Sie sind auf Seite 1von 45

http://hubpages.

com/hub/RFID-Advantages
Advantages of RFID In A Library
Increased efficiency in self-check-ins and checkouts. RFID technology is not like barcode
technology. In fact, RFID readers don’t need line of sight and can read multiple RFID tags
concurrently. Reading numerous tags at the same time means faster check-ins and check-outs thus
leading to an increase customer contentment.

Automatic check-ins. People can place items in an RFID return-bin and then get a receipt showing
that they have brought back books.

Improvement in sorting. An RFID wand can be used to easily and quickly distinguish books that are
out of sequence. These RFID wands can even be configured to show where the misplaced book
actually belongs right on the spot.

http://www.slais.ubc.ca/courses/libr500/04-05-wt2/www/T_Gnissios/index.htm

Introduction

RFID stands for radio frequency identification.


Be prepared to hear this acronym or some variation of the term a lot over the next few years.
Everyone is getting on the bandwagon: warehousing, retail, goverment, military and libraries
are all exploring the new found usefullness of this old technology.
Developed in the 1940's, the technology has been making great strides since 1995
but when Walmart announced that it would require all suppliers to be RFID
compliant by 2006 [1], the RFID technology became mainstream.
The technology can be used for many applications each requiring its own set of tag
parameters, standards, radio frequency and power capabalities.
Far too many configurations for this assignment to cover.
For this project, the focus will be on RFID and libraries.

RFID is far more than a new style of barcode.


When the system is implemented in a library it impacts every work process and staff
member, changing how the staff interact with patrons,
how the staff process material, and most importantly how the public interact with
the library and it's collections.
The technology has great potential but also some very concerning costs.
The ability to save time and be more accurate is a great opportunity to increase public
service, but this potential comes at the price of people's privacy.
The system requires no line of sight and no staff/public interaction to gather information.
These issues will be explored along with the benefits of the system in the following pages.

A History of Development

RFID was developed out of the radar experiments and development during the Second
World War. The actual date of invention is 1948 but this was followed by decades
of development and experimentation before commercial applications were implemented.
For a detailed history of RFID development see the AIM publication
Shrouds of Time, The history of RFID. [3]
It wasn’t until the 1970’s that RFID implementations started to occur.
At this time the cost of the tags was prohibitive and use was limited.
By the 1980’s significant development had occurred and in 1987 Norway implemented
the first successful toll collection system. Toll systems were the breakthrough product for RFID.
In just a few years, toll systems and government toll collection agencies had spread
across the United States fueling the development of the system.
We now bring us forward to libraries again. During the 1990’s the proliferation of
competing systems and radio frequencies employed created the need for standards
and interoperability. Most warehousing operations can use large readers which
use low radio frequencies. Libraries need the higher frequency waves to allow for
smaller, less powerful and portable readers. As complexities and uses increased,
standards were developed to allow systems to work together.
Development of standards is still going on with the latest standard being release late in 2004.
The final piece of the RFID puzzle was the miniaturization of the
tags and the improvements in manufacturing.
These two developments dropped the price of the tags to a
level that allowed for wide-spread use of the system.
The first Library suppliers started to market their systems in the mid 1990’s.

RFID in Libraries

Implementation of an RFID system is not a simple process. It is a complex web of


technology, equipment and software that has to be fitted to each library's needs.
This is a brief list of the most important pieces of the RFID puzzle.
• Tags - Every item must be tagged and the tag programmed with the
required unique information.
• Readers - Each service unit needs to have sufficient
portable readers to carry out operations.
• Check in, check out and sorting – The circulation area
systems need to be designed and built.
The system allows for the implementation of self-sorting machines and other
time and worker health savers.
• Self-Serve check out stations - One of the prime cost reducers
of the system. Implementation of this system requires several
decisions around security protocols, fine and bill payment procedures,
library card types and other policy decisions that will increase or
limit the usefulness of these systems.
• Software – Newer systems come with software that converts
the radio frequency data to digital and communicates it to the ILS system.
Older versions require third party software to communicate between the two systems.

Benefits of RFID
The main benefit of RFID is the increase in productivity.
Materials handling is the primary efficiency. Checkout becomes a much faster
process as stacks of books can be checked out with one scan of a reader without
opening or handling the books. This is a dramatic reduction in the steps required
during checkout.
Fully implemented, the system could do away with a checkout station completely.
The patron walks past the exit sensors, the information is read off the smart card right
from the patron's pocket and the items are checked out. No contact with staff,
no need to interact with a station of any kind.
The system also has the potential to use a smart card to increase services
to patrons. Information can be embedded in the card including prepaid
dollars or other information useful at the checkout or other library service desks.
If the installation includes the security addition into the tag then
the checkout stations become far more user friendly.
All items can be checked out using the self checkout units as
no electromagnetic desensitizing occurs that can damage sensitive
audiovisual material. Also, the careful placement required by barcode
technology is no longer necessary as tag placement is not relevant to the RFID reader.
Inventory, tracking of lost items, shelf reading and all work associated
with checking the shelves becomes much easier using the portable readers.
Scan a shelf and the reader will read back the missing or out- of-place items
either through a report for limited readers or directly off the reader for more advanced versions.
Check in becomes far more efficient as entire bins of books can be
checked in by moving the bin through a large reader or scanning a
truck of books with a portable reader. This process reduces handling
of returned material by several steps.
Repetitive strain injuries that have plagued libraries will be reduced
as many of the repetitive movements at check in and checkout are reduced.
If the implementation of RFID is integrated with an automatic materials
sorting system, even further reductions in injuries will occur.

Problems with RFID

Bleeding Edge Technology:


One of the primary issues to be concerned with an RFID implementation
is the immaturity of the industry. Standards are only just being developed.
Tags and readers are being modified and improved at a rapid rate.
Competing technologies and non-crosscomplient systems still exist.
This ongoing development could make equipment and tags obsolete,
rendering investments in older equipment useless, and requiring expensive
conversions and upgrades. This is especially concerning for multi-unit
libraries that may implement one branch at a time over several years.
Costs:
The costs of the tags are still relatively high and not expected to drop
significantly over the next few years.
Fragile Tags:
This problem appears to be in the process of being solved with
new technology that makes for a smooth label with no bumps or other
protrusions. The bumps and protrusions of the chip and antenna make
the tags vulnerable to damage and vandalism.
Older tags still have this problem but several new designs
reduce protrusions very well and limit potential damage,
in the near future tags may be as thin as paper.
One type of system provider's Libramation's RFID chips.
Image courtesy of Libramation Company
Dual Use Tags:
Using the tag for both circulation and security means that once the
tag system has been beaten the security is also defeated.
Tag Interference Vulnerability:
Radio waves cannot be read through metal. Simply wrapping
several layers of aluminum foil around an item can defeat the security system.
Placing two tags close together can interfere with the signal
disabling the read capability of the scanner. Most suppliers
have software systems in place to limit this possibility but the
interference cannot be removed entirely at this time.
Tag Collision:
Readers can become confused when too many signals are received at
the same time. System providers have developed complex algorithms
to minimize this problem but the vulnerability remains.

http://www.ehow.com/list_6116737_advantages-
disadvantages-rfid.html

Advantages & Disadvantages of RFID


By Natasha Gilani , eHow Contributor

updated: March 23, 2010


1.
RFID - An Alternative to Barcode Technology

RFID, or radio-frequency identification, is a system that identifies and wirelessly transmits the
identity of a person or an object via radio waves. An RFID system comprises of an antenna, a reader
and unique active, passive or battery-assisted passive tags. The main purpose of an RFID system is
the transmission of data through a tag (which is a portable transmitter). The RFID reader deciphers
and processes the data at the receiving end. This technology is popularly used in the health care,
manufacturing, retail, animal-tracking, defense and security, and transportation sectors.

Advantage 1: Efficiency
2. RFID tags do not require line-of-sight to be deciphered They can be read through cardboard, plastic,
wood and even the human body. RFID tags can easily track moving objects and send the required
information back to the reader. This eliminates human errors, reduces labor and provides quick
access to a wealth of information.
Advantage 2: Return on Investment (ROI)
3. RFID costs more to implement than a barcode system, but provides a good return on investment in
the long run, since RFID is significantly more efficient.
Advantage 3: Less Vulnerable to Damage
4. RFID tags are less susceptible to damage. An RFID tag is securely placed within an object or
embedded in plastic, enabling the system to be used in a variety of harsh environments, such as
areas of high temperature or moisture, or with exposure to chemicals or the outdoors.
Disadvantage 1: Expense
5. RFID systems are typically more expensive than alternatives such as barcode systems. While
passive tag reading is similar to (and generally less expensive than) barcode reading, active tags are
costly due to their complexity. Active tags consist of an antenna, radio transceiver and microchip,
increasing the overall cost of an RFID system.
Disadvantage 2: Collision
6. Tag collision and reader collision are common problems with RFID. Tag collision occurs when
numerous tags are present in a confined area. The RFID tag reader energizes multiple tags
simultaneously, all of which reflect their signals back to the reader. This results in tag collision, and
the RFID reader fails to differentiate between incoming data. RFID reader collision results when the
coverage area managed by one RFID reader overlaps with the coverage area of another reader.
This causes signal interference and multiple reads of the same tag.
Disadvantage 3: Security
7. RFID technology gives rise to numerous security concerns. Since the system is not limited to line-of-
sight, external (and malicious) high-intensity directional antennas could be used to scan sensitive
tags. Fraud is always a possibility when the technology is used for high-security operations, such as
payment verification.
RFID System for Librarywww.rfid-library.com
LibBest Library RFID Management, Security System

Biometrics-NITGEN Co. Ltdwww.nitgen.com


Fingerprint Biometrics Solutions Access Control/Live Scanner

13.56MHz HF RFID Readerwww.austriamicrosystems.com


With unique antenna auto tuning, power output 700mW. Get tech Spec!

Tag RFID SolutionsRFIDTags.com/tag-rfid


Extensive RFID information from top tag rfid manufacturers.

Read more: Advantages & Disadvantages of RFID |


eHow.com http://www.ehow.com/list_6116737_advantages-disadvantages-
rfid.html#ixzz19sS6Ycr1
http://www.usingrfid.com/news/read.asp?lc=s44325nx1433zg Close
RFID's advantages & disadvantages explained
Thursday July 10, 2008

Many applications are now using radio frequency chip technology to automatically identify objects or
people. But while a variety of applications use radio waves to communicate information, the RF chip
technology used for each is quite different, addressing unique storage, range and security
requirements, according to according to Tony Revis of Extech Data Systems.
As a general definition, RFID tag technology is used in applications that identify or track objects and
contactless smart card technology, for example, is used in applications that identify people or store
financial or personal information.112.198.64.129 This article is copyright 2008 UsingRFID.com.

Short range applications


There are a growing number of applications where a form of very short range communications is
needed. One technology that can meet this need is called Near Field Communications or NFC. While it
does not have the hype of Bluetooth, Wi-Fi, WiMax, Zigbee, RFID or others, (NFC) appears to be set to
become a major presence in the wireless communications arena.
The concept of NFC technology has evolved from a combination of contact-less identification and
interconnection technologies including RFID and it allows connectivity to be achieved very easily over
distances of a few centimetres. Simply by bringing two electronic devices close together they are able
to communicate and this greatly simplifies the issues of identification and security, making it far easier
to exchange information.
Application requirements
Applications most often have differing requirements in their use of RF technology, with RFID tag and
contactless smart card technologies providing very different capabilities.
RFID is emerging as a complementary technology to help overcome some of the drawbacks associated
with bar code technology. Barcodes have one significant downfall- they require line-of-sight
technology. That means the scanner has to see the barcode to read it, which usually means items
have to be manually oriented toward the scanner for it to be read. Conversely, RFID does not require
line-of-sight and can be read as long as the item is within range of the reader.
RFID tags are simple, low-cost and disposable and are being used to identify animals, track goods
logistically and replace printed bar codes at retailers. RFID tags include a chip that typically stores a
static number (an ID) and an antenna that enables the chip to transmit the stored number to a reader
via electromagnetic waves. When the tag comes within range of the appropriate RF reader, the tag is
powered by the reader's RF field and transmits its ID to the reader.
RFID middleware provides the interface for communication between the interrogator and existing
company databases and information management systems.
Security concerns
One of the biggest objections to RFID is the lack of security. There is little to no security on the RFID
tag or during communication with the reader. Any reader using the appropriate RF signal can get the
RFID tag to communicate its contents.
Typical RFID tags can be easily read from distances of several inches (centimetres) to several yards
(meters) to allow easy tracking of goods. RFID tags have common characteristics, including: low cost,
high volume manufacturing to minimize investment required in implementation and minimal security,
with tags able to be read by any compatible reader. In addition, disposable or one-time use, minimal
data storage comparable to bar code, usually a fixed format written once when the tag is
manufactured and finally, read range optimised to increase speed and utility.
Not 'spy chips' as such
There is a still a suspicious view of RFID held by many in the industry - the thinking that RFID
technology is a 'spychip' technology. The term 'spychip' is self- explanatory and the issue of lack of
privacy rears its head. However, there are security measures being put in place to tackle the issue of
privacy. Both EPCglobal and AIM Global, the trade association representing RFID manufacturers, have
issued policy statements on RFID and privacy.
AIM's policy states: "AIM Global believes that policies and procedures should be put into place to
ensure consumer rights, for example, the right to know whether products contain RFID tags, the right
to have RFID tags removed or deactivated when they purchase products, the right to opt out of RFID-
enabled services, the right to access an RFID's tag's stored data and finally the right to know when,
where and why the tags are being read."
The benefits of RFID
There are many areas that benefit from the use of RFID. The technology can be used in Document
Tracking Applications as a way to improve the management of important document files in industries
like insurance and legal where the loss of such files can cause severe problems. RFID improves the
tracking of documents so that files can be more quickly located and legal document workflow more
easily tracked.
For sports events, concerts, and other leisure activities, RFID systems streamline ticket issue and
validation. They also serve to minimise losses from ticket fraud. Tickets can be created on demand
with RFID-enabled bar code printers; RFID card transponders can be issued to individual customers
and enabled for specific time periods; and tickets can be read remotely to increase throughput at
entrances and gates.
A hands-free access system for ski lifts based on RFID is used at many ski resorts in Europe. This
allows for improved customer service, more efficient operations, increased sales and higher
throughput of customers. Remote-operated gates detect a valid ski pass, embedded with a Tag-it
read/write transponder, and open automatically. The credit-card sized ski pass fits into a jacket pocket
and never has to be removed, giving skiers the freedom to enjoy hassle free skiing.
The military
The US military is currently one of the largest users and biggest markets for RFID systems although
the majority of their systems require/use expensive active RFID tags, some with sensing capabilities.
The airport and airline industry are piloting and using RFID for a multitude of applications. Boeing is
using RFID to track and manage serviceable parts on their aircrafts, whilst others such as Hong Kong
International Airport are using an automated in-flight catering system for the routing of in-flight meals
and the management of returnable containers. The application with the most potential within the
industry is for baggage tagging. The airlines are reported to handle approximately 3 billion bags each
year and due to limitations of barcode technology it is estimated that about 2% of bags get lost each
year, representing 60 million missing bags. Each missing bag cost the airlines as much as $200 to
replace, costing the industry around US$12 billion per year plus the additional problem of dissatisfied
customers. The implementation of RFID is changing this dramatically.
Manufacturing role
RFID is a mature technology within the automotive industry and has established itself as an integral
part of flexible manufacturing systems for those at the forefront of technological development, with
greater penetration within vehicle security systems (immobilisers) being adopted. The industry is
investigating additional usages of the technology such as supply chain management similar to other
industries.
The logistics industry consists of warehousing and postal services, road haulage, fleet management
and more. Worldwide the independent logistic industry is a late adopter of RFID although this is
currently being addressed. Postal services are paying an active interest in RFID particularly for item
management (auto-routing etc.), as are logistics service providers.
RF is a flexible technology and has potential for applications across all industry sectors. It is moving
beyond traditional application niches such as baggage handling, rental item tagging, point of sales,
Real Time Location Systems (RTLS) and Supply Chain Management.
There is no doubt that RF is a hugely significant technology in most industries, with the projected
market value for global RFID systems sales of $3.1 billion by 2008, according to ABI Research.
Meanwhile, IDTechEx predicts the global market to be worth approximately US$10 billion by 2013.
RFID in e-commerce
RFID is now being considered as an integral link in e-commerce environments. The technology
enhances and complements Electronic Data Interchanges (EDIs) to facilitate quick response and the
generation of exception reports. This should allow real time information to be transmitted to partners
within the supply chain supporting the decision-making process.
Ultimately RFID could provide immediacy of data right down to individual item level identification. This
can help bridge the gap between the customer, the order and order fulfilment process to the
satisfaction of the customer. This means essentially that it can enable the enhanced responsiveness
expected within an E-Business environment.
RF communications
The area of using RF for communication, including IRDA, Bluetooth and WiFi is expanding very rapidly
too. The first breakthrough in wireless communication for personal area networks was the use of
Infrared communications and the establishment of a universal standard, IrDA. IrDA is used for simple
short-range (up to 1 meter) point-to-point transmissions; use is still especially strong in Japan but
Bluetooth has really taken over in 2007 in Europe and the US, especially as many handheld computers
no longer have IR ports installed.
Bluetooth solutions are still relatively more expensive than IrDA, but there is an industry promise of a
low cost of ownership, ease of use and a fully interoperable system. Wireless Personal Area Networks,
connecting hand-held computers with a range of peripheral equipment with either IrDA or Bluetooth
will dominate in mobile computing applications. Connectivity to Wireless LANs and WANS will mainly
be handled by radios in the computer system. The ability to seamlessly switch from a WLAN running
802.11b to peer-to-peer WPAN using Bluetooth will be a defining requirement for the future.
Wi-Fi security issues
Security in the WiFi arena is always an issue. The IEEE and IETF specify 802.1X and EAP as the
standard for secure wireless networking, and Protected EAP (PEAP) is standards based. PEAP
(Protected EAP) is a form of EAP developed by RSA, Microsoft, and Cisco. PEAP uses server-side PKI to
build an encrypted EAP-TLS tunnel between the client and server prior to the client transmitting its
authentication credentials (such as; username, password and certificates). PEAP is used to overcome
some of the scalability problems associated with TLS.
Cisco's LEAP is an older EAP that uses TKIP and dynamic WEP keys rather than PKI and TLS for
authentication confidentiality. PEAP has largely replaced LEAP due to its advantages- providing mutual
authentication and using a server certificate for server authentication by the client. Users also have
the convenience of entering password-based credentials. In the first stage, a secure TLS channel is
created between the client computer and the authenticator/RADIUS server. In stage two, after that
secure tunnel has been created, authentication occurs. This provides strong security during the
authentication process and protects against a variety of possible attacks.
RF in transaction processing
Another very significant area for RF technology is in Transactions. Identification for payment and
contactless smart cards will be extremely important tools in the future.
Despite having a reputation for being a complex technology, smart cards have already delivered huge
benefits across a wide range of diverse applications. The deployment of smart cards has proved their
worth in secure access, transport, financial services and several areas of government among others.
However, vendors would like to find a way of getting everyone to adopt them immediately to recoup
their development costs and get return on investment. There are certain issues. The creation of a
smart card to do one thing is comparatively cheap; getting it to do two or more things is incrementally
more expensive.
Smart card prices continue to fall and competitive pressure to deliver greater value and functionality
using one token increase, especially in the financial services sector. Most often Smart cards have
'single function' thinking behind them. As Henry Ford once said, "They can have any colour they want
as long as it's black".
Contactless smart cards
The event of 'contactless' smart card technology is used in applications that need to protect personal
information or deliver secure transactions. Contact smart card technology provides similar capabilities
but does not have the RF interface that allows contactless smart cards to be conveniently read at a
short distance from the reading mechanism.
There are an increasing number of contactless smart card technology implementations that capitalise
on its ability to enable fast, convenient transactions and its availability in form factors other than
plastic cards - for example the inside of a watch, key fob or document. Current and emerging
applications using contactless smart card technology include transit fare payment cards, government
and corporate identification cards, documents such as electronic passports and visas, and contactless
financial payment cards.
The contactless device includes a smart card secure microcontroller, or equivalent intelligence, and
internal memory and has the unique ability to securely manage, store and provide access to data on
the card, perform complex functions (for example, encryption or other security functions) and interact
intelligently via RF with a contactless reader.
Applications that require the highest degree of information and communications security (for example,
payment applications, government IDs, electronic passports) use contactless smart card technology
based on an international standard that limits the ability to read the contactless device to
approximately 4 inches (10 centimetres). Applications that need longer reading distances can use
other forms of contactless technologies that can be read at longer distances.
Smart card security features
Applications using contactless smart cards support many security features that ensure the integrity,
confidentiality and privacy of information stored or transmitted, including the following:
1. Mutual authentication
For applications requiring secure card access, the contactless smart card-based device can
verify that the reader is authentic and can prove its own authenticity to the reader before
starting a secure transaction.

2. Strong information security


For applications requiring complete data protection, information stored on cards or documents
using contactless smart card technology can be encrypted and communication between the
contactless smart card-based device and the reader can be encrypted to prevent
eavesdropping. Additional security technologies may also be used to ensure information
integrity.

3. Strong contactless device security


Like contact smart cards, contactless smart card technology is extremely difficult to duplicate
or forge and has built-in tamper-resistance. Smart card chips include a variety of hardware
and software capabilities that detect and react to tampering attempts and help counter
possible attacks.

4. Authenticated and authorised information access


The contactless smart card's ability to process information and react to its environment allows
it to uniquely provide authenticated information access and protect the privacy of personal
information. The contactless smart card can verify the authority of the information requestor
and then allow access only to the information required. Access to stored information can also
be further protected by a personal identification number (PIN) or biometric to protect privacy
and counter unauthorized access.

5. Strong support for information privacy


The use of smart card technology strengthens the ability of a system to protect individual
privacy. Unlike other technologies, smart card-based devices can implement a personal
firewall for an individual, releasing only the information required and only when it is required.
The ability to support authenticated and authorised information access and the strong
contactless device and data security make contactless smart cards excellent guardians of
personal information and individual privacy.
Conclusions
Contactless smart card technology is an excellent privacy-enabling solution for applications that need
to protect personal information and ensure that communication with the contactless device is secure.
The on-chip intelligence enables systems that use contactless smart card technology to comply with
strong privacy and security guidelines, as well as deliver the speed and convenience of contactless
communication.
This combination of features is leading governments, corporations, financial service providers and
transit agencies to choose contactless smart card technology for new secure identification and
payment applications.
To conclude, RF technology - despite certain issues - with its fast registration, wireless data collection,
and communication abilities, offers far-reaching benefits to many industries.
http://forum.rficdesign.com/YaBB.pl?num=1228841512

RFID Advantage and disadvantage Mehmet

Advantages.

RFID technology does not require line-of-sight reading. Unlike a bar code, an RFID tag can
be read through other materials (though some materials may cause problems).
Theoretically, this means that you could take a pallet of mixed products, all of which contain
individual RFID tags, and have an RFID reader read all the tags within the palletized load
without having to physically move any of the materials or open any cases.

RFID tags can hold more data than bar codes. The operative word here is “can”. As the data
storage capacity of RFID tags increase, so does the cost of the tags. Therefore, you will
likely find that many RFID tags will not hold any more data than a bar code.

RFID tag data can be changed or added to as a tag passes through specific operations. Once
again, cost comes into play here, as read-only tags are much less expensive than read/write
tags. Therefore, you will likely see limited use of this functionality.

RFID tags are more effective in harsh environments where bar code labels have problems.
RFID tags can be sealed within a plastic enclosure eliminating many of the problems that
plague bar codes in harsh environments where they are exposed to chemicals, heat,
abrasion, dirt and grease buildup, etc.

A large number of RFID tags can be read almost instantaneously. This brings us back to the
palletized load scenario where the load contains a large quantity of products, each with its
own RFID tag. Though it may seem as though the tags are all read at once, they are
actually read sequentially (one at a time), however, this happens so fast that it is virtually
imperceptible.

Disadvantages.

Cost, Cost, Cost. This is the biggest hurdle to RFID tags replacing bar codes for item-level
tracking of low-cost products. You can produce a bar code on an item for less than 1 cent,
yet the most optimistic proponents of RFID are still “hoping” for 5 or 10-cent RFID tags
sometime in the future (this may be years away). And even if we get 5-cent tags, that is
still a significant cost to add to the manufactured cost of low-cost consumer goods. And
even with higher-cost products, or case and pallet level tracking, the benefits of RFID must
be greater than this additional cost.
RFID signals may have problems with some materials. Metals and liquids can cause
problems when trying to read RFID tags. Tag placement is becoming a science in and of
itself since — depending on the product — even a case-level RFID tag may have to be
placed in a specific location on the case and cases stacked in a specific orientation to get a
consistent read. When you get back to the mixed-pallet scenario, it is unclear whether or
not you can be assured that you have read all the tags on the pallet.

Though RFID does not require of line-of-sight, it is also not restricted by it. With the proper
bar code equipment, I can selectively read a single bar coded case on a shelf more than ten
feet away. I can’t do that with RFID since an RFID reader will read all tags within its range.
Even though you can get directional RFID readers, they are still not as selective as a visual
device (bar code scanner). There are still many warehouse applications that require this
line-of-site capability.

RFID tags can fail. Yes I know, bar code labels can fail as well. The unique issue with RFID
failure is the automated nature of RFID optimized processes. If you have a pallet of
materials with RFID tags and one of the RFID tags is damaged, how will you know that you
did not read all the tags. And, what happened to your system data when this occurred.

RFID programming speed. The smartlabel scenario (using labels with integrated RFID chips)
seems to be the most likely one for mass utilization of RFID for case and unit tracking of
inventory. Unfortunately, it takes more time to print, program, and verify an RFID enabled
label than to simply print a bar code label. In addition, RFID smartlabels seem to have some
serious quality problems. I have been hearing of average failure rates (inability to properly
program and read the tag) of anywhere from 10% to 30%. For automated print-and-apply
applications, this could be a serious problem.

RFID standards are still being developed. You don’t want to invest in an RFID system that is
based on soon-to-be obsolete specs. Most RFID systems currently in place are based upon
proprietary technology where the readers are designed to only read RFID tags from a
specific manufacturer. When compared to bar code technology, where standards have been
in place for decades, most bar code scanners are designed to read all standard bar code
symbologies.

Re: RFID Advantage and disadvantage guru

Active and Passive Tags

There are actually two reasons why active is better than passive in your case for the pure
identification: better receiving and better transmitting of the active tag.

Better receiving:
The passive tag requires energy from the electromagnetic field of the reader for the entire
operation. If the passive tag does not get enough energy from the field it will not start
operating at all. Therewith the tag might not even receive the request for it's ID from the
reader.
In contrast to that, the active tag always operates and therewith needs much less
electromagnetic field strenght to acquire the request for the ID from the reader.
-> The active tag receives better.

Better transmitting:
It might be the case that the passive tag got enough energy to operate and processed the
request from the reader. The passive tag might even have sent the response with it's ID.
But, the transmission power was not enough to reach the reader. The response got lost.
Again, the active tag is in a better position. It transmits the response with a higher power
such that the reader has a much better chance to acquire the response signals.
-> The active tags transmits better.

One important drawback to mention is the power supply situation of the active tag. It
always needs a battery or similar energy source for operation. Though, active tags might be
optimized for reasonable life time, depending on the application scenario.

And there might be additional values of active tags like temperatur logging in cool chains.
Small, check-card-sized tags can log temperatures during transport of perishable or
pharmaceutic goods. The independent activity then is essential for the logging.

Tutorial and bookmark on RFID is on

visit Login or Register to view attachments


Guru
Re: RFID Advantage and disadvantage guru

The distance from which a tag can be read is the read range. There are environmental and
application factors that may limit read range. Optimal conditions exist in an air environment
with the tag placed perpendicular to the antenna field. Factors such as tag frequency,
electromagnetic noise, metals and antenna power may affect the read range. Typically, the
larger the tag the better the read range. Some tag and antenna combinations can read
passive tags as far away as 18 inches. Most read ranges using hand-held readers are 3 to 9
inches depending on the reader.
Re: RFID Advantage and disadvantage Shrinivasan

cmos and rfid


Radio Frequency Identification (RFID) is slated to become a standard tracking and
tagging system for various products chain management systems. Since more and more
products become RFID enabled, a faster identification mechanism must be needed. The
anti-collision algorithm is one of the basic mechanisms used to address the issue of
multiobject
identification. This paper firstly introduces the basics of the RFID and anti-collision
algorithm in RFID tag system. Then, Field Programmable Gate Array (FPGA)
implementation for this algorithm is presented by using software-based simulation. The
design methodology and results are useful for designing and implementing a practical
RFID system. The developed logic circuits can be finalized by implements it in the Very
Large Scale Integrated circuit (VLSI). The system design is realized by using
Complementary Metal Oxide Semiconductor, (CMOS) technology and from here the
extraction of the final layout for the anti-collision protocol will be develop.
Re: RFID Advantage and disadvantage amit

Very good lecture notes on rfid

Outline
What is RFID.
RFID Applications.
RFID Devices (Interrogator & Transponder).
Different Frequency Bands and Standards.
System Design for Passive and Semi-Passive Systems.
Passive Tag Building Blocks.
Future research Topics.

Login or Register to view attachments


Re: RFID Advantage and disadvantage Martis

basic difference is
Passive Tags Active Tags

Operate without power Operate on battery

Less expensive More expensive

Unlimited life Limited life

Light in weight Heavier in weight

Less range (up to 3 to 5 meters) Greater range (up to 100 meters)

Subject to noise Better noise immunity

Derive power from the electromagnetic field generated by the reader Internal power to
transmit signal

Require powerful readers Effective with less powerful readers

Low data transmission rate High data transmission rate

Fewer tags can be read simultaneously More tags can be read simultaneously
Greater orientation sensitivity Less orientation sensitivity
Re: RFID Advantage and disadvantage Verayue

Dear Sir/Madam,

With us, you'll have a wide range of RFID products to choose from. We offer RFID
Card,Contact IC Card and Laundry tag etc.

All the products are undering an ISO 9001:2000-certified management system. Small MOQ
(1000pcs) which will be shipped in one seven working days.

Inquire today and we will respond within 24 hours.

Thanks&Regards,

Vera

OPRFID Technologies., LTD


2-603 Room, Hong Feng Jia Yuan , 270# BeiMo Street

ChengXiang Putian City Fujian, P.R, China.


Tel: (0086)594 2790031
Fax: (0086)594 2790185

Website: Login or Register to view attachments

Email:oprfid.sales@oprfid.com

oprfid.salesyue@hotmail.com

Login or Register to view attachments


Re: RFID Advantage and disadvantage naveen

How does an RFID system work?


Re: RFID Advantage and disadvantage Ray Kwok

An RFID system consists of a tag made up of a microchip with an antenna, and an


interrogator or reader with an antenna. The reader sends out electromagnetic waves. The
tag antenna is tuned to receive these waves. A passive RFID tag draws power from the field
created by the reader and uses it to power the microchip's circuits. The chip then modulates
the waves that the tag sends back to the reader, which converts the new waves into digital
data.

http://www.idautomation.com/rfid_faq.html

RFID FAQ & Tutorial


The purpose of this document is to provide users with a basic
understanding of RFID that is necessary to implement the
technology with IDAutomation RFID products. To find technical data
not located in this RFID FAQ & Tutorial, please refer to the source of
that data. For example, to understand the requirements of the
various RFID mandates, refer to the creator of the mandate for
those specifications.
• About RFID
• RFID vs barcodes
• Advantages and disadvantages of RFID
• Encoding RFID Tags
• Reading RFID tags
• Verifying RFID encoding
• Amount and type of data Encoded
• Formatting data for RFID tags with IDAutomation products
○ Tilde Processing Options
○ Encoding Properties
○ Tag data construct examples
 DOD-96
 GID-96
 EPC GIAI-96
 EPC SGTIN-96
 EPC SSCC-96
 DOD-64 UID
○ Step by step example of encoding a tag for DOD-96
○ Proprietary encoding examples
○ Encoder Prefix and Suffix Examples
• Setup, Support and Troubleshooting
○ Encoder Setup and Configuration
○ Step by Step Troubleshooting Process
Because most RFID printers now come with their own RFID
Label Software, IDAutomation has discontinued their RFID
Label Software application.

About RFID Technology


RFID (Radio Frequency Identification) technology has been around
for many years. Before 2000, common uses for RFID in the USA
included toll road passes, access ID cards and the tiny ID chips that
are inserted in animals for identification purposes. The recent
introduction of RFID in the supply chain, as well as several
mandates, has added to the awareness and value of this
technology.
RFID tags operate at several different frequencies. The majority of
RFID tags operate at either 13 MHZ or 900 MHZ. Think of these two
frequencies as the AM and FM bands on your radio. Each one has its
advantages. For example, one works better when surrounded by
metal, while the other will work better over long distances.
• 13 MHZ (HF) RFID tags are generally better at penetrating
liquids and are commonly used for access control such as in
security cards and wristbands. The read range at this
frequency is about 3 feet, or 1 meter.
• 900 MHZ (UHF) RFID tags operate better when reading
multiple tags simultaneously, and thus are generally the tag
type of choice for inventory purposes. The read range at this
frequency is about 3-10 feet or more depending on what type
of reader, interrogator or access point is used.
Most RFID tags do not contain any data after
they are manufactured; they are similar to a
blank label waiting for information to be printed
on them. To place information in the tag, an
RFID encoder must be used. One of the most
popular methods of encoding is with an RFID
Capable Label Printer that has a built-in
encoder and RFID Capable Barcode Label
Software. There are basically three types
(called classes) of tags:
• Class 0 - these RFID tags are like license plates in that they
are read-only, and are encoded with data when they are
manufactured.
• Class 1 - these RFID tags allow you to write the data in the
tag and are usually one-time programmable (OTP). These are
available in either HF or UHF versions and are known as GEN1.
• Class 1 GEN2 EPC (GEN2) - these RFID tags are the latest
type of UHF tag and are most referred to in this document.
They are also the tags required for mandates by various
suppliers such as Wal-Mart and the US Department of Defense
(DOD). In the automation identification industry, we refer to
these tags simply as GEN2. These tags are 96 bits or larger
and contain advanced features, such as lock after write and
CRC read verification.
The following components are required to write data (encode) to
class 1 tags:
Software Application  Encoder Software  Tag
Encoder  RFID Tag
The following components are required to read data from the tag:
RFID Tag  Reader, Interrogator or Access Point  Decoding
Software  Software Application
IDAutomation provides some components of this system
including Software Applications,Encoder Software and Tag Writers.
RFID vs Barcodes
Barcoding is a mature technology that has been around for many
years, unlike RFID, which is still in its infancy. Additionally, the
components used to read and write barcodes have decreased in cost
because of this maturity and sales volume. There are many
additional issues to consider with RFID, such as those listed below
in the Disadvantages of RFID section. However, overall, RFID has
many advantages over barcoding. In some cases, these advantages
outweigh the disadvantages and high cost of the components.
Decision makers must carefully consider whether RFID really
provides an advantage over barcoding in their business model.

Advantages & Disadvantages of RFID


Advantages of RFID:
• Inventory efficiency - Because line-of-sight is not required
to read RFID tags, inventory can be performed in a highly
efficient method. For example, pallets in a warehouse can be
read, inventoried, and their location can be determined no
matter where the tag is placed on the pallet. This is because
the radio waves from the reader are strong enough for the tag
to respond regardless of location.
• Return on investment (ROI) - Though the cost may be high
at first, the total cost of ownership should go down over the
years and provide a good ROI, if the implementation provides
a significant method to improve business processes.
• Vulnerability to damage minimized - Barcodes can be
damaged in many ways. Although, 2D barcode types such
as Data Matrix can be read even when up to 40% of the
barcode is damaged.
Disadvantages of RFID:
• Dead areas and orientation problems - RFID
works similar to the way a cell phone or wireless
network does. Like these technologies, there may
be certain areas that have weaker signals or
interference. In addition, poor read rates are sometimes a
problem when the tag is rotated into an orientation that does
not align well with the reader. These issues are usually
minimized by proper implementation of multiple readers and
use of tags with multiple axis antennas.
• Security concerns - Because RFID is not a line-of-sight
technology like barcoding, new security issues could develop.
For example, a competitor could set up a high-gain directional
antenna to scan tags in trucks going to a warehouse. From the
data received, this competitor could determine flow rates of
various products. Additionally, when RFID is used for high-
security operations such as payment methods, fraud is always
a possibility.
• Ghost tags - In rare cases, if multiple tags are read at the
same time the reader will sometimes read a tag that does not
exist. Therefore, some type of read verification, such as a CRC,
should be implemented in either the tag, the reader or the
data read from the tag.
• Proximity issues - RFID tags cannot be read well when
placed on metal or liquid objects or when these objects are
between the reader and the tag. Nearly any object that is
between the reader and the tag reduces the distance the tag
can be read from.
• High cost - Because this technology is still new, the
components and tags are expensive compared to barcodes. In
addition, software and support personnel needed to install and
operate the RFID reading systems (in a warehouse for
example) may be more costly to employ.
• Unread tags - When reading multiple tags at the same time,
it is possible that some tags will not be read and there is no
sure method of determining this when the objects are not in
sight. This problem does not occur with barcodes, because
when the barcode is scanned, it is instantly verified when read
by a beep from the scanner and the data can then be entered
manually if it does not scan.
• Vulnerable to damage - Water, static discharge or high-
powered magnetic surges (such as lightning strike) may
damage the tags.
Advantages of using UHF GEN 2 RFID tags:
UHF GEN 2 tags greatly reduce (if not eliminate) the ghost tag
problem, using a mandatory hardware based CRC. The CRC is
created when the tag is encoded, and the reader verifies the CRC
when the tag is read. If the CRC does not match, the data read is
considered invalid. In addition, more tags can be read
simultaneously when using GEN2.

Encoding & Writing RFID Tags


One of the most automated methods of encoding RFID
tags is with an RFID-Capable Label Printer that has a
built-in tag writer and RFID-Capable Barcode Label
Software. IDAutomation also offers an RFID Encoder
Component that can easily be integrated into custom
software applications, and can easily format the data
for the RFID encoder and tag.
The complete process of creating RFID tags involves
the following:
1. Determine which products to purchase. We recommend using
a barcode label printer that has a built-in RFID tag writer and
our IDAutomation RFID Label Software or the RFID Encoder
Component. The appropriate smart tag labels for the
implementation or mandate must also be purchased.
2. Implement the Tag Data Construct, which is the method used
to format the data to be encoded in the tag. When formatting
data for mandates and standards such as DOD or EPC
requirements, these procedures must be followed very
carefully. Refer to the Tag Data Construct Examples section
below for common applications and mandates.
3. If each tag is to contain unique information, decide how the
variable data will be encoded in the tag. Our IDAutomation
RFID Label Software has the ability to increment numbers
(which is useful for variable serial numbers) with VB scripting
or connect to a database field for the variable portion of the
data. Using the IDAutomation RFID Label Software to
increment a serial number for the DOD-96 UID mandate may
look something like this in VB script:
"~b00811001111~b0040000~t048 2S194" & "~n036" & L# +
1000
Note that the label software will automatically change L# +
1000 to be the label number plus 1000, which is the starting
serial number.
4. When using an RFID Label Printer with our IDAutomation RFID
Label Software, it is recommend that the printer be set up so
the tag is automatically read after encoding to verify for
accuracy. However, this does not assure the tag was encoded
with the correct data, it only insures the data sent to the tag
was written and can be read. A few of the tags should be read
to confirm the data was written and formatted correctly for
the Tag Data Construct. The IDAutomation RFID Label
Software has the ability to print the hexadecimal data encoded
in the tag as an option for read verification. The IDAutomation
RFID Label Software also provides a diagnostic that assists in
determining tag data construct formatting errors.

Reading RFID Tags


Hand-Held RFID Readers such as the Symbol Technologies RFID
Scanner are convenient for reading and locating RFID tags. Many
other products are also available that can read multiple tags for
tracking or inventory, but these implementations are too complex to
describe here.
Most RFID printers can also read data from a tag. This is
accomplished by issuing a read command with the label on the
printer's encoder.
• With the Datamax H Class RFID Printer, the label is read by
diagnostics. Choose Menu - Diagnostics - Options Testing -
Test RFID - Tag Data.
• When using the Zebra R110xi printer, press Setup and the
Previous button until "RFID Tag Data" appears in the display.

Verifying Encoding of RFID Tags


Because the data in the RFID tag cannot be seen, it is necessary to
verify the data was written to the tag properly and in the correct
format. The RFID-capable tag printer must be set up to verify the
data was written properly by enabling "verify after write," which
verifies the data was correctly written to the tag by performing a
read on the tag. Additionally, diagnostic options in the
IDAutomation RFID Component and RFID Label Software may be
used to visually verify the data written to the tag.

Amount & Type of Data Encoded in


RFID Tags
The amount of data encoded depends on the bit size of the tag,
minus any fields that may be required. Refer to the formatting
section below for examples. The maximum decimal value for a field
is calculated with the formula of 2^n-1 where n=the fixed number
of bits in the field.

Formatting Data For RFID Tags


When using IDAutomation RFID products to encode RFID tags, data
may be sent directly or easily formatted. The formatting allows
variable data such as a serial number or text to be encoded in
hexadecimal with ease. Special processing is performed when a tilde
character is used to properly format the data to the tag and insure
it is correct. The Tag Data Construct Examples below make use of
this processing for common applications.
Tilde Processing Options:
When the data to be encoded does not begin with a tilde (~), the
data is sent directly to the encoder as is. When the data begins with
a tilde, the following processing operations may be performed to
format the data to the tag:
• ~b??? informs the RFID component that the data that follows
is binary data where ??? is the length of the binary data in
bits.
For example, ~b00811001100 encodes 8 bits of the binary
data 11001100 in the tag (which represents the number 204).
• ~d??? allows the ASCII code of a character to be encoded in
EncoderPrefix or EncoderSuffix where ??? is a 3 digit number
in decimal format. For example, ~d013 encodes character
<CR>. This processing is only provided in the EncoderPrefix
and EncoderSuffix properties.
• ~n??? informs the RFID component that the data that follows
is variable numeric data where ??? is the length of bits
reserved for encoding this number.
For example, ~n016170 encodes 170 which is converted to
binary as 0000000010101010. Because 16 bits are reserved
for this number, several zero bits are added to the beginning.
This may be necessary when encoding variable-length serial
numbers. Because this number may be variable, a space or
tilde must follow this number if data is to be encoded after it.
• ~x??? informs the RFID component that the data that follows
is hexadecimal data where??? is the length of bits reserved for
encoding this data. Four (4) bits are reserved for each
character. Therefore, multiply ??? by 4 to determine the total
number of bits reserved in the tag for this command.
For example, ~x016A1C3 encodes A1C3 as hexadecimal which
is 1010000111000011 in binary format; 16 bits in length.
• ~t??? informs the component that data that follows is variable
text or ASCII data to be encoded where ??? is the length of
bits reserved for encoding this text. This process may be used
to encode standard text or ASCII data in RFID tags. Up to 12
characters may be stored in a 96 bit tag; 8 bits are required
for each character. A tilde must follow this text if data is to be
encoded after it. For example: ~t032TEXT~n016170
Encoding Properties:
• DataToEncode (this is the Value in the IDAutomation RFID
Label Software) - The data to be formatted and encoded in the
RFID tag. If the data begins with a tilde, the information will
be formatted for UHF tags and converted to hexadecimal
format as required. If the data begins with anything else, it will
not be modified and is sent directly, which is common when
encoding HF tags. When using the tilde, spaces may be
entered between fields to improve readability. However,
spaces may not be entered between the tilde and the end of
the data that is to be processed by it. For example, the
following is a correct use of the space in DataToEncode:
~x008CE ~b00201
~b030110001000100110011111000110001 ~n02416522293
• EncoderPrefix - A string that is sent directly to the printer (or
other encoding device) to inform it of the type of RFID label
being encoded, and to prepare it to encode the result of the
DataToEncode property.
• EncoderSuffix - A string that is sent directly to the printer (or
other encoding device) after the DataToEncode is sent to
finalize encoding of the tag.
• PrintCommand - If a value is present in this property, the
custom printer commands are inserted just before the value
during the printing of each label. Normally, the Print Command
may be left blank. However, when using Datamax RFID
printers, Q0001 or another printer command must be used
that identifies the end of each label. When the PrintCommand
is empty (default), the encoder inserts its data (EncoderPrefix
+ DataToEncode + EncoderSuffix) just before the last line that
appears at the end of each label.

RFID Tag Data Construct Examples:


The constructs presented below are only examples. The EPCglobal
EPC Tag Data Standardidentifies the specific encoding schemes for
the EAN.UCC Global Trade Item Number (GTIN), the EAN.UCC Serial
Shipping Container Code (SSCC), the EAN.UCC Global Location
Number (GLN), the EAN.UCC Global Returnable Asset Identifier
(GRAI), the EAN.UCC Global Individual Asset Identifier (GIAI), and a
General Identifier (GID). Please refer to the latest EPC Tag Data
Standard to determine the tag data construct.

In the examples below, the first row defines the fields and the bit
size allocated for each. For example, Serial Number (36) means 36
bits are allocated to store the serial number field. The second row is
an example of how this field would be formatted for IDAutomation
RFID software products. The total number of bits of all sections
must equal the tag size and all unallocated bits must be padded
with zeros. For example, 8+4+48+36=96 bits. The maximum
decimal value for a field is calculated with the formula of 2^n-
1 where n=the fixed number of bits in the field. When
using IDAutomation RFID software products, the tag size property
must equal the bit size of the tag.
DOD-96: (step-by-step example)
CAGE Code as
Header Filter Serial Number
ASCII
(8) (4) (36)
(48)

~b00811001111~b0040000 ~t048 2S194 ~n03612345678901

GID-96:
Manager Object
Header Serial Number
Number Class
(8) (36)
(28) (24)

~b00800110101 ~n02810240 ~n02419254~n03612345678901

EPC GIAI-96:
Partitio Company Individual Asset
Header Filter
n* Prefix Reference
(8) (3)
(3) (20-40) (62-42)

~b00800110100~b003000 ~n0032 ~n03412345678 ~n04812345678901

EPC SGTIN-96:
Item
Partitio Company
Header Filter Referenc Serial Number
n* Prefix
(8) (3) e (38)
(3) (20-40)
(24-4)

~b00800110000~b003000 ~n0032 ~n03412345678 ~n010174 ~n03612345678901

EPC SSCC-96: (To create the SSCC barcode, refer to the SSCC-18
Barcode Label FAQ)
Partitio Company Serial Unallocate
Header Filter
n* Prefix Reference d**
(8) (3)
(3) (20-40) (38-18) (24)

~b00800110001~b003000 ~n0034 ~n02712345678~n03112345678 ~n0240


DOD-64 UID:
Serial
Header Filter CAGE Code as ASCII
Number
(8 bits) (2 bits) (30 bits)
(24 bits)

~b0081100111 ~b0020 ~b0301100010001001100111110001100 ~n0241652229


0 1 01 3

NOTES:
1. The header determines the EPC tag standard. The following
are a few of the defined header standards:

Header Bits Encoding Standard

11001110 DOD-64

11001111 DOD-96

00110000 SGTIN-96

00110001 SSCC-96

00110010 GLN-96

00110011 GRAI-96

00110100 GIAI-96

00110101 GID-96

2. * The Partition is an indication of where the subsequent


Company Prefix and Serial Reference numbers are divided.
Refer to the EPC Tag Data Standard to determine the company
prefix and the overall tag data construct. Below is an example
of a partition table. Using this table, if your company prefix is
34 bits long, then you would use the partition value of 2 and
use 48 bits for the value of the asset reference.
The GIAI Partition Table:
Partition Value (P) Company Prefix Individual Asset Reference

Bits (M) Digits (L) Bits (N) Digits

0 40 12 42 12

1 37 11 45 13
2 34 10 48 14

3 30 9 52 15

4 27 8 55 16

5 24 7 58 17

6 20 6 62 18

3. ** Unallocated bits must still be defined and padded with


zeros. For example, with SSCC-96, the unallocated area is 24
bits represented as ~n0240 in all IDAutomation RFID software
products.
Step-by-Step example of encoding an RFID tag for DOD-
96:
The following is a step-by-step example of how the IDAutomation
RFID Software products process the formatted data to encode RFID
tags:
1. This implementation example will use the following data
construct. The number of bits reserved for each section is very
important. The total number of bits for each section must
equal the tag size. For example, 8+4+48+36=96 bits.
CAGE Code as
Header Filter Serial Number
ASCII*
(8 bits) (4 bits) (36 bits)
(48 bits)

~b00811001111~b0040000 ~t048 2S194 ~n03612345678901

2. Implementation of the above data construct for the


Department of Defense would involve placing the string of:
~b00811001111~b0040000~t048 2S194~n03612345678901
in the DataToEncode property of any IDAutomation RFID
Software product. This data would be encoded in the tag with
our software to a Zebra RFID label printer using the following
format:
EncoderPr EncoderS
DataToEncode
efix uffix
^XA^RFW,H ~b00811001111~b0040000~t048
^FS
^FD 2S194~n03612345678901

3. The component converts this data into a single bit stream


represented in the BitsToEncode property:
110011110000001000000011001001010011001100010011
100100110100001011011111110111000001110000110101
4. The RFID software converts the bit stream into hexadecimal
characters for encoding which is represented in the
HexToEncode property:
CF02032533139342DFDC1C35
5. Finally, this software appends the encoder prefix and suffix,
which informs the encoder to place the hexadecimal data into
the tag, the entire string sent to the printer, would be the
following:
^XA^RFW,H^FDCF02032533139342DFDC1C35^FS
*As required by the DoD's Passive RFID Information Guide, the first
character of the CAGE code is a space.
Step-by-Step example of encoding an RFID tag for SGTIN-96:
The following is a step by step example of how the IDAutomation
RFID Software products process the formatted data to encode RFID
tags.
1. This implementation example uses the SGTIN-96 data
construct. The number of bits reserved for the company prefix
and the item reference are determined by the partition defined
in the EPCglobal EPC Tag Data Standard. The total number of
bits for each section must equal the tag size of 96 bits. For
example, 8+3+3+24+20+38=96 bits.
Partiti Company Item Serial
Header Filter
on Prefix Reference Number
(8) (3)
(3) (24) (20) (38)

~b00800110000~n0033~n0035~n0240614141~n020100734 ~n0382

2. Implementation of the above data construct would involve


placing the string of:
~b00800110000~n0033~n0035~n0240614141~n020100734
~n0382
in the DataToEncode property of any IDAutomation RFID
Software product. This data would be encoded in the tag with
our software to a Zebra R110xi RFID label printer using the
following format:
EncoderPr EncoderS
DataToEncode
efix uffix

^XA^RFW,H ~b00800110000~n0033~n0035~n0240614141
^FS
^FD ~n020100734~n0382

3. Our software appends the encoder prefix and suffix, which


informs the encoder to place the hexadecimal data into the
tag.
*As required by the DoD's Passive RFID Information Guide, the first
character of the CAGE code is a space.
Proprietary Encoding Examples:
Text, numbers, hexadecimal and binary data are easily encoded in
RFID tags with IDAutomation RFID software products, which can
make proprietary implementations an easier task. Before
implementing a proprietary RFID system, consider implementing
one of the EPC standards to better position your implementation for
future possibilities. If you decide not to implement one of the EPC
standards with UHF tags, try including a header field of 8 bits (all
zeros) in your tag (for example ~n0080) because this is not a
valid EPC Header, and it should insure your tags do not conflict in
some way with other EPC or DOD tags.
Serial Number Encoding Example:
The following VB code encodes a variable serial number into a 64 bit
RFID tag. Because 56 bits of the tag may be used for the number, it
can be very large in size.
string SerialNumber = "10223847"
rfidWriter.DataToEncode = "~n0080~n056" & SerialNumber
Our RFID Component Encoder DLL can be used to convert the tag
data back to a number after it is read. For example, if the tag is
read in hexadecimal format, this code would convert the data back:
SerialNumber =
rfidWriter.ConvertHexStringToDecString(HexDataFromTag)
Text Encoding Example:
The following VB code encodes a text string into a 96 bit RFID tag.
Up to 11 characters may be encoded in a 96 bit tag; 88 bits are
used to encode text (8 bits per character).
string Name = "John Smith"
rfidWriter.DataToEncode = "~n0080~t088" & Name
The RFID DLL Encoder may also be used to convert the tag data
back to text after it is read. For example, if the tag is read in
hexadecimal format, this code would convert the data to a string of
text:
Name = rfidWriter.ConvertHexStringToTextString(HexDataFromTag)

RFID Setup and Support


Please review this entire section carefully before contacting us for
support.
To obtain support for RFID products, you must have made a
software purchase for the applicable RFID product from us and you
must have ordered the Priority Support and Upgrade
Subscriptionwith the software product.
To obtain support, please open a help desk ticket with your order ID
number.
Encoder Setup and Configuration:
To properly encode RFID tags on a printer with IDAutomation
software, the printer must have the following capabilities:
1. Ability to encode the RFID tag as separate printer command.
The separate command will be combined with the print stream
and sent as a single complete print job.
2. Ability to read and verify the tag data after it is written.
3. Ability to void and retry on the next label. If the data read
does not match what was written, a "VOID" should be printed
on the defective label and the printer should retry the entire
process on the next label.
We recommend the following printer settings for all GEN
2 RFID tags:
1. Tag Type = GEN2
2. Tag Size = 96
3. Void and Retry = True - this option must be set so that the
encoder performs a read after write to verify the data was
written properly. If the data read does not match what was
written, "VOID" will be printed on the defective label and the
printer will reprint and encode the next label.
4. Retry Attempts = 3
5. Lock after Write = Enabled
6. RFID Position - this depends on the encoder type, label type
and printer. It is the location of the tag in the smart-label
measured from the top of the label. Many printers such as
theDatamax H Class and the Zebra R110xi have a calibrate
feature that will set this automatically.
7. Preset Distance - the distance the label will be advanced for
tear off when it is finished printing or after a form feed.
For example, upon receiving a Datamax H Class printer, the
following settings should be made from the front panel:
• Menu - Printer Options - RFID - UHF Settings - Tag Type =
GEN2
• Menu - Printer Options - RFID - UHF Settings - Tag Size = 96
• Menu - Printer Options - RFID - Lock after Write = Enabled
• Menu - Printer Options - RFID - Retry Attempts = 3 (for
testing purposes, you may want to use 1 or 2)
• Menu - Printer Options - RFID - RFID Position = 1.7 inches is
a common setting with Alien 4 by 6 labels.
• Menu - Print Control - Preset Distance = 2 inches is a
common setting with Alien 4 by 6 labels.
After the above settings are set and saved from the menu on the
printer, press FEED once. The printer should now be able to encode
tags properly.
Step-by-Step Troubleshooting Process:
1. Verify the printer contains the latest firmware.
2. Verify the printer driver is the latest version. Corrupted or bad
drivers have caused many printer problems.
3. Double-check the Encoder Setup and Configuration.
4. Check to make sure the correct label stock is selected
in both the software and in the print driver.
1. When using the Zebra printer driver, Choose Properties -
Printing Preferences and select the paper size.

When using the Seagull driver for Datamax printers,


Choose Properties - General – Printing Preferences – Page
Setup and select the label stock size.

2. Select the correct paper type in the application that is


printing the label; when usingIDAutomation RFID Label
Software, choose File - Label Stock Properties.
5. Open the software that will be used to encode the tag and
double check the encoder prefix and suffix. When
using IDAutomation RFID Label Software, simply right-click on
the RFID object and select the RFID Encoder tab to see these
properties.
6. Double check the formatting commands by examining the
hexadecimal data and the complete encoder string computed
by the software and verify they are correct. When
usingIDAutomation RFID Label Software, these commands are
found by right-clicking on the RFID object and selecting
the Value tab.
7. With the software, print one label with a custom printer
command in place of the RFID command. This involves
changing the Encoder Prefix and possibly the Suffix;
the formula value or data being encoded may stay the same.
When using this test method, the data will be encoded in the
barcode instead of the RFID tag. For example, the following
values create a code 39 barcode on a Datamax
printer encoding hex for EPC SSCC-96 with a custom
command:
Prefix: 1A5205000500025
DataToEncode: ~b00800110001~b003000~n0034~n027123
45678~n03112345678~n02401
Suffix: ~d013
Print Command: Q0001
The result on the label should be a barcode encoding
31105E30A700BC614E000001

Encoding Options:
The IDAutomation RFID Label Software may be used to
increment a serial number in VB script as in this example
encoding a label for the DOD-96 UID:
"~b00811001111~b0040000~t048 2S194" & "~n036" & 1000
+ L#
In many cases, the data encoded may extend beyond the
label. In this case, a simple formula of "LBL" & L# may be
used as the formula value to encode only LBL and the label
number in the barcode.
8. If the custom command properly creates a barcode on the
label, the software, printer, and printer driver are working
correctly. If the problem still exists, it resides in either the
printer's RFID firmware or the printer's RFID encoder.
9. If the custom command does not create the label properly,
try the following or contact the printer manufacturer to resolve
the issue:
1. Check the printer manual and the control codes being
sent to the printer, and verify this against the
EncoderPrefix and EncoderSuffix. The In most cases, you
need to use specific commands for different types of
tags. Examples...
2. Check the Print Command. Normally, the Print Command
may be left blank. However, when using Datamax
printers, Q0001 or another printer command must be
used that identifies the command to print at the end of
each label. When left blank, the encoder inserts its data
(EncoderPrefix + DataToEncode + EncoderSuffix) just
before the last line that appears at the end of each label.
3. In the IDAutomation RFID Label Software, the data being
encoded may be examined in the diagnostics tab. Verify
the encoder prefix and suffix values are appended to the
data being encoded in the tag.*
* Note that lower ASCII functions such as <STX> and
<CR> will not display as a character.
4. Make sure the entire tag is encoded with data. Unused
bits of the tag should be encoded with zeros or a pad
character recommended by the implementation. This
problem is corrected by setting the Tag Bit Size in the
software to the actual bit size of the tag.
5. Check the alignment of the printer's RFID writer and the
place where the chip is located in your label. If you
receive many voided labels, this is most likely the issue.
6. Be sure not to damage the label by bending it. Lay the
label upside down and remove the liner without bending
the label, then apply it to a flat surface.
10.It is suggested to read the data encoded in the label by
placing the label on a reader or placing the tag on the printer's
reader.
1. In the Datamax RFID Printer, the label is read by
diagnostics. Choose Menu - Diagnostics - Options Testing
- Test RFID - Tag Data.
2. When using the Zebra R110xi printer, press Setup and
the Previous button until "RFID Tag Data" appears in the
display.
3. If the data in the tag is read correctly, the tag was
encoded properly.
Determining the Print Command and Examining Printer
Files:
It may be necessary to verify the actual data being sent to the
printer to find a good Print Command.
1. Change the PrintCommand to VERBOSE. If a command
currently exists in the PrintCommand, Append the command to
VERBOSE. For example, a command of Q0001 would become
VERBOSEQ0001. When the text of VERBOSE appears in the
PrintCommand, diagnostic files are created in the %TEMP%
directory for each label printed. When the PrintCommand is left
blank, the encoder inserts its data (EncoderPrefix +
DataToEncode + EncoderSuffix) just before the last line that
appears at the end of each label.

2. Print one label with the software.


3. Open the TEMP directory. Generally, this is done by choosing
Start - Run and entering%TEMP% and choosing OK.

4. In the TEMP folder, open the IDAutomation.com sub folder.


5. Sort the files in the directory by date.
6. Examine one of the latest files ending in .TXT with a text
editor.
7. Determine where the encoder commands are being inserted.
Ensure they are inserted before the command that informs the
printer to print the label. In this example, the label command
of L1A5205000500025LBL3 appears just before Q0001*.
Q0001 is the command for a Datamax printer that informs the
printer to print 1 label.
* Note that lower ASCII functions such as <STX> and <CR>
will not display as a character, however, a <CR> creates a
new line.
8. It may be necessary to try multiple commands to determine
the correct Print Command. If the command cannot be easily
determined, consult the printer's programming manual or
contact the printer's manufacturer.
9. If it is necessary to further verify the data being sent to the
printer, enable "Hex Dump Mode" on the printer, and print
only the tag data for one tag. This will allow you to see exactly
what hex characters are being sent to the printer. When using
the Datamax RFID Printer, this may be enabled by choosing
Diagnostics - Hex Dump Mode.
Encoder Prefix and Suffix Examples:
EncoderSuffi
Encoder Type EncoderPrefix PrintCommand
x

Datamax DPL ~d002LD113W1x0000000000000 ~d013 Q0001

Printronix
^WT0,,,,1FDN^FD ^FS
SL5204 MP

Zebra ZPL II ^XA^RFW,H^FD ^FS

Common ASCII and Hexadecimal Codes used in Datamax


RFID Label Printers:
ASCII HEX Character

000 00 <NUL>
002 02 <STX>

003 03 <ETX>

013 0d <CR>

http://www.nndaycollege.com/rfid-intro.html

Radio Frequency Identification Device is a means of capturing data about an object without using a
human to read data, i.e., it is a method of remotely storing and retrieving data using devices. It is a
technology similar in theory to barcode identification but one key difference between RFID and
barcode technology is RFID eliminates the need for line-of-sight reading that barcode depends on.
Also RFID scanning can be done at greater distance than barcode scanning.
An RFID system may consist of several devices like tags, tag readers, tag programming sections,
circulation readers, and sorting equipment and tag Inventory wands. Security can be handled in two
ways. Security gates can query the ILS to determine its security status or the tag may contain a
security bit which would be turned on and off by circulation or self-check reader stations.
Although some people think that the first “known” device may have invented by Leon Theremin as an
espionage tool for the Russian Government in 1945, the first real usage of RFID devices predates
that . During Second World War the United Kingdom used RFID devices to distinguish returning British
aeroplanes from in-bound German ones. RADAR was only able to signal the presence of an aeroplane,
not the kind of aeroplane it was.
A curious aspect of technical innovation is the time it takes to go from being invented to being mass-
adopted by the market. The mobile phone, invented in 1972, did not become a must-have item until
the 2000's in our country. Like wise, with the Internet it took 30 years for DARPA's net to
metamorphose into Time Berner Lee's world wide web.
RFID is one such innovation. Invented in the 1970's, companies immediately recognized the value in a
device that could help machines identify other objects.
However, there were problems, the main two being those of standardization and making the ROI
business case a viable one. “ Why bother when we already have bar codes. And most importantly, the
cost of producing RFID tags has dropped dramatically.
This has led to numerous trials and rollouts of RFID around the world over the last few years. RFID
usage has become increasing by prevalent in the retail and logistics sector to enable supply chain
management as well as the transport sector for applications, such as security and road toll pricing.
However we must discussed the advantages and disadvantages of using RFID Technology before going
to any conclusion.
RFID technology advantages and disadvantages :
Compared to barcode inventory control systems RFID technology has both advantages and
disadvantages, many of which are outside of product manufacture and distribution chain applications.
ADVANTAGES versus Barcodes
• Not requiring line of sight access to be read.
• The tag can trigger security alarm systems if removed from its correct location.
• Scanner/reader and RFID tag are not (so) orientation sensitive.
• Automatic scanning and data logging is possible without Operator intervention.
• Each tag can hold more than just a unique product code.
• Each item can be individually ‘labeled'.
• Tag data can be comprehensive, unique in parts/common in parts, and is compatible with data
processing.
• With the right technology a plurality of tags can be concurrently read
• It can be read only or read-write.
• There is a very high level of data integrity (character check sum encoding).
• Provides a high degree of security and product authentication – a tag is more difficult to counterfeit
than a barcode.
• The supporting data infrastructure can allow data retrieval and product tracking anywhere provided
the scanner/reader is close enough to the tag.
• Combined with its authentication is the ability to monitor shelf life – a societal advantage in the
pharmaceutical and food industry.
• Since each tag can be unique they can act as a security feature if lost or stolen e.g. a stolen smart
travel card can be cancelled.
• The technology is rugged and can be used in hostile environments such as down oil wells (heat and
pressure) to carry data to remote equipment.
• The technology lends itself to being updated, for example, as a car goes through its life its service
record can be electronically logged with the car.
• The technology could be inserted within a suit so that when it is sent to the cleaners it automatically
gets the right cleaning procedure applied to it.
• The technology can be used to increase security so that, for example, it may be construed that a
child is at school as their tag in their school bag was logged when they came through the school gates.
[Clearly, this does not of necessity mean the child is at school, but only that their bag with the
contained RFID tag has been taken into the school, which in most circumstances will mean the child
was with it at the time.]
DISADVANTAGES versus Barcodes :
• Even in six figure production quantities, the simplest of these tags is more expensive (say tens of
Rupees) than a printed barcode – this extra cost, plus the potential greater infrastructure capital cost,
has to be bettered by other benefits in the distribution chain or represent an application for which the
barcode is not suitable e.g. Smart Cards.

• There is a high cost (long pay-back) for integrating RFID technology into existing inventory control
systems.
• External influences such as metalwork, material dielectric properties and radio interference can
constrain RFID remote reading.
• If a significant number of RFID's greater systems capabilities are implemented then the host system
and infrastructure have a higher capital cost and complexity than for barcode systems.
• There are currently a range of RFID application numbering systems which need unifying to increase
uptake. [The International Standards Organisation (ISO) and Electronic Product Code [EPC] Global
consortium, amongst others, are working to address this issue.]
• Currently there are not internationally agreed frequencies for RFID operation (other than 13.56 MHz,
which is primarily used by smart cards but can also be used by other RFID tags) and permitted
scanner/reader powers differ between countries. This limits product take-up. [For example, there are
significant differences between the USA and European UHF frequencies.]
To address these disadvantages there are programmes to develop standards, which will enable
interoperability. This will increase confidence in the technology, stimulate greater competition and
produce consequential reduction in costs.
The market Economy has already changed our society and as a whole, the Government policy. We are
running after I.T. but in comparison to some other state of our country, we have been late in joining
the competition. With some diligent efforts in the last few years, we have, of course succeeded to
catch the states in the race others. Our state is now one of the leading states in software and
hardware industry. However the RFID has opened up a new era specially in defence, police, health
services, marketing, transport sector etc. Our state should be aware of the same and try to imbibe
RFID technology so that we can adopt it and be able to capture the world market on this technology.
References:
• Radio Frequency Identification Technology (RFID) © IEE 2005 18
• http:/www.crimereduction.co.uk/securedesign14.htm
• e.center:http://www.e-centre.org.uk/sec_home.asp?fid=61
A passive tag is an RFID tag that does not contain a battery; the power is supplied by
the reader. When radio waves from the reader are encountered by a passive rfid tag,
the coiled antenna within the tag forms a magnetic field. The tag draws power from it,
energizing the circuits in the tag. The tag then sends the information encoded in the
tag's memory.
The major disadvantages of a passive rfid tag are:
• The tag can be read only at very short distances, typically a few feet at most.
This greatly limits the device for certain applications.
• It may not be possible to include sensors that can use electricity for power.
• The tag remains readable for a very long time, even after the product to which
the tag is attached has been sold and is no longer being tracked.
The advantages of a passive tag are:
• The tag functions without a battery; these tags have a useful life of twenty years
or more.
• The tag is typically much less expensive to manufacture
• The tag is much smaller (some tags are the size of a grain of rice). These tags
have almost unlimited applications in consumer goods and other areas.

Das könnte Ihnen auch gefallen