Introduction interface to the host PC framework where the


RFID is the Automatic
Radio Frequency Identification technology that uses the radio frequency
electromagnetic fields in order to identify the objects that consist of tags
when it comes to the reader. It is similar to the bar code identification
(Jung, 2013). The advantage of RFID is that it does not need any straight
contact as well as a line of sight scanning. 

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

The report reflects on
the working of the RFID system. It also discusses the technical problems the
technology is designed for with the limitation of RFID system. It evaluates the
organizational implementation of the technology with assessing its success in
the marketplace.

1.0 Working of Radio
Frequency Identification System

RFID consists of three
components such as an antenna, transceiver as well as transponder. With the use
of radio frequency wave, the antenna can transmit the signal which activates
the transponder (Ahn, 2013). After the activation, the transponder transmits
the data reverse to the antenna. The transmitted information is utilized to
illuminate the programmable logic controller that the activity happens. The
data that gathers from the transponder is moved all through the correspondence
interface to the host PC framework where the information is put away inside the
database and in addition it is examined.

Active RFID system
uses the battery-powered RFID tags to broadcast the signal. It is used to track
the actual time location of the high-speed situation including tolling (Vanitha
Sheba & Rajakumari, 2015). Active tags have much more readable range as
compared to the passive tags, but the active tags are more expensive. Passive
RFID system uses the tags with no such internal power source. The system uses
the electromagnetic energy that is transmitted from the RFID reader to power
it. It uses the applications such as accessing organize, tracking of file,
supply chain management as well as smart labels. The lower cost point per tag
formulates the passive RFIS system cost-effective for the

Explanation of the business or technical problem the RFID technology is
designed to solve

Within the business, the RFID system is used to improve the IT
asset utilization by tracking the servers. It also improves the document
management by tracking the location as well as a status of the document. It
reduces the inventory as well as improves the accuracy of inventory by
providing a proper image of the existing inventory with reducing the labor
required (Dhal & Sengupta, 2012). The most important are that it eliminates
repetitive entry of the data by entering the data into the database of the
computer. The RFID system helps the manufacturers to customize their products
for the customers. Customization increases the complication of the supply
chain; though it creates the process easier by giving with precise information
about the objects by tracking it (Song & Li, 2012). It also reduces the
cost of labor as well as time, by automatically recording the information about
the items received into the computer system.

As per the comparison between RFID as well as a bar code, RFID
is not better than barcodes, but the only advantage of RFID system is that it
does not need any line of sight. The RFID tags can be interpret as long as it
is in the range of the reader. Therefore, the tags are read at a greater
distance as well as the group of tags are read all at once (Jung, 2013). In
order to read the barcode, the reader can orient the bar code towards the
scanner to read it. 

3.0 Limitations of the RFID system with possible solutions

The following are the limitations of the RFID
system with its possible solutions:

Collision: At the time of attempting several tags result in a
collision of a signal as well as it causes loss of data. In order to prevent
it, anti-collision algorithms are used to be applied at additional cost (Dhal
& Sengupta, 2012). Due to a development of this technique, it aims to
reduce the entire read time as well as maximize the total number of tags to

Security and privacy issues: Depend on the field of application;
the use of tag sometimes causes security as well as privacy issues. The
unauthorized person can read as well as write the data stored as well as
transmitted from the tags (Gu et al. 2015). In order to prevent these
limitations, encryption should be used to ensure that all the data should be
authorized use. It should be intercepted as well as transmitted by the tag
reader as well as reader host communication.

Increase in expenses: Within the business, the supplier can
equip the warehouses as well as transport the vehicles with the readers. The
readers are connected with the computer networks to exchange the information.
Therefore, it requires additional costs to hire technical consultants as well
as additional hardware (Wang, 2012). The business invests in the sophisticated system
in order to process the data. Due to the use of this technology, it reduces the
cost of labor as well as zero tag information generation into account.
Therefore, the business can use this labor cost for the development of the

Accurate read rate: Sometimes, the smart tag technology does not
function properly, and the reader are unable to read the accurate rate on the
items as it is low. It also disrupts the transmission of the tags within the
warehouse (Prakashe & Rathor, 2014). The solution is that the system should
be maintained properly by the IT Consultant of the business so that the reader
can read the data accurately.