Friday, February 7, 2020
IT - Radio Frequency Identification Essay Example | Topics and Well Written Essays - 2500 words
IT - Radio Frequency Identification - Essay Example This arises because of the simple reason that an wireless monitoring system is capable of checking the work that a person does or claims to have done in addition to even the personal chores that one might attend to. It is like any other personal monitoring system, like say a video-graphy station in a parking lot. There will of course, be occasions when the monitoring station infringes in to the privacy of the individual. The user of such devices has to exhibit caution and responsibility in addition to technical prowess. RFID comes under two basic technological models. One, we call the passive RFID tag and the other an active RFID tag. While the passive RFID tag has a pretty long life with no supporting batteries inside the tag, the active RFID tag has a battery inside it which makes the life of the tag relatively lesser though the power consumption of such tags are very small1. The corollary of such a limited life is that, the RFID tags cannot be embedded permanently inside any object or an animal body including man. If it has to be done, then it has to be a passive tag. The passive tags have another major limitation being that they cannot be read from a distance that is greater than two feet effectively. There are passive tags that are supposed to read even from greater distances but are not found effective. Technologically this limitation arises because of the fact that the RFID tag uses the induction technology of the radio frequency waves. There is always an RFID reader that is placed at strategic points. These readers emanate radiations all around and get triggered once it senses a response. These readers are generally directed and emit radiations only in one direction. In case of a passive tag, the waves sent out by the reader induces a current in the tag itself. This powers the operation of the tag and it passes to the reader a specific number or identification that forms the basis of communication between the two. However, in case of an active tag, the active tag receives the signal and is able to boost it and send it back to the reader. Since this has an internal source of power, the active tags can respond to even very feeble signals from the readers. This is the reason why while passive tags can be read out of a distance of one and half feet to two feet, that of the active tag is much more. And as we have seen earlier, the same reason also has a disadvantage that of life time limitation. RFID provides its users the facility of storage, retrieval, erase and rewriting of the data in the RFID tags from the remote reader. This makes the RFID immensely powerful and enables it to have details like the entire patient history in case of hospitals, payment histories in case of customers / vendors and production data in case you need to monitor the work in progress. Remote reading and writing of data into the RFID tags also make it the right kind of tool to monitor animals in a farm and assets or library books that are issued and returned or routed to some body else. All these are massive advantages for industries. However, these can also be misused by having and storing data that goes into the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.