DOC PREVIEW
MIT 6 111 - RFID Tag Reader System

This preview shows page 1-2-3-19-20-38-39-40 out of 40 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

RFID Tag Reader SystemKatonio Butler and Akua Nti6.111: Introductory Digital Systems LaboratoryDecember 14, 2005AbstractRadio Frequency Identification (RFID) technology holds much promise as applied to areassuch as remote sensing and access control. The RFID reader system constructed in this projectwas des igned to demonstrate access control through the use of low-frequency ID cards. Thesecards contained identification data that is read by the reader, sent to a database where it iscompared to stored values, and implemented depending upon the level of access associated withit. If the c ard’s identification data is in the system, a stored image as well as the name of theuser associated with the ID card is displayed. If the data is not in the system, it notifies theuser with the me ss age “ACCESS DENIED!” on a display screen. The reader was successfullyconstructed using Ve rilog hardware description language in an FPGA.1Contents1 Introduction 42 RFID Tag Reader System Overview 43 Tag Reader System Module Descriptions 53.1 RFID Reader Chip (Akua) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53.2 Asynchronous Receiver (Akua) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73.3 Database (Akua) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73.4 Display (Katonio) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73.4.1 VGA ROM Display (Katonio) . . . . . . . . . . . . . . . . . . . . . . . . . . . 83.4.2 VGA Synchronizer (Katonio) . . . . . . . . . . . . . . . . . . . . . . . . . . . 83.4.3 Character Display (Katonio) . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Design and Testing 94.1 Design Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94.2 Testing and Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Conclusions 11A Verilog Code 12A.1 Top-Level RFID Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13A.2 Asynchronous Receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21A.3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26A.4 Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31B Miscellaneous 37B.1 PGM-to-COE Conversion Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37B.2 Card Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391List of Figures1 RFID Tag Reader System Block Diagram . . . . . . . . . . . . . . . . . . . . . . . . 62List of Tables1 Card ID Number Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Card ID Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3931 IntroductionRadio Frequency Identification (RFID) is a remote sensing and contol technology that can be usedto identify and track people or objects. Applications of the technology include logistics, inventorymanagement access control.An RFID system typically consists of a tag, or transponder, and a reader. The RFID tagcontains a digital memory chip with a unique ID, and an antenna to send data to and receive datafrom a reader. The RFID tag reader consists of a transceiver and decoder. The reader transmits acontinuous interrogation signal which is rece ived by a tag when it is within range. Upon receivingand decoding this signal, the tag sends the reader its identification data, which is typically a streamof bits.When the reader receives proper identification data from the card, it can then send commandsignals to the tag. Res ponding to comm ands from the reader, the tag sends out encoded data. Thisdata, which is sent out on an amplitude-modulated frequency, is received and decoded by thereader. The reader then sends it to a host computer to be processed.Our RFID tag reader system combines a tag reader module with a VGA display to demon-strate the use of RFID for access control. It displays messages and images that depend on the IDnumber of the card and the level of access associated with that number.2 RFID Tag Reader System OverviewA principal application of the RFID tag reader system is access control. Only people with cardswhose ID numbers are in the database can unlock a door or have some other ac ce ss to a facility.Additionally, if the system is used at a place where a human is checking identification, the guardcan make sure the person holding the card is the person associated with the card by viewing thepicture.Typical use of the tag reader system is as follows: A user holds up a card in front of thereceiver, parallel to the antenna. The value on the card is compared to values in a database,and a picture is displayed based on the card’s level of access. If the ID is in the database, thecorresponding picture and name is displayed on …


View Full Document

MIT 6 111 - RFID Tag Reader System

Documents in this Course
Verilog

Verilog

21 pages

Video

Video

28 pages

Bass Hero

Bass Hero

17 pages

Deep 3D

Deep 3D

12 pages

SERPENT

SERPENT

8 pages

Vertex

Vertex

92 pages

Vertex

Vertex

4 pages

Snapshot

Snapshot

15 pages

Memories

Memories

42 pages

Deep3D

Deep3D

60 pages

Design

Design

2 pages

Frogger

Frogger

11 pages

SkiFree

SkiFree

81 pages

Vertex

Vertex

10 pages

EXPRESS

EXPRESS

2 pages

Labyrinth

Labyrinth

81 pages

Load more
Download RFID Tag Reader System
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view RFID Tag Reader System and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view RFID Tag Reader System 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?