Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
slider contactless 1

Coding in RFID systems: Sending meaningful data via radio waves

Chris Corum   ||   Apr 01, 2003  ||   ,

A revised version of this article was printed in a later issue of Contactless News. Click here to read the updated version.

In the past two lessons, we have examined the concepts of frequency and modulation. This month, we will examine coding. First a brief review of the recent building block concepts that are essential to our understanding of coding.

All RFID systems rely on radio waves to carry data between a transponder and a receiver or a card and a reader. We learned that frequency is the key defining component of these radio waves.

Frequency refers to the number of cycles or waves per second and it is the difference in frequencies that enable a system to sort out the signals of importance to it from the myriad of signals flowing through the air. And we learned that specifically altering a radio wave, meaningful data can be transmitted on it. Modulation defines this altering of radio waves in a manner to carry data.

But just how does the modulating of radio waves enable data transmission? The answer is found in the concept of coding. Coding refers to a modulation pattern that is understood and shared by both a transponder and a receiver. Like Morse code–the series of dots and dashes used to transmit data in the past– radio frequency coding relies on two states to indicated binary data. The states can be thought of as modulated and un-modulated, though different coding schemes encode data into the modulating states in different manners.

Before we delve into the common coding schemes used in RFID systems, let's briefly review the fundamental concept of binary data. All digital systems use binary data to represent information. Any letter, number, or symbol can be signified by a specified pattern of zeros and ones. For example, the letter ‘A' can be represented as 00101 while the letter ‘B' is represented as 01011, etc.

In different systems, these zeros and ones can be indicated by different binary situations. Examples include:
dots and dashes in Morse code, positively and negatively charged particles on a magnetic stripe, black and white bars in a barcode, and so on. The binary situation used to represent the zeros and ones in an RFID system consists of the modulated and un-modulated–or the specific changes created via modulating–cycles of a radio wave.

Knowing the specific differences between coding schemes is more than most of us will ever need. Understanding the conceptual differences between them, however, will provide you with a good working knowledge of coding and the operation of RFID systems.

Though there are a number of coding schemes used in RFID, we will examine three common varieties for the purpose of illustrating the concept.The varieties described below with accompanying diagrams are NRZ Coding, Manchester Coding, and Miller Coding.

NRZ Coding

NRZ is short for Non Return to Zero coding. In this scheme, ones are represented by a high signal and zeros by a low signal.

Manchester Coding

In this scheme, ones are represented by a transition for high-to-low while a zero is represented by a transition from low-to-high. Unlike NRZ, Manchester relies upon the transitions within the measurement period to define the data. NRZ, on the other hand, relies on the state during the period with transitions occurring between measurement periods.

Miller Coding

In this scheme, a one is represented by a transition (either high-to-low or low-to-high) within the measurement period while a zero is represented by the lack of a transition.

While these are simplistic explanations of coding methods, they should suffice to illustrate how meaningful data can be carried on radio waves. Each coding scheme has its own unique set of strengths and weaknesses. The choice of which coding scheme to use, however, is not typically the left to the card issuer. Rather, it is built into the operating protocols employed by a specific RFID system, be it an industry standard technology or system proprietary to its developer.

Environmental parameters are often taken into consideration when the coding scheme is selected. Variables such as power sources, acceptable error rates and correction procedures, and modulation type (ASK, FSK, or PSK) can make one coding type better than another in a specific application. Additionally, systems frequently use a different coding scheme for card to reader transmissions than for reader to card transmissions.

Just keep in mind that coding schemes are not magic. Like Morse code, they are simply a system for encoding data onto the carrier waves in a manner that is shared and meaningful to both the transponder and the receiver.

Subscribe to our weekly newsletter

RECENT POSTS

Genetec stats
Dec 01, 23 /

Hybrid cloud, cyber fears, supply chain hangovers lead trends in physical security

In its annual “State of the Physical Security 2024” study, Genetec surveyed more than 5,500 end users and channel partners to get their perspectives on the market in 2023. Of the respondents, 32% were from North America and the remaining 68% were split between other regions across the globe. Key findings saw cloud-based access control […]
Amazon One Enterprise turnstile

Amazon makes move into access control space with palm biometrics

  The Amazon One Enterprise solution is a palm-based identity service that enables employees and other authorized users to access to buildings and facilities as well as computers, data, and online services. In the announcement, AWS highlights its increased security and user convenience as well as the cost savings associated with ID card issuance and […]
Northern Arizona University mobile ID
Nov 28, 23 / ,

Mobile ID drives massive growth in mobile app usage at Northern Arizona University

Northern Arizona University’s JacksCard went mobile two years ago and never looked back. The mobile credential was initially released to students in Apple Wallet, but one year later in August 2022, Android availability was added to the mix. With the help of their transaction system partner TouchNet, they accomplished the initial launch of the mobile […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Join us, @NACCUorg, and @TouchNet to explore how campus card programs can successfully navigate the sales and procurement process. Join the webinar on June 6, 2 pm EDT. https://go.touchnet.com/l/652093/2022-05-18/lsndq

Webinar: Learn how the University of Arizona uses campus cards, mobile ordering, kiosks, lockers, and robots to revolutionize campus dining. April 7, 2-2:30 EDT. Register Now at https://register.gotowebinar.com/register/7821245544009488910?source=campus-id

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2023 CampusIDNews. All rights reserved.