consig - IEEE Xplore

0 downloads 0 Views 1020KB Size Report
An RFID Attendance and Monitoring System for. University ... modifications in the RFID system can be easily done in order for the system to be ready for a new ...
An RFID Attendance and Monitoring System for University Applications A.

Kassem (IEEE Member), M. Hamad (IEEE Member), Z. Chalhoub, and S. EI Dahdaah, Department of Electrical and computer and communication Engineering Notre Dame University Louaize Zouk M osbeh akassem I [email protected]

Abstract-

The main objective of this paper is to enhance the

II.

university's monitoring system taking into account factors such

RFID systems are basically made up of two components: the first one consists of tags and readers, and the second is a computer software or application (a very important and essential component for the whole system) that can handle all the collected data, as shown in figure 1.

as reliability, time saving, and easy control. The proposed system consists of a mobile RFID solution in a logical context. The system prototype and its small scale application was a complete success.

However,

the

more

practical

phase

will

not

RFID SYSTEM COMPONENTS

be

immediately ready because a large setup is required and a part of the existing system has to be completely disabled. Some software modifications in the RFID system can be easily done in order for the system to be ready for a new application. In this paper,

CONSIG�

advantages and disadvantages of the proposed RFID system will be presented.

Keywords-component; RFID; University Monitoring system; I.

University

Attendance;

INTRODUCTION

Radio Frequency Identification (RFID) is not a new technology; it is a proven technology that has been used around 1940s as a way of remotely identifYing aircraft.s for military purposes, and has since been used widely in civil aviation [1]. By the 1980s, the same concept has been recognized as having a potential in commercial and industrial applications. Until now, it is still very expensive and limited to be practical for many commercial applications. Using the micro technology, the tags can be embedded in a very small package and have can store a serial number for every product [2]. Many applications are going to replace the barcodes and/or the magnetic cards by the RFID because using this technology multiple objects or products can be identified simultaneously and remotely [3]. In addition, RFID technology does not require scanning products or line of sight, because the RFID tags can be read as long as they are within range of a reader.

1-------..,

L

Reader

I -.... -.

/

\.,

i

Fig. 1. RFlD System Components

The RFiD device that actively transmits data to a reader was known as a tag; an RFID device that actively transmits was known as a transponder (transmitter+responder) [4]. Nowadays, tags and the transponder become common within the industry. The tags are located on the object to be identified come in different shapes and sizes depending on the field of

Furthermore, RFiD technology can help to identifY and to

monitor items (products, people, animals, etc . . . ) wirelessly within a specified distance (a few centimeters to hundreds of meters). In this paper, we describe the proposed RFID system for identifYing and monitoring attendance at Notre Dame University.

use, but they all share a common structure in the way that all consist of an antenna and a microchip as shown in figure 2. Each tag can store a maximum of 2KB of information in the microchips. Microchips in RFiD tags can be divided into two categories, read only (or "write once, read many") and read-write RFID tags [5]. These two categories can be divided into two sub-groups, passive and active tags. The first one does not need a power supply (battery), but the second needs a battery to power the microchip and to transmit signals to a reader [6].

Section II gives an overview of the RFID system components. Section III describes the hardware and software implementation of the system. Section IV highlights the system specifications and present preliminary results. Finally a conclusion is given in section V.

978-1-4244-8157-6/10/$26. 0 0 ©2010 IEEE

___ 1_ -

851

ICECS 2010

The main function of the reader is to provide the means of communicating with the tags and enabling data transfer [5]. A reader contains a transmitter and receiver, a control unit and a coupling element to the tag. Many readers are also equipped with an interface, which allow them to forward the received data to another system; an information system is a good example.



First the credentials needed are sent



The connection is checked: a)

If no connection: an exception is outputted

b)

If the connection succeeds, the result is shown on the status bar

In order to connect to the reader, the identification process should be done. Figure 4 shows this process. In addition, before disconnecting the Reader, a "Stop Listening" signal should be sent. Figure 5 shows the disconnection process.

SENDS TO READER: READER IP

Microchip

READER PORT

Fig. 2. Two Basic RFJD Tag.

III.

READER

USERNAME

HARDWARE / SOFTWARE IMPLEMENTATION

Many of the benefits that RFID offers are directly connected to savings that can be made with the new technology. Although the savings potential is difficult to predict, RFID is often marketed as the technology that will provide an organization with greater transparency and fewer unnecessary manual activities; thus lowering the costs in the long run.

Fig. 4. Reader Connect

Universities have increasingly become well aware of the importance of making processes less time consuming and more

READER CLOSE,

efficient. RFID could help to speed up the processes and thus reduce the lead time in several different areas such as parking, attendance, class access, and others. \I NOU . ADVANCED UNMRSIlY ID£NTlflCATlON SYSTEM

lC'"

I

""""'"

�ru""."

ConMC:t

Admll'ustrM.CNS

VetudH

CLOSES C ONNECTIO wnHREADER

'loi;ii� Conftgul.11On

lOO

logOut

......

I

�.rtllStttling StopLlStttling O'Konn«t SI:.,tLlStttl�

CHECK IF POSSIBLE

......

LOGIN

...

An RFID

- NOTIfY IF MO DE 0 FF - Auro M OD E OFF

Attendance and Monitoring System

- DISC ONNECT

DISPLAY,

- DISPOSE

for University Applications

RESPONSE

�AILUR

CHECK

Fig. 5. Reader Close �Ruden· Sl:ttl,lS



In order to create harmony between the different components of the network our program is based on two main tools. The first establishes communication between the server and the hardware (reader + antennae), and the second establishes communication between the server and the database.

Fig. 3. Start Listening

Figure 3 shows the main application window of this system. From this window all control menus will be reachable, once the Reader is connected to the system. The "Start Listening" phase represents the different phases of the initialization of the execution process:

The two forms used for establishing a communication between the application and hardware are: I-Start Listening, and 2-Stop Listening. These two forms allow the server to

852

Each time the system receives a request from the hardware, it connects to the database using an SQL connection, checks the data to verify whether or not an access granted. At the same time, our application stores all log info in order to provide later on monitoring while the user has the opportunity to track all the requests. All this is happening based on detailed queries created within the application during the development phase. One of the queries used to list all students select * from students as shown in figure 6; this query will list the entire student registered in the database.

control the reader using Microsoft.net, software development, Alienrfid.dll class library, and AAlienss.dll. A reference installed name alienrfid.dll must be added to the project system. The alien RFID software development kit provides us with many controlling features. In this system the following features were used: 1. "Reader info" initializes a new instance of the reader info class. 2. Interface types sets/gets a numeration identifying current reader interface as (TCP/IP).

All other tables are similar to the student table but with different parameters as shown in figures 7 and 8.

3. "IP address" sets/gets strings with readers IP addresses. 4. "Name" sets/gets strings with reader's name. 5. "Antenna" specifies which antenna is being used. 6. "Discovery Time", a read/write property representing time of tag discovery as a string.

INSERT INTO TABLE

7. "Host Name" hosts name of reader who reads this tag.

SET:

PARAMETERS:

8. "Command Port" gets/sets current network port number. In this project port number 23 was used.

NAME



MAJOR

5-

DATE OF BIRTH



9. "Tag List" sets/gets array of type of the tag information representing Alien Tag List.

FAMILY NAME

2-

3-

ID NUMBER

FACULTY

B-

STANDING

CREDITS LEFT

STUDENT PRIVILEGES

(

PARKING ACCE5 MWF - TTH -ALL DAY_ ClASS ACCESS

4-

LIBRARY ACCESS

6-

OFFICES ACCES

5-

6-



The forms used for establishing communication between an application and the hardware are as follows:



1-

2-

LAB ACCESS

1. Students (new, list) and reporting. 2. Instructors (new, list) and reporting. 3. Administrators (new, list) and reporting.

Fig. 7. Create New Student Entry

4. Vehicles (new, list) and reporting.

A utomatical l V tBkes

jJf"W�fln. d p;o,.m@te's:

To accomplish this, a database should be defined. It is an integrated collection of logically-related records or files consolidated into a common pool that provides data for one or more multiple uses. One way of classifying databases involves the type of content. This database consists of four main tables: students, administrators, instructors, vehicles; where each table consists of many fields, for example:

ltead.. ,p

R�det i>Oft

!teadet ooernsme R�d6 p8�\\'(ifd Ue,. t88 10

Student table consists of the following: name, family name, ID number, date of birth, faculty, major, student privileges, parking access, class access, library access, lab access, and system access.

CO N ECTIO C ti ECK

Fig. 8. Writing Infonnation onto Tag

IV.

SYSTEM SPECIFICATIONS AND PRELIMINARY RESULTS

The system uses the ALIEN 880 reader as and RFID tag reader; and the ACR-8611-C antenna. All readers are connected to the antennas via reverse polarity TNC connector.

Fig. 6. Student Management List

853

Every reader will have two antennas but can hold up to four as a maximum and to optimize and speed up the processes. The two antennas used are one for receiving the data and one for reading the data. The Alien Reader Protocol gives RFID users a well-equipped toolkit for implementing effective RFID solutions. This system is connected to a computer that can access the software and write all the required information needed for the database in the university (students, faculty/staff, administrators, etc . . . ). The connection between computer and reader can be done in two different ways: It can either be done in a wired manner using the CAT5 network cable that supports a bit rate of 100Mbps, or the connection can be done in a wireless manner. The reader is then configured as

to the database where all data is stored. Passive tags will be used for this entire project. As previously mentioned each RFID reader would have two or four antennas. For this system four antennas will be used for optimization reasons. As also mentioned in previous sections, two antennas for receiving data and two for sending, the tag will then be placed in front of the reader and all the data is then sent to it. Next the Alien Reader 880 is installed and tested. Every access door must have a reader, and every reader will have four ACR-8611-C antennas connected to it via reverse polarity TNC connector. The main reason behind having four antennas connected to the reader is to optimize the reading of tags in several ways. This method is also very essential for the parking

DHCP and automatically given an lP address.

A.

access areas. Parking access areas will have the same configuration as the one on access door, but the only difference is that a signal will be sent to open the parking access door if the person is authorized to enter. The same logic is also applied for the library and all other access doors.

Specifications

i)

Student Identification and Monitoring Module: The system is upgradable to handle up to 15 000 students



registered per semester, and keep record, at the same time,

Only two parameters should be taken into consideration when installing the reader, which are:

of old students while disabling their privileges to access any part of the university except for the alumni parking. •

2)

The system will keep student records, activities and their



Type of tag (layout)

privileges.



Material where tag is applied on

Faculty/StaffIdentification and Monitoring Module:

The maximum distance the reader can read a tag is ten meters and the optimal one is six meters. This all depends on how much power is given to the reader. The power that the reader operates at to read tags is controlled by the designer. One other important factor is the angle of which the reader is installed. The reader sends radio waves to read the tags and the waves' power depend on the input power to the reader.

The system will be able to handle 2500 members, divided



into full time faculties, part time faculties, and staff. Also the system must always keep record of all instructors at NDU even if they are not active at that present time. The system will keep record of instructors, their activities



and privileges.

3) •

Administrators identification and Monitoring Module:

V.

The system will be able to keep record of administrator's

In this paper, an RFID system for monitoring and identitying attendance at Notre Dame University is presented, and a small-scale prototype of the system was successfully implemented. This system offers reliability, time savings, and easy control/upgrade. It can be used for other applications such as payment systems, access control and quality tracking.

activities such as the time they come in to the university, get in to their offices, open the parking gate, and the time they leave the University, etc. with each authentication process being tagged with a date and time stamp. •

The system would enable the administrators to access all the offices and classes.

B.

CONCLUSION

ACKNOWLEDGMENT

Preliminary Results

The authors would like to thank lAMED SYSTEMS for being the sponsor for this research.

All computers are connected to the main server where all data is stored. Only Notre Dame University authorized computers are allowed to connect to wirelessly the server. The database used is the SQL database. For students, all related information registered on their IDs is handled by the student affairs office. So it is most logical to place a computer that has a direct connection to the main server where all data can be directly written, stored, modified, or deleted. Similarly, all instructors, administrative personnel, etc will have a main computer connected to the database. Finally, a computer monitoring all server actions must also be installed.

REFERENCES [I]

Parliamentary Office o f Science and Technology, "Radio Frequency

[2]

RFID Journal, http://www.rfidjournal.com/fagI16. visited on March 15,

[3]

Gareth R.T. White et aI., "A Comparison of Barcoding and RFID

Identification (RFID)," postnote July 2004 Number 225. 2010. Technologies

in

Practice,"

Journal

of

Information,

Information

Technology, and Organizations, Volume 2, 2007. [4]

Amit Rawal, "RFID:

The Next Generation Auto-ID

Technology,"

Microwave Journal, Vol. 52, No. 3, pp. 58-62, March 2009.

A software for data manipulation is written using VB.NET language and it is directly connected to the SQL database. In addition, writing the information on the tags is an essential step for the success of the system. Using this software, all the required information fields are written and the data will be sent

[5]

Intermec Technologies Corp., "RFID Overview: Introduction to Radio Frequency Identification," RFID Journal, 2006.

[6]

VidTroniX

L.L.C.,

"RFID

Tags",

http://www.vidtronix.com/RFIDTags.htm visited on March 15, 20 I O.

854