The History of RFID Technology: Benefits That Users of the Technology Are Bound to Accrue on Adoption Research Paper

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

RFID is fast taking shape as manifested by the recent media blitz and newspaper articles about the technology. Not many people can distinguish the different categories and benefits that technology brings. It is the purpose of this paper to highlight the history, uses, and benefits that users of the technology are bound to accrue on adoption. Although not widely used as its counterpart the bar code, RFID is poised to work best when incorporated with the barcode technology. With an integrated database in use, users of RFID can ease business operations and save time and cost for both the manufacturer and the end consumer of the products tagged. As much as there has been a media frenzy about the technology, comprehensive research and public sensitization should be carried for it to be truly appreciated (Burgess 265).

We will write a custom essay on your topic a custom Research Paper on The History of RFID Technology: Benefits That Users of the Technology Are Bound to Accrue on Adoption
808 writers online

Background Information

The history of RFID technology spans back to the days of the Second World War where research was conducted by Leon Theremin to use RFID technology to spy on other countries for the Soviet Union. Information was to be sent back to intelligence headquarters in the form of audio and hence conversations between individuals could be intercepted. This device was primarily used for listening rather than what the technology is used for today. Earlier on, the Royal Air force used similar techniques as that used in RFID in the identification of aircraft. Using IFF (Identification-friend or foe) transponders, aircraft could be determined if they belonged to the enemy or they belonged to one of their allies (Finkenzeller 63) A ground-breaking article by Harry stockman in 1948, forecasted that there was a need for proper research on reflected power communication for humankind to truly benefit from its numerous uses and applications. The first RFID technology that utilized memory was introduced in 1973 by Mario Cardullo, who is described as the father of the modern RFID. His first device was activated by an external signal and was applied in the collection of government revenue in the toll systems. The biggest user of RFID technology has been the Department of Defense which is currently using over 1.5 million tags in the tracking of containers that are shipped outside the US.

At present times research is now focusing on how to reduce the cost of equipment used for this technology in both the software and hardware aspect. Cheaper materials are being sought for this purpose and this is leading to better and more efficient solutions. Research is also focusing on how to transfer the information from the reader to other networks within an organization at a faster with greater emphasis on increasing the volume of data. As RFID becomes more popular, more and more products are being tagged and this is creating demand for the need for ways to deliver these bulky amounts of information from the reader to the database, to be reflected the users who need it. Manufacturers of the technology are also developing new standards that ensure interoperability between their equipment; this will lead to a greater variety for the consumer. Standards for this technology are dictated by the EPC (Electronic Product Code) which is made up of firms specializing in the manufacture and marketing of RFID products (Rochel 56).

Technical Aspect

Radiofrequency identification employs radio waves in the transmission of the signal from the tagged product to the reader which is located some distance away. Radio waves have the advantage of passing through obstacles. RFID technology encompasses a range of both software and hardware solutions for the purposes of identification of goods. These goods can be tracked regardless of the location and the only limiting factor could be the characteristic of the tag and the corresponding reader (Shepard 58). Some tags have an accompanying antenna which eases the reader in locating the tag. It also enhances the read rate of the tag. In essence, the reader transmits a signal to the tag and this signal is echoed back with information regarding the tag and the product attached to it. The relayed information is then analyzed using sophisticated software. The software also enables the users to locate the product in real-time about its state and history. Each tag has an exclusive number that is used to identify it from the rest. This number also has information on the manufacturer of the tag. Further information that may be useful to the relevant organizations may also be integrated into the tag. The reader can obtain this information wirelessly from a distance and the information is read at a high rate.

Components of RFID

Tag: This is a device that utilizes a microchip attached to an aerial which is miniaturized to beam back the signal received from the RFID reader with information about the product and its location around the organization. These tags come in all manner of shapes and sizes so as to be enclosed in all environments (Finkenzeller 89). The most preferred covering comes in plastic which ensures that the microchip and antenna are not susceptible to environmental elements of degradation such as heat and moisture. There are also active tags that also have a battery as an extra component.

RFID Reader: The reader is responsible for transmitting radio wave signals to the tag and collecting the received information. This information is relayed to a database where it is stored for further analysis. Some readers have multiple antennas in order to pick out tags and enhance the speed at which information from the tags is collected.

Computer/ Database: Information received from the tags is processed via software run from the computer. The computer also enables the data to be stored in databases that could be connected to other networks hence enabling the product to be located on a real-time basis

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Advantages of RFID

Since radio waves are employed in the location of objects, the product does not have to be within line of sight of the reader and this is a big advantage when taking into consideration that there are some products such as military hardware which could be dangerous when in close proximity. Such hardware could be radioactive materials. RFID tags are known to be durable as they can withstand environmental elements such as to much heat and this is one of the reasons that the military has used them in harsh terrains where climatic conditions are not favorable. RFID readers can detect tags that could be located far away. Active tags can be detected by readers located approximately 100 meters away. This gives the user advantage as they do not have to be near the tag. Another advantage that the technology has is that the readers can read multiple numbers of tags at the same time. This ensures that auditing and tracking of products are done faster and more efficiently. Last but not least is that the information stored on the tags can be altered when the need arises, this ensures that the tags can be reused in another carton and hence this saves the organization revenue which would have been used in purchasing new ones.

Forms of RFID

The tags are also categorized by the frequency they employ for operations. Frequencies normally used are between low (135 KHz), VHF (13.5 MHz), UHF (860MHz), and Microwave frequencies. These frequency groups dictate where the tags will be applied. For example, tags using low frequencies are used for tracking humans and animals. As we all know that live animals including humans are susceptible to the effects of radiation. These tags are also used for asset tracking. High-frequency tags (VHF) are used in a condition where interference from other environmental elements is unacceptable. Radio frequencies are prone to interference from water or metals that could be around the tag. This makes sit hard for the tag to be detected by a reader. Tags employing Ultra-high frequencies have the advantage of a longer reading range i.e. around three meters and the speed at which this information is read by the reader is also fast as compared to other tags using other frequencies (Espejo, 35).

There are three categories of RFID each displaying its different characteristics. The first class of RFID tags are active tags, they operate with the use of a battery that powers the tag in sending out waves to the reader. These tags are large and have a read range of approximately a hundred meters (Espejo, 42). Large amounts of data and be stored in them as the embedded microprocessor has a large capacity. It is these reasons that make the tag more costly than its counterparts. Another class of tags is passive tags that only have the microchip embedded into the tag. Unlike the active tag, the passive tag relies on the reader to activate a signal which will be picked up by the reader. These tags are much smaller and contain fewer data stored. They are much cheaper and the read range is much shorter i.e. less than three meters. The last class of RFID tags is battery-assisted passive tags which require a battery in order to send out a signal. The difference with this tag is that the signal transmitted can travel further and hence be picked up by a reader more easily. Such tags are used in rough terrain or in harsh environments where they may be hard to reach.

The tags can also be categorized in order of how the information is stored in the RFID tag. Some tags are read-only, meaning that data stored in the tag cannot be modified. The Information in such tags is mostly the unique code identifier that is used to identify the tag in the first place. This information is normally integrated when the tag was being manufactured (Espejo, 40). Some tags are categorized as write-once meaning that data can only be modified and lastly there are read/write tags. These tags can be read and data modified as many times as the user would like. Such tags are more costly than their counterparts.

Challenges Faced by RFID technology

As much as RFID technology has its benefits, it does have its challenges which are being addressed, and research into how to solve the issue is taking shape. The first set of challenges faced by RFID is on the technological front where large amounts of data have to be made available to all people within an organization at precisely the same time, This places an enormous burden on the network resources of a company and hence a comprehensive solution in terms of the readers and the backbone database has to be in place for all this data to be present to the users. As the number of tagged products increases so does the need to expand the network serving this technology. Another set of challenges that are faced by users of this technology is the issue of security. In highly complex environments, where there are a number of persons interested in the same product, sets of authorization have to be in place so as to enable the distinction between who the owners of the system are. These issues normally arise in supply chain environments where many companies and individuals are involved. There is also an issue with how the devices are configured as configurations differ from one manufacturer to another (Thornton, 108).

Solutions to Challenges

As stated earlier, the issues surrounding RFID are being dealt with by numerous research and development initiatives. These initiatives are focused on solving the issues surrounding this technology to make it more affordable to users and more adaptable for other applications. A good example of one solution used to tackle the problem of huge data overloads is that the companies need to come up with a network solution that is easily scalable with the demands of the firm (Finkenzeller 23). This will ensure that the technology grows at the same pace as demand and not just increase network resources blindly. Another solution to the challenge of complexity in configuration is presented in the form of manufacturers coming up with a clear set of standards as to how the technology will best be implemented. There are new standards that are always being incorporated within EPC in order to involve as many stakeholders as possible and also to make the technology as affordable and reachable to all.

Uses of RFID technology

RFID technology is used in numerous applications to increase revenue and reduce the time in which business operations are carried out. An example of applications of RFID is in the supply chain management including logistics. With RFID technology, these two processes have been automated in a manner that ensures less human involvement and more accuracy in the process, this leads to less time taken for the product to go from the manufacturer to the retailer (Thornton, 108). A good case is how Wal-Mart increased revenue by demanding all suppliers start using RFID technology. Also in the Manufacturing sector where automation of manufacturing processes is required such as the labeling of specific products and also control of the products in a manufacturing line, RFID tags and readers can be attached to the production line to identify which products are being produced. Another field that RFID plays is in the Logistics & distribution of items. Goods can be easily tracked from the factory up to the end consumer thus better security for all parties involved in the supply chain. Speed within the supply chain has been enhanced thus making the whole process of transporting goods much easier.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Conclusion

These are just some of the applications that we have discussed but the future of RFID technology is fast growing and in a few year’s time, the technology will be part and parcel of our lives as its adoption from the military to the mainstream population takes form.

Works Cited

Burgess, Stephen. Effective Web Presence Solutions for Small Businesses: Strategies for Successful Implementation. Sydney: Idea Group Inc (IGI), 2008.

Espejo, Roman. RFID Technology. New York, N.Y: Green haven Press, 2009.

Finkenzeller, Klaus. RFID handbook: fundamentals and applications in contactless smart cards and identification. London: John Wiley and Sons, 2003.

Rochel, Roman. RFID Technology and Impacts on Supply Chain Management Systems. Sydney: VDM Verlag, 2008.

Shepard, Steven. RFID: radio frequency identification. New York, N.Y: McGraw-Hill Professional, 2005.

Thornton, Frank. RFID security. California: Syngress, 2006.

Print
Need an custom research paper on The History of RFID Technology: Benefits That Users of the Tech... written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, March 14). The History of RFID Technology: Benefits That Users of the Technology Are Bound to Accrue on Adoption. https://ivypanda.com/essays/the-history-of-rfid-technolog/

Work Cited

"The History of RFID Technology: Benefits That Users of the Technology Are Bound to Accrue on Adoption." IvyPanda, 14 Mar. 2022, ivypanda.com/essays/the-history-of-rfid-technolog/.

References

IvyPanda. (2022) 'The History of RFID Technology: Benefits That Users of the Technology Are Bound to Accrue on Adoption'. 14 March.

References

IvyPanda. 2022. "The History of RFID Technology: Benefits That Users of the Technology Are Bound to Accrue on Adoption." March 14, 2022. https://ivypanda.com/essays/the-history-of-rfid-technolog/.

1. IvyPanda. "The History of RFID Technology: Benefits That Users of the Technology Are Bound to Accrue on Adoption." March 14, 2022. https://ivypanda.com/essays/the-history-of-rfid-technolog/.


Bibliography


IvyPanda. "The History of RFID Technology: Benefits That Users of the Technology Are Bound to Accrue on Adoption." March 14, 2022. https://ivypanda.com/essays/the-history-of-rfid-technolog/.

Powered by CiteTotal, cite machine
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1