An Overview of RFID Based Library Management System

Documentation of RFID Based Library Management System

Introduction to RFID

RFID stands for Radio Frequency Identification, a RF technology based identification system which enables identifying objects using the tags attached to them, irrespective of them being in the line of sight of the reader or not.

RFID System Components

There are two basic components in an RFID system apart from the control system unit, as given below

RFID Tags:RFID Tag

Figure 1: RFID Tag

An RFID Tag consists of a Silicon microchip, attached to a small antenna and both mounted on a substrate, which is encapsulated in different materials like plastic or glass veil. The Tag consists of an adhesive on its back side which enables easy attachment to objects.

RFID Reader:

RFID ReaderFigure 2: RFID Reader

An RFID reader is a network operated device which acts as an interface between the RFID tag and the system software utilizing data from the tag. It consists of an RF transceiver module along with antennas to transmit and receive information. It basically interrogates RFID tags irrespective of the distance from them.

Types of RFID System

There are two types of RFID systems

     1.Active RFID Systems: These systems consist of RFID tags with their own power source (external power supply or battery) and can be used for non-line of sight applications like tracking moving vehicles.

Click image to enlargeActive RFID vs Passive RFID

Figure 3: Active RFID vs Passive RFID System

     2. Passive RFID system: These are used for line of sight, short range applications where the RFID tags are powered through transfer of power from reader antenna to tag antenna.

Idea about RFID Based Library System

Here I am presenting a brief idea about how RFID based library system would operate. Conventional procedure in libraries involve manually handling functions like keeping record of the books (or magazines, journals etc.) being read at the place, or being given to the reader for a stipulated time-period, checking membership authenticity of existing readers, creating new memberships etc. Block Diagram of RFID Based Library System

These functions are usually done by a person who manually enters new data or modifies existing data in the software, making it tedious as well as time consuming. Hence a more convenient method would be a system where automatic handling of all these operations would be successful. One of the feasible methods is using Radio Frequency Identification System.

This would require each member to possess an RFID card whose chip would contain the person’s contact details, a unique identification code and details of the book (or journal, magazines etc.) in possession of that member.For any new entry, the system would require creation of membership, which would then allow the person to utilize the library amenities.

The identification code of the person would also provide him the authority to enter the library premises. Each item (read books, journals, magazines etc.) in the library would also contain a RFID tag with a unique code embedded in it. Each rack of the library would consist of a small embedded system comprising of a RFID reader, a microcontroller i.e. 8051 and a communication device i.e Max – 232 which exchange the TTL/CMOS logic to RS232 logic levels through the serial communication of Microcontroller with the personal computers.RFID Based Library Management System

Data from both the person’s RFID tag and from the book would be scanned by the RFID reader, which in turn communicates with the microcontroller. The microcontroller processes the acquired data and then sends the output data to the main computer for storing information in the database.  

Working & Block Diagrams of RFID Based Library Management System

This system would comprise of three sections – The main database section, the individual rack section and the entry section. The first section is the small embedded system installed at each rack of the library, second one consists of the personal computer consisting of the master database.

Given below is the block diagram of the entry section

RFID Based Library System for personInitially the member would be required to scan his/her RFID card onto the reader/scanner. The information from the scanner is obtained by the microcontroller connected to an LCD Display. The microcontroller would then send the member’s identification code to the main database section through GSM communication, for verification.

Once verified, the microcontroller would control the entry motor to open the door and simultaneously display instructions for the person to enter the book name or subject name he is searching for. As the person enters the book details (name or subject name), the microcontroller would send information to the main database section. If book is available, the required rack number would be displayed on the LCD. If not available, similar message would be displayed.

Given below is the block diagram of the individual rack section

Each rack would consist of an individual embedded system comprising of a microcontroller, reader and a communication system. As the person scans the required book onto the reader, it reads the information present on the RFID tag of the book, and transmits information to the microcontroller. The microcontroller would then again give instructions to the user for making the following choices: –

  1. Temporary Reading
  2. Issuing the book
  3. Returning the book
  4. Reissuing the book

If member chooses option ‘a’, he/she can keep the book with himself if he is inside the library. However, if he accidently or deliberately tries to exit along with the book, a system generated warning SMS would be sent to his number along with blocking his exit.

If member chooses option ‘b’, the microcontroller first verifies if the member has reached the limit for number of books issued. If ‘yes’, it would give instructions to the member for choosing option ‘c’. Else, it would send the member’s code along with the book’s code to the main databasesection for adding the book’s details to the member’s database.

If member chooses option ‘c’, the microcontroller would ask the member if he wants to return book or choose option ‘d’. If ‘yes’, the system would delete the book’s details from the member’s database.  If option ‘d’ is chosen, member’s database would be re-updated with the book’s details along with the new allotted period.

Given below is block diagram of the main database section

RFID block diagram of the main database sectionOnce the microcontroller at the entry section sends member information to the microcontroller of this section, it verifies the member details from the master database within the personal computer and sends the corresponding result.

The master database consists of sub databases for each member. Depending upon the option chosen (out of the four options mentioned in the above section), the microcontroller would add or delete the book’s details to his (the member’s) database. Apart from this, the microcontroller would also keep a tab on each person entering and exiting the place.

For instance, if a person choses to temporarily read the book and then tries to exit the library with the book, the microcontroller would send an SMS to the person for keeping the book back into its place, simultaneously re-transmitting instructions to the microcontroller at the entry section for controlling the door opening.

Applications, Pro & Cons of of RFID Based Library Management System

Advantages

  1. It would be a highly secured and authenticated system.
  2. Time consumption would lessen as the system is fully automatic.
  3. It would be an easy and convenient system.

Disadvantages

  1. With increasing number of racks, it would be difficult to sustain the cost of installation of an embedded system at each rack.
  2. As this system is completely automatic and does not require human control, it may be subjected to software failures at times.

You may also read:

The post An Overview of RFID Based Library Management System appeared first on Electrical Technology.



September 23, 2017 at 12:07AM

Substation ownership demarcation between the utility and the plant (considerations & issues)

The substation ownership demarcation between the utility and the plant is very important and should be determined carefully. Specific ownership of the substation and associated equipment may be a complicated... Read more
By EEE, ADBU

4 crucial devices used for distribution system protection (selection and installation tips)

A wide variety of equipment is used to protect distribution networks. The particular type of protection used depends on the system element being protected and the system voltage level. And... Read more
By EEE, ADBU

What is ZigBee Technology and How it works?

ZigBee Technology its Design, Architecture and Applications

Introduction to ZigBee Wireless Networking Technology

ZigBee is a IEEE 802.15.4 based, low power, low data rate supporting wireless networking standard, which is basically used for two-way communication between sensors and control system. It is a short-range communication standard like Bluetooth and Wi-Fi, covering range of 10 to 100 meters. The difference being while Bluetooth and Wi-Fi are high data rate communications standard supporting transfer of complex structure like media, software etc.,

ZigBee Technology supports transfer of simple data like that from sensors. It supports low data rate of about 250 kbps. The operating frequencies are 868 MHz, 902 to 928 MHz and 2.4 GHz. ZigBee Technology is used mainly for applications requiring low power, low cost, low data rate and long battery life.What is ZigBee Technology and How it works?

Also Read: Electric circuits / Networks and important terms related to it you must know

History of ZigBee Technology

ZigBee standard was developed by ZigBee Alliance including many major companies like Philips, Mitsubishi Electric, Epson, Atmel, Texas Instruments, etc. This Alliance was formed in 2002 as a non-profit organization.

ZigBee Architecture

The ZigBee Network Protocol follows IEEE 802.15.4 standards for Physical and MAC layers, along with its own Network and Application layers.What is ZigBee Technology and How it works?

Figure 1: ZigBee Architecture

Also Read: An Overview of Energy Conservation in Buildings

Given below is explanation for each layer.

  1. Physical Layer: This is the lowest protocol layer, and is responsible for controlling and activating the radio transceiver, and also for selecting the channel frequency and monitoring the channel. It is also responsible for communication with the radio devices. Communication of data or commands is done using Packets. Each PHY Packet consists of a Synchronization Header (SHR)(responsible for receiver synchronization), Physical Header (PHR)(contains information about Frame length) and PHY payload (provided by upper layers as a frame and includes data or command).
  2. Medium Access Control or MAC Layer: It acts as an interface between the Physical layer and the Network layers. It is responsible for generation of Beacons and synchronization of devices in the Beacon enabled network. A MAC frame can be a Beacon Frame (used by Coordinator to transmit Beacons), Data Frame, Acknowledge Frame or a Command Frame. It consists of a MAC Header (contains information about security and addressing), Variable length size MAC Payload (contains data or command) and a MAC Footer (contains 16 bit Frame check sequence for data verification).
  3. Network Layer: This layer connects the Application layer with the MAC layer. It manages the network formation and routing. It establishes a new network and selects the network topology. The NWK frame consists of the NWK Header and NWK Payload. The Header contains information regarding network level addressing and control. The NWK Payload contains the Application sublayer frame.
  4. Application Support Sub Layer: It provides a set of services through two entities – Application SupportData Entity and Application Support Management Entity, to the application and network layers. These entities are accessed through their respective Service Access Points (SAP)
  5. Application Layer: This is the highest layer in the network and is responsible for hosting the application objects which holds user applications and ZigBee Device Objects (ZDOs). A single ZigBee device can contain up to 240 application objects which control and manage the protocol layers. Each application object can consist of one application profile or program, developed by the user or the ZigBee alliance. The application profile is responsible for transmission and reception of data in the network. The type of devices and function of each device is defined in an application profile. The ZigBee Device Objects act as a interface between application objects, device profiles and the Application sub layer.

Network Topologies of ZigBee

ZigBee Network supports many types of topologies, the popular one being – star and peer to peer topologies. Each network topology consists of three types of nodes – ZigBee Coordinator, ZigBee Router and ZigBee End Device. The Coordinator performs the task of allocating unique address to each device in the network, initiates and transfers messages in the network and selects a unique identifier for the network. ZigBee devices are of two types –Full Function Device (FFD) and Reduced Function Device (RFD)ZigBee Network Topologies

Figure 2: ZigBee Network Topologies

In a Star Topology, the Coordinator is the central device which initiates and manages devices within the network. Each coordinator selects a unique identifier, which is not used by any other network within its region of influence. Each End Device communicates with the Coordinator. The end devices are generally RFDs which can only communicate with the Coordinator or the FFD.

In Peer to Peer Topology, each end device can communicate with one another placed in its vicinity. The devices are FFDs which can communicate directly with each other. However, this type of topology can contain a RFD which communicates with only one device in the network. A Peer to Peer Topology can be a Mesh topology or a Tree Topology.

Also Read: Automatic UPS system wiring circuit diagram (New Design Very simple) for Home or Office

Communication using ZigBee

Transfer of data can be between a Coordinator and Device or Peer to Peer. Data Transfer between Coordinator and Device can be done using two methods – Beacon Enabled and Non Beacon Enabled.

In Beacon Enabled Networking, contention free channel access method is used. Here the Coordinator allocates a particular time slot to each device, known as Guaranteed Time Slot (GTS). Here all the devices in the network need to be synchronized. This is ensured by sending a Beacon signal from the coordinator to each device (node), such that each device synchronizes its clock. However, this may end up reducing the battery life of devices when not in any other task than synchronizing their clock. 

Once the device is synchronized, it can transmit data to the coordinator using Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) method, wherein type of occupying signal is determined, or during the GTS allocation period.  On sending a request, the Coordinator sends back the acknowledgement. For transfer of data from Coordinator to device, an indication is send with the Beacon message to the device. The device then receives this indication and sends a data request message. The Coordinator sends an acknowledgment of this data request receipt and transfers the corresponding data.

In Non-Beacon Networking, the Coordinator does not transmit any Beacon message. Rather, each device transmits data using CSMA-CA method in the same frequency channel. The device transmits the data as soon as the channel is clear. For transfer of data from Coordinator to device, the device first sends a data request message to the Coordinator and then the latter transmits the data message with a null length payload, on availability of data. For no pending data, the Coordinator sends an acknowledgement indicating no data pending.

Also Read: What are Industrial Communication Networks? An Overview

Applications of ZigBee Technology

Home Automation: ZigBee technology proves to be the most reliable technology in realizing home automation. Different applications like controlling and monitoring energy consumption, water management, light control etc. have been made easier through automation using ZigBee technology.ZigBee Home Automation

Figure 3: ZigBee Home Automation

Industrial Automation: ZigBee based RFID devices help provide reliable access management in industries. Other applications in industries include process control, energy management, personnel tracking etc.

Healthcare Automation: A popular example of healthcare automation is remote health monitoring. A person wears a ZigBee device with a body parameter measuring sensor which collects the health information. This information is transmitting on the ZigBee network to the Internet Protocol (IP) network and then to the Healthcare personnel (the physician or the nurse), who would then prescribe proper medication based on the received information.

You may also read: Power Distribution in Industries – All You Need to Know

Apart from the above three, there are many applications of ZigBee technology. This is a brief introduction about ZigBee technology. Any other information regarding this technology is welcome in the below comments section.

Also read:

The post What is ZigBee Technology and How it works? appeared first on Electrical Technology.



September 13, 2017 at 03:29AM

Installing a submarine transmission cable, how they do it

Installing a submarine transmission cable is a costly and challenging activity. The lifetime of a submarine cable might be tens of years and the technical interventions for its repairing in... Read more
By EEE, ADBU

Main circuit breaker types from 1000 V MCB to 1000 kV dead tank breaker

This technical article discusses two important circuit breaker classifications – by voltage level (from low to medium and high voltage) and secondly by technology (extinguishing method or medium that insulates... Read more
By EEE, ADBU

Connecting transmission systems with system intertie transformers

System intertie transformers connect extra high voltage (EHV) transmission systems with different voltages up to 800kV together with the purpose that active as well as reactive power can be exchanged... Read more
By EEE, ADBU

Calculate Size of Ventilation Fan

  • Calculate Size of Ventilation Fan for Bathroom of 10 Foot Long,15 Foot width and 10 foot height .

Calculation:

  • Area of the Room=Length x Width x Height
  • Area of the Room=10 x 15 x 10 =1500 Cub. Foot
  • From the table Air Changing Rate (ACH) for Bathroom = 8 Times/Hour.
  • Size of Ventilation Fan = (Area of Room x ACH ) / 60
  • Size of Ventilation Fan = (1500 x 8 ) / 60 = 200 CFM
  • Size of Ventilation Fan = 200 CFM

 

Recommended Air Change Rates For  Room  (ACH)
Type of Room Air Change Rate /Hour Consider
Shower Area 15 To 20 20
Bathroom & Shower Rooms 15 To 20 15
Bathroom 6 To 10 8
Bedrooms 2 To 4 4
Halls & Landings 4 To 6 5
Kitchens 10 To 20 15
Living & Other Domestic Rooms 4 To 6 5
Toilets – Domestic 6 To 10 8
Utility Rooms 15 To 20 15
Cafés 10 To 15 15
Canteens 8 To 12 10
Cellars 3 To 10 6
Changing Rooms with Showers 15 To 20 15
Conference Rooms 8 To 12 8
Garages 6 To 10 8
Hairdressing Salons 10 To 15 13
Hospital Wards 6 To 8 7
Laundries & Launderettes 10 To 15 13
Meeting Rooms 6 To 12 7
Offices 4 To 6 6
Restaurants & Bars 10 To 15 12
School Rooms 5 To 7 6
Shops 8 To 10 9
Sports Facilities 4 To 6 6
Store Rooms 3 To 6 5
Workshops 6 To 10 8
Assembly rooms 4 To 8 8
Bakeries 20 To 30 25
Banks/Building Societies 4 To 8 5
Billiard Rooms * 6 To 8 5
Boiler Rooms 15 To 30 25
Canteens 8 To 12 10
Changing Rooms Main area 6 To 10 8
Changing Rooms Shower area 15 To 20 17
Churches 1 To 3 3
Cinemas and theatres * 10 To 15 12
Club rooms 0.12 0.12
Compressor rooms 10 To 15 15
Conference rooms 8 To 12 12
Dairies 8 To 10 10
Dance halls 0.12 0.12
Dental surgeries 12 To 15 15
Dye works 20 – 30 30
Electroplating shops 10 To 12  
Engine rooms 15 To 30 30
Entrance halls & corridors 3 To 5 5
Factories and workshops 8 To 10 10
Foundries 15 To 30 20
Glasshouses 25 To 60 50
Gymnasiums 0.6 0.6
Hospitals – Sterilizing 15 To 25 20
Kitchens – Domestic 15 To 20 15
Kitchens – Commercial 0.3 0.3
Laboratories 6 To 15 12
Lavatories 6 To 15 12
Lecture theatres 5 To 8 8
Libraries 3 To 5 4
Mushroom houses 6 To 10 8
Paint shops (not cellulose) 10 To 20 15
Photo & X-ray darkrooms 10 To 15 12
Public house bars 0.12 0.12
Recording control rooms 15 To 25 20
Recording studios 10 To 12 10
Shops and supermarkets 8 To 15 12
Squash courts 0.04 0.04
Swimming baths 10 To 15 12
Welding shops 15 To 30 20
 
 



September 03, 2017 at 10:02PM