RFID - a basic introduction

Size: px
Start display at page:

Download "RFID - a basic introduction"

Transcription

1 RFID - a basic introduction Sophie Bruce Supervisor: Jerzy Dabrowski May 10, 2016

2 Contents 1 Introduction 1 2 What is RFID? Transponders Physical principles of RFID systems Passive RFID Tags Active RFID Tags Read-Only vs. Read/Write or Smart Tags Readers Anticollision and data integrity Parity Checking XOR checksum CRC Privacy 7 5 Conclusion 8 Sources

3 1 Introduction As many are aware of, RFID (radio frequency identification) is a technique used to read information from a distance. It is a technique that contactless transfers data between the data-carrying device and its reader which makes it very flexible. (Finkenzeller, 2007) The basic principle is that a signal is sent to a transponder, which then either reflect the signal back (passive system) or broadcasts it (active system) (RFID Journal, 2016). Barcodes are widely used, almost everything has some sort of barcode printed on it to help manufacturers and retailers keep track on and identify the product. They can be seen as the products fingerprint, since its creation in the 1970s (How Stuff Works, Tech 2016). It has some disadvantages that could explain why the RFID-technology is becoming increasingly popular. For starters, barcodes can only be read and can therefore not send out any information. Also it needs to be read in a direct line of sight by an optical scanner and it can only hold a limited amount of data. Whereas RFID can efficiently store data and can carry information by radio waves. THe RFID technique is also becoming less and less expensive to implement. The history of RFID dates back to the Second World War when radar technology first was used to identify enemy and friendly aircrafts, IFF (identify friend or foe) by putting a transmitter on each British plane. (RFID Journal, 2016) Nowadays RFID are used in many applications and industries such as pet identification, road tolls, transportation and assembly lines. 1

4 2 What is RFID? As mentioned in the introduction, RFID is using radio waves to transfer data information. Data is stored on the transponder (tag), which is located on the object that is being read. The device that is identifying the transponder, the reader (interrogator), can come in different versions depending on if it can only read or also read/write information. These two, the transponder and the reader, are the main components of every RFID system. (Finkenzeller, 2007) In addition there is also the controller, which usually takes the form as a computer with a software that runs a database. When the transponder enters the zone of a reader, the reader signals the transponder to transmit its stored data. When the reader is in possession of the data, it is sent to the controller through a standard network interface such as a LAN-cable or through the internet. (Hunt, Pugalia and Pugalia, 2007) The transponder only operates when it is supplied with power. There are two types of transponders, active and passive. An active transponder contain an on-board power source, i.e. a battery whereas a passive transponder have no power source if its own, instead it uses the signal sent by the reader to derive power, usually through load modulation (Paret 2005). When talking about the reader-transponder relationship Paret (2005) defines the uplink as the data transfer from the reader to the transponder and the downlink as the data transfer from the transponder to the reader. Frequencies used in the RFID vary from 30 KHz to 3 GHz and applications are usually divided into three bands. LF RFID (low frequency) is usually in the band ranging from 30 KHz to 300 KHz. HF RFID (high frequency) is the name for applications using the band ranging from 3 to 30 MHZ. The third group is called UHF RFID (ultra-high frequency) and covers the range from 300 MHz to 3 GHz. There are ISO-standards that specify in which frequency range certain RFID applications operates.(impinj, 2016) 2.1 Transponders Shortly explained a transponder is something that emits an identifying signal once it has received an interrogating signal. In RFID technique one differs between active and passive transponders. But they both have similar physical functionality Physical principles of RFID systems This energy transfer system is caused when the readers antenna is producing an alternating electric field, H(t), due to an alternating current I(t), see equation (1), where H is expressed in amperes per meter (A/m). Where N is the number of turns the readers coil (antenna) have per meter while carrying the current I. (Paret, 2005) In the medium where the magnetic field travels there is a corresponding induction B(t) created, see equation (2). The induction is expressed in teslas (T ) and µ is the permeability of the medium the waves travels through. Since RFID tags are used at different distances, depending what kind of tag it is, it is useful to examine the variations of magnetic induction as a function of the distance between the reader and the transponder. (Paret, 2005) From equation (3), and by holding r, the radie of the readers antenna, constant one can derive the variation of B(d). Similarly one can solve for the optimal value of r, which is useful for a system that is 2

5 operating at a fixed distance. (Paret, 2005) H = NI (1) B(t) = µh(t) (2) r 2 B(d, r) = µ NI (3) 2(r 2 + d 2 ) 3/2 ) If the d is set to be d = ar then the magnetic field strength or magnetic induction takes the general form in equation (4). (Hunt, Pugalia and Pugalia, 2007) 1 B(a, r) = µ (r 2 + a 2 ) 3/2 ) Depending on if the distance, d, between the base station antenna and the transponder compared with the radius, r, of the antenna, the transponder is either in the very near field (d << r, or a << 1), near field (d > r or a > 1) or far field (d >>> r, or a >>> 1) of the transmitting antenna.(hunt, Pugalia and Pugalia, 2007) Passive RFID Tags As mentioned in the beginning of this section, the transponder is only activated when it is within the interrogation zone of a reader. The power that is needed to activate the tag is derived through the transponder antenna from the magnetic or electromagnetic field the reader provides. (Finkenzeller, 2007) In passive transponders, the variation of the magnetic flux causes an induced potential difference, u(t), to appear. It is from this voltage that the transponders derive its power supply through a data carrier. In order for this to happen the tag needs to be tuned to the carrier frequency. The amount of energy transfer depends on how well the frequencies of the two antennas (reader and transponder) are tuned.(hunt, Pugalia and Pugalia, 2007) When out of range from the reader, the transponder does not have any power supply and can therefore not send out or receive any signals. A passive transponder normally consists of a transponder coil, chip and some sort of housing. The housing can consists of glass (for situations when it will be injected under the skin, i.e pet identification), plastic or the most common one, the disk (coin).(finkenzeller, 2007) Figure 1 shows the components of a glass transponder. The coil functions as the antenna, the chip capacitor is the circuit used for storing a charge temporarily. The cip is a microprocessor used to incorporate functions from a central processing unit (CPU) on a single semiconducting integrated circuit (IC), everything is put onto the printed circuit board (PCB). (RFID Journal, 2016) Active RFID Tags Active RFID tags has the same components as passive ones but with an additional power source, usually some sort of battery but it can also be captured from photovoltaic cells or other sources. (RFID Journal, 2016) NI 2r (4) 3

6 Figure 1: Layout of a glass transponder (Finkenzeller, 2007) Since an active transponder has this source of power it has a longer read range than most passive tags. This is because they do not need to modulate the received signal in order to receive power, that means that the transponder is capable to detect a much weaker reader signal. It does however need the reader signal in order to transmit data between the reader and transponder. It can not generate a high-frequency signal of it own, therfore these kind of transponders are also sometimes called semi-active transponders. (Finkenzeller, 2007) Some active transponders has the same functionality as a classic radio with an active transmitter (TX) and sometimes a high-quality receiver (RX).They are sometimes considered to be short-range radio devices (SRD), since they can emit high-frequency electromagnetic fields, see figure 2. Figure 2: Comparison between passive and active transponders (Finkenzeller, 2007) Read-Only vs. Read/Write or Smart Tags Read-only tags have permanently encoded data set, usually in the form of a serial number. When it is in a reader field it starts to continuously broadcast this number. The flow is only one way, wich means that the reador cannot access the transponder, it can only receive the information. It is important to make sure that there is only one transponder in 4

7 the readers interrogation zone. Otherwise continuously transmit from the transponders creates a data collision and the reader cannot distinct one transponder from another. (Finkenzeller, 2007) Read-only tags are much used as a substitute for barcodes in identification of pets, products, containers or in other measures where very small amounts of data is needed. Read/Write-tags are of wide diversity of different memory sizes. These usually have some sort of anticollision features that ensures that the reader can differentiate between transponders. Many of them also have cyptological procedures between the transponder and reader and data stream encryption. (Finkenzeller, 2007) 2.2 Readers The reader (also called base station) usually consists of a microcontrolled part, an analouge part and an antenna. The analouge part have some sort of bit coding, carrier modulation and a power stage to ensure transmission. To ensure reception it needs reception of the transponders load modulation of the transmitted signal. It also needs to be able to process the signal through amplification, filtering, demodulation and validation of the bits. (Paret, 2005) The microcontrolled part ensures anticollision, manages the encryption algorithm, display information on a LCD screen or ensures connection to the host if needed. (Paret, 2005) As maybe understood, readers can look very different depending on the application. It is therefore hard to state a standard circuit or description. In short words explained by Paret (2005), in order to use the information sent by the transponder it is neccessary to: amplify and filter the signal demodulate it detect it validate the value of the bit (parity checking, see section 3). 3 Anticollision and data integrity Every communication channel is limited by its capacity determined by the maximum data rate and the time span of its availability. In order for several transponders to transmit to a single reader without collision the channel have to be divided between the number of senders. A technical procedure that handles multi-access without any interferences is called an anticollision system. Competition between manufactures has lead to publications of what kind of anticollision procedures that are being used are rare. (Finkenzeller, 2007) In order to clarify how a multi-acess procedure can work, the ALOHA procedure will be shortly explained. It is a simple procudere developed in the 1970s and is exclusively used with read-only transponders that generally send out small data packages with long pauses between transmissions. The variable G in equation (5), is the averaged offered load i.e. the number of transponders transmitting simultaneously. T is the observation period and τ is the transmission duration of a data packet and r is the number of packets that are transmitted by transponder n during the observation period.the throughout S of a transmission is calculated with equation (6) and the probability that a packet can be transmitted without collision is calculated with equation (7). If equation (6) is derived 5

8 and set to zero, the maximum will occur at G = 0, 5 which results in S being equal to 18, 4 %. Hence, only 20 % of the channel is used, but more load would quickly lead to collision between transponders. (Finkenzeller, 2007) G = n i=1 τ n T r n (5) S = Ge 2G (6) q = S G = e 2G (7) In order to be able to identify transmission errors or other interferences, checksum is used to detect these errors. The most common checksum procedures are parity checks, XOR sum and CRC. 3.1 Parity Checking A parity bit is a bit that is added at the end of a string, so that nine bits are sent for every byte. There are two parity types, even parity bit and odd parity bit, which makes the each byte have either an odd number or an even number. Both the sender and the reader needs to be configurated with the same parity sense, i.e. need to know whether party is to be odd or even. If the parity bit is even, the bits with value one is counted for the given set of bits making the whole set an even number. If the parity bit is odd, it is set to one if the set has an even amount of one s. It is set to zero if the set already have an odd number odd one s. (Finkenzeller, 2007) The transmitter sends the data and at the same time count the data. If two devices communicate with even parity, the transmitter set the parity bit in each byte so that the set is even. The reader then checks so that it has an even number of set bits. If it finds an odd set it knows where there has been an error in the transmission. (Webopedia, 2016) The method is a simple form of error detecting code and therefore popular. However, it has some drawbacks. If for example an even number of bits is changed due to electrical noise it goes undetected (Webopedia, 2016). Similarly, an odd number of inverted bits will always be detected, but for an even number (2, 4, 6,..) the errors cancel each other out and the parity bit will appear to be correct (Finkenzeller, 2007). 3.2 XOR checksum This method is also known as the longitudinal redudancy check, LCR. It is primarily used for fast checking of small data blocks. It functions similar to parity checking in the sense that if you XOR the bits together it is possible to tell if a bit string has an even or odd parity. The reader then perform the same checksum procedure to see if it matches the sent checksum. Problems occur if multiple errors cancel each other out, the check cannot detect if bytes have been transposed within a data block. (Finkenzeller, 2007) 3.3 CRC The CRC procedure is reliable even for large data quantities. The name, cyclic redundancy check, suggest the procedure is a cyclical one. It uses polynomial division, where 6

9 the remainder of this division is set to the CRC value. The receiver then calculates the CRC value of the received data including the received CRC byte. The result is always zero unless there is an transmission error involved. It is well suited for error recognition in data transfer via wireless interfaces such as RFID. If even one bit is incorrect the CRC value will not match up. (Finkenzeller, 2007) 4 Privacy Attacks on RFID systems can be done by attacks on the transponder or the RF interface. Common measures of attacking the transponder is through exposure to a strong field which thermally destroys the transponder since the waste heat created at the shunt regulator cannot be transported away enough. More direct measures of destroying the transponder is to simply smash the antenna or any other part of the device. A slightly more sophisticated method is transponder shielding/tuning which blocks out the transponder from the reader s magnetic or electromagnetic radiation. A simple method is to wrap aluminum foil around the transponder. The third and most sophisticated method mentioned here is to use spoofing or cloning of transponders. For this a clone of a read-only transponder is built but the PROM is replaced with an EPROM (multi-programmable memory). A reader is then needed in order to get hold of the transponders serial number before putting it in the transponder clone. After that the cloned transponder can send out teh serial number and the reader cannot determine if the signal is sent by the original transponder or the cloned one. Attacks on the RF interface is more common due to fact it does not require access to a reader or a transponder and can therefore be done from a distance. Common measures is eavesdropping via interception or jamming through interruption of the communication between the reader and the transponder by a interference signal. (Finkenzeller, 2007) For security, RFID signals can be encrypted and RFID applications that are easy to physically access should avoid using read-only transponders. 7

10 5 Conclusion The field of RFID-technique is far more complicated than this basic rapport has presented. The technique is evolving together with new components, algorithms and transmission methods. The future for the RFID technology looks bright and it is increasingly used in a variety of different industries and products due to its more and more cost effective implementation. Because of this increasing use it is also facing more privacy issues. The tracking functions RFID offers could be misused. But as long as personal and data integrity can be protected the usage of RFID applications will probably increase even more in future. 8

11 References Printed sources: Finkenzeller, K. (2010). RFID Handbook Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication. West Sussex: John Wiley and Sons Ltd. Paret, D. (2005). RFID and Contactless Smart Card Applications. West Sussex: John Wiley and Sons Ltd. Hunt, V.D., Pugalia, A and Pugalia, M. (2007). RFID: A Guide to Radio Frequency Identification. West Sussex: John Wiley and Sons Ltd. Electronic sources: RFID Journal (2016). The History of RFID Technology. [ ] Impinj (2016). The different types of RFID systems. [ ] How Stuff Works, Tech (2016). How RFID Works. tech-gadgets/rfid1.htm [ ] RFID Journal (2016). Glossary of RFID terms. [ ] Webopedia (2016). Parity checking. http : // ERM/P/parity checking.html [ ]

Preface to the Third Edition. List of Abbreviations

Preface to the Third Edition. List of Abbreviations Contents Preface to the Third Edition List of Abbreviations 1 Introduction 1 1.1 Automatic Identification Systems 2 1.1.1 Barcode Systems 2 1.1.2 Optical Character Recognition 3 1.1.3 Biometric Procedures

More information

RFID HANDBOOK THIRD EDITION

RFID HANDBOOK THIRD EDITION RFID HANDBOOK THIRD EDITION RFID HANDBOOK FUNDAMENTALS AND APPLICATIONS IN CONTACTLESS SMART CARDS, RADIO FREQUENCY IDENTIFICATION AND NEAR-FIELD COMMUNICATION, THIRD EDITION Klaus Finkenzeller Giesecke

More information

Contents and Preface of the RFID-Handbook

Contents and Preface of the RFID-Handbook Contents and Preface of the RFID-Handbook RFID-Handbook, Wiley & Sons LTD 1999 Radio-Frequency Identification: Fundamentals and Applications Klaus Finkenzeller, Munich, Germany ISBN 0-471-98851-0 Contents

More information

Technical Explanation for RFID Systems

Technical Explanation for RFID Systems Technical Explanation for RFID Systems CSM_RFID_TG_E_2_1 Introduction Sensors What Is an ID System? Switches ID (Identification) usually refers to unique identification of people and objects. RFID, like

More information

Speed regulation vehicles using RFID

Speed regulation vehicles using RFID Speed regulation vehicles using RFID Chandrashekar.P Electronics and communication engineering SDIT-Mangalore Karnataka-India Cschandran44@gmail.com Praveen kumar.m Electronics and communication engineering

More information

Definition of RF-ID. Lecture on RF-IDs

Definition of RF-ID. Lecture on RF-IDs Definition of RF-ID RF-ID: Radio Frequency Identification. Indicates the use of Electromagnetic waves to detect and identify TAGS (i.e. labels) purposely attached to objects Basic components (2) Interrogator

More information

DATE: 17/08/2006 Issue No 2 e-plate Operation Overview

DATE: 17/08/2006 Issue No 2 e-plate Operation Overview Page 1 of 7 Fundamentals Introduction e-pate technology is the next generation of long range RFID (Radio Frequency IDentification). The objective is wireless and automated data collection of vehicles and

More information

RFID/NFC TECHNOLOGY. With emphasis on physical layer. Ali Zaher Oslo

RFID/NFC TECHNOLOGY. With emphasis on physical layer. Ali Zaher Oslo RFID/NFC TECHNOLOGY With emphasis on physical layer Ali Zaher Oslo 28.09.2012 CONTENTS List of abbreviations. RFID Definition. RFID Coupling. NFC. RFID Physical Model. NFC Physical Model. My work. 2 LIST

More information

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification MOBILE COMPUTING CSE 40814/60814 Spring 2017 What is RFID? Radio Frequency IDentification Who Are You? I am Product X RFID ADC (automated data collection) technology that uses radio-frequency waves to

More information

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Radio Frequency IDentification Frequency Distance LF 125khz Few cm HF 13.56Mhz 1m Example Application Auto- Immobilizer

More information

Physics of RFID. Pawel Waszczur McMaster RFID Applications Lab McMaster University

Physics of RFID. Pawel Waszczur McMaster RFID Applications Lab McMaster University 1 Physics of RFID Pawel Waszczur McMaster RFID Applications Lab McMaster University 2 Agenda Radio Waves Active vs. Passive Near field vs. Far field Behavior of UHF fields Modulation & Signal Coding 3

More information

RFID. Contents and form. Petr Bureš, Faculty of transportation sciences Czech technical university in Prague

RFID. Contents and form. Petr Bureš, Faculty of transportation sciences Czech technical university in Prague RFID Contents and form Petr Bureš, bures@fd.cvut.cz Faculty of transportation sciences Czech technical university in Prague RFID considerations Critical performance variables in an RFID system are the

More information

RFID. Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague

RFID. Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague RFID Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague Discussion What is RFID? page 2 RFID Radio Frequency Identification (RFID) is a

More information

NEAR FIELD COMMUNICATION (NFC) A TECHNICAL OVERVIEW

NEAR FIELD COMMUNICATION (NFC) A TECHNICAL OVERVIEW UNIVERSITY OF VAASA FACULTY OF TECHNOLOGY TELECOMMUNICATION ENGINEERING Naser Hossein Motlagh NEAR FIELD COMMUNICATION (NFC) A TECHNICAL OVERVIEW Master s thesis for the degree of Master of Science in

More information

RFID Frequency Overview to Application fit

RFID Frequency Overview to Application fit RFID Frequency Overview to Application fit 1 The Radio Spectrum RFID tags exhibit different characteristics at different frequencies and it is highly unlikely that there will ever be one tag that can be

More information

Lecture 5. RFID Technologies

Lecture 5. RFID Technologies Lecture 5 RFID Technologies What s RFID and What s It for? RFID Categories and Working Mechanisms RFID Frequencies and Features RFID Anti-Collision Techniques What is RFID - Video 1 Object Auto-Identification

More information

Design of Adaptive RFID Reader based on DDS and RC522 Li Yang, Dong Zhi-Hong, Cong Dong-Sheng

Design of Adaptive RFID Reader based on DDS and RC522 Li Yang, Dong Zhi-Hong, Cong Dong-Sheng International Conference on Applied Science and Engineering Innovation (ASEI 2015) Design of Adaptive RFID Reader based on DDS and RC522 Li Yang, Dong Zhi-Hong, Cong Dong-Sheng Beijing Key Laboratory of

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

NCD RO HDX Robust 50mm Transponder

NCD RO HDX Robust 50mm Transponder HDX Robust 50mm Transponder Description is a contact-less Read-Only RFID device for single transponder applications in the area of electronic identification operating in the low frequency (134.2 khz) range,

More information

Physical-Layer Services and Systems

Physical-Layer Services and Systems Physical-Layer Services and Systems Figure Transmission medium and physical layer Figure Classes of transmission media GUIDED MEDIA Guided media, which are those that provide a conduit from one device

More information

NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags

NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags previously known as Kovio NFC Barcode Functional Specification Product Features Passive 13.56MHz 128- or 256-bit Read-Only Memory (ROM) 106 Kb/s Data

More information

Wireless Keyboard Without Need For Battery

Wireless Keyboard Without Need For Battery Technical Disclosure Commons Defensive Publications Series April 29, 2015 Wireless Keyboard Without Need For Battery Vijay Asrani James Tanner Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

DATA SHEET CORE ID-SERIES COMPONENT READERS (ID2, ID2RW, ID12, ID12RW, ID20, ID20RW)

DATA SHEET CORE ID-SERIES COMPONENT READERS (ID2, ID2RW, ID12, ID12RW, ID20, ID20RW) DATA SHEET CORE ID-SERIES COMPONENT READERS (ID2, ID2RW, ID12, ID12RW, ID20, ID20RW) Overview The CORE ID2, ID12 and ID20 readers are a series of component style, low frequency RFID readers designed for

More information

NCD1015ZP 50mm Half Duplex Read-Only RFID Transponder Features Description Applications Ordering Information Part # Description Block Diagram

NCD1015ZP 50mm Half Duplex Read-Only RFID Transponder Features Description Applications Ordering Information Part # Description Block Diagram 50mm Half Duplex Read-Only RFID Transponder Features Reliable Half-Duplex (HDX) Low Frequency (LF) Communications Format 64 Bits For Data / Identification Storage 134.2 khz Operating Frequency FSK Modulation

More information

Multi Frequency RFID Read Writer System

Multi Frequency RFID Read Writer System Multi Frequency RFID Read Writer System Uppala Sunitha 1, B Rama Murthy 2, P Thimmaiah 3, K Tanveer Alam 1 PhD Scholar, Department of Electronics, Sri Krishnadevaraya University, Anantapur, A.P, India

More information

NCD1015-IC 17 February 2011 Data sheet status: Product Data. NCD1015-IC HDX RFID IC. Product data February 2011 Production 1/14

NCD1015-IC 17 February 2011 Data sheet status: Product Data.  NCD1015-IC HDX RFID IC. Product data February 2011 Production 1/14 NCD1015-IC HDX RFID IC Product data February 2011 Production 1/14 NCD1015-IC HDX RFID IC 1 GENERAL DESCRIPTION The NCD1015-IC is a read/write IC to be used in HDX contact-less RFID devices for single transponder

More information

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

Course Project. Project team forming deadline has passed Project teams will be announced soon Next step: project proposal presentation

Course Project. Project team forming deadline has passed Project teams will be announced soon Next step: project proposal presentation Course Project Project team forming deadline has passed Project teams will be announced soon Next step: project proposal presentation Presentation slides and one-page proposal document are due on Jan 30

More information

DATA SHEET. HTRM440 family HITAG proximity reader module hardware INTEGRATED CIRCUITS

DATA SHEET. HTRM440 family HITAG proximity reader module hardware INTEGRATED CIRCUITS INTEGRATED CIRCUITS DATA SHEET Supersedes data of 1999 Feb 01 File under Integrated Circuits, IC11 2001 Oct 04 CONTENTS 1 FEATURES 2 APPLICATIONS 3 GENERAL DESCRIPTION 4 ORDERING INFORMATION 5 BLOCK DIAGRAM

More information

SPECIFICATION. Product Name : Square Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector

SPECIFICATION. Product Name : Square Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector SPECIFICATION Part No. : FXR.06.52.0075X.A.dg Product Name : Square Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector Features : 13.56 MHz RFID

More information

CORE SERIES DATASHEET Mar 01, 2005

CORE SERIES DATASHEET Mar 01, 2005 CORE SERIES DATASHEET Mar 01, 2005 CORE-2 /CORE-12 /CORE-20 The CORE2. CORE12 and CORE20 are similar to the obsolete CORE0, CORE10 and CORE15 MK(ii) series devices, but they have extra pins that allow

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

Chaos Communication Camp Milosch Meriac Henryk Plötz

Chaos Communication Camp Milosch Meriac Henryk Plötz Chaos Communication Camp 2007 Milosch Meriac Henryk Plötz meri@openpcd.org henryk@ploetzli.ch Chaos Communication Camp 2007 2007-08-10 (1/30) CCCamp2007 2007-08-10 international standard for Proximity

More information

RFID Integrated Teacher Monitoring

RFID Integrated Teacher Monitoring RFID Integrated Teacher Monitoring Introduction Article by Adewopo Adeniyi M.Sc, Texila American University, Nigeria Email: preciousadewopon@yahoo.com Radio Frequency Identification (RFID) is a generic

More information

OPTIMIZATION OF INDUCTIVE WID TECHNOLOGY

OPTIMIZATION OF INDUCTIVE WID TECHNOLOGY OPTIMIZATION OF INDUCTIVE WID TECHNOLOGY Steve C. Q. Chen(*) and Valerie Thomas(2) (')Department of Electrical Engineering and (*)Center for Energy and Environmental Studies Princeton University, Princeton,

More information

Journal Online Jaringan COT POLIPD (JOJAPS) Research on RFID Antenna in Convocation Management System

Journal Online Jaringan COT POLIPD (JOJAPS) Research on RFID Antenna in Convocation Management System JOJAPS eissn 2504-8457 Journal Online Jaringan COT POLIPD (JOJAPS) Research on RFID Antenna in Convocation Management System Mohd Shah Rizan Nizam Abd Manap 1, Nurzaimawani Hussin 2, 12 Department of Electrical

More information

Basics of RFID technology Thomas Holtstiege Technical Manager EECC. October 2009

Basics of RFID technology Thomas Holtstiege Technical Manager EECC. October 2009 Basics of RFID technology Thomas Holtstiege Technical Manager EECC October 2009 About the European EPC Competence Center (EECC) First European EPCglobal accredited performance test center Active since

More information

SPECIFICATION. Product Name : Rectangular Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector

SPECIFICATION. Product Name : Rectangular Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector SPECIFICATION Part No. : FXR.08.52.0075X.A.dg Product Name : Rectangular Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector Features : 13.56 MHz

More information

SPECIFICATION. Product Name : Square Flexible Near-Field Communications Antenna with Ferrite Layer for Metal Direct Mount

SPECIFICATION. Product Name : Square Flexible Near-Field Communications Antenna with Ferrite Layer for Metal Direct Mount SPECIFICATION Part No. : FXR.06.A.dg Product Name : Square Flexible Near-Field Communications Antenna with Ferrite Layer for Metal Direct Mount Features : 13.56 MHz RFID / NFC Antenna Can be placed directly

More information

A. The purpose of this experiment is to find out what material will protect a credit

A. The purpose of this experiment is to find out what material will protect a credit I. What is RFID A. The purpose of this experiment is to find out what material will protect a credit card or tag from getting read by an RFID reader. What it means by read is the RFID scanner will send

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Functional Description / User Manual

Functional Description / User Manual Functional Description / User Manual of SIEMENS VDO Immobilization system HONDA RxM Type 5WK49210 / 5WK49215 Functional description_rxm.doc Page 1 of 5 1. FUNCTIONAL DESCRIPTION The immobilizer system

More information

Application Report. Josh Wyatt / J.A. Gouldbourne...

Application Report. Josh Wyatt / J.A. Gouldbourne... Application Report SCBA026 April 2009 RFID Technology Selection for Waste Management Applications Josh Wyatt / J.A. Gouldbourne... ABSTRACT This document is intended to assist those involved in the waste

More information

Wireless systems. includes issues of

Wireless systems. includes issues of Wireless systems includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs. digital, bits & bytes software applications, operating system organization

More information

PRINCIPLES OF COMMUNICATION SYSTEMS. Lecture 1- Introduction Elements, Modulation, Demodulation, Frequency Spectrum

PRINCIPLES OF COMMUNICATION SYSTEMS. Lecture 1- Introduction Elements, Modulation, Demodulation, Frequency Spectrum PRINCIPLES OF COMMUNICATION SYSTEMS Lecture 1- Introduction Elements, Modulation, Demodulation, Frequency Spectrum Topic covered Introduction to subject Elements of Communication system Modulation General

More information

Student Seminars: Kickoff

Student Seminars: Kickoff Wireless@VT Seminars Wireless@VT Student Seminars: Kickoff Walid Saad Wireless@VT, Durham 447 walids@vt.edu Wireless@VT Seminars Fall Logistics Weekly meetings in SEB 135 SEB 125 used 10/24, 11/07, and

More information

An Empirical Study of UHF RFID Performance. Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof.

An Empirical Study of UHF RFID Performance. Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof. An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS 577 - Prof. Bob Kinicki Overview Introduction Background Knowledge Methodology and Tools

More information

Compact Microstrip UHF-RFID Tag Antenna on Metamaterial Loaded with Complementary Split-Ring Resonators

Compact Microstrip UHF-RFID Tag Antenna on Metamaterial Loaded with Complementary Split-Ring Resonators Compact Microstrip UHF-RFID Tag Antenna on Metamaterial Loaded with Complementary Split-Ring Resonators Joao P. S. Dias, Fernando J. S. Moreira and Glaucio L. Ramos GAPTEM, Department of Electronic Engineering,

More information

Contactless snooping: Assessing the real threats

Contactless snooping: Assessing the real threats Thomas P. Diakos 1 Johann A. Briffa 1 Tim W. C. Brown 2 Stephan Wesemeyer 1 1 Department of Computing,, Guildford 2 Centre for Communication Systems Research,, Guildford Tomorrow s Transactions forum,

More information

Chapter 1 Introduction

Chapter 1 Introduction Wireless Information Transmission System Lab. Chapter 1 Introduction National Sun Yat-sen University Table of Contents Elements of a Digital Communication System Communication Channels and Their Wire-line

More information

Liquidmetal Electromagnetic Properties & RF Shielding Overview

Liquidmetal Electromagnetic Properties & RF Shielding Overview Liquidmetal Electromagnetic Properties & RF Shielding Overview Liquidmetal alloy is more transparent to RF signals than many similar materials 1 Introduction H ow a material interacts with radio frequency

More information

AN Low Frequency RFID Card Reader. Application Note Abstract. Introduction. Working Principle of LF RFID Reader

AN Low Frequency RFID Card Reader. Application Note Abstract. Introduction. Working Principle of LF RFID Reader Low Frequency RFID Card Reader Application Note Abstract AN52164 Authors: Richard Xu Jemmey Huang Associated Project: None Associated Part Family: CY8C24x23 Software Version: PSoC Designer 5.0 Associated

More information

SmartRadio Transmitter / Receiver

SmartRadio Transmitter / Receiver Easy to use Radio Transmitter & Receivers AM Radio Hybrid Technology Supports Data or Telemetry communications Simple CMOS/TTL Data Interface Automatic data encryption / decryption Host Interface up to

More information

MCRF200. Contactless Programmable Passive RFID Device

MCRF200. Contactless Programmable Passive RFID Device M MCRF200 Contactless Programmable Passive RFID Device FEATURES Contactless programmable after encapsulation Read only data transmission 96 or 128 bits of OTP user memory Operates at 125 khz On chip rectifier

More information

Qi Developer Forum. Circuit Design Considerations. Dave Wilson 16-February-2017

Qi Developer Forum. Circuit Design Considerations. Dave Wilson 16-February-2017 WPC1701 Qi Developer Forum Circuit Design Considerations Dave Wilson 16-February-2017 Overview Getting Started Basics The Qi Advantage for Circuit Design Practical Design Issues Practical Implementation

More information

ROM/UDF CPU I/O I/O I/O RAM

ROM/UDF CPU I/O I/O I/O RAM DATA BUSSES INTRODUCTION The avionics systems on aircraft frequently contain general purpose computer components which perform certain processing functions, then relay this information to other systems.

More information

In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics:

In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics: In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics: Links between Digital and Analogue Serial vs Parallel links Flow control

More information

UHF-Technology. Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2016

UHF-Technology. Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2016 UHF-Technology Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2016 RFID System A traditional passive label (tag) is queried and it responds with it s ID accordingly. Power

More information

Passive High-Function RFID: Sensors and Bi-Stable Displays

Passive High-Function RFID: Sensors and Bi-Stable Displays Passive High-Function RFID: Sensors and Bi-Stable Displays May 4, 2015 Charles Greene, Ph.D. Chief Technical Officer EDN 2010 Hot 100 Emerging Technology P2100 Powerharvester TX91501 Powercaster P2110

More information

RADAR CHAPTER 3 RADAR

RADAR CHAPTER 3 RADAR RADAR CHAPTER 3 RADAR RDF becomes Radar 1. As World War II approached, scientists and the military were keen to find a method of detecting aircraft outside the normal range of eyes and ears. They found

More information

Lesson Title: Electromagnetics and Antenna Overview

Lesson Title: Electromagnetics and Antenna Overview Page 1 of 5 Lesson Title: Electromagnetics and Antenna Overview 6/26/09 Copyright 2008, 2009 by Dale R. Thompson {d.r.thompson@ieee.org} Rationale Why is this lesson important? Why does the student need

More information

Dynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System

Dynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System Dynamic Framed Slotted AOHA Algorithms using Fast Tag Estimation Method for RFID System Jae-Ryong Cha School of Electrical and Computer Engineering Ajou Univ., Suwon, Korea builder@ajou.ac.kr Jae-Hyun

More information

Instantaneous Inventory. Gain ICs

Instantaneous Inventory. Gain ICs Instantaneous Inventory Gain ICs INSTANTANEOUS WIRELESS Perhaps the most succinct figure of merit for summation of all efficiencies in wireless transmission is the ratio of carrier frequency to bitrate,

More information

Design of Uhf Band Microstrip-Fed Antenna for Rfid Applications

Design of Uhf Band Microstrip-Fed Antenna for Rfid Applications IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 8, Issue 5 (Nov. - Dec. 2013), PP 46-50 Design of Uhf Band Microstrip-Fed Antenna for Rfid

More information

Wireless Communication in Embedded System. Prof. Prabhat Ranjan

Wireless Communication in Embedded System. Prof. Prabhat Ranjan Wireless Communication in Embedded System Prof. Prabhat Ranjan Material based on White papers from www.radiotronix.com Networked embedded devices In the past embedded devices were standalone Typically

More information

Long Range Passive RF-ID Tag With UWB Transmitter

Long Range Passive RF-ID Tag With UWB Transmitter Long Range Passive RF-ID Tag With UWB Transmitter Seunghyun Lee Seunghyun Oh Yonghyun Shim seansl@umich.edu austeban@umich.edu yhshim@umich.edu About RF-ID Tag What is a RF-ID Tag? An object for the identification

More information

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com Layerone / 2006 RFID Technology, Security & Privacy Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com What are we talking about today? RFID history Technologies WiFi tags Privacy/ Security Who am

More information

RF Design Considerations for Passive Entry Systems

RF Design Considerations for Passive Entry Systems 20 Atmel Automotive Compilation, Vol. 6 Security Car Access RF Design Considerations for Passive Entry Systems Paul Lepek, Paul Hartanto Introduction Passive Entry (PE) systems set a new trend for automotive

More information

RFID ACCESS CONTROL. SRðAN LALE FACULTY OF ELECTRICAL ENGINEERING EASTERN SARAJEVO

RFID ACCESS CONTROL. SRðAN LALE FACULTY OF ELECTRICAL ENGINEERING EASTERN SARAJEVO RFID ACCESS CONTROL SRðAN LALE FACULTY OF ELECTRICAL ENGINEERING EASTERN SARAJEVO 1 INTRODUCTION RFID (RADIO - FREQUENCY IDENTIFICATION) systems use RF signals for identification of people, animals and

More information

Battery Powered Tags for ISO/IEC Klaus Finkenzeller

Battery Powered Tags for ISO/IEC Klaus Finkenzeller Battery Powered Tags for ISO/IEC 14443 Klaus Finkenzeller 17.05.2011 Battery powered Tags for ISO/IEC 14443 Content Requirements to ISO/IEC 14443 Limiting factors of very small transponder antennas Communication

More information

SPECIFICATION. Product Name : Circular Flexible Near-Field Communications Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector

SPECIFICATION. Product Name : Circular Flexible Near-Field Communications Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector SPECIFICATION Part No. : FXR.07.52.0075X.A Product Name : Circular Flexible Near-Field Communications Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector Features : 13.56 MHz Antenna Flexible

More information

Electromagnetic Modelling of UHF RFID Tags*

Electromagnetic Modelling of UHF RFID Tags* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 8, No. 1, February 2011, 1-7 UDK: 621.396.029:537.531 Electromagnetic Modelling of UHF RFID Tags* Nemanja Milošević 1, Branko Kolundžija 1 Abstract: Paper

More information

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques 1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,

More information

Hybrid RFID-Based System Using Active Two- Way Tags

Hybrid RFID-Based System Using Active Two- Way Tags San Jose State University SJSU ScholarWorks Master's Theses Master's Theses and Graduate Research Fall 2010 Hybrid RFID-Based System Using Active Two- Way Tags Girish N. Jadhav San Jose State University

More information

Functional Description / User Manual of SIEMENS VDO

Functional Description / User Manual of SIEMENS VDO Functional Description / User Manual of SIEMENS VDO Immobilization system smart 451 Type 5WY7776 Name: Department: Telephone: Date: Author: Frank Lindner +49 941-790- 90992 Check: Thomas Heselberger SV

More information

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson Detecting and Correcting Bit Errors COS 463: Wireless Networks Lecture 8 Kyle Jamieson Bit errors on links Links in a network go through hostile environments Both wired, and wireless: Scattering Diffraction

More information

Data Communications. Unguided Media Multiplexing

Data Communications. Unguided Media Multiplexing Data Communications Unguided Media Multiplexing Fiber-Optic Cable A fiber-optic cable is made of glass or plastic and transmits signals in the form of light. If a ray of light traveling through one substance

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Error Detection Mohamed Khedr http://webmail.aast.edu/~khedr Syllabus Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12

More information

technical report 860MHz 930MHz Class 0 Radio Frequency Identification Tag Protocol Specification Candidate Recommendation, Version 1.0.

technical report 860MHz 930MHz Class 0 Radio Frequency Identification Tag Protocol Specification Candidate Recommendation, Version 1.0. Published June 1, 2003. Early Release July 2003 technical report 860MHz 930MHz Class 0 Radio Frequency Identification Tag Protocol Specification Candidate Recommendation, Version 1.0.0 Auto-ID Center auto-id

More information

Data and Computer Communications Chapter 4 Transmission Media

Data and Computer Communications Chapter 4 Transmission Media Data and Computer Communications Chapter 4 Transmission Media Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education - Prentice Hall,

More information

RFID. Presented by BESSER ASSOCIATES. Instructor: Al Scott

RFID. Presented by BESSER ASSOCIATES. Instructor: Al Scott RFID Presented by BESSER ASSOCIATES Instructor: Al Scott 1 COURSE OUTLINE Uses of RFID Basic RFID System ISM Frequency Bands Walmart Directive EPC RFID System How RF part of EPC System Works RF antennas

More information

H4102 EM MICROELECTRONIC-MARIN SA. Read Only Contactless Identification Device H4102. Typical Operating Configuration

H4102 EM MICROELECTRONIC-MARIN SA. Read Only Contactless Identification Device H4102. Typical Operating Configuration Read Only Contactless Identification Device Features 64 bit memory array laser programmable Several options of data rate and coding available On chip resonance capacitor On chip supply buffer capacitor

More information

1W-H3-05 (K)* M12. * Letter K refers to a reader with a common cathode. RFID reader 125 khz Unique. Product Card

1W-H3-05 (K)* M12. * Letter K refers to a reader with a common cathode. RFID reader 125 khz Unique. Product Card 1W-H3-05 (K)* M12 RFID reader 125 khz Unique Product Card * Letter K refers to a reader with a common cathode. Before use Please do not open the reader and do not make any changes. This results in loss

More information

32mm Glass Transponder Eco-Line Read Only, Read/Write. Reference Guide

32mm Glass Transponder Eco-Line Read Only, Read/Write. Reference Guide 32mm Glass Transponder Eco-Line Read Only, Read/Write Reference Guide 11-09-21-051 June 2001 1 32mm Glass Transponder RO, R/W June 2001 Edition One - June 2001 This is the first edition of this manual,

More information

AC : THE EFFECT OF FLUORESCENT LIGHTS ON RFID SYSTEMS OPERATING IN BACKSCATTER MODE

AC : THE EFFECT OF FLUORESCENT LIGHTS ON RFID SYSTEMS OPERATING IN BACKSCATTER MODE AC 2007-619: THE EFFECT OF FLUORESCENT LIGHTS ON RFID SYSTEMS OPERATING IN BACKSCATTER MODE Ghassan Ibrahim, Bloomsburg University Associate Professor, Electronics Engineering Technology/Bloomsburg University

More information

Properties of Inductor and Applications

Properties of Inductor and Applications LABORATORY Experiment 3 Properties of Inductor and Applications 1. Objectives To investigate the properties of inductor for different types of magnetic material To calculate the resonant frequency of a

More information

RFID UHF pour l'identification et la traçabilité des objets. Jean-Marc Laheurte Professeur à l Université Paris-Est

RFID UHF pour l'identification et la traçabilité des objets. Jean-Marc Laheurte Professeur à l Université Paris-Est RFID UHF pour l'identification et la traçabilité des objets Jean-Marc Laheurte Professeur à l Université Paris-Est Séminaire TELECOM ParisTech du 10 janvier 2013 1 Agenda Generalities and Principles HF

More information

RFID HANDBOOK FUNDAMENTALS AND APPLICATIONS IN CONTACTLESS SMART CARDS, RADIO FREQUENCY IDENTIFICATION AND NEAR-FIELD COMMUNICATION, THIRD EDITION

RFID HANDBOOK FUNDAMENTALS AND APPLICATIONS IN CONTACTLESS SMART CARDS, RADIO FREQUENCY IDENTIFICATION AND NEAR-FIELD COMMUNICATION, THIRD EDITION RFID HANDBOOK FUNDAMENTALS AND APPLICATIONS IN CONTACTLESS SMART CARDS, RADIO FREQUENCY IDENTIFICATION AND NEAR-FIELD COMMUNICATION, THIRD EDITION Klaus Finkenzeller Giesecke & Devrient GmbH, Munich, Germany

More information

Design Of Low-Power Wireless Communication System Based On MSP430 Introduction:

Design Of Low-Power Wireless Communication System Based On MSP430 Introduction: Design Of Low-Power Wireless Communication System Based On MSP430 Introduction: Low power wireless networks provide a new monitoring and control capability for civil and military applications in transportation,

More information

HY448 Sample Problems

HY448 Sample Problems HY448 Sample Problems 10 November 2014 These sample problems include the material in the lectures and the guided lab exercises. 1 Part 1 1.1 Combining logarithmic quantities A carrier signal with power

More information

MOBILE PHONE SIGNAL JAMMER FOR GSM, CDMA WITH PRE-SCHEDULED TIME DURATION USING ARM7 TDMI LPC2148. K.Navaneetha* 1, Prof.

MOBILE PHONE SIGNAL JAMMER FOR GSM, CDMA WITH PRE-SCHEDULED TIME DURATION USING ARM7 TDMI LPC2148. K.Navaneetha* 1, Prof. e-issn 2277-2685, p-issn 2320-976 IJESR/June 2014/ Vol-4/Issue-6/492-496 K. Navaneetha et. al./ International Journal of Engineering & Science Research MOBILE PHONE SIGNAL JAMMER FOR GSM, CDMA WITH PRE-SCHEDULED

More information

Introduction to: Radio Navigational Aids

Introduction to: Radio Navigational Aids Introduction to: Radio Navigational Aids 1 Lecture Topics Basic Principles Radio Directional Finding (RDF) Radio Beacons Distance Measuring Equipment (DME) Instrument Landing System (ILS) Microwave Landing

More information

Analysis and Simulation of UHF RFID System

Analysis and Simulation of UHF RFID System ICSP006 Proceedings Analysis and Simulation of UHF RFID System Jin Li, Cheng Tao Modern Telecommunication Institute, Beijing Jiaotong University, Beijing 00044, P. R. China Email: lijin3@63.com Abstract

More information

OEM 100. User Manual. Figure 1: OEM 100 Module with HG Rectangular Antenna Board

OEM 100. User Manual. Figure 1: OEM 100 Module with HG Rectangular Antenna Board OEM 100 User Manual Figure 1: OEM 100 Module with HG Rectangular Antenna Board Revision History Revision History Release Version Date Revision Description Authors Version 1.0 07/20/09 Initial Release Bryan

More information

VisorTrac A Tracking System for Mining

VisorTrac A Tracking System for Mining VisorTrac A Tracking System for Mining Marco North America, Inc. SYSTEM APPLICATION The VISORTRAC system was developed to allow tracking of mining personnel as well as mining vehicles. The VISORTRAC system

More information

SpringCard Contactless Readers

SpringCard Contactless Readers SpringCard Contactless Readers Antenna Installation Guide 4 Jan 2018 PMI9C2P-BA / January 2018 Agenda Introduction Inductive communication in a nutshell Electromagnetic environment impact of a ferrite

More information

SMARTALPHA RF TRANSCEIVER

SMARTALPHA RF TRANSCEIVER SMARTALPHA RF TRANSCEIVER Intelligent RF Modem Module RF Data Rates to 19200bps Up to 300 metres Range Programmable to 433, 868, or 915MHz Selectable Narrowband RF Channels Crystal Controlled RF Design

More information

RFID Door Unlocking System

RFID Door Unlocking System RFID Door Unlocking System Evan VanMersbergen Project Description ETEC 471 Professor Todd Morton December 7, 2005-1- Introduction In this age of rapid technological advancement, radio frequency (or RF)

More information