Professional Documents
Culture Documents
Submitted By
Sana Amir
10-TE-135
Faiza Mir
10-TE-141
Supervisor
Dr. Adeel Akram
Dean & Chairman of TED
Abstract
RFID based Vehicle Identification & Auto-Car Parking System
Sana Amir
10-TE-135
Faiza Mir
10-TE-141
Project Supervisor:
UNDERTAKING
I certify that project titled RFID based Vehicle Identification & Auto-Car Parking
System is my own work. Where material has been used from other sources it has been
properly acknowledged / referred.
Sana Amir
10-TE-135
Faiza Mir
10-TE-141
ACKNOWLEDGEMENTS
All praise belongs to God to whom all blessings flow and to Our Beloved Prophet
Muhammad (SAW) who is The Benefactor of whole Universe.
We would like to thank our parents for all their Love and support.
We would like to express our sincere gratitude to our supervisor, Prof. Dr. Adeel Akram,
for his guidance, and encouragement.
Contents
Abstract................................................................................................................................i
UNDERTAKING.................................................................................................................ii
ACKNOWLEDGEMENTS.................................................................................................iii
List of figures.......................................................................................................................v
List of tables.......................................................................................................................vi
1.
Introduction.................................................................................................................1
1.1.
1.2.
1.3.
PIC Microcontroller..............................................................................................3
1.3.1.
Rotating Motor...............................................................................................3
1.3.2.
Infra-Red........................................................................................................4
1.4.
2.
3.
Objectives..............................................................................................................4
Literature Review........................................................................................................5
2.1.
2.2.
Methodology................................................................................................................8
3.1.
Introduction...........................................................................................................8
3.2.
3.3.
3.4.
Gantt chart...........................................................................................................13
3.5.
REFERENCES...................................................................................................................15
List of figures
Number
Page
List of tables
Table 1.1: IEEE 802.11 Standards..3
Table 3.1: Timeline of expected design13
1. Introduction
1.1.
management and Access control. We are interested in the RFID proximity cards that are
commonly used for building access control at many companies and universities across the
world.
1.2.
IEEE 802.11 is an international standard for Wireless Local Area Networks (WLANs).
The name Wi-Fi (short for Wireless Fidelity) corresponds to the certification given by
Wi-Fi Alliance, a group that ensures compatibility between hardware devices that use
802.11 standard. A Wi-Fi network is actually a network that complies with IEEE 802.11
standard.
IEEE 802.11 standard specifies the two low level layers of the OSI model, namely: the
physical layer and data link layer. The physical layer defines the radio wave modulation
and signaling characteristics for data transmission. The data link layer is further
composed of Logical link Layer and Medium Access Control Layer. The physical layer
has three standards: FHSS, DSSS and Infrared. 802.11 standard has different variants
designated by alphabets a, b, g, n etc. depending upon the physical layer standard and
MAC they use.
802.2
(MAC)
802.11
Physical Layer
DSSS FHSS Infrared
(PHY)
Table 1.1: IEEE 802.11 Standards
1.3.
PIC Microcontroller
to the human eye because it radiates at infrared wavelengths, but it can be detected by
electronic devices designed for such a purpose. We are using this technology for safety
purposes. The IR sensor indicates the status of the vehicle that it has safely crossed the
barrier premises.
1.4.
Objectives
communication standard
To manage entry and exit for capacity estimation and reducing parking issues
To facilitate the employees of our department by automating the parking lot of
TED
To reduce cost of future RFID deployments at UET, Taxila
2. Literature Review
2.1.
ISO/IEC 14443 Part 2: Radio frequency power and signal interfaces [3]
Two types of cards are defined: Type A & B both communicate with the reader at
13.56MHz, have same transmission protocol but different modulation method, coding
schemes etc. ISO/IEC 14443 standard uses the term Proximity coupling device (PCD) for
RFID reader and Proximity integrated circuit card (PICC) for the tag.
2.2.
RFID systems are low bit rate wireless networks designed to exchange a very small
amount of data over a very short distance using tags and readers based on standard
interface protocol. RFID networks have begun to converge with short range wireless data
networks like Bluetooth, Zigbee, Wi-Fi and NFC, with RF part of RFID being expanded
to include these short range wireless technologies. It can be said that RFID applications
are going to piggy back on these Wireless personal area networks (WPANs) and
Wireless local area networks (WLANs) using active tags that communicate with these
technologies air interface protocol.[6] Active RFID has been integrated with the Wi-Fi in
the so called Wi-Fi enabled RFID. Wi-Fi enabled RFID is commonly used for location
based services (LBS) in which a physical object is tracked in a specific physical context.
The Active tags communicate with the Wi-Fi air interface protocol, in our design quite
the opposite has been proposed: the tags communicate with the reader with ISO/IEC
6
14443 air interface protocol at 13.56MHz however to take advantage of range of Wi-Fi,
the reader communicates with Wi-Fi networks air interface to transmit the data to the
central location through IP routing and Addressing.
A regular RFID system can only give Choke point location which means the tag
location is known in relation to the location of reader. On the contrary, Wi-Fi network can
give the precise coordinates of a tag using its own positioning algorithm similar to GPS.
In such RFID systems, Wi-Fi devices act as tags and Wi-Fi Access points as Readers. The
MAC address on the tag serves as a unique identifier and the specific coordinates are
determined by location software. Kidspotter is one such example that has used Wi-Fi
enabled tags to track children in a theme park. [7] AeroScout [8] and Cisco [9] have
published detailed reports on the utilization of Wi-Fi wireless networks for Active RFID.
3. Methodology
Proposed RFID Auto-car Parking System Architecture
3.1. Introduction
The main purpose of creating an RFID auto-car parking system is to facilitate the
employees of TED by providing them with the automated car-parking facility that is
reserved just for them. The goal of this project is to use Wi-Fi communication standard to
enable RFID readers to communicate wirelessly in a network. The RFID Readers will
send the tag data to the Server for authentication and received authentication information
is used for Access control for barrier opening mechanism and LEDs to indicate a valid
user.
The entire system is modeled as per the Block Diagram shown in Fig. 3.1. All the
hardware is divided in two parts, namely Client and Server, running the application
software which is developed as per client-server communication algorithms. The Work
assignment of the Client is to initiate communication with Server and establish link for
data transfer through TCP/IP protocol over the Wi-Fi Network, reading the UID of RFID
tags, sending the acquired tag information to the server for authentication, and generate
control signals to operate Access Control for barrier opening mechanism based upon
authentication information received from server. The function of the server is to listen to
the request of link connection from the client, to allow them to send tag data, to receive
8
and dispatch tag data to the database server for authentication, to match the UID of tags
with the that of Registered users in the database, send the authentication information back
to the requesting client for the access control mechanism and to enter the information
(date, check in time, Name) of registered users in the database against their UID to have a
log of entries.
Barrier
sends the UID of the tag along with the Device ID to the Wi-Fi Network Module to be
sent to the Server through TCP/IP link over Wi-Fi network for authentication. The server
replies with the requested authentication information, if UID of the tag matches that of
any registered users, the server sends the information about tag being authentic and vice
versa. The application program developed at server sends the authentication information
back to the client. The microcontroller is programmed to receive the authentication
information and implement access control. If the tag is authentic microcontroller makes
the GREEN LED glow and the barrier to open, otherwise if the tag is invalid the RED
LED glows and barrier remains down.
The Server is simply a Windows operating System based PC running the application
program with all the features required. The application running on the server is a
multithreaded parallel executable application developed in C# .NET framework. The
main work of Server is to receive the Tag data from the client over Network through
TCP/IP Server Application, to provide this information to the Database server for the
authentication of tags and data logging in case the tag is authentic, the server also sends
back authentication information to the requesting Client for access control mechanism.
The application has been developed in C# using socket programming; all the clients send
the tag information to the Server Using IP Address and Port Number defined for socket
3.2.
3.3.
11
3.4.
Gantt chart
12
Task Name
Duration
Start
Finish
literature Review
3 wks
Tue 1/10/13
Mon 21/10/13
2 wks
Tue 22/10/13
Mon 4/11/13
5 wks
Tue 5/11/13
Mon 9/12/13
designing circuitry(PsPice)
2 wks
Tue 22/10/13
Mon 4/11/13
buying equipment
2 wks
Tue 5/11/13
Mon 18/11/13
5 wks
Tue 10/12/13
Mon 13/1/14
5 wks
Tue 14/1/14
Mon 17/2/14
implementing prototype
5 wks
Tue 18/2/14
Mon 24/3/14
creating RTS
10 wks
Tue 25/3/14
Mon 2/6/14
3.5.
14
REFERENCES
[1] K. Finkenzeller, RFID Handbook, 2nd Edition New York: Wiley, 2003.
[2] Identification Cards--Contactless Integrated Cards--Proximity Cards-Part1: Physical
Characteristics, Int. Std. ISO/IEC 14443-1, ISO/IEC/JTC1 Inf. Technol., 1997,
ISO/IEC/JTC1.
[3] Identification Cards--Contactless Integrated Cards--Proximity Cards-Part2: Radio
Frequency Power and Signal Interface, Int. Std. ISO/IEC 14443-2, ISO/IEC/JTC1 Inf.
Technol., 1997, ISO/IEC/JTC1.
[4]
Identification
Cards--Contactless
Integrated
Cards--Proximity
Cards-Part3:
Initialization and Anti-collision, Int. Std. ISO/IEC 14443-3, ISO/IEC/JTC1 Inf. Technol.,
1997, ISO/IEC/JTC1.
[5]
Identification
Cards--Contactless
Integrated
Cards--Proximity
Cards-Part1:
Transmission Protocol, Int. Std. ISO/IEC 14443-1, ISO/IEC/JTC1 Inf. Technol., 1997,
ISO/IEC/JTC1.
[6]Charlie Fine et al, The Evolution of RFID Networks, MIT Case study retrieved from
www.cfp.mit.edu/docs/rfid-casestudy-march2006.pdf
[7] Jonathan Collins, Lost and Found in legoland, RFID Journal, July 09, 2004
15
[8]AeroScout, Utilizing WiFi Standard Wireless Networks For Active RFID, White
paper retrieved from www.mas-rfid-solutions.com/Utilizing%20WiFi%20.pdf
[9] Cisco, How Cisco tracks RFID with Active RFID and Wireless LANs, Cisco IT Case
study, Cisco India2
16