Pages

Tuesday 23 April 2013

RF Device : A very Basic Tutorial

What is RF driver?
RF (Radio Frequency) driver is basically a Computer program that provides radio frequency voltage to an external power device.
But first we have to know a term Radio Frequency Identification (RFID), because to have a basic idea on RF driver knowledge of RFID is important.






Radio-frequency identification (RFID) is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Others use a local power source and emit radio waves (electromagnetic radiation at radio frequencies). The tag contains electronically stored information which may be read from up to several meters away. Unlike a bar code, the tag does not need to be within line of sight of the reader and may be embedded in the tracked object.
RFID tags are used in many industries. An RFID tag attached to an automobile during production can be used to track its progress through the assembly line. Pharmaceuticals can be tracked through warehouses. Livestock and pets may have tags injected, allowing positive identification of the animal.
Since RFID tags can be attached to clothing, possessions, or even implanted within people, the possibility of reading personally-linked information without consent has raised privacy concerns.

I hope reading the above paras now you are able to understand the RFID technology. Let's have a look on RF drivers. So you can see that RF drivers are nothing but a hardware set on which a particular computer program is implemented/embeded to do a certain work. here the certain work is to provide Radio Frequency voltage to an external power device. This external power device is almost in every cases are Power Amplifiers for HighTech user-end.

How RF Device Works?

Problems and concerns

Data flooding

Not every successful reading of a tag (observation) represents data useful for the purposes of the business. A large amount of data may be generated that is not useful for managing inventory or other applications. For example, a customer moving a product from one shelf to another, or a pallet load of articles that passes several readers while being moved in a warehouse, are events that do not produce data that is meaningful to an inventory control system.
Event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data.

Global standardization

The frequencies used for RFID in the USA are currently incompatible with those of Europe or Japan. Furthermore, no emerging standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to use a tag that is operational within all of the international frequency domains.

Security concerns

Retailers such as Walmart, which already heavily use RFID technology for inventory purposes, also use RFID as an anti-employee-theft and anti-shoplifting technology. If a product with an active RFID tag passes the exit-scanners at a Walmart outlet, not only does it set off an alarm, but it also tells security personnel exactly what product to look for in the shopper's cart.
A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defense's recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. This is mostly as result of the fact that RFID tags can be read, and legitimate transactions with readers can be eavesdropped, from non-trivial distances. RFID technology used in access control, payment and eID (e-passport) systems operate at a shorter range than EPC RFID systems but are also vulnerable to skimming and eavesdropping, albeit at shorter distance.
A second method of prevention is by using cryptography. Rolling codes and challenge-response authentication (CRA) are commonly used to foil monitor-repetition of the messages between the tag and reader; as any messages that have been recorded would prove to be unsuccessful on repeat transmission. Rolling codes rely upon the tag's id being changed after each interrogation, while CRA uses software to ask for a cryptographically coded response from the tag. The protocols used during CRA can be symmetric, or may use public key cryptography.
Security concerns exist in regard to privacy over the unauthorized reading of RFID tags, as well as security concerns over server security. Unauthorized readers can use the RFID information to track the package, and so the consumer or carrier, as well as identify the contents of a package. Several prototype systems are being developed to combat unauthorized reading, including RFID signal interruption, as well as the possibility of legislation, and 700 scientific papers have been published on this matter since 2002. There are also concerns that the database structure of servers for the readers may be susceptible to infiltration, similar to denial-of-service attacks, after the EPCglobal Network ONS root servers were shown to be vulnerable.

Exploitation

Ars Technica reported in March 2006 an RFID buffer overflow bug that could infect airport terminal RFID databases for baggage, and also passport databases to obtain confidential information on the passport holder.

Passports

In an effort to make passports more secure, several countries have implemented RFID in passports. However, the encryption on UK chips was broken in under 48 hours. Since that incident, further efforts have allowed researchers to clone passport data while the passport is being mailed to its owner. Where a criminal used to need to secretly open and then reseal the envelope, now it can be done without detection, adding some degree of insecurity to the passport system.

Shielding

In an effort to prevent the passive “skimming” of RFID-enabled cards or passports, the U.S. General Services Administration (GSA) issued a set of test procedures for evaluating electromagnetically opaque sleeves. For shielding products to be in compliance with FIPS-201 guidelines, they must meet or exceed this published standard. Shielding products currently evaluated as FIPS-201 compliant are listed on the website of the U.S. CIO’s FIPS-201 Evaluation Program. The United States government requires that when new ID cards are issued, they must be delivered with an approved shielding sleeve or holder.

Shielding controversy

There are contradicting opinions as to whether aluminum can prevent reading of RFID chips. Some people claim that aluminum shielding, essentially creating a Faraday cage, does work. Others claim that simply wrapping an RFID card in aluminum foil only makes transmission more difficult and is not completely effective at preventing it.
Shielding effectiveness depends on the frequency being used. Low-frequency LowFID tags, like those used in implantable devices for humans and pets, are relatively resistant to shielding, though thick metal foil will prevent most reads. High frequency HighFID tags (13.56 MHz—smart cards and access badges) are sensitive to shielding and are difficult to read when within a few centimetres of a metal surface. UHF Ultra-HighFID tags (pallets and cartons) are difficult to read when placed within a few millimetres of a metal surface, although their read range is actually increased when they are spaced 2–4 cm from a metal surface due to positive reinforcement of the reflected wave and the incident wave at the tag. UHFID tags can be successfully shielded from most reads by being placed within an antistatic bag.

Temperature exposure

Currently, RFID tags are created by gluing an integrated circuit (IC) to an inlay. This poses a problem as vibration and high temperatures will loosen the connection. If the IC loses connection with the inlay, the RFID tag will no longer transmit. A new design was filed for patent (currently pending approval) where the IC is soldered to a circuit board and the circuit board is then soldered to the inlay. This process replaces the adhesive with solder which is much more durable and temperature resistant.


Thank you for reading. please give your valuable feedback & dont forget to follow the blog!!

7 comments:

  1. among the shell kind, windings ar encircled by the core ring. Shell core device might even be used over the core kind device for distribution device applications as a results of the relative ease in stacking the core surround the winding coils.Turns Tester

    ReplyDelete
  2. little or no or no or no voltage and power transformers ar at intervals the foremost utilized in low voltage electrical and electronic circuit styles tend to use copper conductors and it's have succeeding mechanical strength and smaller conductor size than same Al sections.toroidal winding machine

    ReplyDelete
  3. The two simplest and customary technique of device construction ar the closed core device and place on the shell core device. once the first and secondary windings ar surround the core ring, the device is in core form(closed core transformer).jovil winding machine

    ReplyDelete
  4. Coil winding machine provides highest truth and long strength and it offers low area demand. fantastic powder focus has taking once some piece of goliath components, as associate example, high resistivity, low development and vortex current events.automatic winding machine

    ReplyDelete
  5. As wants be, the inductance holding tight quality is astounding at intervals the AC and DC conditions.
    A winding machine might even be a machine has engulfed with string of paper, tape, metal wire, onto a spool, and bobbin, etc. it's additionally declared as as winder.toroidal winding

    ReplyDelete
  6. Toroidal winding machine ar many full and convenient machine that ar microprocessor-based controller and ar accessible in conjunction with high-powered parameter. The structure is modified to die the great application for powder core focal application.toroidal winding

    ReplyDelete
  7. solid winding machine finds its application in coils of energy meter current transformers, very little or no or no or no or no power transformers, solid coils, inductors, CT (current transformer), etc. Automatic winding machine might even be a hoop no personnel to work, all the work is achieved via a magnetic ring winding machine.toroidal winding

    ReplyDelete

Repost.Us

Translate