IntroductionRFID is the AutomaticRadio Frequency Identification technology that uses the radio frequencyelectromagnetic fields in order to identify the objects that consist of tagswhen it comes to the reader. It is similar to the bar code identification(Jung, 2013). The advantage of RFID is that it does not need any straightcontact as well as a line of sight scanning.
The report reflects onthe working of the RFID system. It also discusses the technical problems thetechnology is designed for with the limitation of RFID system. It evaluates theorganizational implementation of the technology with assessing its success inthe marketplace.1.0 Working of RadioFrequency Identification SystemRFID consists of threecomponents such as an antenna, transceiver as well as transponder. With the useof radio frequency wave, the antenna can transmit the signal which activatesthe transponder (Ahn, 2013).
After the activation, the transponder transmitsthe data reverse to the antenna. The transmitted information is utilized toilluminate the programmable logic controller that the activity happens. Thedata that gathers from the transponder is moved all through the correspondenceinterface to the host PC framework where the information is put away inside thedatabase and in addition it is examined.Active RFID systemuses the battery-powered RFID tags to broadcast the signal. It is used to trackthe actual time location of the high-speed situation including tolling (VanithaSheba & Rajakumari, 2015). Active tags have much more readable range ascompared to the passive tags, but the active tags are more expensive. PassiveRFID system uses the tags with no such internal power source. The system usesthe electromagnetic energy that is transmitted from the RFID reader to powerit.
It uses the applications such as accessing organize, tracking of file,supply chain management as well as smart labels. The lower cost point per tagformulates the passive RFIS system cost-effective for theindustries. 2.0Explanation of the business or technical problem the RFID technology isdesigned to solveWithin the business, the RFID system is used to improve the ITasset utilization by tracking the servers. It also improves the documentmanagement by tracking the location as well as a status of the document.
Itreduces the inventory as well as improves the accuracy of inventory byproviding a proper image of the existing inventory with reducing the laborrequired (Dhal & Sengupta, 2012). The most important are that it eliminatesrepetitive entry of the data by entering the data into the database of thecomputer. The RFID system helps the manufacturers to customize their productsfor the customers. Customization increases the complication of the supplychain; though it creates the process easier by giving with precise informationabout the objects by tracking it (Song & Li, 2012).
It also reduces thecost of labor as well as time, by automatically recording the information aboutthe items received into the computer system.As per the comparison between RFID as well as a bar code, RFIDis not better than barcodes, but the only advantage of RFID system is that itdoes not need any line of sight. The RFID tags can be interpret as long as itis in the range of the reader. Therefore, the tags are read at a greaterdistance as well as the group of tags are read all at once (Jung, 2013). Inorder to read the barcode, the reader can orient the bar code towards thescanner to read it. 3.0 Limitations of the RFID system with possible solutionsThe following are the limitations of the RFIDsystem with its possible solutions:Collision: At the time of attempting several tags result in acollision of a signal as well as it causes loss of data.
In order to preventit, anti-collision algorithms are used to be applied at additional cost (Dhal& Sengupta, 2012). Due to a development of this technique, it aims toreduce the entire read time as well as maximize the total number of tags toread.Security and privacy issues: Depend on the field of application;the use of tag sometimes causes security as well as privacy issues. Theunauthorized person can read as well as write the data stored as well astransmitted from the tags (Gu et al. 2015). In order to prevent theselimitations, encryption should be used to ensure that all the data should beauthorized use.
It should be intercepted as well as transmitted by the tagreader as well as reader host communication.Increase in expenses: Within the business, the supplier canequip the warehouses as well as transport the vehicles with the readers. Thereaders are connected with the computer networks to exchange the information.Therefore, it requires additional costs to hire technical consultants as wellas additional hardware (Wang, 2012). The business invests in the sophisticated systemin order to process the data. Due to the use of this technology, it reduces thecost of labor as well as zero tag information generation into account.
Therefore, the business can use this labor cost for the development of thesystem.Accurate read rate: Sometimes, the smart tag technology does notfunction properly, and the reader are unable to read the accurate rate on theitems as it is low. It also disrupts the transmission of the tags within thewarehouse (Prakashe & Rathor, 2014).
The solution is that the system shouldbe maintained properly by the IT Consultant of the business so that the readercan read the data accurately.