Rugged RFID. RFID FAQs

Similar documents
1 GETTING STARTED. 5/7/2008 Chapter 1

Software and Hardware Change Management Policy for CDes Computer Labs

Licensing Windows Server 2012 for use with virtualization technologies

How do I evaluate the quality of my wireless connection?

Disk Redundancy (RAID)

Electronic Data Interchange (EDI) Requirements

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

In addition to assisting with the disaster planning process, it is hoped this document will also::

IMT Standards. Standard number A GoA IMT Standards. Effective Date: Scheduled Review: Last Reviewed: Type: Technical

DISASTER RECOVERY PLAN TEMPLATE

Introduction to Mindjet MindManager Server

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Serv-U Distributed Architecture Guide

Document Management Versioning Strategy

Licensing Windows Server 2012 R2 for use with virtualization technologies

Louisiana 2D Bar Code General Information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc.

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

NASDAQ BookViewer 2.0 User Guide

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public

Completing the CMDB Circle: Asset Management with Barcode Scanning

Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory

Office Use Only Account # Approved By:

CMS - CISUC - Universidade de Coimbra

PAYMENT GATEWAY ACCOUNT SETUP FORM

Basic Guide line for The Sportident system

Chapter - 3. Cable Connections

CareLink Connectivity Options Introduction and Comparison Updated June 2013

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

4394 Gazzetta tal-gvern ta Malta MINISTRY OF FINANCE. Value Added Tax Department. Fiscal Cash Register Specifications

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

Using PayPal Website Payments Pro UK with ProductCart

expertise hp services valupack consulting description security review service for Linux

Manual. Adapter OBD v2. Software version: NEVO DiegoG Full compatibility with OBD Adapter v2 2.0B

TaskCentre v4.5 Send Message (SMTP) Tool White Paper

TaskCentre v4.5 MS SQL Server Trigger Tool White Paper

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

How Does Cloud Computing Work?

efusion Table of Contents

Otomasyon, Danışmanlık Ltd. Şti. INDILOAD DATACARD M AN UAL. Antetli03.doc / Page 9 of 1. Kibele Hedef mükemmele ulasmaksa.

First Global Data Corp.

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

New Chip Card Technology Released Across the U.S.

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Optimal Payments Extension. Supporting Documentation for the Extension Package v1.1

The Cost Benefits of the Cloud are More About Real Estate Than IT

Mobile Workforce. Improving Productivity, Improving Profitability

Business Continuity Management Systems Foundation Training Course

ABELMed Platform Setup Conventions

BED BUG PROTOCOL FOR SCHOOLS

Retirement Planning Options Annuities

Process of Setting up a New Merchant Account

Concur Travel QuickStart Guide. Concur Technologies Version 1.0

UNIVERSAL MUSIC GROUP PRIVACY POLICY. Universal Music AB ("We") are committed to protecting and respecting your privacy.

Welcome to Microsoft Access Basics Tutorial

Wireless Light-Level Monitoring

Copyright 2013, SafeNet, Inc. All rights reserved. We have attempted to make these documents complete, accurate, and

HIPAA HITECH ACT Compliance, Review and Training Services

Fermilab Time & Labor Desktop Computer Requirements

Tech Notes Promise RAID

HarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation User Guide

PRIVACY POLICY Last revised: April 2015

Serv-U Distributed Architecture Guide

Sage 100 What s New in Tracey Brinkman Senior Consultant BKD Technologies tbrinkman@bkd.com

PAYMENT GATEWAY ACCOUNT SETUP FORMS

Mobile Device Manager Admin Guide. Reports and Alerts

TaskCentre v4.5 File Transfer (FTP) Tool White Paper

Customers FAQs for Webroot SecureAnywhere Identity Shield

Integrating With incontact dbprovider & Screen Pops

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors

Virtual Meetings and Virtual Teams Using Technology to Work Smarter

CHECKING ACCOUNTS AND ATM TRANSACTIONS

How much life insurance do I need? Wrong question!

RECONCILIATION OF FUNDS

FAQs for Webroot SecureAnywhere Identity Shield

Table of Contents. About... 18

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

About the Staples PTA Discount Program

Hardware components. Typical connections and data flow. Student 3 page 1: Low Merit

FINRA Regulation Filing Application Batch Submissions

Protecting Point of Sale Devices from Targeted Attacks

Emergency Disaster Plan

Wireless Nurse Calling System Technical Document

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

PAYMENT GATEWAY ACCOUNT SETUP FORM

URM 11g Implementation Tips, Tricks & Gotchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC.

BackupAssist SQL Add-on

Connecting to

EXTENDED WARRANTY PROMOTIONAL CAMPAIGN

How to put together a Workforce Development Fund (WDF) claim 2015/16

Avatier Identity Management Suite

Rainwater Harvesting Incentive Program

AT&T U-verse App for Android FAQs

SMART Active Directory Migrator Requirements

Transcription:

Rugged RFID RFID FAQs What is RFID? Radi frequency identificatin, r RFID, is a generic term fr technlgies that use radi waves t autmatically identify peple r bjects. There are several methds f identificatin, but the mst cmmn is t stre a serial number that identifies a persn r bject, and perhaps ther infrmatin, n a micrchip that is attached t an antenna (the chip and the antenna tgether are called an RFID transpnder r an RFID tag). The antenna enables the chip t transmit the identificatin infrmatin t a reader. The reader cnverts the radi waves reflected back frm the RFID tag int digital infrmatin that can then be passed n t cmputers that can make use f it. An RFID system cnsists f a tag, which is made up f a micrchip with an antenna, and an interrgatr, r reader with an antenna. The reader sends ut electrmagnetic waves. The tag antenna is tuned t receive these waves. A passive RFID tag draws pwer frm the field created by the reader and uses it t pwer the micrchip s circuits. The chip then mdulates the waves that the tag sends back t the reader and the reader cnverts the new waves int digital data fr use in the applicatin.

What is the purpse f RFID? RFID allws data t be transmitted by a prduct cntaining an RFID tag, which is read by an RFID reader. The data transmitted can prvide identificatin r lcatin infrmatin abut the prduct, r specifics such as date f purchase r price, similar t a birth certificate. What is the advantage f using RFID technlgy? N cntact r even line-f-sight is needed t read data frm a prduct that cntains an RFID tag. This means n mre checkut scanners at grcery stres, n mre unpacking shipping bxes t see what is in them, and n mre getting keys ut f yur pcket t start yur car. RFID technlgy als wrks in rain, snw and ther envirnments where bar cde r ptical scan technlgy wuld be useless. What are the advantages f RFID versus linear r 2D bar cdes? Barcde readers require a direct line f sight t the printed barcde; RFID readers d nt require a direct line f sight. Line f sight requirements als limit the ruggedness f barcdes as well as the reusability f barcdes. (Since line f sight is required fr barcdes, the printed barcde must be expsed n the utside f the prduct, where it is subject t greater wear and tear.) RFID tags are typically mre rugged, since the electrnic cmpnents are better prtected in a plastic cver. RFID tags can als be implanted within the prduct itself, guaranteeing greater ruggedness and reusability. RFID tags can be read at much greater distances than barcdes; sme RFID readers can pull infrmatin frm a tag at distances up t 300 feet. The range t read a barcde is much less, typically n mre than fifteen feet. RFID readers can interrgate, r read, RFID tags much faster; read rates f hundreds tags per secnd are pssible. Reading barcdes is much mre time-cnsuming; due t the fact that a direct line f sight is required, if the items are nt prperly riented t the reader it may take secnds t read an individual tag. Barcde readers usually take a half-secnd r mre t successfully cmplete a read. Barcdes have n read/write capability; that is, yu cannt add t the infrmatin written n a printed barcde. RFID tags, hwever, can be read/write devices; the RFID reader can cmmunicate with the tag, and alter as much f the infrmatin as the tag design will allw.

What infrmatin is n an RFID tag? RFID tags can typically hld 96 bits f infrmatin (24 alpha numeric characters). Express Rugged RFID Tags can have any alpha-numeric identificatin cmbinatin within the 24 character limit. What are the different types f RFID Tags? Passive Tags Pwered frm electrmagnetic field generated by the reader Less Expensive Unlimited lifetime Less Weight Lesser Read Range (10 t 20 feet) Lwer data transmissin rates Fewer tags can be read simultaneusly Active Tags Pwered by an internal battery Mre expensive Finite lifetime (due t battery life) Greater range (up t 200 yards) Can be effective with less pwerful readers Higher data transmissin rates Mre tags can be read simultaneusly Express Rugged RFID tags are all Passive Are there different frequencies fr RFID? There are 4 majr frequency ranges that RFID systems perate at. As a rule f thumb, lw-frequency systems are distinguished by shrt reading ranges, slw read speeds, and lwer cst. Higher-frequency RFID systems are used where lnger read ranges and fast reading speeds are required, such as fr vehicle tracking and autmated tll cllectin. Micrwave requires the use f active RFID tags. Frequency Range Applicatins Lw-frequency 125-148 KHz High-frequency 13.56 MHz Ultra-high freq 915 MHz Micrwave: 2.45GHz 3 feet Pet and ranch animal identificatin; car key lcks 3 feet library bk identificatin; clthing identificatin; smart cards 25 feet Supply chain tracking: Bx, pallet, cntainer, trailer tracking 100 feet Highway tll cllectin; vehicle fleet identificatin

What is a Rugged RFID Tag? A Rugged RFID tag takes a standard RFID inlay (chip and antenna n a substrate) and encapsulates it in plastic. The encapsulatin prtects the inlay frm harsh envirnments where the prduct might be handled in a rugh manner. These envirnments include: material handling, prduce, shipping, slid waste, and many ther cmmercial r industrial scenaris. What are RFID Readers? RFID Readers, smetimes referred t as interrgatrs, are electrnic devices that transmit and receive radi waves. Readers nt nly interrgate tags fr infrmatin, but sme can als be used t prgram (write) infrmatin t tags. The RFID reader uses an antenna t send and receive signals t and frm RFID tags. The antenna can be either an internal r an external additin. Sme barcde scanning devices can add an RFID sled n t them t becme a reader. Readers can als be fixed munted; fixed munted readers can be fund at a receiving dck s bay dr r at an EZPass tll bth. A standard dck dr r chke pint fixed reader cnfiguratin is ften called a prtal. Prtals create a field which the tag passes thrugh, allwing the reader t send and receive infrmatin. Readers can als be incrprated int ther equipment such as frk lifts r assembly lines. Handheld Readers An RFID Handheld Cmputer is a handheld device which emits a radi wave, in rder t reach the RFID tags that are in a predefined range. When the RFID tags receive the signal emitted, the RFID tag sends the data stred in the tag back t the handheld cmputer. The user then uses the handheld cmputer t view the infrmatin which the tag cllected, as well as run the RFID sftware applicatin.

Fixed Munt Readers / Dr Prtals Fixed Munt readers are permanently munted t a structure whereby prducts with RFID tags will pass by the reader and antenna. Fixed munt readers require a separate antenna t transmit the radi waves. RFID Antennas RFID Antennas What is Ingress Prtectin Rating? IP stands fr Ingress Prtectin and indicates the degree f prtectin prvided by an enclsure. The numbers fllwing IP represent levels f sealing and can range frm nne at all (IP00) t prtectin against dust and cntinuus immersin in water (IP68). The table prvides a descriptin f the prtectin at each level.

Rugged RFID tags have a minimum ingress prtectin rating f IP67 but mst have the maximum available f IP69K The table belw gives a representatin f the cncept behind Ingress Prtectin.