India: +91 406677 1418

WhatsApp no. : +919100386313

USA: +1 909 233 6006

Telegram : +15168586242

rfid Training

RFID Training Introduction:

RFID Training interrogators,their components and the functionality of RFID interrogators. You will also learn about interrogator antennas: their types, polarization and function. A section of this course is dedicated to interrogator operation, including air interface and data protocols, dense reader mode, anti-collision and other tag management practices. The last section of the course discusses interrogation zone configuration, as well as interference problems that can arise while optimizing the system.

RFID Online Training tutorial by Global Online Trainings is based on latest research, live project, & best possible industry update. Not only students will find this module advantageous to avail,but also on job professional will find it super flexible for attaining besides their regular job.

RFID Online Training Course Content

RFID BASIC CONCEPTS
  • Introduction to RFID
  • A modern history of RFID
  • An Attractive technology
  • Automatic Identification
  • Bar Codes:1
  • Bar Codes:2
  • Bar Codes:3
  • Code for Matrix Bar
  • Use of the Automatic Identification
  • What does a bar code reveal?
  • Do bar codes follow any standards?
  • How is a UPC bar Code made up?
  • What is a tag?
  • Active, Passive & Semi Passive Tags
  • More RFID tags
  • What does an RFID reader read?
  • How is an RFID tag different from a bar code?-1
  • How is an RFID tag different from a bar code?-2
  • How is an RFID tag different from a bar code?-3
  • RFID system
  • Some Advantages of RFID over bar codes
  • Bar Code reader for a moving conveyor
  • RFID reader for a moving conveyor
  • Anti Counterfeiting-1 & 2
  • Further advantage
  • Disadvantages of RFID
  • Summary of Basic Concepts
RFID PHYSICS
  • RFID Physics Module Outlines
  • What are the Waves?
  • Development of wave-1& wave-2
  • Parts of a wave
  • Electricity & Magnetism
  • A practical experiment
  • Amperes laws & Biot Savart’s Laws
  • Maxwell’s findings
  • Electromagnetic Waves
  • The Electromagnetic Spectrum
  • An electromagnetic wave
  • Transformers
  • Basic Radio Communication
  • A radio communication system-1& system-2
  • Antennas
  • Half wave dipole
  • Magnetic & Electric fields around antennas
  • Near field & Far field
  • What is Resonance?
  • A basic radio tuner
  • How does a Radio receiver work?
  • Modulation
  • Frequency Modulation
  • Digital Modulation
  • An example of Digital modulation
  • Amplitude Shift Keying & Frequency Shift Keying
  • Data transmission by radio
RFID SYSTEMS
  • Practical RFID systems
  • RFID Tags
  • A practical RFID system
  • Tags of RFID
  • Physical Construction
  • Smart label tags
  • Plastic encased tags
  • Tag Generations & Classes
  • Classifications of RFID systems
  • Tag frequencies
  • Countries & Tag frequencies
  • Countries & Tag frequencies
  • Selection of frequencies
  • RFID Readers
  • RFID Antennas
  • RFID Antennas
  • Near Field & Far field readers
  • Near Field reader
  • Far Field reader
  • Antenna coverage area
  • Electronic Article Surveillance
  • Working of an EAS reader
  • Contactless Smart Cards
  • How do Near Field systems work?
  • Data transfer in Near field systems
  • Data transfer using Load modulation
  • What is backscatter?-1
  • What is backscatter?-2
  • Data transfer using backscatter
  • Collisions
  • Space, Frequency & Time domain anti collision
  • Singulation
  • Tree Walking protocol
  • ALOHA
  • Slotted ALOHA
MIDDLEWARE & STANDARDS
  • What is Middleware?
  • Need for Middleware-1
  • Need for Middleware-2
  • Need for Middleware-3
  • Functions of Middleware
  • What is a Savant?
  • Middleware Architecture-1
  • Middleware Architecture-2
  • EPC global
  • Electronic Product Code
  • What is EPCIS?
  • Object Naming Service
  • What is an EPC tags?
  • How will system work?
  • Summary
  • Standards in RFID
  • The Air Interface Protocol
  • Standards in RFID
  • Standards laid by ISO
RFID APPLICATIONS
  • RFID applications
  • Pharma Supply Chain-1& Chain-2
  • Container tracking in a yard-1
  • Container tracking in a yard-2
  • Hospital patient identification & tracking-1
  • Hospital patient identification & tracking-2
  • Airlines baggage handling-1
  • Airlines baggage handling-2
  • Airlines baggage handling-3
  • Summary of Application
RFID SECURITY & PRIVACY
  • Security Issues in RFID-1 & RFID-3
  • Security Issues in RFID-2 & RFID-4
  • Eavesdropping
  • Summary of RFID Security
  • Privacy Issues in RFID
  • Example of Privacy invasion
  • Privacy protection
  • Using blocker tag
  • Blocker tags disadvantages
  • Killing Tags
  • Faraday Cage
  • Tracking with the RFID
  • Summary of Privacy Issue
  • Conclusion