group 10teletraffic engineering tele probability.pptx

joelmshana 6 views 14 slides Jul 03, 2024
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

teletraffic engineering tele probability


Slide Content

NAME REGISTRATION NUMBER ANTHONY MLIPILI T/UDOM/2019/00726 HUMPHERY URIO T/UDOM/2019/00718 DWIGHT J DANDA T/UDOM/2019/00716 PLAYGOD NKUNDA T/UDOM/2019/00760 MARK GERVAS T/UDOM/2019/00788 JEREMIA G. KOOLA T/UDOM/2018/03641 SALU GODI SENGO T/UDOM/2018/10903 EVANCE DANDA T/UDOM/2019/00184 ALLY KASUWI T/UDOM/2019/00743

RADIO FREQUENCY IDENTIFICATION (RFID)

RADIO FREQUENCY IDENTIFICATION(RFID) Radio frequency identification(RFID) use radio waves to identify, track, sort and detect a variety of objects including people, vehicles, goods and assets without the need of the direct contact or line of sight.

RFID ARCHITECTURE The RFID systems consist of main three elements RFID tag or Transponder RFID Reader Middleware

RFID transponder/tag RFID tag is located on the object to be identified It consists of a chip and antenna A chip store unique serial number or other information based on the tag’s type of memory The antenna is used to transmit information from the chip to the reader RFID Tag can be attached or embedded in an object to be identified and can be scanned by mobile or stationary readers using microwaves.

RFID reader RFID reader communicate with tags through an RF channel to obtain identifying information It scan tags and then forward the information to the middleware In environments with many tags, a reader may have to perform an anti-collision protocol to ensure that communication conflict to not occur Anti-collision protocols permit readers to rapidly communication with many tags in serial order

RFID middleware RFID middleware is the interface that sits between RFID hardware and RFID applications Connect RFID readers and the data they collect, to enterprise information systems. Used to process, filter and aggregate information.

RFID operating frequencies Standard frequency range for RFID systems are: ( i )Low frequency (LF) Low frequency RFID tags operates between 30-500KHz The most ordinary range used is 125-134KHZ They have short read ranges of 10-20cm. They are cheaper than any of the higher frequency range They have low data read rate compared to the other operating frequencies .

High Frequency (HF) HF RFID tags operates between 10-15MHZ The most ordinary range used is 13-56KHZ They have higher transmission rate and ranges but also cost more than LF tags HF tags offer a higher data rate than LF tags They do not perform as well as LF tags

Ultra-high frequency UHF RFID tags operates in the 868>928MHz range UHF reader they have higher cost than LF readers. They offer a longer read range and cheaper to manufacture Microwave Microwave tag operate at either 2:45GHz or 5:8ghz Active tag may be read from range up to 30m They offer high read rates and read range than UHF Consume more energy compared to LF.

RFID standard Technology standard These standards deal with technological features of RFID technology. The technology standard mainly address tag-reader communication. Data standards These standard describe how information is to be structured and stored on RFID tag. These standards ensure compatibility and interoperability of the information transmitted among different parties. Conformance standards These standards provides agreement that specifies how a device is to be evaluated to ensure that it complies with a standard Application standards The application standards ensure that the system used are compatible and useful by anyone involved in the application described by the standard.

SECURITY MEASURES APPLIED IN RFID TECHNOLOGY Encryption Radio signals transmitted from the tag and the reader and can be detected several meters away by the other radio receivers. So as to avoid eavesdropping you must encrypt the tag content. Password protection on tag memory Passwords can be used to protect tag data, preventing tags from being read without the original owner’s permission. But if the passwords for all the tags are identical, then the data becomes virtually public.

SECURITY MEASURES APPLIED IN RFID TECHNOLOGY Faraday Cage An RFID tag can be shielded with a container made of metal mesh or foil, known as a “Faraday Cage”. This foil-lined container can block radio signals of certain frequencies and thus protect tagged products from being detected Active jamming Active jamming of RF signals refers to the use of a device that actively broadcasts radio signals in order to disrupt the operation of any nearby RFID readers. This physical means of shielding may disrupt nearby RFID systems

SECURITY MEASURES APPLIED IN RFID TECHNOLOGY Reader Protection Readers can reject tag replies with anomalies in response times or signal power levels which don’t match the physical properties of tags. If passive tags are used, this can be a way to prevent spoofing attempts