Top Banner
Fall 2006 Introduction to Introduction to RFID RFID Choong Seon Hong Choong Seon Hong Kyung Hee University Kyung Hee University [email protected] [email protected]
124

Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University [email protected] [email protected].

Dec 18, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

Fall 2006

Introduction to Introduction to RFIDRFID

Choong Seon HongChoong Seon Hong

Kyung Hee UniversityKyung Hee University [email protected]@khu.ac.kr

Page 2: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

2Fall 2006

RFID InfrastructureRFID Infrastructure

CouplingTag

Antenna

Reader

RFID Middleware

Server

Host Server

Page 3: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

3Fall 2006

Software ComponentsSoftware Components

Tag ReaderHost

ComputerNetwork

RFID System Software

RFID Middleware

Host Application

Page 4: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

4Fall 2006

““Slap and Ship” ProcessSlap and Ship” Process

1. De-palletize cases

3. Enter # of cases

2. Scan SKUs

4. Print RFID case labels

Sequenceof

Operations

5. Apply labels manually

6. Re-palletize cases

7. Print RFID pallet labels

8. Read RFID tags on pallet

9. Print reports & ASNs

Page 5: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

5Fall 2006

RFID Tag AnatomyRFID Tag Anatomy

Integrated Circuit (IC)

Antenna

Courtesy of Alien Technology

Page 6: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

6Fall 2006

RFID ChipRFID Chip

Page 7: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

7Fall 2006

Basic tag assemblyBasic tag assembly

Page 8: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

8Fall 2006

Why the excitement?Why the excitement?

Page 9: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

9Fall 2006

Barcode vs. RFIDBarcode vs. RFID

Barcode Requires line of sight between reader and label Can read many labels simultaneously but expensive Many symbologies – UPC-A, Code 39, UCC128, Unique serialized identity not standardized

RFID “No Human” data collection Does not require line of sight Can hold more data than bar codes Data can be changed or added to as a tag passes throug

h specific operations More effective in harsh environments (sealed tags) Reads many tags simultaneously (cheaply) Each tag uniquely serialized as standard (EPC)

Page 10: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

10Fall 2006

:

01•0000A89•00016F•000169DC0

01•0000A89•00016F•000169DC1

01•0000A89•00016F•000169DC2

01•0000A89•00016F•000169DC3

01•0000A89•00016F•000169DC4

01•0000A89•00016F•000169DC5

01•0000A89•00016F•000169DC6

01•0000A89•00016F•000169DC7

:

Simultaneous read of

numerous tags-

Multiple transactions

posting

Transaction ProcessingTransaction Processing

RFID Portal

PO: 2456 PO Line: 12 SKU: 34878 Qty:1

One read of bar code

-

One transaction

posting

Bar Code Scanning

Automated Data Collection RFID Data Collection

Page 11: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

11Fall 2006

Proximity technologyProximity technology

Presence known if within a certain radiusDo not know exactly the position

Cycle count Smart shelf

Page 12: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

12Fall 2006

How RFID works !How RFID works !

Page 13: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

13Fall 2006

RFID & Product LifecycleRFID & Product Lifecycle

Distribution

Customers

Manufacturing

ProcessEfficiency

•Supply Chain Efficiency•Replenishment•Product Recall•Loss Prevention

•Track and Trace•Receiving•Cycle Count•Packing•Shipping•Interplant Transfers

•Track WIP•Monitoring/Time Stamp•Value-Added Processing•Lot id/Serialization

Page 14: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

14Fall 2006

WalWal∗∗Mart MandateMart Mandate

RFID tags with EPCs(Eletronic Product Codes) are required on all pallets and cases Cases are defined as totes, reusable plastic containers or corrugated boxes Electronic ITEMS such as television set, stereo, or CD must be tagged.

Tag requirements EPC Global Class 0 or 1, moving to Class 1 Gen 2 when available A logo on the tag stating it is there

Reader accuracy requirements Dock doors: 100% on all pallet tags on forklift traveling at 5-7 mph Conveyors: <= 540 fpm, 6 inch gap between products, 100% at all orientatio

ns Information Processing

EPC compliant middleware that works with existing infrastructure, no ONS or PML

Page 15: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

15Fall 2006

Why they want it?Why they want it?

Automated check-in Visibility of product movement from backroom to the

floor Eventual linkage to the POS (point of sale) Replenishment feedback to suppliers Reduction in personnel and increase in accuracy Ultimate goal – reduce “out of stocks”

The costs are borne by the supplier

Page 16: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

16Fall 2006

1870s

1873Maxwell’s equations

published

1880s 1890s 1900s

1887Hertz experimentally

proved Maxwell’s equations

1905Einstein proves light

is a constant

1940s 1950s 1960s 1970s 1990s1980s 2000s

1942Friend or Foe

1999Auto-ID Center

MIT

Wal-Mart Mandate

2003

2003RFID used

By DoD Operation Iraq Attack

1989Toll CollectionBy the Dallas

North Turnpike

Late 1960s

Electronic Article Surveillance

(EAS)

RFID – Historical PerspectiveRFID – Historical Perspective

Page 17: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

17Fall 2006

An implementation based only on the air interfaceAn implementation based only on the air interface

Page 18: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

18Fall 2006

RFID InfrastructureRFID Infrastructure

CouplingTag

Antenna

Reader

RFID Middleware

Server

Host Server

Page 19: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

19Fall 2006

Software ComponentsSoftware Components

Tag ReaderHost

ComputerNetwork

RFID System Software

RFID Middleware

Host Application

Page 20: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

20Fall 2006

RFID System SoftwareRFID System Software

Read/Write Basic functions of a tag

Anti-Collision Establish cooperation between tags and readers Algorithm to sequence tag response to reader’s request

Error Detection/Correction Encryption, Authorization, and Authentication

(Security) Secure data exchange

Page 21: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

21Fall 2006

RFID MiddlewareRFID Middleware

Monitors device health and statusManage RFID-specific infrastructure and data

flow Encoding, collection, processing, filtering and

aggregation of data transmitted by tags and Data normalization

• Different formats• Communication protocols

Page 22: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

Fall 2006

How to apply a proximity technology to How to apply a proximity technology to resolve a business problem?resolve a business problem?

Page 23: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

23Fall 2006

RFID interrogation zoneRFID interrogation zone

“Choke point” Any point where the material flows in a specific

direction and a business process can be associated to it

Business processes Receiving Shipping Raw goods transfer Etc…

Page 24: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

24Fall 2006

Conveyor portalConveyor portal

Page 25: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

25Fall 2006

Conveyor portalConveyor portal

Page 26: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

26Fall 2006

Dock door setupDock door setup

What you need! High-powered UHF system Ample power to the antennas in the interrogation zone Reader set to constantly poll for tags

Setup Decide on the area to be covered and the number of

antennas to use Determine where to place the antennas Install them and make sure they are canted Perform a thorough path loss contour mapping (PLCM)

Page 27: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

27Fall 2006

Dock door setupDock door setup

121.50

119.00

36.00

6 3.00

1 8.67

1 2.93

3 6.00

0 6.00

LightStack

Bollard

DC600 RFIDPortal System

Page 28: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

28Fall 2006

Dock door setupDock door setup

Page 29: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

29Fall 2006

Dock door setupDock door setup

Page 30: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

30Fall 2006

Shrink-wrap stationShrink-wrap station

Best results achieved for reading cases on a pallet

Turntable of the stretch-wrap machine is constantly changing the location and orientation of the tags, giving the readers many attempts to read each of the tags as the pallet spins in the same spot

Page 31: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

31Fall 2006

Smart shelfSmart shelf

HF (13.56 MHz) – Near Field -1 to 6 inchesLess affected by metals or liquidsState change as reading modeHF tags must be perpendicular to the

magnetic field for couplingFaraday’s law at work here

Page 32: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

32Fall 2006

Smart shelfSmart shelf

Page 33: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

33Fall 2006

PortalsPortals

Anywhere where you have a “choke” point Doorway portals

Item-level tracking Security and personnel access Asset tracking Electronic Article Surveillance (EAS)

Security portals Sensitive secure areas of Government facilities Active RFID asset tracking in hospitals

Luggage portals Airports

Car or bus portals Tollroad booth Commuter lanes

Page 34: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

34Fall 2006

1. De-palletize cases

3. Enter # of cases

2. Scan SKUs

4. Print RFID case labels

Sequenceof

Operations

5. Apply labels manually

6. Re-palletize cases

7. Print RFID pallet labels

8. Read RFID tags on pallet

9. Print reports & ASNs

Tag and ShipTag and Ship

Page 35: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

35Fall 2006

Inline production applicationInline production application

No tangible ROI on tag and ship Migrate process upstream to production line Benefits

Eliminate breakdown and rebuild of pallets Automatic work-in-process tracking Better controls for companies fulfilling orders from inventory and

then manufacturing to those order volumes May bring greater speed and accuracy to quality assurance and

shipping processes

Page 36: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

36Fall 2006

Other applicationsOther applications

Ski resorts RFID wrist bands w/ dollar amount Tracking of individuals and their preferences Diminished lines for the ski resort Counterfeiting eliminated

Law enforcement Tracking imports Controlling access to secure areas Tracking evidences Drug shipments

Pharmaceuticals Theft and counterfeiting

• Viagra Diversion

• Tiered pricing structures

Page 37: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

37Fall 2006

Additional Business ApplicationsAdditional Business Applications

Hazardous materials and recallsWarranty verification and returnsManufacturingMaintenance

Airline industry• Boeing• Airbus

Page 38: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

38Fall 2006

Keyless Remote

EAS

ProductAuthentication

Ticketing

RFID Sample ApplicationsRFID Sample Applications

Airline baggage ID Sports Timing

Document Tracking

Express Parcel ID

EPC Supply Chain

Highway Toll Collection

Smart Cards

and many more…

Page 39: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

39Fall 2006

Tag selectionTag selection

Page 40: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

40Fall 2006

How passive tags are definedHow passive tags are defined

Page 41: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

41Fall 2006

Tag characterization testTag characterization test

1. Connect a single antenna to a reader through an attenuator2. Mount the antenna 2 feet away from a flat surface like your SKU

(stock keeping unit) testing stand3. To characterize a certain type of tag, gather at least 100 of the same

type of tags4. Test the tags one at a time under the antenna for readability. Slowly

turn down or attenuate the signal until the tag can no longer be read and record the results

5. When you have complete data for 100 tags, set the antenna up on the edge of your grid that’ furthest from the direction you will be positioning the tag, so you can get as far away from the reader as possible

6. Test several of the tags, one at a time, that were of the highest attenuation value and see how far they can be read and then repeat the process for each of the different tag attenuation values

Page 42: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

42Fall 2006

Tag testing processTag testing process

Use Figure 9-1 at page 161

Page 43: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

43Fall 2006

Tag testingTag testing

Tag is the only thing that should vary during the test

Isolate the performance of the tag Location on the case Orientation (vertical, horizontal, random)

Examine the material composition of the items in the case

Page 44: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

44Fall 2006

Physics and tag performancePhysics and tag performance

Absorption (loss)Reflection/refractionDielectric effectsComplex propagation effects

Standing waves Multi-pathing

Page 45: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

45Fall 2006

Material effects on RFID communicationsMaterial effects on RFID communications

Material Composition Effects on RF Signals

Corrugated cardboard Absorption from moisture

Conductive liquids Absorption

Glass Attenuation (weakening)

Groups of cans Multiple propagation effects; reflection

Human body/animals Absorption; detuning; reflection

Metals Reflection

Plastics Detuning (dielectric effect)

Page 46: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

46Fall 2006

RF friendliness pyramidRF friendliness pyramid

Page 47: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

47Fall 2006

Best spot for testingBest spot for testing

1. Determine whether the outside packaging material is RF transparent

2. If the packaging material is RF transparent, open the container and visually inspect the contents

3. Determine where the contents fit on the RF pyramid4. Rank eight or ten different areas of the object on their

positions in the RFID pyramid based on how close to the peak they are

5. Start your tag testing by using the highest ranked (most RF-friendly) areas

Page 48: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

48Fall 2006

Label PlacementLabel Placement

Reader Location

Customer Requirements

Package Contents Pallet Loading

Packaging Materials Package Orientation

Handling RequirementsPackage Design/Branding

Page 49: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

49Fall 2006

Label placementLabel placement

Page 50: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

50Fall 2006

Label placementLabel placement

Page 51: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

51Fall 2006

Selecting tags to testSelecting tags to test

Not all tags are created equal… To get a statistically significant result, test 100 tags of each ty

pe. Method

1. Activate the reader and set the attenuator to its lowest output power2. Place a single tag in the filed generated by the reader in autoread mode3. Manually adjust the attenuator to increase it power drain on the signal returning fro

m the tag4. When the tag no longer can be read, record the corresponding value on the attenu

ator for the tag you’re testing5. Repeat steps 1 through 4 for all 100 tags6. Calculate the average attenuation value and standard deviation for the 100 tags tes

ted7. Grab tags that have a tested attenuation value close to the calculated average

Page 52: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

52Fall 2006

Tag performance index (TPI)Tag performance index (TPI)

Evaluate performance across all channels in a particular frequency band

Three critical performance measures Percent of successful reads Dispersion of reads across the ISM band Ratio of nulls, or poor performers, to successful reads

Measurements are entered in a simple formula that yields a TPI (range from 0 to 100)

Page 53: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

53Fall 2006

Tag test setupTag test setup

Equipment Fixed-mount RFID reader and single circularly polarized antenna Tag testing software Wooden or plastic table Measuring tape

Set up1. Position the antenna and the reader at least 25 feet from any

obstructions that may interfere with the interrogation zone2. Mount the antenna approximately 3 feet off the ground in a fixed

location3. Mark off 1-foot measurements heading directly out from the

antenna4. Position the table with the tagged product directly in front of the

antenna, 1 foot away

Page 54: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

54Fall 2006

Tag testTag test

Three methods1. Collect Frequency Response Characterization

(FRC) at 3 different distances – 1, 3, and 5 feet

2. Move the tagged object farther and farther away until it cannot be read and then compare different distances with each other

3. Take reader threshold power measurements

Page 55: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

55Fall 2006

Frequency Response Characterization (FRC)Frequency Response Characterization (FRC)

Goal:Find the optimal product/tag combination that works well across the entire RFID spectrum of choice

Required: Software tool Signal generator Spectrum analyzer or reader

Test Pick 50 channels at random Issues 100 read commands Record number of successful read cycles Record number of successful tag wake-ups Repeat the same test for different tag placements and distances

Page 56: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

56Fall 2006

FRC Results ExampleFRC Results Example

% Reads @ Distance

Tag Type Placement 1’ 3’ 5’

I Tag 1 98.36% 68.42% 24.64%

2 97.36% 17.72% 1.78%

3 98.54% 1.12% 0.00%

Strip 4 98.10% 40.18% 4.54%

5 97.92% 3.76% 0.00%

6 97.92% 1.10% 0.00%

Squiggle 7 99.46% 71.40% 27.58%

8 95.72% 71.74% 22.15%

9 95.72% 25.48% 0.00%

10 99.36% 5.38% 0.00%

11 95.64% 77.82% 14.22%

Page 57: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

57Fall 2006

UHF Gen 2 memoryUHF Gen 2 memory

Page 58: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

58Fall 2006

UHF Gen 2 memoryUHF Gen 2 memory

Page 59: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

59Fall 2006

UHF Gen 2 memoryUHF Gen 2 memory

Page 60: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

60Fall 2006

UHF Gen 2 memoryUHF Gen 2 memory

Page 61: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

Fall 2006

ReaderReader

Page 62: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

62Fall 2006

Reader typeReader type

Hand-held Acceptable if you have only one or two tags per read location No reader with high power output and long battery life available

Mobile Printer, reader and bar code scanner can be in one easily movable

solution Communites using 802.11 back to main database

Fixed location Located at choke points Ability to automatically count and capture data without human interv

ention

Page 63: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

63Fall 2006

Portable ReadersPortable Readers

RFID Antenna

RFID Antenna

Page 64: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

64Fall 2006

Reader evaluation criteriaReader evaluation criteria

Determine all the costs involvedTest reader performanceAssess connectivity

Network connectivity Manufacturer’s configuration software Manufacturer’s data export software Upgradeability

Evaluate how well a reader can be fine-tuned

Page 65: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

65Fall 2006

Costs involvedCosts involved

Purchase price Installation costsMaintenance costs

Replacing readers Upgrading for new protocols and standards Changing configurations Replacing damaged antennas

Page 66: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

66Fall 2006

Assess connectivityAssess connectivity

RS-232 Well-known reliable system for short-range wired communications Communications speeds are low (9600 bps to 115.2 Kbps) Length limited to 30 meters No error control Point-to-point communications system

RS-485 Similar to RS-232 Greater cable lengths (up to 1200 meters) Higher speeds (up to 2.5 Mbps Bus protocol

Ethernet Connectivity solution of choice for RFID Ethernet infrastructures very common Speed sufficient for RFID readers Reliable communication protocol: TCP/IP TCP/IP packets can only travel 100 meters

Page 67: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

67Fall 2006

Reducing cabling needsReducing cabling needs

Wireless connectivity Eliminates the need for a separate network conne

ction Need power IEEE 802.11 Wi-Fi

Power over Ethernet Power and connectivity delivered over the same C

AT-5 cable Maximum power output of 15.4 watts

Page 68: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

68Fall 2006

Reader fine tuningReader fine tuning

Forward compatibility with future tag protocols Make sure your reader is upgradeable to Gen 2.0 via software or firmware u

pgrade Get written commitment from vendor

Tunability Acquisition cycle design (timing and number of wakeup, read, and sleep co

mmands) Acquisition frequency Timing No standard configuration tools across readers Experiment with various settings to find the common setup to use in your op

erations Flexible power output

Many tagged items have a maximum performance threshold well below the maximum power output of a reader

Minimize power output for each application

Page 69: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

69Fall 2006

Reader fine tuningReader fine tuning

Clean RF output RFID tags have simple timing device to synchronize with the carrier

signal emitted by the carrier Signal phase variance ➙ Trouble “Splatter” – Undesirable additional frequencies generated

by the reader Antenna programmability

Multiplexing• No two antennas are ever active at the same time• Avoid interference and data collision

Change sequence to fit needs of your application• Default – 1,2,3,4,1,2,3,…• Custom – 1, 2 ,3,3,3,4,1,…

Always design the system for the most challenging use case

Page 70: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

70Fall 2006

Installing a Reader and AntennasInstalling a Reader and Antennas

1. Mount the readera. As far from harm’s way as possibleb. Clean and dry place with normal temperaturec. Six-inches clearance all around the reader for ample airflow and easy cablingd. Away from any source of EM wavese. Consider a ruggedized RFID rack

2. Mount and connect the antennasa. Decide the locations of the antennasb. Map the RF path loss contourc. Mount the antennas and protect them from people or machineryd. Attach the antenna in sequential order

3. Power up the readera. Similar to booting up a PCb. Goes through internal verificationsc. Put a tag in front of the antenna to verify if the reader can read it – Light flashes on

4. Test the interrogation zone for RF path loss

Page 71: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

71Fall 2006

UHF Gen 2 commandsUHF Gen 2 commands

Page 72: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

72Fall 2006

Select commandSelect command

Page 73: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

73Fall 2006

Select commandSelect command

Page 74: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

74Fall 2006

Select commandSelect command

Page 75: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

75Fall 2006

Inventory commandsInventory commands

Page 76: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

76Fall 2006

Inventory commandsInventory commands

Page 77: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

77Fall 2006

Inventory commandsInventory commands

Page 78: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

78Fall 2006

Inventory commandsInventory commands

Page 79: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

79Fall 2006

Inventory commandsInventory commands

Page 80: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

80Fall 2006

Access commandsAccess commands

Page 81: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

81Fall 2006

Access commandsAccess commands

Page 82: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

82Fall 2006

Access commandsAccess commands

Page 83: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

83Fall 2006

Access commandsAccess commands

Page 84: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

84Fall 2006

Access commandsAccess commands

Page 85: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

85Fall 2006

Access commandsAccess commands

Page 86: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

86Fall 2006

Access commandsAccess commands

Page 87: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

87Fall 2006

Access commandsAccess commands

Page 88: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

88Fall 2006

Access commandsAccess commands

Page 89: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

89Fall 2006

Security featuresSecurity features

Page 90: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

Fall 2006

Reader testsReader tests

Page 91: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

91Fall 2006

Reader power and path loss Reader power and path loss

Reader transmit power (Pr) of 30 dBm

Reader receiver sensitivity (Sr); -80 dBm or 10-11 watts

Reader antenna gain (Gr); 6 dBi

Tag has a power requirement of -10 dBm, or 100 microwatts Tag antenna has a gain (Gt) of only 1 dBi

The tag’s has a backscatter efficiency (Et) of -20dB

λ = 33 cm

P

2

2

4 d

GGPP trrt

4

2

t

trr

P

GGPd

Page 92: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

92Fall 2006

Basic distance testBasic distance test

1. Find location with little to no AEN2. Affix a RFID tag to an empty cardboard box3. Layout measurement grid outward from reader4. Set up the reader in the factory default setting (usually full

power) with a single antenna attached5. Mount the antenna 3 feet off the ground6. Put the cardboard box on the SKU table7. Measure the number of reads over a 60-second time

period at 2, 4, 6, 8, 10 and 12 feet away from the antenna8. Record the results from each reader and compare the

numbers

Page 93: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

93Fall 2006

Conveyor testConveyor test

Specific speed conditions required by various mandates 600 fpm 6 inches separation between each case

Expensive to implement a loop conveyor for testing Upwards of $200,000. – High acceleration Build up acceleration and speed over time

Page 94: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

94Fall 2006

Running a conveyor testRunning a conveyor test

Set up the readers in their fastest polling mode and read at gradually increasing speeds (400, 600 and 1200 fpm)

Test a baseline RF-friendly product, such as cardboard box

Test around your most RF-unfriendly itemsTest your most representative or popular

productsMeasure at least 50 passes

Page 95: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

95Fall 2006

Interpreting the resultsInterpreting the results

Control variables Speed Product

Dependent variable Average number of successful read cycles completed per pass

Normalized the data for each reader Raw data for each product divided by baseline data (empty cardboard

box) Eliminate all firmware- and software related variables Compare each reader performance against its own unique baseline

Note: Make sure you use the same tags on the same cases of products for all readers involved eliminating case and tag variance

Page 96: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

96Fall 2006

ResultsResults

PAPER

0 0.5 1 1.5

400

600

1200

Sp

ee

d (

fpm

)

Relative Performance

SAMSys

Symbol

AWID

Alien

METAL

0 0.2 0.4 0.6 0.8 1 1.2

400

600

1200

Sp

ee

d (

fpm

)

Relative Performance

SAMSys

Symbol

AWID

Alien

Page 97: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

97Fall 2006

Test for FCC ComplianceTest for FCC Compliance

1. Set the power of reader to maximum (should be 1 watt)2. Set up the spectrum analyzer with a center frequency of 915

MHz and a span of 50 MHz so that you can record all activity from 865 to 965 MHz

3. Monitor the reader for 60 minutes and keep the hold lock ON in your spectrum analyzer to record all the read points

4. Look for any signals outside the 902-928 MHz range

Page 98: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

98Fall 2006

Antenna gainAntenna gain

Page 99: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

99Fall 2006

Coax feeder cableCoax feeder cable

Page 100: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

100Fall 2006

Coax cable routingCoax cable routing

Page 101: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

101Fall 2006

Setting the reader powerSetting the reader power

Page 102: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

102Fall 2006

Avoiding reading holesAvoiding reading holes

Page 103: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

103Fall 2006

Limiting interferenceLimiting interference

Page 104: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

104Fall 2006

Reading ratesReading rates

Page 105: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

105Fall 2006

Secrets of Read SuccessSecrets of Read Success

Avoid cross talk Adjust power output Utilize reader triggering Use software to coordinate readers

Ensuring high-speed reads Tune the reader acquisition mode Change how the antennas are pointed

Executing full pallet reads Place tags on the outer cases of a pallet Adjust antenna sequencing to focus RF power on challenging

areas Tune the reader acquisition mode

Page 106: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

Fall 2006

MiddlewareMiddleware

Page 107: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

107Fall 2006

RFID System SoftwareRFID System Software

Read/Write Basic functions of a tag

Anti-Collision Establish cooperation between tags and readers Algorithm to sequence tag response to reader’s request

Error Detection/Correction Encryption, Authorization, and Authentication (Security)

Secure data exchange

Page 108: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

108Fall 2006

Why a middleware?Why a middleware?

Tag and reader physics solves only the problem of being able to capture RFID data

You must process the incoming RFID data and intelligently integrate it into your business applications

Reasons Not all of the incoming RFID data is valuable Not all readers speak the same language Different RFID information needs to be passed off to different

applications and data stores

Page 109: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

109Fall 2006

Middleware capabilitiesMiddleware capabilities

Reader and device management Configure, deploy, and issue commands directly to the readers

Data management Filter and route data to appropriate destinations

Application integration Messaging, routing and connectivity features to integrate RFID data into existing host systems (WMS, SCM,

ERP and CRM) SOA

Partner integration Sharing RFID data with partners to improve collaborative processes

Process management and application development Orchestrate RFID-related end-to-end processes No human involvement

Packaged RFID content Routing logic Product data schemas Integration with RFID-related processes like shipping, receiving and asset tracking

Architecture scalability and administration Dynamically processing loads across multiple servers Reroute data when server fails

Page 110: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

110Fall 2006

RFID MiddlewareRFID Middleware

Monitors device health and statusManage RFID-specific infrastructure and data

flow Encoding, collection, processing, filtering and

aggregation of data transmitted by tags and Data normalization

• Different formats• Communication protocols

Page 111: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

111Fall 2006

Three tiers of RFID middlewareThree tiers of RFID middleware

Page 112: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

Fall 2006

Active RFID systemActive RFID system

Page 113: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

113Fall 2006

Tag Types and ApplicationsTag Types and Applications

Tag Type Advantages Disadvantages Application

Active Greater read range,

memory capacity,

continuous signal.

Batteries require maintenance.

Larger size.

Used with high-value

asset tracking

Semi-passive Greater read range,

longer battery life

Battery wear

and expense.

Reusable containers

and asset tracking

Passive Read/Write Longer life, multiple

form factors, erasable

and programmable

Time and expense

to program

Case & pallet applications.

Approved for use

with Wal-Mart.

Passive WORM Suited for item

identification,

controllable at the

packaging source

Limited to a few

re-writes, replacing

existing data with

new data.

Case & pallet applications.

Approved for use

with Wal-Mart.

Passive Read Only Simplest approach Identification only,

no tracking updates

Case & pallet applications.

Approved for use

with Wal-Mart.

Page 114: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

114Fall 2006

Different tag classesDifferent tag classes

Page 115: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

115Fall 2006

Active RFID InfrastructureActive RFID Infrastructure

Page 116: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

116Fall 2006

Classification of passive and active tagClassification of passive and active tag

Characteristics Passive RFID tag Active RFID tag

Power Source Provided by a reader Inbuilt

Availability of power Within the field of reader

Continuous

Signal Strength (Reader to Tag)

High Low

Signal Strength (Tag to Reader)

Low High

Communication range

< 3meters >100 meters

Tag reads < 20 moving tags @ 3mph in few seconds

>1000 moving tags @ 100mph in 1 sec

Memory 128 bytes 128 Kbytes

Applicability in supply chain

Applicable where tagged items movement is constrained

Applicable where tagged items movement is variable and unconstrained

Page 117: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

117Fall 2006

RFID family treeRFID family tree

Page 118: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

118Fall 2006

Passive RFID characteristicsPassive RFID characteristics

Page 119: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

119Fall 2006

Communication range Communication range

Page 120: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

120Fall 2006

Memory capacityMemory capacity

Page 121: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

121Fall 2006

Devices and interfaces that are used by Devices and interfaces that are used by Active RFIDActive RFID

                                                                          

Source: IDTechEx.

Page 122: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

122Fall 2006

FrequenciesFrequencies

315 to 433 MHz Most popular

2.45 GHz Increasingly important Suitability for RTLS ZigBee WiFi Blue Tooth

13.56 MHz Near Field Communication NFC Semi-passive RFID sensor devices

Page 123: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

123Fall 2006

Applications of active RFIDApplications of active RFID

Condition monitoring tags, asset tags, RTLS, etc.

Animals, people and thingsAnimals, farming, research, libraries, archiving, leisure, manufacturing, financial and other

VariousVariousSecure access/other security and safety

Active, active with sensing, RTLS, SAL

People, assets, conveyances, vehicles

Healthcare

Smart seals, RTLS, RFID with sensing

Assets, consumables, conveyances, vehicles

Postal and Courier

Air industry

SAL, e.g. self-adjusting use by date, in-transit condition monitor

Items, assets, conveyances, vehicles

Consumer goods and retail

Smart wrist and ankle bandsPeoplePrison (correctional facility) and parole service

Key fobs, etc., active with sensing, RTLS, SAL

Vehicle, premises and computer access, vehicles, ticketing, assets

Passenger transport/automotive

Active, active with sensing, RTLS, SAL

Items, assets, conveyances, vehicles

Other Logistics

Smart seals and RTLSIntermodal containers, etc.Smart and Secure Tradelanes global initiative

Smart seals, RTLS, RFID with sensing

Assets, consumables, conveyances, vehicles

Military

TagsLocationApplication

Condition monitoring tags, asset tags, RTLS, etc.

Animals, people and thingsAnimals, farming, research, libraries, archiving, leisure, manufacturing, financial and other

VariousVariousSecure access/other security and safety

Active, active with sensing, RTLS, SAL

People, assets, conveyances, vehicles

Healthcare

Smart seals, RTLS, RFID with sensing

Assets, consumables, conveyances, vehicles

Postal and Courier

Air industry

SAL, e.g. self-adjusting use by date, in-transit condition monitor

Items, assets, conveyances, vehicles

Consumer goods and retail

Smart wrist and ankle bandsPeoplePrison (correctional facility) and parole service

Key fobs, etc., active with sensing, RTLS, SAL

Vehicle, premises and computer access, vehicles, ticketing, assets

Passenger transport/automotive

Active, active with sensing, RTLS, SAL

Items, assets, conveyances, vehicles

Other Logistics

Smart seals and RTLSIntermodal containers, etc.Smart and Secure Tradelanes global initiative

Smart seals, RTLS, RFID with sensing

Assets, consumables, conveyances, vehicles

Military

TagsLocationApplication

Page 124: Fall 2006 Introduction to RFID Choong Seon Hong Kyung Hee University cshong@khu.ac.kr cshong@khu.ac.kr.

124Fall 2006

Thanks !Thanks !