Professional Documents
Culture Documents
TABLE OF CONTENTS
CHAPTER 1 INTRODUCTION
1.1 WHAT IS RFID?
Abstract
The primary objective of any project in any undergraduate course is to implement
the concepts that we have studied in our curriculum. Apart from that it is the sole
responsibility of every student to make a project which could serve the society or
at least his / her almighty institute, with these points in our mind we started to
build a RFID BASED POWER MANAGEMENT SYSTEM. In the project we have
designed and implemented a RFID-based power access control. It grants
POWER ACCESS only to the persons intended like TENANT or renter via a
unique identification card in order to avoid power thefts and burglary- which is
most common in todays scenario of semi developed areas. The secured power
distribution can be extended from a single room to an entire hostel or home area.
From the hardware we are only showing the basic switching that illustrates the
working principle.
A very unique implementation can be done when interfaced with the PCs in the
offices ,clubs or highly secured areas. No external user can even turn on the
power supply until a valid card is swapped against the reader.
Similarly entire room can be made secured by completely limiting all the power
driven appliances being accessed by the user only.
Even if a few number of sockets are to be made access controlled; that can also
be done by attaching the relay only to the particular pins rather than affecting the
entire power supply .
Power burglary can easily be deterrent by such a system. The relay will not allow
the power supply to get in directly even if connected until the card is used. Hence
the security to the electricity supplies is made.
This basic circuitry is very economical and can be cleanly interfered with
any of the presently working devices that need to get POWER ACCESS
CHAPTER 1
INTRODUCTION
RFID is a tracking technology used to identify and authenticate tags that are applied to
any product, individual or animal. Radio frequency Identification and Detection is a
general term used for technologies that make use of radio waves in order to identify
objects and people.
ABOUT RFID
Purpose of Radio frequency Identification and Detection system is to facilitate data
transmission through the portable device known as tag that is read with the help of RFID
reader; and process it as per the needs of an application. Information transmitted with the
help of tag offers location or identification along with other specifics of product tagged
purchase date, color, and price. Typical RFID tag includes microchip with radio antenna,
mounted on substrate.
The RFID tags are configured to respond and receive signals from an RFID transceiver.
This allows tags to be read from a distance, unlike other forms of authentication
technology. The RFID system has gained wide acceptance in businesses, and is gradually
Powered by its internal battery or by the reader signals, the tag sends radio waves back to
the reader. Reader receives these waves and identifies the frequency to generate a unique
ID. Reader then decodes data encoded in integrated circuit of tags and transmits it to the
computers for use.
Powered by its internal battery or by the reader signals, the tag sends radio waves back to
the reader. Reader receives these waves and identifies the frequency to generate a unique
ID. Reader then decodes data encoded in integrated circuit of tags and transmits it to the
computers for use.
Powered by its internal battery or by the reader signals, the tag sends radio waves back to
the reader. Reader receives these waves and identifies the frequency to generate a unique
ID. Reader then decodes data encoded in integrated circuit of tags and transmits it to the
computers for use.
Active and passive RFID are different technologies but are usually evaluated together.
Even though both of them use the radio frequency for communication between tag and
reader, means of providing power to tags is different. Active RFID makes use of battery
within tag for providing continuous power to tag and radio frequency power circuitry.
Passive RFID on the other hand, relies on energy of radio frequency transferred from
reader to tag for powering it.
Passive RFID needs strong signals from reader but signal strength bounced from tag is at
low levels. Active RFID receives low level signals by tag but it can create higher level
signals to readers. This type of RFID is constantly powered, whether in or out of the
readers field. Active tags consist of external sensors for checking humidity, temperature,
motion as well as other conditions.
The role of RFID is not just confined to Aircraft identification anymore; it is also lending
a hand in various commercial uses. Asset tracking is one of the most popular uses of
RFID. Companies are using RFID tags on the products that might get stolen or
misplaced. Almost each type of Radio frequency Identification and Detection system can
be used for the purpose of asset management.
Manufacturing plants have also been using RFID from a long time now. These systems
are used for tracking parts and working in process for reduction of defects, managing
production of various versions and increasing output. The technology has also been
useful in the closed looped supply chains for years. More and more companies are
turning to this technology for tracking shipments among the supply chain allies. Not just
manufacturers but retailers also are using this RFID technology for proper placement of
their products and improvements in the supply chain.
RFID also plays an important role in the access and security control. The newly
introduced 13.56 MHz RFID systems provide long range readings to the users. The best
part is that RFID is convenient to handle and requires low maintenance at the same time.
RFID definitely has an edge over conventional technology of bar codes. RFID reader
easily pulls data from tag at greater distances as compared to barcodes. Range
in case of RFID is around 300 feet as against 15 feet of barcodes. So RFID tags can be
read much faster as compared to barcodes. While reading the barcodes is time
consuming, RFID readers can interrogate rates of more than 40 tags in a second.
Need of line of sight in case of barcodes restricts reusability and ruggedness of the
barcodes. RFID, on the other hand are rugged, since its components are protected in
plastic cover. The Radio frequency Identification and Detection can also be fitted within
the products for ensuring greater reusability and ruggedness. Unlike barcodes, RFID tags
can be used as write and read devices. One can use RFID tags for communicating with
the tag and for altering the information stored on it.
10
CHAPTER 2
COMPONENTS EXPLANATION
11
1.1 MICROCONTROLLER
Atmega 8A PU
12
1. General description
Features
High-performance, Low-power AVR 8-bit Microcontroller
Advanced RISC Architecture
130 Powerful Instructions Most Single-clock Cycle Execution
32 x 8 General Purpose Working Registers
Fully Static Operation
Up to 16 MIPS Throughput at 16 MHz
On-chip 2-cycle Multiplier
High Endurance Non-volatile Memory segments
8K Bytes of In-System Self-programmable Flash program memory
512 Bytes EEPROM
1K Byte Internal SRAM
Write/Erase Cycles: 10,000 Flash/100,000 EEPROM
Data retention: 20 years at 85C/100 years at 25C(1)
Optional Boot Code Section with Independent Lock Bits
In-System Programming by On-chip Boot Program
True Read-While-Write Operation
Programming Lock for Software Security
Peripheral Features
Two 8-bit Timer/Counters with Separate Prescaler, one Compare Mode
One 16-bit Timer/Counter with Separate Prescaler, Compare Mode, and
Capture
Mode
13
1.2
Pin Descriptions
2.2.1 VCC
Digital supply voltage.
2.2.2 GND
Ground.
2.2.3 Port B (PB7:PB0) XTAL1/XTAL2/TOSC1/TOSC2
Port B is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit). The
Port B output buffers have symmetrical drive characteristics with both high sink
and source
capability. As inputs, Port B pins that are externally pulled low will source current
if the pull-up
resistors are activated. The Port B pins are tri-stated when a reset condition
becomes active,even if clock is not running.
2.2.4 Port C (PC5:PC0)
Port C is an 7-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit). The
14
Port C output buffers have symmetrical drive characteristics with both high sink
and source
capability. As inputs, Port C pins that are externally pulled low will source current
if the pull-up
resistors are activated. The Port C pins are tri-stated when a reset condition
becomes active,
even if the clock is not running.
2.2.7 RESET
Reset input. A low level on this pin for longer than the minimum pulse length will
generate a
reset, even if the clock is not running. The minimum pulse length is given in Table
25-3 on page
247. Shorter pulses are not guaranteed to generate a reset.
AREF
AREF is the analog reference pin for the A/D Converter.
2. Block diagram
15
16
3. Pinning information
1.2
Features
17
Specifications
Coil Data
Coil Power: 360mW
Nominal Voltage: 24Vdc
Pick-Up Voltage: 18.0Vdc
Drop-Out Voltage: 2.4Vdc
Maximum Voltage: 31.2Vdc
Coil Resitance: 1600ohm
Contact Data
Contact Rating: 10A 277Vac / 28Vdc
Maximum Switching Voltage: 277Vac / 30Vdc
Maximum Switching Current: 10 A
Maximum Switching Power: 2770VA / 210W
Mechanical Endurance: 10,000,000 Operations
Electrical Endurance: 100,000 Operations (NO Contact)
Maximum Turn-On Time: 10 ms
Maximum Turn-Off Time: 5 ms
General
Dielectric Strength (Between Contacts): 750 VAC 1 min
Insulation Resistance: 100 Mohm@500 VDC
Ambient Operating Temperature Range: -40C to +85C
Weight: 10.0g
RoHS Compliant: Yes
18
Pin layout
circuit
diagram
19
Features:
RFID systems detect the coded information in tags via readers. A Passive
Reader Active Tag (PRAT) system has a passive reader which only receives
radio signals from active tags (battery operated, transmit only). The reception
range of a PRAT system reader can be adjusted from 12,000 feet (0.30
609.60 m)], allowing flexibility in applications such as asset protection and
supervision.
An Active Reader Passive Tag (ARPT) system has an active reader, which
transmits interrogator signals and also receives authentication replies from
passive tags.
An Active Reader Active Tag (ARAT) system uses active tags awoken with an
interrogator signal from the active reader. A variation of this system could also
use a Battery-Assisted Passive (BAP) tag which acts like a passive tag but has a
small battery to power the tag's return reporting signal.
Fixed readers are set up to create a specific interrogation zone which can be
tightly controlled. This allows a highly defined reading area for when tags go in
and out of the interrogation zone. Mobile readers may be hand-held or mounted
on carts or vehicles.
20
21
RFID TAGS
22
Data capacity
The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as
much as several thousand bits on the high end. Of course, the greater the storage capacity,
the higher the price per tag.
Form factor
The tag and antenna structure can come in a variety of physical form factors and can
either be self-contained or embedded as part of a traditional label structure (i.e., the tag is
inside what looks like a regular bar code labelthis is termed a 'Smart Label') companies
must choose the appropriate form factors for the tag very carefully and should expect to
use multiple form factors to suit the tagging needs of different physical products and units
of measure. For example, a pallet may have an RFID tag fitted only to an area of
protected placement on the pallet itself. On the other hand, cartons on the pallet have
RFID tags inside bar code labels that also provide operators human-readable information
and a back-up should the tag fail or pass through non RFID-capable supply chain links.
4.5 Polyester Capacitors
100 watt 5 volts capacitor in series with relay used to suppress heavy voltage drops
across the relay when switched to the ac supply of 220 volts.
It helps in
1.Managing Electromagnetic Interference
2.Control Inductive Loads with a Induction Suppression Capacitor
3.Capacitor Absorbs the High Voltages Generated by Inductive Loads
4.A Capacitor Improves the Lifespan of the Relay and Reliability of the Board
5.Handling Inductive Loads
Perhaps the most overlooked aspect of relay control is proper handling of inductive loads.
Inductive loads can best be defined as anything with a magnetic coil, such as a motor,
solenoid, or a transformer. Controlling a inductive load using our relay controllers
23
requires the use of induction suppression capacitors. The purpose of this capacitor is to
absorb the high voltages generated by inductive loads, blocking them from the contacts of
the relay. Without this capacitor, the lifespan of the relay will be greatly reduced.
Induction can be so severe that it electrically interferes with the microprocessor logic of
our controllers, causing relay banks to shut themselves down unexpectedly. In the case of
USB devices, customers may experience loss of communications until the device is
reconnected to the USB port.
4.6 IC 7805
Function
Name
Input
24
2
3
Ground (0V)
Regulated output; 5V (4.8V-5.2V)
Ground
Output
It is used to amplify the current reaching relay such that above a certain
threshold the relay is driven by the current output supplied by the
microcontroller in presence of a valid rfid card swap. ULN 2000 can also be
used.
25
is used in common emitter configuration for amplifiers. The voltage divider is the
commonly used biasing mode. For switching applications, transistor is biased so
that it remains fully on if there is a signal at its base. In the absence of base
signal, it gets off.
4.8 Electrolytic capacitor
An electrolytic
capacitor is
a capacitor that
uses
an electrolyte (an
ionic
conducting liquid) as one of its plates to achieve a larger capacitance per unit
volume than other types. The large capacitance of electrolytic capacitors makes
them particularly suitable for passing or bypassing low-frequency signals and
storing large amounts of energy. They are widely used in power supplies,and
interconnecting stages of amplifiers at audio frequencies. An electrolytic
capacitor will generally have higher leakage current than a comparable (dry)
capacitor, and may have siginificant limitations in its operating temperature range,
parasitic resistance and inductance, and the stability and accuracy of its
capacitance value.
26
the power resistor is used in series with the such that the current reaching the
relay is limited and could not damage it. Relays has a maximum current rating of
1 ampere and the supply may damage its working. Normal resistors cant be used
as they possess very low power rating (0.25 w) and may burn out at higher
currents
27
CHAPTER 2
BASIC BLOCK DIAGRAM
28
POWER
SUPPLY
RFID Reader
MICROCONTROLLER
(ATMEGA8P)
MEMORY
ADAPTER
RELAY
APPLIANCES
TO CONTROL
29
30
CHAPTER 5
CIRCUIT REPRESENTATION AND
WORKING OF PROJECT
31
32
As soon as Shown below is a typical RFID system. In every RFID system the
transponder Tags contain information. This information can be as little as a single
binary bit , or be a large array of bits representing such things as an identity
code, personal medical information, or literally any type of information that can be
stored in digital binary format.
33
Shown is a RFID transceiver that communicates with a passive Tag. Passive tags have
no power source of their own and instead derive power from the incident
electromagnetic field. Commonly the heart of each tag is a microchip. When the Tag
enters the generated RF field it is able to draw enough power from the field to access its
internal memory and transmit its stored information.
When the transponder Tag draws power in this way the resultant interaction of the RF
fields causes the voltage at the transceiver antenna to drop in value. This effect is
utilized by the Tag to communicate its information to the reader. The Tag is able to
control the amount of power drawn from the field and by doing so it can modulate
the voltage sensed at the Transceiver according to the bit pattern it wishes to transmit.
In the circuit shown whenever a valid user with rfid tag swaps it across the rfid
reader ; a pulse signal is generated by the hinderance of the magnetic field across
the tag reader or more precisely by flux change an emf is induced in the tag circuit
which enables it and it transmits its serial card number to the rfid receiver. If
verified with the serial number embedded in the microcontrollers memory,it
switches the relay on and the attached appliance will get the power supply.
34
CHAPTER 3
PROBLEM FORMULATION AND
SOFTWARE
35
#include <avr/pgmspace.h>
// Tags include the two CRC bytes (14 bytes total)
String Card = "08006A60282A";
prog_char tag_0[] PROGMEM = "08006A60282A"; //add your tags here
PROGMEM const char *tag_table[] =
{
tag_0
};
//---String tagString;
char tagNumber[14];
boolean receivedTag;
int lockPIN=4; // pin 7 is controls
36
38
digitalWrite(led,LOW);
Serial.flush();
}
CHAPTER 6
39
40
START
Initialize Variables
Verification
YES
NO
Relay unaffected
Bulb glows
END
41
CHAPTER 7
CONCLUSION
42
CONCLUSION
RFID is an evolving technology which has a great future scope with its advance
technology access. The role of RFID is not just confined to Aircraft identification
anymore; it is also lending a hand in various commercial uses. Almost each type of Radio
frequency Identification and Detection system can be used for the purpose of asset
management. Manufacturing plants have also been using RFID from a long time now.
These systems are used for tracking parts and working in process for reduction of defects,
managing production of various versions and increasing output. The technology has also
43
been useful in the closed looped supply chains for years. More and more companies are
turning to this technology for tracking shipments among the supply chain allies. Not just
manufacturers but retailers also are using this RFID technology for proper placement of
their products and improvements in the supply chain. The best part is that RFID is
convenient to handle and requires low maintenance at the same time.
44
CHAPTER 8
FUTURE ENHANCEMENT
45
FUTURE ENHANCEMENT
Present trends point towards the fast growth of RFID in the next decade. With around 600
million RFID tags sold in the year 2005 alone, value of market including systems,
services and hardware is likely to grow by factor of 10 between years 2006 -2016. It is
expected that total number of RFID tags delivered in the year 2016 will be around 450
times as compared to the ones delivered in the year 2006.
Commercial applications using Radio Frequency Identification and Detection like
logistics, transport, supply chain supervision, processing, manufacturing, medicine,
access control are also likely to grow by leaps and bounds. But this smart technology will
influence consumer sectors and government too. Barcodes and RFID will coexist for
years to come, although the latter is expected to replace the former in many sectors.
46
CHAPTER 9
REFERENCES
47
9. REFERENCE
http://discovery.bits-pilani.ac.in/Other/ceeai/sample-projectsynopsis.pdf
http://arduino.cc/en/main/software
http://www.electronicsforu.com/newelectronics/defaultcampaign.asp
http://www.efymag.com/admin/issuepdf/RFID-Based-SecuritySystem.zip
http://www.electronicsforu.com/electronicsforu/circuitarchives/view_arti
cle.asp?sno=458&id=4704
http://grietinfo.in/projects/MINI/EEE/DOC-B.13-RFID%20based
%20secured%20Access%20system.pdf
www.electronicsforum.com
NSK Electronics
48
And www.triindia.co.in
49