124
Fall 2006 Introduction to Introduction to RFID RFID Choong Seon Hong Choong Seon Hong Kyung Hee University Kyung Hee University [email protected] [email protected]

Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University [email protected] [email protected]

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Fall 2006

Introduction to Introduction to RFIDRFID

Choong Seon HongChoong Seon Hong

Kyung Hee UniversityKyung Hee University [email protected]@khu.ac.kr

2Fall 2006

RFID InfrastructureRFID Infrastructure

CouplingTag

Antenna

Reader

RFID Middleware

Server

Host Server

3Fall 2006

Software ComponentsSoftware Components

Tag ReaderHost

ComputerNetwork

RFID System Software

RFID Middleware

Host Application

4Fall 2006

““Slap and Ship” ProcessSlap and Ship” Process

1. De-palletize cases

3. Enter # of cases

2. Scan SKUs

4. Print RFID case labels

Sequenceof

Operations

5. Apply labels manually

6. Re-palletize cases

7. Print RFID pallet labels

8. Read RFID tags on pallet

9. Print reports & ASNs

5Fall 2006

RFID Tag AnatomyRFID Tag Anatomy

Integrated Circuit (IC)

Antenna

Courtesy of Alien Technology

6Fall 2006

RFID ChipRFID Chip

7Fall 2006

Basic tag assemblyBasic tag assembly

8Fall 2006

Why the excitement?Why the excitement?

9Fall 2006

Barcode vs. RFIDBarcode vs. RFID

Barcode Requires line of sight between reader and label Can read many labels simultaneously but expensive Many symbologies – UPC-A, Code 39, UCC128, Unique serialized identity not standardized

RFID “No Human” data collection Does not require line of sight Can hold more data than bar codes Data can be changed or added to as a tag passes throug

h specific operations More effective in harsh environments (sealed tags) Reads many tags simultaneously (cheaply) Each tag uniquely serialized as standard (EPC)

10Fall 2006

:

01•0000A89•00016F•000169DC0

01•0000A89•00016F•000169DC1

01•0000A89•00016F•000169DC2

01•0000A89•00016F•000169DC3

01•0000A89•00016F•000169DC4

01•0000A89•00016F•000169DC5

01•0000A89•00016F•000169DC6

01•0000A89•00016F•000169DC7

:

Simultaneous read of

numerous tags-

Multiple transactions

posting

Transaction ProcessingTransaction Processing

RFID Portal

PO: 2456 PO Line: 12 SKU: 34878 Qty:1

One read of bar code

-

One transaction

posting

Bar Code Scanning

Automated Data Collection RFID Data Collection

11Fall 2006

Proximity technologyProximity technology

Presence known if within a certain radiusDo not know exactly the position

Cycle count Smart shelf

12Fall 2006

How RFID works !How RFID works !

13Fall 2006

RFID & Product LifecycleRFID & Product Lifecycle

Distribution

Customers

Manufacturing

ProcessEfficiency

•Supply Chain Efficiency•Replenishment•Product Recall•Loss Prevention

•Track and Trace•Receiving•Cycle Count•Packing•Shipping•Interplant Transfers

•Track WIP•Monitoring/Time Stamp•Value-Added Processing•Lot id/Serialization

14Fall 2006

WalWal∗∗Mart MandateMart Mandate

RFID tags with EPCs(Eletronic Product Codes) are required on all pallets and cases Cases are defined as totes, reusable plastic containers or corrugated boxes Electronic ITEMS such as television set, stereo, or CD must be tagged.

Tag requirements EPC Global Class 0 or 1, moving to Class 1 Gen 2 when available A logo on the tag stating it is there

Reader accuracy requirements Dock doors: 100% on all pallet tags on forklift traveling at 5-7 mph Conveyors: <= 540 fpm, 6 inch gap between products, 100% at all orientatio

ns Information Processing

EPC compliant middleware that works with existing infrastructure, no ONS or PML

15Fall 2006

Why they want it?Why they want it?

Automated check-in Visibility of product movement from backroom to the

floor Eventual linkage to the POS (point of sale) Replenishment feedback to suppliers Reduction in personnel and increase in accuracy Ultimate goal – reduce “out of stocks”

The costs are borne by the supplier

16Fall 2006

1870s

1873Maxwell’s equations

published

1880s 1890s 1900s

1887Hertz experimentally

proved Maxwell’s equations

1905Einstein proves light

is a constant

1940s 1950s 1960s 1970s 1990s1980s 2000s

1942Friend or Foe

1999Auto-ID Center

MIT

Wal-Mart Mandate

2003

2003RFID used

By DoD Operation Iraq Attack

1989Toll CollectionBy the Dallas

North Turnpike

Late 1960s

Electronic Article Surveillance

(EAS)

RFID – Historical PerspectiveRFID – Historical Perspective

17Fall 2006

An implementation based only on the air interfaceAn implementation based only on the air interface

18Fall 2006

RFID InfrastructureRFID Infrastructure

CouplingTag

Antenna

Reader

RFID Middleware

Server

Host Server

19Fall 2006

Software ComponentsSoftware Components

Tag ReaderHost

ComputerNetwork

RFID System Software

RFID Middleware

Host Application

20Fall 2006

RFID System SoftwareRFID System Software

Read/Write Basic functions of a tag

Anti-Collision Establish cooperation between tags and readers Algorithm to sequence tag response to reader’s request

Error Detection/Correction Encryption, Authorization, and Authentication

(Security) Secure data exchange

21Fall 2006

RFID MiddlewareRFID Middleware

Monitors device health and statusManage RFID-specific infrastructure and data

flow Encoding, collection, processing, filtering and

aggregation of data transmitted by tags and Data normalization

• Different formats• Communication protocols

Fall 2006

How to apply a proximity technology to How to apply a proximity technology to resolve a business problem?resolve a business problem?

23Fall 2006

RFID interrogation zoneRFID interrogation zone

“Choke point” Any point where the material flows in a specific

direction and a business process can be associated to it

Business processes Receiving Shipping Raw goods transfer Etc…

24Fall 2006

Conveyor portalConveyor portal

25Fall 2006

Conveyor portalConveyor portal

26Fall 2006

Dock door setupDock door setup

What you need! High-powered UHF system Ample power to the antennas in the interrogation zone Reader set to constantly poll for tags

Setup Decide on the area to be covered and the number of

antennas to use Determine where to place the antennas Install them and make sure they are canted Perform a thorough path loss contour mapping (PLCM)

27Fall 2006

Dock door setupDock door setup

121.50

119.00

36.00

6 3.00

1 8.67

1 2.93

3 6.00

0 6.00

LightStack

Bollard

DC600 RFIDPortal System

28Fall 2006

Dock door setupDock door setup

29Fall 2006

Dock door setupDock door setup

30Fall 2006

Shrink-wrap stationShrink-wrap station

Best results achieved for reading cases on a pallet

Turntable of the stretch-wrap machine is constantly changing the location and orientation of the tags, giving the readers many attempts to read each of the tags as the pallet spins in the same spot

31Fall 2006

Smart shelfSmart shelf

HF (13.56 MHz) – Near Field -1 to 6 inchesLess affected by metals or liquidsState change as reading modeHF tags must be perpendicular to the

magnetic field for couplingFaraday’s law at work here

32Fall 2006

Smart shelfSmart shelf

33Fall 2006

PortalsPortals

Anywhere where you have a “choke” point Doorway portals

Item-level tracking Security and personnel access Asset tracking Electronic Article Surveillance (EAS)

Security portals Sensitive secure areas of Government facilities Active RFID asset tracking in hospitals

Luggage portals Airports

Car or bus portals Tollroad booth Commuter lanes

34Fall 2006

1. De-palletize cases

3. Enter # of cases

2. Scan SKUs

4. Print RFID case labels

Sequenceof

Operations

5. Apply labels manually

6. Re-palletize cases

7. Print RFID pallet labels

8. Read RFID tags on pallet

9. Print reports & ASNs

Tag and ShipTag and Ship

35Fall 2006

Inline production applicationInline production application

No tangible ROI on tag and ship Migrate process upstream to production line Benefits

Eliminate breakdown and rebuild of pallets Automatic work-in-process tracking Better controls for companies fulfilling orders from inventory and

then manufacturing to those order volumes May bring greater speed and accuracy to quality assurance and

shipping processes

36Fall 2006

Other applicationsOther applications

Ski resorts RFID wrist bands w/ dollar amount Tracking of individuals and their preferences Diminished lines for the ski resort Counterfeiting eliminated

Law enforcement Tracking imports Controlling access to secure areas Tracking evidences Drug shipments

Pharmaceuticals Theft and counterfeiting

• Viagra Diversion

• Tiered pricing structures

37Fall 2006

Additional Business ApplicationsAdditional Business Applications

Hazardous materials and recallsWarranty verification and returnsManufacturingMaintenance

Airline industry• Boeing• Airbus

38Fall 2006

Keyless Remote

EAS

ProductAuthentication

Ticketing

RFID Sample ApplicationsRFID Sample Applications

Airline baggage ID Sports Timing

Document Tracking

Express Parcel ID

EPC Supply Chain

Highway Toll Collection

Smart Cards

and many more…

39Fall 2006

Tag selectionTag selection

40Fall 2006

How passive tags are definedHow passive tags are defined

41Fall 2006

Tag characterization testTag characterization test

1. Connect a single antenna to a reader through an attenuator2. Mount the antenna 2 feet away from a flat surface like your SKU

(stock keeping unit) testing stand3. To characterize a certain type of tag, gather at least 100 of the same

type of tags4. Test the tags one at a time under the antenna for readability. Slowly

turn down or attenuate the signal until the tag can no longer be read and record the results

5. When you have complete data for 100 tags, set the antenna up on the edge of your grid that’ furthest from the direction you will be positioning the tag, so you can get as far away from the reader as possible

6. Test several of the tags, one at a time, that were of the highest attenuation value and see how far they can be read and then repeat the process for each of the different tag attenuation values

42Fall 2006

Tag testing processTag testing process

Use Figure 9-1 at page 161

43Fall 2006

Tag testingTag testing

Tag is the only thing that should vary during the test

Isolate the performance of the tag Location on the case Orientation (vertical, horizontal, random)

Examine the material composition of the items in the case

44Fall 2006

Physics and tag performancePhysics and tag performance

Absorption (loss)Reflection/refractionDielectric effectsComplex propagation effects

Standing waves Multi-pathing

45Fall 2006

Material effects on RFID communicationsMaterial effects on RFID communications

Material Composition Effects on RF Signals

Corrugated cardboard Absorption from moisture

Conductive liquids Absorption

Glass Attenuation (weakening)

Groups of cans Multiple propagation effects; reflection

Human body/animals Absorption; detuning; reflection

Metals Reflection

Plastics Detuning (dielectric effect)

46Fall 2006

RF friendliness pyramidRF friendliness pyramid

47Fall 2006

Best spot for testingBest spot for testing

1. Determine whether the outside packaging material is RF transparent

2. If the packaging material is RF transparent, open the container and visually inspect the contents

3. Determine where the contents fit on the RF pyramid4. Rank eight or ten different areas of the object on their

positions in the RFID pyramid based on how close to the peak they are

5. Start your tag testing by using the highest ranked (most RF-friendly) areas

48Fall 2006

Label PlacementLabel Placement

Reader Location

Customer Requirements

Package Contents Pallet Loading

Packaging Materials Package Orientation

Handling RequirementsPackage Design/Branding

49Fall 2006

Label placementLabel placement

50Fall 2006

Label placementLabel placement

51Fall 2006

Selecting tags to testSelecting tags to test

Not all tags are created equal… To get a statistically significant result, test 100 tags of each ty

pe. Method

1. Activate the reader and set the attenuator to its lowest output power2. Place a single tag in the filed generated by the reader in autoread mode3. Manually adjust the attenuator to increase it power drain on the signal returning fro

m the tag4. When the tag no longer can be read, record the corresponding value on the attenu

ator for the tag you’re testing5. Repeat steps 1 through 4 for all 100 tags6. Calculate the average attenuation value and standard deviation for the 100 tags tes

ted7. Grab tags that have a tested attenuation value close to the calculated average

52Fall 2006

Tag performance index (TPI)Tag performance index (TPI)

Evaluate performance across all channels in a particular frequency band

Three critical performance measures Percent of successful reads Dispersion of reads across the ISM band Ratio of nulls, or poor performers, to successful reads

Measurements are entered in a simple formula that yields a TPI (range from 0 to 100)

53Fall 2006

Tag test setupTag test setup

Equipment Fixed-mount RFID reader and single circularly polarized antenna Tag testing software Wooden or plastic table Measuring tape

Set up1. Position the antenna and the reader at least 25 feet from any

obstructions that may interfere with the interrogation zone2. Mount the antenna approximately 3 feet off the ground in a fixed

location3. Mark off 1-foot measurements heading directly out from the

antenna4. Position the table with the tagged product directly in front of the

antenna, 1 foot away

54Fall 2006

Tag testTag test

Three methods1. Collect Frequency Response Characterization

(FRC) at 3 different distances – 1, 3, and 5 feet

2. Move the tagged object farther and farther away until it cannot be read and then compare different distances with each other

3. Take reader threshold power measurements

55Fall 2006

Frequency Response Characterization (FRC)Frequency Response Characterization (FRC)

Goal:Find the optimal product/tag combination that works well across the entire RFID spectrum of choice

Required: Software tool Signal generator Spectrum analyzer or reader

Test Pick 50 channels at random Issues 100 read commands Record number of successful read cycles Record number of successful tag wake-ups Repeat the same test for different tag placements and distances

56Fall 2006

FRC Results ExampleFRC Results Example

% Reads @ Distance

Tag Type Placement 1’ 3’ 5’

I Tag 1 98.36% 68.42% 24.64%

2 97.36% 17.72% 1.78%

3 98.54% 1.12% 0.00%

Strip 4 98.10% 40.18% 4.54%

5 97.92% 3.76% 0.00%

6 97.92% 1.10% 0.00%

Squiggle 7 99.46% 71.40% 27.58%

8 95.72% 71.74% 22.15%

9 95.72% 25.48% 0.00%

10 99.36% 5.38% 0.00%

11 95.64% 77.82% 14.22%

57Fall 2006

UHF Gen 2 memoryUHF Gen 2 memory

58Fall 2006

UHF Gen 2 memoryUHF Gen 2 memory

59Fall 2006

UHF Gen 2 memoryUHF Gen 2 memory

60Fall 2006

UHF Gen 2 memoryUHF Gen 2 memory

Fall 2006

ReaderReader

62Fall 2006

Reader typeReader type

Hand-held Acceptable if you have only one or two tags per read location No reader with high power output and long battery life available

Mobile Printer, reader and bar code scanner can be in one easily movable

solution Communites using 802.11 back to main database

Fixed location Located at choke points Ability to automatically count and capture data without human interv

ention

63Fall 2006

Portable ReadersPortable Readers

RFID Antenna

RFID Antenna

64Fall 2006

Reader evaluation criteriaReader evaluation criteria

Determine all the costs involvedTest reader performanceAssess connectivity

Network connectivity Manufacturer’s configuration software Manufacturer’s data export software Upgradeability

Evaluate how well a reader can be fine-tuned

65Fall 2006

Costs involvedCosts involved

Purchase price Installation costsMaintenance costs

Replacing readers Upgrading for new protocols and standards Changing configurations Replacing damaged antennas

66Fall 2006

Assess connectivityAssess connectivity

RS-232 Well-known reliable system for short-range wired communications Communications speeds are low (9600 bps to 115.2 Kbps) Length limited to 30 meters No error control Point-to-point communications system

RS-485 Similar to RS-232 Greater cable lengths (up to 1200 meters) Higher speeds (up to 2.5 Mbps Bus protocol

Ethernet Connectivity solution of choice for RFID Ethernet infrastructures very common Speed sufficient for RFID readers Reliable communication protocol: TCP/IP TCP/IP packets can only travel 100 meters

67Fall 2006

Reducing cabling needsReducing cabling needs

Wireless connectivity Eliminates the need for a separate network conne

ction Need power IEEE 802.11 Wi-Fi

Power over Ethernet Power and connectivity delivered over the same C

AT-5 cable Maximum power output of 15.4 watts

68Fall 2006

Reader fine tuningReader fine tuning

Forward compatibility with future tag protocols Make sure your reader is upgradeable to Gen 2.0 via software or firmware u

pgrade Get written commitment from vendor

Tunability Acquisition cycle design (timing and number of wakeup, read, and sleep co

mmands) Acquisition frequency Timing No standard configuration tools across readers Experiment with various settings to find the common setup to use in your op

erations Flexible power output

Many tagged items have a maximum performance threshold well below the maximum power output of a reader

Minimize power output for each application

69Fall 2006

Reader fine tuningReader fine tuning

Clean RF output RFID tags have simple timing device to synchronize with the carrier

signal emitted by the carrier Signal phase variance ➙ Trouble “Splatter” – Undesirable additional frequencies generated

by the reader Antenna programmability

Multiplexing• No two antennas are ever active at the same time• Avoid interference and data collision

Change sequence to fit needs of your application• Default – 1,2,3,4,1,2,3,…• Custom – 1, 2 ,3,3,3,4,1,…

Always design the system for the most challenging use case

70Fall 2006

Installing a Reader and AntennasInstalling a Reader and Antennas

1. Mount the readera. As far from harm’s way as possibleb. Clean and dry place with normal temperaturec. Six-inches clearance all around the reader for ample airflow and easy cablingd. Away from any source of EM wavese. Consider a ruggedized RFID rack

2. Mount and connect the antennasa. Decide the locations of the antennasb. Map the RF path loss contourc. Mount the antennas and protect them from people or machineryd. Attach the antenna in sequential order

3. Power up the readera. Similar to booting up a PCb. Goes through internal verificationsc. Put a tag in front of the antenna to verify if the reader can read it – Light flashes on

4. Test the interrogation zone for RF path loss

71Fall 2006

UHF Gen 2 commandsUHF Gen 2 commands

72Fall 2006

Select commandSelect command

73Fall 2006

Select commandSelect command

74Fall 2006

Select commandSelect command

75Fall 2006

Inventory commandsInventory commands

76Fall 2006

Inventory commandsInventory commands

77Fall 2006

Inventory commandsInventory commands

78Fall 2006

Inventory commandsInventory commands

79Fall 2006

Inventory commandsInventory commands

80Fall 2006

Access commandsAccess commands

81Fall 2006

Access commandsAccess commands

82Fall 2006

Access commandsAccess commands

83Fall 2006

Access commandsAccess commands

84Fall 2006

Access commandsAccess commands

85Fall 2006

Access commandsAccess commands

86Fall 2006

Access commandsAccess commands

87Fall 2006

Access commandsAccess commands

88Fall 2006

Access commandsAccess commands

89Fall 2006

Security featuresSecurity features

Fall 2006

Reader testsReader tests

91Fall 2006

Reader power and path loss Reader power and path loss

Reader transmit power (Pr) of 30 dBm

Reader receiver sensitivity (Sr); -80 dBm or 10-11 watts

Reader antenna gain (Gr); 6 dBi

Tag has a power requirement of -10 dBm, or 100 microwatts Tag antenna has a gain (Gt) of only 1 dBi

The tag’s has a backscatter efficiency (Et) of -20dB

λ = 33 cm

P

2

2

4 d

GGPP trrt

4

2

t

trr

P

GGPd

92Fall 2006

Basic distance testBasic distance test

1. Find location with little to no AEN2. Affix a RFID tag to an empty cardboard box3. Layout measurement grid outward from reader4. Set up the reader in the factory default setting (usually full

power) with a single antenna attached5. Mount the antenna 3 feet off the ground6. Put the cardboard box on the SKU table7. Measure the number of reads over a 60-second time

period at 2, 4, 6, 8, 10 and 12 feet away from the antenna8. Record the results from each reader and compare the

numbers

93Fall 2006

Conveyor testConveyor test

Specific speed conditions required by various mandates 600 fpm 6 inches separation between each case

Expensive to implement a loop conveyor for testing Upwards of $200,000. – High acceleration Build up acceleration and speed over time

94Fall 2006

Running a conveyor testRunning a conveyor test

Set up the readers in their fastest polling mode and read at gradually increasing speeds (400, 600 and 1200 fpm)

Test a baseline RF-friendly product, such as cardboard box

Test around your most RF-unfriendly itemsTest your most representative or popular

productsMeasure at least 50 passes

95Fall 2006

Interpreting the resultsInterpreting the results

Control variables Speed Product

Dependent variable Average number of successful read cycles completed per pass

Normalized the data for each reader Raw data for each product divided by baseline data (empty cardboard

box) Eliminate all firmware- and software related variables Compare each reader performance against its own unique baseline

Note: Make sure you use the same tags on the same cases of products for all readers involved eliminating case and tag variance

96Fall 2006

ResultsResults

PAPER

0 0.5 1 1.5

400

600

1200

Sp

ee

d (

fpm

)

Relative Performance

SAMSys

Symbol

AWID

Alien

METAL

0 0.2 0.4 0.6 0.8 1 1.2

400

600

1200

Sp

ee

d (

fpm

)

Relative Performance

SAMSys

Symbol

AWID

Alien

97Fall 2006

Test for FCC ComplianceTest for FCC Compliance

1. Set the power of reader to maximum (should be 1 watt)2. Set up the spectrum analyzer with a center frequency of 915

MHz and a span of 50 MHz so that you can record all activity from 865 to 965 MHz

3. Monitor the reader for 60 minutes and keep the hold lock ON in your spectrum analyzer to record all the read points

4. Look for any signals outside the 902-928 MHz range

98Fall 2006

Antenna gainAntenna gain

99Fall 2006

Coax feeder cableCoax feeder cable

100Fall 2006

Coax cable routingCoax cable routing

101Fall 2006

Setting the reader powerSetting the reader power

102Fall 2006

Avoiding reading holesAvoiding reading holes

103Fall 2006

Limiting interferenceLimiting interference

104Fall 2006

Reading ratesReading rates

105Fall 2006

Secrets of Read SuccessSecrets of Read Success

Avoid cross talk Adjust power output Utilize reader triggering Use software to coordinate readers

Ensuring high-speed reads Tune the reader acquisition mode Change how the antennas are pointed

Executing full pallet reads Place tags on the outer cases of a pallet Adjust antenna sequencing to focus RF power on challenging

areas Tune the reader acquisition mode

Fall 2006

MiddlewareMiddleware

107Fall 2006

RFID System SoftwareRFID System Software

Read/Write Basic functions of a tag

Anti-Collision Establish cooperation between tags and readers Algorithm to sequence tag response to reader’s request

Error Detection/Correction Encryption, Authorization, and Authentication (Security)

Secure data exchange

108Fall 2006

Why a middleware?Why a middleware?

Tag and reader physics solves only the problem of being able to capture RFID data

You must process the incoming RFID data and intelligently integrate it into your business applications

Reasons Not all of the incoming RFID data is valuable Not all readers speak the same language Different RFID information needs to be passed off to different

applications and data stores

109Fall 2006

Middleware capabilitiesMiddleware capabilities

Reader and device management Configure, deploy, and issue commands directly to the readers

Data management Filter and route data to appropriate destinations

Application integration Messaging, routing and connectivity features to integrate RFID data into existing host systems (WMS, SCM,

ERP and CRM) SOA

Partner integration Sharing RFID data with partners to improve collaborative processes

Process management and application development Orchestrate RFID-related end-to-end processes No human involvement

Packaged RFID content Routing logic Product data schemas Integration with RFID-related processes like shipping, receiving and asset tracking

Architecture scalability and administration Dynamically processing loads across multiple servers Reroute data when server fails

110Fall 2006

RFID MiddlewareRFID Middleware

Monitors device health and statusManage RFID-specific infrastructure and data

flow Encoding, collection, processing, filtering and

aggregation of data transmitted by tags and Data normalization

• Different formats• Communication protocols

111Fall 2006

Three tiers of RFID middlewareThree tiers of RFID middleware

Fall 2006

Active RFID systemActive RFID system

113Fall 2006

Tag Types and ApplicationsTag Types and Applications

Tag Type Advantages Disadvantages Application

Active Greater read range,

memory capacity,

continuous signal.

Batteries require maintenance.

Larger size.

Used with high-value

asset tracking

Semi-passive Greater read range,

longer battery life

Battery wear

and expense.

Reusable containers

and asset tracking

Passive Read/Write Longer life, multiple

form factors, erasable

and programmable

Time and expense

to program

Case & pallet applications.

Approved for use

with Wal-Mart.

Passive WORM Suited for item

identification,

controllable at the

packaging source

Limited to a few

re-writes, replacing

existing data with

new data.

Case & pallet applications.

Approved for use

with Wal-Mart.

Passive Read Only Simplest approach Identification only,

no tracking updates

Case & pallet applications.

Approved for use

with Wal-Mart.

114Fall 2006

Different tag classesDifferent tag classes

115Fall 2006

Active RFID InfrastructureActive RFID Infrastructure

116Fall 2006

Classification of passive and active tagClassification of passive and active tag

Characteristics Passive RFID tag Active RFID tag

Power Source Provided by a reader Inbuilt

Availability of power Within the field of reader

Continuous

Signal Strength (Reader to Tag)

High Low

Signal Strength (Tag to Reader)

Low High

Communication range

< 3meters >100 meters

Tag reads < 20 moving tags @ 3mph in few seconds

>1000 moving tags @ 100mph in 1 sec

Memory 128 bytes 128 Kbytes

Applicability in supply chain

Applicable where tagged items movement is constrained

Applicable where tagged items movement is variable and unconstrained

117Fall 2006

RFID family treeRFID family tree

118Fall 2006

Passive RFID characteristicsPassive RFID characteristics

119Fall 2006

Communication range Communication range

120Fall 2006

Memory capacityMemory capacity

121Fall 2006

Devices and interfaces that are used by Devices and interfaces that are used by Active RFIDActive RFID

                                                                          

Source: IDTechEx.

122Fall 2006

FrequenciesFrequencies

315 to 433 MHz Most popular

2.45 GHz Increasingly important Suitability for RTLS ZigBee WiFi Blue Tooth

13.56 MHz Near Field Communication NFC Semi-passive RFID sensor devices

123Fall 2006

Applications of active RFIDApplications of active RFID

Condition monitoring tags, asset tags, RTLS, etc.

Animals, people and thingsAnimals, farming, research, libraries, archiving, leisure, manufacturing, financial and other

VariousVariousSecure access/other security and safety

Active, active with sensing, RTLS, SAL

People, assets, conveyances, vehicles

Healthcare

Smart seals, RTLS, RFID with sensing

Assets, consumables, conveyances, vehicles

Postal and Courier

Air industry

SAL, e.g. self-adjusting use by date, in-transit condition monitor

Items, assets, conveyances, vehicles

Consumer goods and retail

Smart wrist and ankle bandsPeoplePrison (correctional facility) and parole service

Key fobs, etc., active with sensing, RTLS, SAL

Vehicle, premises and computer access, vehicles, ticketing, assets

Passenger transport/automotive

Active, active with sensing, RTLS, SAL

Items, assets, conveyances, vehicles

Other Logistics

Smart seals and RTLSIntermodal containers, etc.Smart and Secure Tradelanes global initiative

Smart seals, RTLS, RFID with sensing

Assets, consumables, conveyances, vehicles

Military

TagsLocationApplication

Condition monitoring tags, asset tags, RTLS, etc.

Animals, people and thingsAnimals, farming, research, libraries, archiving, leisure, manufacturing, financial and other

VariousVariousSecure access/other security and safety

Active, active with sensing, RTLS, SAL

People, assets, conveyances, vehicles

Healthcare

Smart seals, RTLS, RFID with sensing

Assets, consumables, conveyances, vehicles

Postal and Courier

Air industry

SAL, e.g. self-adjusting use by date, in-transit condition monitor

Items, assets, conveyances, vehicles

Consumer goods and retail

Smart wrist and ankle bandsPeoplePrison (correctional facility) and parole service

Key fobs, etc., active with sensing, RTLS, SAL

Vehicle, premises and computer access, vehicles, ticketing, assets

Passenger transport/automotive

Active, active with sensing, RTLS, SAL

Items, assets, conveyances, vehicles

Other Logistics

Smart seals and RTLSIntermodal containers, etc.Smart and Secure Tradelanes global initiative

Smart seals, RTLS, RFID with sensing

Assets, consumables, conveyances, vehicles

Military

TagsLocationApplication

124Fall 2006

Thanks !Thanks !