Escolar Documentos
Profissional Documentos
Cultura Documentos
passif communication
El Harrak Hajri Mohammad, Asselman Adel
Departement of physics
Science faculty, Abdelmalek Essaadi University.
Tetuan, Morroco
E_mail : harrakmed@gmail.com, asselman57@gmail.com
I.
Introduction
A.Communication
The communication process between the reader and tag is
managed and controlled by one of several protocols, such as
the ISO 15693 and ISO 18000-3 for HF or the ISO 18000-6,
and EPC for UHF. Basically what happens is that when the
reader is switched on, it starts emitting a signal at the selected
frequency band (typically 860 - 915MHz for UHF or
13.56MHz for HF) . Any corresponding tag in the vicinity of
the reader will detect the signal and use the energy from it to
wake up and supply operating power to its internal circuits.
Once the Tag has decoded the signal as valid, it replies to the
reader, and indicates its presence by modulating (affecting)
the reader field.[2]
B RFID Tags
An RFID tag is an object that can be applied to or
incorporated into a product, animal, or person for the purpose
of identification and tracking using radio waves.
Some tags can be read from several meters away and
beyond the line of sight of the reader. Most tags carry a plain
text inscription and a barcode as complements for direct
reading and for cases of any failure of radio frequency
electronics.
The tags contain electronically stored information. .Tags
can be attached to any item, goods, and objects to track or
value the objects.[3]
Page 1
Passive Tags
Do not require power. Draws from Interrogator field
Active Tags
D. RFID Readers
Reader Functions
Remotely power tags
Establish a bidirectional data link
Inventory tags filter results
Communicate with networked servers
Can read 100-300 tags per second
Readers can be at a fixed point such as entrance
exit
Location Tracking
Page 2
B.Tag Cloning
Rather than simply trying to steal data from RFID tags,
adversaries might try to imitate tags to readers. This is a
threat to RFID systems currently being used for access.
Intruder can steal the content of tag and similar tag can
develop to imitate the behavior of original tag this we call as
cloning of tag this he can use it further misuse create
nuisance to users. Hence now RFID based systems are facing
huge difficulties. In future applications like RFID based
passport applications cloning is a more serious threat.[3]
IV- ULB Antenne large bande pour la communication
RFID en champ proche et lointain
In this work, we present the design of a new antenna
passive UHF RFID Tag for communications in near and far
field. This antenna is matching for a chip and optimized for
operation in near field. The minimum bandwidth of the
measured Tag antenna is 140 MHz. It covers the entire UHF
band (820-960 MHz). In our simulations, we used sequence
impedance of the chip given by the manufacturer and that of
the measured impedance.
A.Conception de lantenne propose
1.) Utilisation de la puce 1 : Impdance donne dans la
fiche technique
The structure that we propose for Tag antenna is shown in
Figure 5. The antenna consists of a rectangular adaptation
loop, fueling a gradual meander dipole.
Page 3
process, as well as the chip of the tag antenna and due to the
proximity of metal objects, liquids or human bodies, that can
change the frequency behavior of our RFID system and
impair operation, it is always better to have a tag antenna
covering the entire UHF RFID band, that is to say from 860
to 960 MHz, to ensure at least partial operation. That is why
we have made sure that the design of our antenna is best
reflection losses 10 dB at the working frequency. So we
could get a S11> 10dB approximately 155 MHz around 868
MHz, e 17.8%, from 730 to 885MHz.
The antenna has a gain meander of 1.5 dB. Del'antenne
the 3D radiation pattern is shown in Figure 5.The antenna has
a gain meander of 1.5 dB. The del'antenne 3D radiation
pattern is shown in Figure 9.
Page 4
Page 5