mass transit passes, building access badges, and consumer products in

    the supply chain. The development of these inexpensive tags has created a revolution in RFID

    adoption and made wide scale use of them a real possibility for government and industry

    organizations.

  • 26

    4.6.2 ACTIVE TAGS

    Active tags contain a power source and a transmitter, in addition to the antenna and

    chip, and send a continuous signal. These tags typically have read/write capabilitiestag data

    can be rewritten and/or modified. Active tags can initiate communication and communicate over

    longer distancesup to 750 feet, depending on the battery power. The relative expense of these

    tags makes them an option for use only where their high cost can be justified. Active tags are

    more expensive than passive, costing about $20 or more per tag. Examples of active tag

    applications are toll passes, such as E-Z pass, and the in-transit visibility applications on major

    items and consolidated cargo moved by DOD(Defence of Development).

    4.6.3 Technical Characteristics of Active and Passive RFID tags

    Active RFID and Passive RFID are fundamentally different technologies. While both use

    radio frequency energy to communicate between a tag and a reader, the method of powering the

    tags is different. Active RFID uses an internal power source (battery) within the tag to

    continuously power the tag and its RF communication circuitry, whereas Passive RFID relies on

    RF energy transferred from the reader to the tag to power the tag.

    Passive RFID either 1) reflects energy from the reader or 2) absorbs and temporarily stores a

    very small amount of energy from the readers signal to generate its own quick response. In

    either case, Passive RFID operation requires very strong signals from the reader, and the signal

    strength returned from the tag is constrained to very low levels by the limited energy. On the

    other hand, Active RFID allows very low-level signals to be received by the tag (because the

    reader does not need to power the tag), and the tag can generate high-level signals back to the

    reader, driven from its internal power source. Additionally, the Active RFID tag is continuously

    powered, whether in the reader field or not.

  • 27

    Table:4.1

  • 28

    4.6.4 Functional Capabilities of Active and Passive RFIDTAGS

    The functional capabilities of Active and Passive RFID are very different and must be considered

    when selecting a technology for a specific application.

    Communication Range

    For Passive RFID, the communication range is limited by two factors:

    1) the need for very strong signals to be received by the tag to power the tag, limiting the reader to

    tag range,

    2) the small amount of power available for a tag to respond to the reader, limiting the tag to reader

    range.

    These factors typically constrain Passive RFID operation to 3 meters or less. Depending on the vendor

    and frequency of operation, the range may be as short as a few centimetres.

    Active RFID has neither constraint on power and can provide communication ranges of 100 meters or

    more.

    Multi-Tag Collection:

    As a direct result of the limited communication range of Passive RFID, collecting multiple

    collocated tags within a dynamic operation is difficult and often unreliable. Identifying multiple

    tags requires a substantial amount of communication between the reader and tags, typically a

    multi-step process with the reader communicating individually with each tag. Each interaction

    takes time, and the potential for interference increases with the number of tags, further increasing

    the overall duration of the operation. Because the entire collection operation must be completed

    while the tags are still within the range of the reader, Passive RFID is constrained in this aspect.

    For example, one popular Passive RFID systems available today requires more than 3 seconds to

    identify 20 tags. With a communication range of 3 meters, this limits the speed of the tagged

    items to less than 3 miles per hour. Active RFID, with operating ranges of 100 meters or more, is

    able to collect thousands of tags from a single reader. Additionally, tags can be in motion at more

    than 100 mph and still be accurately and reliably collected

  • 29

    Sensor Capabilities

    One functional area of great relevance to many supply chain applications is the ability to

    monitor environmental or status parameters using an RFID tag with built-in sensor capabilities.

    Parameters of interest may include temperature, humidity, and shock, as well as security and

    tamper detection. Because Passive RFID tags are only powered while in close proximity to a

    reader, these tags are unable to continuously monitor the status of a sensor. Instead, they are

    limited to reporting the current status when they reach a reader.

    Active RFID tags are constantly powered, whether in range of a reader or not, and are therefore

    able to continuously monitor and record sensor status, particularly valuable in measuring

    temperature limits and container seal status. Additionally, Active RFID tags can power an

    internal real-time clock and apply an accurate time/date stamp to each recorded sensor value or

    event.

    Data Storage

    Both Active and Passive RFID technologies are available that can dynamically store data

    within the tag. However, because of power limitations, Passive RFID typically only provides a

    small amount of read/write data storage, on the order of 128 bytes (1000 bits) or less, with no

    search capability or other data manipulation features. Larger data storage and sophisticated

    data access capabilities require the tag to be powered for longer periods of time and are

    impractical with Passive RFID. Active RFID has the flexibility to remain powered for access and

    search of larger data spaces, as well as the ability to transmit longer data packets for simplified

    data retrieval. Active RFID tags are in common use with 128K bytes (1 million bits) of

    dynamically searchable read/write data storage.

  • 30

    4.6.5 SEMI PASSIVE TAGS:

    Semipassive tags also do not initiate communication with the reader but contain batteries

    that allow the tag to perform other functions, such as monitoring environmental conditions and

    powering the tags internal electronics. These tags do not actively transmit a signal to the reader.

    Some semi passive tags remain dormant (which conserves battery life) until they receive a signal

    from the reader. The battery is also used to facilitate information storage. Semi passive tags can

    be connected to sensors to store information for container security devices. Tags have various

    types of memory, including read-only, read-write, and write-once read-many.

    4.6.6 READ ONLY TAGS:

    Read-only tags have minimal storage capacity (typically less than 64 bits) and contain

    permanently programmed data that cannot be altered. These tags primarily contain item identification

    information and have been used in libraries and video rental stores. Passive tags are typically read-only.

    4.6.7 READ WRITE TAGS:

    In addition to storing data, read-write tags can allow the data to be updated when

    necessary. Consequently, they have larger memory capacity and are more expensive than read-

    only tags. These tags are typically used where data may need to be altered throughout a products

    life cycle, such as in manufacturing or in supply chain management.

    4.6.8 WRITE ONCE READ MANYTIMES TAGS:

    A write-once, read-many tag allows information to be stored once, but does not allow

    subsequent alterations to the data. This tag provides the security features of a read-only tag while

    adding the additional functionality of read/write tags. In order for an RFID system to function, it

    needs a reader, or scanning device, that is capable of reliably reading the tags and

    communicating the results to a database

  • 31

    4.7 THE READER:

    A reader uses its own antenna to communicate with the tag. When a reader broadcasts

    radio waves, all tags designated to respond to that frequency and within range will respond. A

    reader also has the capability to communicate with the tag without a direct line of sight,

    depending on the radio frequency and the type of tag (active, passive, or semi passive) used.

    Readers can process multiple items at once, allowing for increased read processing times. They

    can be mobile, such as handheld devices that scan objects like pallets and cases, or stationary,

    such as point-of-sale devices used in supermarkets. Readers are differentiated by their storage

    capacity, processing capability, and the frequencies they can read.

    4.8 DATABASE:

    The database is a back-end logistic information system that tracks and contains

    information about the tagged item. Information stored in the database can include item identifier,

    description, manufacturer, movement of the item, and location. The type of information housed

    in the database will vary by application. For instance, the data stored for a toll payment system

    will be different than the data stored for a supply chain. Databases can also be linked into other

    networks, such as the local area network, which can connect the database to the Internet. This

    connectivity can allow for data sharing beyond the local database from which the information

    was originally collected

    4.9 Radio Frequencies for RFID systems:

    Choice of radio frequency is a key operating characteristic of RFID systems. The

    frequency largely determines the speed of communication and the distance from which the tag

    can be read. Generally, higher frequencies indicate a longer read range. Certain applications are

    more suitable for one type of frequency than other types, because radio waves behave differently

    at each of the frequencies. For instance, low-frequency waves can penetrate walls better than

    higher frequencies, but higher frequencies have faster data rates.In the United States, the Federal

    Communications Commission (FCC) administers the allocation of frequency bands for

  • 32

    commercial use and the National Telecommunications and Information Administration (NTIA)

    manages the federal spectrum.

    RFID systems use an unlicensed frequency range, classified as industrial scientific-medical or

    short-range devices, which is authorized by the FCC.Devices operating in this unlicensed

    bandwidth may not cause harmful interference and must accept any interference received. The

    FCC also regulates the specific power limit associated with each frequency. The combination of

    frequency and allowable power levels determine the functional range of a particular application,

    such as the power output of readers.

    There are four main frequencies used for RFID systems:

    low frequency,

    high frequency,

    ultrahigh frequency,

    microwave frequency

    Low-frequency

    Low-frequency bands range from 125 kilohertz (KHz) to 134 KHz. This band is most

    suitable for short-range use such as antitheft systems, animal identification, and automobile key-

    and-lock systems.

    High-frequency

    High-frequency bands operate at 13.56 megahertz (MHz). High frequency allows for

    greater accuracy within a 3-foot range, and thus, reduces the risk of incorrectly reading a tag.

    Consequently, it is more suitable for item-level reading. Passive 13.56 MHz tags can be read at a

    rate of 10 to 100 tags per second and at a range of 3 feet or less. High-frequency RFID tags are

    used for material tracking in libraries and bookstores, pallet tracking, building access control,

    airline baggage tracking, and apparel item tracking.

  • 33

    Ultrahigh-frequency

    Ultrahigh-frequency tags operate around 900 MHz and can be read at longer distances

    than high-frequency tags, ranging from 3 to 15 feet. These tags, however, are more sensitive to

    environmental factors than tags that operate in other frequencies. The 900 MHz band is emerging

    as the preferred band for supply-chain applications due to its read rate and range.

    Passive ultrahigh-frequency tags can be read at about 100 to 1,000 tags per second, with efforts

    under way to increase this read rate. These tags are commonly used in pallet and container

    tracking, truck and trailer tracking in shipping yards, and have been adopted by major retailers

    and DOD.

    Microwave frequencies

    Tags operating in the microwave frequencies, typically 2.45 and 5.8 gigahertz (GHz),

    experience more reflected radio waves from nearby objects, which can impede the readers

    ability to communicate with the tag. Microwave RFID tags are typically used for supply chain

    management.

    Within the federal government, the major initiatives at agencies that use or propose to use the

    technology include physical and logical access control and tracking various objects such as

    shipments, baggage on flights, documents, radioactive materials, evidence, weapons, and assets

    .Several agencies have initiated pilot programs to evaluate the use of RFID in specific

    applications. Of the 24 CFO Act agencies, 13 reported having implemented or having a specific

    plan to implement the technology in one or more applications

    4.10 Tag-Reader Communication:

    Tag-reader communication is achieved by using a common communications protocol

    between the tag and the reader. Tag-reader communication protocols are often specified in RFID

    standards. Prominent international standards include the ISO/IEC 18000 series for item

    management and the ISO/IEC 14443 and ISO/IEC 1569standards for contactless smart cards.

    The most recent EPC global Class-1 Generation-2 standard is essentially equivalent to the

    ISO/IEC 18000-6C standard.

  • 34

    Communication Initiation

    Tags and readers can initiate RF transactions in two general ways:

    Reader Talks First (RTF). In an RTF transaction, the reader broadcasts a signal that is

    received by tags in the readers vicinity. Those tags may then be commanded to respond

    to the reader and to continue transactions with the reader.

    Tag Talks First (TTF). In a TTF transaction, a tag communicates its presence to a

    reader when the tag is within the readers RF field. If the tag is passive, then it transmits

    as soon as it gets power from the readers signal to do so. If the tag is active, then it

    transmits periodically as long as its power supply lasts. This type of transaction might be

    used when it is necessary to identify objects that pass by a reader, such as objects on a

    conveyer belt.

    Readers and tags in an RFID system typically operate using only RTF or only TTF transactions,

    not both types. Active tag TTF operation may be easier for an adversary to detect or intercept,

    because active tags send beaconing signals even when they are not in the presence of a reader.

    The adversary could eavesdrop on this communication without risking detection because in TTF

    transactions the adversary never has to send a signal to ascertain the tags presence.

    4.11 Multiple Sets of Standards Guide RFID Technology:

    RFID standards define a set of rules, conditions, or requirements that the components of a

    system (tag, reader, and database) must meet in order to operate effectively and that are needed

    to cover the air-interface operational requirements, ensure that tags meet intended designs

    provide adequate protection of data for both security and privacy issues, and define coding

    information contained on the tags. Currently, multiple sets of standards guide the use of RFID

    technology. Additionally, multiple standards-setting organizations have developed standards that

    support these needs. These standards can vary based on the type of activity the application is

    used for and the industry or country in which it is used

  • 35

    4.12 Multiple Organizations Develop RFID Standards:

    Multiple organizations, including international, national, private-sector, and industry

    organizations, are involved in the development of RFID standards

    International standards-setting organizations generally develop standards through a process that

    is open to participation by representatives of all interested countries, transparent, consensus-

    based, and subject to due process. ISO and IEC are actively involved in developing RFID

    standards for international use. ISO is an international association of countries, each of which is

    represented by its leading standards-setting organization. The scope of ISO is broad and includes

    all fields except electrical and electronic standards, which are the responsibility of IEC. ISO and

    IEC have jointly created several RFID standards.

    National standards-setting organizations facilitate the development of national standards for use

    within their country. For example, the American National Standards Institute (ANSI) represents

    the United States to ISO and facilitates the development of U.S. standards. ANSI, as well as

    other national standards organizations, is involved in the development of RFID standards. For

    example, the Standardization Administration of China has established a National RFID

    Standards Working Group to draft and develop a national standard.

    Private-sector organizations involved in the development of RFID standards can represent a

    single industry or multiple industries. For example, the Automotive Industry Action Group,

    Universal Postal Union, and International Air Transport Association have developed RFID

    standards for their respective industries. Private-sector organizations that represent multiple

    industries can develop a standard for a specific application. For example, EPC global

    Incorporated, which partners with various industry groups, has developed a series of

    specifications that DOD(Defence of Development) and various private-sector users are

    implementing in their supply chains.

  • 36

    4.13 Applications of RFID technology

    The standards-setting organizations have developed separate sets of standards governing

    RFID systems for specific applications. The standards used often depend on the type of activity

    the application is used for and the industry or country in which it is used. Requirements of

    applications often differ, and a single, common set of standards may not meet the needs of all

    applications

    RFID applications such as supply chain, animal tracking, and access control use separate

    standards because the needs of these applications differ. The frequency used affects the

    performance of tags in certain environments. For example, an animal tracking application will

    likely use a standard that specifies the use of the low-frequency range because this range

    performs well in environments that require reading through materials such as water and body

    tissue. An access control application that requires a read range of approximately 3 inches and the

    ability to read multiple tags simultaneously would likely use a standard that specifies the use of

    the high-frequency range. A supply chain application may likely use a standard that specifies the

    use of the ultra high frequency range because this range provides a read range of up to 15 feet

    and a read rate of 100 to 1,000 tags per second.

    Industries such as the automotive, postal, and aviation, use standards for industry-specific

    applications. They may use standards developed by industry standards-setting organizations or

    standards developed by other standards-setting organizations, such as ISO, IEC, and EPC global.

    For example, the aviation industry uses a standard created by an industry organization for

    identifying airplane parts by means of bar code and RFID technologies. This standard requires

    the use of an ISO standard for tracking parts.

    There are also applications that only operate in a specific country. These applications, such as

    national identification cards, may be governed by national standards used only within that

    country.

  • 37

    RFID systems can be used just about anywhere, from clothing tags to missiles to pet tags to food

    - anywhere that a unique identification system is needed. The tag can carry information as simple

    as a pet owners name and address or the cleaning instruction on a sweater to as complex as

    instructions on how to assemble a car.

    Here are a few examples of how RFID technology is being used in everyday places:

    RFID systems are being used in some hospitals to track a patient's location, and to provide real-

    time tracking of the location of doctors and nurses in the hospital. In addition, the system can be

    used to track the whereabouts of expensive and critical equipment, and even to control access to

    drugs, pediatrics, and other areas of the hospital that are considered "restricted access" areas.

    RFID chips for animals are extremely small devices injected via syringe under skin. Under a

    government initiative to control rabies, all Portuguese dogs must be RFID tagged by 2007. When

    scanned the tag can provide information relevant to the dog's history and its owner's

    information.

    RFID in retail stores offer real-time inventory tracking that allows companies to monitor and

    control inventory supply at all times.

    The Orlando /Orange County Expressway Authority (OOCEA) is using an RFID based traffic-

    monitoring system, which uses roadside RFID readers to collect signals from transponders that

    are installed in about 1 million E-Pass and SunPass customer vehicles.

    The most common applications are asset management, asset tracking, automated payment.

    Asset Management

    RFID-based asset management systems are used to manage inventory of any item that can be

    tagged.

  • 38

    RFID Technology Commonly used in

    Store

    Figure 4.5 Application diagram of RFID tags in store

    warehouse

    Library

    Tracking: Used to keep track of the location of an item by recording the location of the last

    interrogator that detected the presence of the tag associated with the item.

    Examples:

    Material tracking in production line

    Animal tracking in Farm

    Figure 4.6 Material tracking in production line using RFID tags

  • 39

    Matching

    Two tagged items are matched with each other and a signal (e.g., a light or tone) is

    triggered if one of the items is later matched with an incorrect tagged item.

    Automated Payment

    RFID technology automates a variety of financial transactions, including fare collection

    on public transit systems (MRT), toll collection on roads, and retail payment using credit cards

    with embedded RFID tags

    Figure 4.7 automated payment RFID card

    Fig4.8 Automatic gate at check post using RFID technology

  • 40

    4.14 Conclusion:

    RFID (Radio Frequency Identification) is a Automated Data-capture

    Technology. It has several advantages compare to the barcode system , such as there is no need

    of line of sight propagation between tag and reader, accessing the data faster than barcode

    system, RFID tag can be automatically scanned by the reader without human intervention .In my

    project i have used RFID Technology at the check post, that is Active RFID tag at the vehicle

    and RFID reader at the check post. Active RFID tag contains vehicle identification code,

    whenever vehicle comes nearer to check-post, reader read the vehicle identification code from

    tag and this code is given to the system and it collects all information about the vehicle from data

    base management system (server) based on identification code.

  • 41

    Chapter 5

    ZIGBEE

    5.1 INTRODUCTION:

    Xbee is the module using Zigbee protocol. Zigbee is a wireless

    communication protocol like wifi and Bluetooth .ZigBee is a low-cost, low-power, wireless

    mesh networking proprietary standard. The low cost allows the technology to be widely

    deployed in wireless control and monitoring applications, the low power-usage allows longer life

    with smaller batteries, and the mesh networking provides high reliability and larger range.XBEE

    operating frequency is 2.4Ghz.

    Xbee can be used for wireless communication with low power consumption. A 3.6V 600mA

    Lithium battery may last 6 - 12 months for powering up an Xbee while the wireless range can up

    to 1 mile. It talks with well known UART interface and makes it easy to use. It is simple and

    straight forward if you only use 2 Xbee for communication. People use this for their own

    electronics projects for wireless communication.

    ZigBee defines a network layer above the 802.15.4 layers to support advanced mesh routing

    capabilities.802.15.4 is a standard for wireless communication put out by the IEEE (Institute for

    Electrical and Electronics Engineers).If the application strictly needs to communicate in a point-

    to-point or a point-to-multipoint fashion, 802.15.4 will be able handle all the communications

    between your devices and will be simpler to implement than trying to use a module with ZigBee

    firmware to accomplish the same goal. ZigBee is necessary if you need to use repeating or the

    mesh networking functionality.

    Fig: 5.1 pin diagram

  • 42

    Table:5.1 Pin description

    5.2 Networking Concepts

    ZigBee defines three different device types: coordinator, router, and end devices.

    A coordinator has the following characteristics: it

    Selects a channel and PAN ID (both 64-bit and 16-bit) to start the network

    Can allow routers and end devices to join the network

    Can assist in routing data

    Cannot sleep--should be mains powered.

    A router has the following characteristics: it

    Must join a ZigBee PAN before it can transmit, receive, or route data

    After joining, can allow routers and end devices to join the network

    After joining, can assist in routing data

    Cannot sleep--should be mains powered.

    A end device has the following characteristics: it

    Must join a ZigBee PAN before it can transmit or receive data

    Cannot allow devices to join the network