Radio Frequency Identification ( Rfid )

925 WordsAug 29, 20144 Pages
RADIO FREQUENCY IDENTIFICATION (RFID) Son Le, ITM 435 Ho Son Ngo, Ph. D TABLE OF CONTENTS The name Radio Frequency Identification (RFID) dates back to the early 1990s. The technology has roots in radar-related work done in the 1940s. During World War II, the military used transponders for the important purpose of identifying a returning aircraft as friend or foe. These systems remain in use today. The military continues to invest in new uses of radio and radar technologies that ultimately could provide the scientific foundation for future RFID enhancements. The commercial market took longer to develop. During the 1960s, electronic article surveillance became the first rudimentary application of RFID that was applied in commercial…show more content…
This technology promises greater efficiency and accuracy than were possible previous technologies. Although RFID is not a recent development, advances in semiconductor technology have now made this method practical and much more cost effective. RFID has many advantages over visual markings primary among them the ability to identify objects without the requirement of line of sight. This means that objects can be identified even when they are tightly packed together or their surface markings are removed, marred, or obscured. There are two major hardware components that help RFID to work: Tag and Reader. The two devices have an asymmetric relationship in that the tag is simple and offers few facilities besides holding and transmitting the code, while the reader takes the leading role at the cost of higher complexity. RFID tags store information about the item they are attached to. Information generally pertains to identification information; supply-chain information such as attributes, source, destination, and route; and possibly other special parameters. In business model, RFID tags provide the capability for seamless and continuous two ways communication as an object moves through a supply chain. This means that any object bearing a tag can become networked without human intervention or manipulation by automated machines, as is the case with bar codes. Most of the time, the tag is placed on
Open Document