ACMQueue Wed, Apr 27, 2005    
 
Data Management
Debugging/QA
Sponsored by
Security Innovation
Developer Tools
Sponsored by
IBM
Open Source
Patching and Deployment
Security
Development Tools Directory
free subscription back issues news forums advertise with queue advisory board dev tools roadmap Search
 
Security Innovation
Comprehensive application testing and debugging with fault-simulation.
igrep Developer Search
Developer Search
Developer Toolbar
Latest Developer Jobs
· HCI Full-Time Faculty Position
· Software Developer
· Principal Software Development Engineer, Identity
· Hardware Ergonomic Scientist
· Assistant Professor of Computer Science
What's New
on ACM Queue
·A Call to Arms
·I Am an Abstraction Layer
·UML Fever: Diagnosis and Recovery
·Comments Are More Important Than Code
·Patching the Enterprise
go to issue index
Latest Comments
·oops
·reading code
·Using /* ... */ to delimit comments is gay
·inline comments, et al
·Why write unecessary comments?
Free Email Newsletter
Newsletter Information
privacy policy
Latest Developer Headlines
·New Debian Project Leader Takes Charge (DevX)
·Ballmer: Microsoft Will Virtualize Linux (InternetNews.com)
·WiMax Faces Uphill Battle for Dominance (TechNewsWorld)
·Microsoft Details More Longhorn Features (PC World)
·Adobe Launches Linux-Compatible Reader (LinuxInsider)
submit | more ...
Most Popular Articles
1Game Development: Harder Than You Think
2You Don't Know Jack about Disks
3Death by UML Fever
4A Conversation with Alan Kay
5A Conversation with Dan Dobberpuhl
 more
What's on
Your Hard Drive?
Tell us about your dev tools and you may win a Queue mug!




sections in this article
1: Radio Frequency Identification
2: How it Works
3: Moving Forward
4: Issues
5: Wrapping Up


Data Management -> Features -> RFID issue

The Magic of RFID

ACM Queue vol. 2, no. 7 - October 2004
by Roy Want, Intel Research
  printer-friendly format
  recommend to a colleague

Just how do those little things work anyway?

Radio Frequency Identification

Many modern technologies give the impression they work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (radio frequency identification), which is relatively new to the mass market, has exactly this characteristic and for many people seems a lot like magic. RFID is an electronic tagging technology (see figure 1) that allows an object, place, or person to be automatically identified at a distance without a direct line-of-sight, using an electromagnetic challenge/response exchange. Typical applications include labeling products for rapid checkout at a point-of-sale terminal, inventory tracking, animal tagging, timing marathon runners, secure automobile keys, and access control for secure facilities.

Click for Figure

In fact, various forms of crude RFID have been used since World War II. In the 1960s the technology became more practical, but the applications since then have resulted in relatively small tag deployments in narrow high-value areas without much public visibility. Also, given a tag’s small size and ability to be hidden or molded into the casing of a product, some people may have encountered RFID without realizing it was present.

In the last couple of years many RFID stories have appeared in the popular press. Why is RFID making a splash now, given that the idea is at least 40 years old? Most technologies have a window of opportunity for deployment, which is related to the scope of the problem it solves, the maturity of the technology, and the cost of deployment. On all three of these points the world has changed over the past 40 years. Inventory tracking is now necessary on an unprecedented scale to support growing consumer markets at low operating costs and to remain price competitive despite the relatively high labor cost in the developed countries. Furthermore, the components used to build the tags and tag readers have become more sophisticated. Today, they provide greater functionality, reading range, and speed of data transfer. As a result, they support the ability to accurately read a large number of co-located tags at the same time. Standards also play a role—an important new standard created by the former Auto-ID Center (whose work is now being carried forward by the not-for-profit EPCglobal) has recently brought together a number of influential organizations such as Wal-Mart, Tesco (UK), and the U.S. Department of Defense (DoD), all of which recognize the opportunity RFID brings to improve operational efficiencies.

     

Lastly, the ultimate incentive for deployment of a technology is cost. When the benefits and cost savings brought about by the technology are greater than the deployment cost, the time is right. Since tags would most often be attached to large inventories of relatively inexpensive products, the tags need to be inexpensive. Some analysts say a tag must cost less than 5 cents (others below 1 cent) for the technology to be truly competitive. By comparison, existing tagging technologies such as bar-code systems involve little more than the very low cost of printing lines on packaging. At present, RFID tags are in the 50-cent range for small quantities, a number that could be reduced to the target price if their use were to grow as expected.

Initially, commercial deployment is likely to focus on pallet- or crate-level tracking in a warehouse, and depending on its success, may lead to item-level tracking in the future. RFID could improve the efficiency of warehouse management considerably. RFID tags would allow crate identities to be checked at a distance when entering or leaving the building, whether or not the tag is directly visible. A bar code used in the same application could well be facing the wrong direction, making it impossible to scan automatically. Once RFID has proved beneficial and has been well established, economies of scale such as mass production should help bring down the price. This would enable item-level tracking for high-value goods, and perhaps eventually, even tracking low-value items.

There is clearly risk involved in investing in the infrastructure before it is truly adopted on a national or global scale, but at the same time the costs will not decrease until that risk is taken. The previously mentioned organizations are engaging in serious trials, and other big chain stores can be expected to follow. These companies have enough presence in their market segments that they can make the opportunity a reality. Once their own warehouses adopt the technology, their suppliers will also be required to follow suit, accelerating the adoption process. These possibilities have drawn a lot of press attention, inspiring a flurry of articles and discussion on the Internet.

LOOKING INSIDE RFID

Before considering the issues raised by this technology, it is helpful to understand the basics of its operation. An RFID system is composed of readers and tags. Readers generate signals that are dual purpose: they provide power for a tag, and they create an interrogation signal. A tag captures the energy it receives from a reader to supply its own power and then executes commands sent by the reader. The simplest command results in the tag sending back a signal containing a unique digital ID (e.g., the EPC-96 standard uses 96 bits) that can be looked up in a database available to the reader to determine its identity, perhaps expressed as a name, manufacturer, SKU (stock keeping unit) number, and cost.

An RFID tag is built from three components:

• Antenna

• Silicon chip

• Substrate or encapsulation material

These tags are generally referred to as passive because they require no batteries or maintenance. Tag operation varies according to the frequency at which the tag operates. Historically, four common ISM (industrial, scientific, medical) frequency bands have been used: 128 kilohertz, 13.56 megahertz, 915 megahertz, and 2.45 gigahertz (see figure 2).

Click for Figure

next page (2/5)
How it Works
next
Discuss The Magic of RFID
 
Latest Comments
 
What happens to RFID in a uwav... - If my microwave dinner is RFID tagged for easy che...
 
how-to abuse RFID... - RFID facilitates wireless remote reading of multip...
 
RFID, Electronic fence for wir... - Hello, I'm the audio engineer for a TV station...
 
Use it with a book... - Could I put sound on a RFID and use a device to li...
 
RFID Consumer?... - Zombie Wire RFID World News' main objective is to ...
 
Is it OK on airplanes... - Is this RFID tech OK on airplanes? I have to turn...
 
Is retail theft really difficu... - We all know about cell phone jammers installed in ...
 
RFID...... - Very interesting article and discussion. Have bee...
 
RFID reading in Liquid Nitroge... - If anyone is interested, we have a developed a sys...
 
Are we asking all the right qu... - I enjoyed reading what I thought was a generally w...
 
Informative... - As an electrical engineer, I have dealt with RF in...
 
RFID in china!... - yes,the same in china RFID attracts many people!i ...
 
tsk tsk tsk... - Any article that refuses to talk about the negativ...
 
Kill switches.... - It seems obvious to me that within minutes of a st...
 
Specific Security Suggestion... - Ahh, I'm sorry - I suggested security in a verbose...
 
Good article, but as we securi... - "Secure" things often and quickly become "insecure...
 
Collisions... - Nobody's telling. The articles gloss over it beca...
 
RFID Tags... - I have been messing around with a TI RFID developm...
 
2 gov uses not mentioned... - Bruce Schneir of Counterpane talks about the use...
 
Why the onslaught?... - I know the technology isnt new..but why in the las...
 
Insecure... - Does anyone remember viruses on floppy disks? Ima...
 
RFID... - Are auto makers already putting tags in plastic pa...
 
Confounded shall be they... - "Moreover they that work in light fiber, and they ...
 
What's the real story on colli... - This was a very informative article, and I appreci...
 
access control... - RFID systems have been used at my work place for a...
 
lowest temperature where RFID ... - I'd like to use RFID tagging at liquid nitrogen te...
 
Active RFID... - I enjoyed your article, however, the failure to me...
Post your comment now!
name:
email:
subject:
comment:
note: only <b>, <i>, and <br> tags allowed
More articles from our issue on RFID

The Burning Bag of Dung—and Other Environmental Antipatterns
    And you think you have problems?
Staying connected: Weaving a wireless safety net
    Relying on the pervasive technology network for security is potentially perilous when the technology fails.
A Conversation with Mike Deliman
    And you think your operating system needs to be reliable.
Calculating error rates for filtering software
    Establishing a blueprint for conducting and reporting tests of filter effectiveness.
Natural programming languages and environments
    An environment that works the way nonprogrammers expect is more inviting and helps users become more confident and productive.
Trials and Tribulations of Debugging Concurrency
    You can run, but you can't hide.
There’s Still Some Life Left in Ada
    When it comes to survival of the fittest, Ada ain’t no dinosaur
Thread Scheduling in FreeBSD 5.2
    To help get a better handle on thread scheduling, we take a look at how FreeBSD 5.2 handles it.
Electronic Voting Systems: the Good, the Bad, and the Stupid
    Is it true that politics and technology don’t mix?
Integrating RFID
    Data management and inventory control are about to get a whole lot more interesting.
Kode Vicious to the Rescue
    A koder with attitude, KV answers your questions. Miss Manners he ain’t.
The Magic of RFID
    Just how do those little things work anyway?
RFID Isn’t Science Fiction
    Is RFID going to wreak its havoc on your systems?
Recent Issues

Databases
Software Updates
Quality Assurance
Programming Languages
Error Recovery
RFID
VoIP
Virtual Machines


Subscribe to Queue in print. It's FREE!
First Name
Last Name
Company
Email
Street
City
State/Province
Zip/Postal Code


ACM home
about queue | contact us | privacy policy | advisory board | writer faq | RSS feed
© 2005 ACM, Inc. All rights reserved.