A Quick Guide To RFID - Azimuth 2015

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

The Problem of Asset Control

Our understanding of your operations enables us to identify causes at their source.


Solving the causes of poor Asset Utilization and Control positively affects other core processes

Tight Financial Control


Asset Visibility Asset Status

Asset location Asset availability Timely Maintenance

Unknown last location Unknown actual status


Proper Compliance
etc… etc…

Asset Utilization & Control


etc… etc…

No event recording No responsibility Efficient Operations

Paper based & no time No event recording


Accurate Planning & Forecasting

Process Enforcement Asset Accountability


High Quality Clinical Services
Our RFID “Engagement Model”
RFID BACKGROUNDER
What is RFID? (1)
• RFID tags are made up of an integrated circuit (IC
or chip) and a passive tag antenna.
– These two components together comprise the inlay
and most often are integrated into a pressure
sensitive adhesive label.
– Key differentiating features of all tags are the chip
manufacturer and antenna design
– There are many standards, however, we promote the
use of the EPC Gen2 UHF Passive RFID Standard for
most applications to protect our customers and offer
them choice and vendor independence
What is RFID? (2)
• RFID Chips
– The “Brains” of an RFID tag are located in the integrated circuit or “Chip.”
– Passive RFID tags have no internal power source; when these tags detect an RF
signal, the tag antenna is stimulated to a point where the chip is powered up
and communicates the information stored in the chip back to the reader.
– Standard EPC Gen2 chips can store 96 bits of data. Many of the newer chips
can store 512 bits. Some higher memory chips are available that can store in
excess of 4 kilobytes (kb) of data.
• RFID Inlays
– An RFID inlay is comprised of a chip and an antenna (made of aluminum,
copper or silver) bonded to a polyethylene terephthalate (PET) layer.
– Inlays are generally laminated or “converted” by companies that place them
between a paper face sheet and pressure sensitive adhesive.
– Most RFID labels can be printed and encoded in an RFID printer.
What is RFID? (3)
• On Metal Tags
– Standard RFID inlays are two dimensional and are typically
integrated into labels and will not work when placed directly on
metal.
– A standard RFID inlay can b used with a plastic or foam “stand-
off” material that separates the inlay from the metal. However,
these tags don't perform as well as those specifically designed
for on-metal use.
– On-metal tags are three dimensional antenna designs. On-metal
tags have can be as thick as 1.5cm, but thinner on-metal tags
are becoming increasingly available.
– On-metal tag designs can vary greatly from small asset tags to
large cargo tags.
– On-metal tag performance is reduced when not placed directly
on metal.
RFID Tag Attributes
Active RFID Passive RFID
Tag Power Source Internal to tag Energy transferred using RF
from reader
Tag Battery Yes No

Availability of power Continuous Only in field of reader

Required signal strength Very Low Very High


to Tag
Range Up to 200m Around 3 to 5m, usually less

Multi-tag reading 1000’s of tags recognized – Few hundred within 2m of


up to 40mph reader

Data Storage Up to 128Kb or read/write 128 bytes of read/write


with sophisticated search
and access
Passive RFID Tags
• “Traditional” tags used in retail security
applications
– Tag contains an antenna, and a small chip that
stores a small amount of data
– Tag can be programmed at manufacture or on
installation
– Tag is powered by the high power
electromagnetic field generated by the antennas
– usually in doorways
– The field allows the chip/antenna to reflect back
an extremely weak signal containing the data
– Collision Detection – recognition of multiple tags
in the read range – is employed to separately
read the individual tags
• These passive tags form the basis of the Auto-
ID designs, and, if manufactured in billions,
will come down in price from $0.50 to $0.05 in
the next 2 years. Current major uers pay in the
region of $0.10
Active Tags
• Battery Powered tags
– Have much greater range – 100m
– Hold much more information – Kbytes
– Can integrate sensing technology
• Temperature, GPS
– Can signal at defined time
– Multiple tags can be recorded at once
• Used for higher value items
– Shipping containers
– Babies
– Electronic assets
• Cost between $20 and $80 per item
• Battery Life between 2 – 4 years
Active/Passive – 2 Minute Brief
Passive RFID Active RFID
• Technology • Technology
– Very Short to Short Range Applications – Medium to Long Range Applications
– Induced power – Battery powered
– 5 millimetres ~ 3 metres – 3 metres ~ 300 metres
– $0.25 - $ 15 each – $25 - $250 each
• Advantages • Advantages
– Cheap – Long Range
– Small Tags – Reduced Infrastructure
• Disadvantages – Dynamic Choke Points
– Short Range • Disadvantages
– Fixed Choke Points – Large Tags
– Increased Infrastructure – Higher Cost

Potential Applications Potential Applications


Warehouse Management Real Time Location
Who, What, When, Where:
Asset Management Nearest Golf Cart/Wheelchair, etc
Access Control Nearest Security Guard
Time & Attendance
Patrol Monitoring Capacity Monitoring
How many where:
Key Management How many security staff on site, etc
How many staff on reception
Tool Management SLA Management
Motion Detection
Passenger Tracking Resource or Item moving:
Baggage Labeling Door Opened
Asset Moved
Telemetry / Monitoring
Temperature recording and alerting... eg:
Medical Refrigerators
Food Storage
Active RFID Infrastructure
• Wi-Fi Network
– Indoor and outdoor options (both RSSI and TDOA)
– AeroScout Engine is embedded in Cisco’s Mobility
Services Engine (MSE)

• Exciters trigger tags at defined areas for


immediate, accurate detection
– Exciters enable 100% room and bay level separation
– Exciters provide instant knowledge of gate/dock
arrivals and departures
– Intrinsically safe versions available for Oil & Gas
EPC Global – At Last A Standard!
• Driven by Walmart Supply Chain Requirements
• Code within Passive RFID Tags
– eg 613.23000.123456.123456789 (96 bits)
– Header – defines data type (8 bits)
– EPC Manager – describes originator of EPC (Product
manufacturer) (34 bits)
– Object Class - Could describe the product type (20 Bits)
– Serial Number – Unique ID for that product item (34 Bits)
• EPC Gen 2 is the most common standard
– Used in all of our applications
– Many 1,000’s of tag types now available
– Each providing different performance
APPLICATION OF TECHNOLOGIES
Applications
•Visibility of goods from production to final use, the key early driver for developments and
Supply Chain Automation implementation of the technology

•Tracking of assets in offices, labs, warehouses, pallets and containers in the supply chain, books in
Asset Tracking libraries

Medical Applications •Linking a patient with key drugs, personnel giving the drugs, biometric measurements

•Security tracking for entrance management or security, contact management at events, baby tags
People Tracking in hospitals to manage access to post-natal wards

Manufacturing •Tracking of parts during manufacture, tracking of assembled items

Retail •Tracking store trolleys in supermarkets, active shelves. Customer Loyalty Cards

Warehouses •Real-time inventory by automated registration of items in a warehouse or store-room

•Implanted RFID tags in animals for tracking and linking the animal to food, location. Applicable to
Livestock farming as well as exotic breeds in zoos

Timing •Sports event timing to track athletes as they start a race and pass the finish line
Application of Active RFID
• Employee Time & Attendance • Par Level Management
– Time In & Time Out gathered with no – Monitors number of
user interaction personnel/assets at specific location
– Covers entry into or exit from – Alerts appropriate employees if Par
anywhere on entire site Levels are exceeded or not met
– Report available in real time • Additional Benefits
• Asset Location – Motion detection of ‘sensitive’
– Real time location of assets assets and doors
• Contract Management – Temperature monitoring with Zero
– Real time location of contractors Infrastructure
– Alerting if under SLA contracted – Reporting and Alerting System tied
amount to business rules
• Optional
– Initiation of screen routines at
Kiosks and Digital Signage
– Access Control integration allows
use of tags to initiate ACS routines
Active RFID: Example Business Rules
• SHORTAGE / PAR LEVELS
– Always 3 Guards at Main Entrance
– Always 2 Staff at information Kiosk
• CALL BUTTON
– Employee X in Location Y has Z Problem
– Fire at Location X
• TELEMETRY
– Gas Bottle X at Location Y has reached Z Level
– Cold Store at Location Y is Over Temperature
• PRESENCE
– VIP X has now entered the facility
– VIPs X & Y in VIP Ante-room 302

• Enables management by Exception, reducing staff


time in monitoring the Norm
• Ensures consistently applied business rules
Application of Passive RFID
• Asset Monitoring
– Asset Movement past choke points
– Alerts passed to relevant personnel on restricted
movement exceptions
• Exhibitor / Visitor Monitoring
– Reports movement into specific areas
– Optionally initiate applications on kiosks and
digital signage
PRACTICAL CONSIDERATIONS
Deployment
Active RFID Passive RFID
• Exciters • Readers
– Fixed Readers generally hidden
– Generally hidden from view from view in ceiling/wall
– Require POE only – Mounted in Pedestal Units of free
standing units
– Provides tag location to 50cm
– Require POE Only
• Access Points / Location • Antennae
Points – Can be deployed within ceiling or
around door jamb
– Deployed in ceiling spaces – Overt antennae can be mounted
– Require POE Only around glass pillars, etc
– Dock Door antennae will require
(generally) physical protection by
mounting on truck protected pillars
Adding / Moving Readers/Exciters
• Active RFID Exciters
– Can be moved readily
– Fixed functionality (eg Sub-Room accuracy)
– Only requires power (POE or Battery)
– Changeable Functionality Exciters require POE
• Passive RFID
– Readers can be moved readily
– Antennae is generally more difficult to move once
deployed, but can be left in place
– Temporary Choke Points/Security Gates can be
augmented and moved at any time.
Initial Steps – Tagging Strategy
• Pre-Printed Barcodes
– Ensures no duplication
– Controlled Issuance
– High Quality / Long
Lasting

• RFID Tags
– High Risk Assets

• RTLS Tags
– Critical Mobile Assets
Asset Take On
Asset Take On and Help
Initial Steps – Device
Audit/Tagging
• Asset Take On
– Barcode
– Passive RFID
– Active RFID
• One or all of the
above can be
enforced, by Asset
Category
Hugh Haskell-Thomas
Principal Consultant
Azimuth
+973 36469080
[email protected]

THANK YOU

You might also like