IBM WebSphere RFID Handbook: A Solution Guide

Similar documents
RFID Technologies. By Francisco J. Carabez

RFID OVERVIEW. by ADC Technologies Group. Introduction to Radio Frequency Identification (RFID) Certified RFID Provider

Dimitar Popov Zeina Muallem

RFID Basic Terms and Frequently Asked Questions

RFID Based Event/Activity Management System

Wireless# Guide to Wireless Communications. Objectives

Letter Report: An RFID-enabled Warehouse at DRDC Valcartier

White Paper. A B C s o f R F I D : U N D E R S T A N D I N G

Identity Management. ID management for people and objects

Sridhar Iyer. IIT Bombay

(RFID) Radio Frequency IDentification System RFID 101. M. I. Suhile Ahamed

Module 7 Evaluation and Selection

T H E I N T E R M E C G U I D E T O RFID TAG S E L E C T I O N

RFID TECHNOLOGY FOR IDENTIFICATION, SECURITY AND DOCUMENT HANDLING IN LIBRARY

RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas

RFID Basics. Three primary frequency bands have been allocated for RFID use.

Introduction to RFID

Umapathy M 1, Indhu V 2, Karthick S 3, Ayyanar S 4 1 (Assistant Professor of Computer Science Engineering) The Kavery Engineering College

Plan, outline / Wireless Networks and Applications Lecture 23: RFID and NFC. How Does It Work? What is RFID? Page 1

Information Security in Electronic Toll Fare System

Automatic Vehicle Identification at Tollgates and Theft Detection of Vehicles

Seminars of Software and Services for the Information Society. Introduction to RFId Radio Frequency Identification

Barcodes or RFID Tags. Key Factors to Consider in Choosing the Data Collection Technology for Your Operation

Whitepaper: Do Passive RFID Tags need Hazardous Area certification?

Manufacturing Insights: RFID: Tool Tracking Solutions

Chapter 2. Theoretical Foundation. In chapter 2 we will discuss more about the theoretical foundation that uses in the thesis.

IEEE RFID 2012 Tutorials and Workshops

EPC Standards: EPC Tag Classes: EPC Class Type Features Tag Type

Design of the RFID for storage of biological information

AN APPLICATION OF RFID IN MONITORING AGRICULTURAL MATERIAL PRODUCTS

Imagine the Power of Knowing. An introduction to our Company

About The FILE Group of Companies

IOT & RFID Technology

Australian Journal of Basic and Applied Sciences

Dimov Stojče Ilčev. CNS Systems

Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches

Company LOGO RFID and Track & Trace System

The Full Range for RFID

RFID enabled Solutions TYRE MANAGEMENT

(12) Patent Application Publication (10) Pub. No.: US 2014/ A1

EPC/RFID Advanced Infrastructure Implementation. Student s Handbook

RFIDs at Work: Tracking Assets, Managing People, and Controlling Costs. Jack Cook, Ph.D., CFPIM, CSQE, CSCP

Oracle RFID Solution. <Name> <Title> Drive the New Supply Chain Model. An Applications Perspective

White paper. ABCs of RFID: Understanding and using radio frequency identification

Campus Access Management System via RFID

What is RFID? RFID versus Bar Coding

Lightweight Cryptography for RFID Systems

RADIO FREQUENCY IDENTIFICATION (RFID) Anush Kumar,Chandan Kumar Department of ECE Dhronacharya Engineering College,Gurgaon,India

RFID (Radio Frequency IDentification)

Mobile Computing and the IoT Wireless and Mobile Computing. RFID Applications

An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises

Cyber-physical systems for processes and organisation NEO SKILLS PORTFOLIO

IMPLEMENTATION OF RFID TECHNOLOGY IN LIBRARY

Don t Make the Mistake of Using RFID Technology With an Application Built for Barcodes

Root Beer Game in Progress

WHITE PAPER. RFID Tag Selection. 5 Considerations for a Successful System Implementation

Avonwood Developments Ltd. Tel: +44 (0) Fax: +44 (0) Web:

Real World Applications of RFID. Mr. Mike Rogers Bryan Senior High School Omaha, NE

RFID BASED SMART TROLLEY FOR SUPERMARKET AUTOMATION

Foundation Certification Blueprint. Version 1.0

Experiences of RFID implementations

FRAUNHOFER INSTITUTE FOR PHOTONIC MICROSYSTEMS IPMS. Into the Cloud with Wireless RFID Sensors

Integration of RFID and WSN for Supply Chain Intelligence System

The Role of RFID in the IDENTIFICATION of Things

SMART ATTENDANCE AND AUTO NOTIFICATION SYSTEM USING RFID

ZMC, LLC Distribution. & Technical Services. Library RFID Management System

Ref:

DESIGN, OPERATION AND ANTI-COLLISION PROCEDURE OF DATA TRANSFER OF INTELLIGENT LOAD UNITS

AN AUTOMATED TOLL GATE VEHICLE PASSING SYSTEM

Design and Fabrication of Low-cost RFID Antenna on a Paper Substrate using Conductive Ink Technology

RFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices

This document is a preview generated by EVS

Guidelines for Using RFID Tags in Ontario Public Libraries

Lessons Learned in the Real World

RFID Tags and Readers

MICROCHIP TECHNOLOGY, MITSUBISHI MATERIALS AND CHECKPOINT SYSTEMS RAISE THE BAR IN MHz RFID TAGGING IC PERFORMANCE

RFID. Myths, Facts and Reality

IntelliSense RFID Workshop

Best Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail

AUTOMATIC TOLL TAX COLLECTION SYSTEM BY USING RFID

SMART TROLLEY FOR GUIDING CUSTOMERS IN SUPER MARKETS USING AOT

KEYWORDS: RFID, RFID tags, RFID receiver, Lecturer, Students, Attendance. INTRODUCTION:

Research and Development. Needs for RFID

Monitoring and Centering a Remote Discrete Using Rfid through Sim Module

We Digitize Your Products So You Can Digitize Your Business.

WHITEPAPER Barcoding, Incorporated How to Implement a Successful RFID Project Tom O Boyle, Director, RFID Systems Barcoding, Inc.

RFID. Liquid Logistics Monitoring using Active RFID Technologies. International Summit on Agricultural and Food Transportation Washington D.C.

RFID: SOLUTIONS WITHOUT A BARRIER

Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development

RFID Technology and Developments in Smart Packaging. Presented by Prateep Misra (

RFid based Toll Collection System

RFID+ Examination Objectives

Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER

Executive Conference. Case Study: Tire Tagging and RFID Within the Auto Industry

Phases of RFID projects. Overview of HKU IMSE Retail Smart Shop. Design Overview. Design Overview

TOKENIZATION OF A PHYSICAL DEBIT OR CREDIT CARD FOR PAYMENT

This document is a preview generated by EVS

REVIEW ON WOMEN SAFETY IN SYSTEM ACCESS CONTROL USING RFID TECHNIQUE

RFID FAQs, not Fiction

Top 7 Considerations to Choose the Right RFID Tag

Transcription:

Front cover Draft Document for Review February 4, 2006 2:14 am SG24-7147-00 IBM WebSphere RFID Handbook: A Solution Guide Get started with IBM WebSphere RFID Premises Server V1.0.2 Understand WebSphere RFID Device InfraStructure Setup the WebSphere RFID Solution James Chamberlain Corinne Blanchard Sam Burlingame Sarika Chandramohan Eric Forestier Gary Griffith Mary Lou Mazzara Subu Musti Sung-Ik Son Glenn Stump Christoph Weiss ibm.com/redbooks

Draft Document for Review February 4, 2006 2:14 am 7147edno.fm International Technical Support Organization IBM WebSphere RFID Handbook: A Solution Guide December 2005 SG24-7147-00

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm 1 Chapter 1. Overview of Radio Frequency Identification (RFID) In this chapter we give you the basics in understanding RFID and we describe some of the challenges that RFID technology faces. Copyright IBM Corp. 2005. All rights reserved. 3

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am 1.1 Radio Frequency Identification (RFID) basics This section gives you a brief overview of RFID. It also describes possible uses of RFID technology. 1.1.1 What is Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) technology is a term used to generically describe a system that has the ability to transmit a unique identity utilizing radio waves. 1.1.2 Utilization of RFID Technology In the early 1970's the government was looking for different ways to track hazardous nuclear material. Los Alamos National Laboratory developed a RFID model which put a transponder in each vehicle; in turn this transponder was activated by an antenna at a gate. This provided the ability to track materials that entered or left the facilities. Today, this application of this technology is used throughout the world in transportation payment collection systems. Many new roads, bridges, or commuter toll collection systems have been replaced by this type of technology. The toll tag card depicted in Figure 1-1 allows a transportation authority to collect payment on specific tollway. Figure 1-1 Example of a Ameritech Wireless RFID toll tag card Photograph courtesy of Transcore 4 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm The technology provides increase efficiency or flow of traffic since the vehicle is not required to stop. A side benefit is reduction operational costs due to automation. Agricultural applications include placing an encapsulated tag (transponder) underneath the skin of livestock (including pets). This has proven to be very useful for tracking historical information such as inoculations or the owners contact information in the case of a lost pet. Figure 1-2 show various examples of RFID transponders by Texas Instruments. Figure 1-2 Examples of RFID transponders Photograph courtesy of Texas Instruments In Figure 1-3 on page 6, the encapsulated passive tag, which is a few millimeters in size, would be inserted under the skin of Chinook as a young puppy. This chip would contain the dog s registered name, birth date, recent inoculations, and ownership information in the event the pet became lost. Chapter 1. Overview of Radio Frequency Identification (RFID) 5

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am Even though the animal s physical characteristics may have changed during growth to adulthood, the tag can provide positive identification with 100% accuracy. Figure 1-3 Encapsulated Agricultural and Pet RFID tag Security access or access control credentials which many of us use today provide different examples of how this technology has been exploited. Access can be granted, restricted or removed with out collection of the physical card. Many financial institutions are embedding this type of technology into the cards for identification purposes (see Figure 1-4). Figure 1-4 Intellitag RFID by Intermec Technologies Photograph courtesy of Intermec Technologies The largest area of growth for RFID technology is supply chain inventory tracking. Manufacturers have the potential to track inventory from the point the item was produced to when it was consumed. This differs significantly from the 6 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm Universal Product Code (UPC) barcode, which has been utilized industry-wide as a product identifier. The product(s) maybe tracked throughout the supply chain, which provides advantages for inventory control (just in time), or identifying the location of the unique product that may have an expiration date or needs to be recalled. Global governing agencies are defining standards so RFID technology may be unitized throughout the world. Concerns or issues like non-duplication or counterfeiting of tags are concerns from a local, national, and global perspective. Included in these concerns are standards for frequency s utilization on a inter-continent perspective. The map shown in Figure 1-5 indicates the typical frequency utilized in a geographical area. Figure 1-5 RFID frequency allocation standards 1.1.3 Automatic Identification Systems RFID is a type of Automatic Identification System. Here, we contrast and compare barcodes with RFID technology. Chapter 1. Overview of Radio Frequency Identification (RFID) 7

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am Barcodes A barcode (see Figure 1-6) is a series of machine readable lines of varying widths. When translated, it represents a series of alphanumeric characters. Barcodes are a static representation of a specific product number or Universal Product Code (UPC). This code, when scanned or input into a collection point, is transmitted to a delivery system. The delivery system depending on the application will translate and provide the appropriate response for that product. Figure 1-6 Static Barcode label Barcodes have several limitations in comparison to RFID Tags: The information on a Barcode cannot be dynamically changed and must be read as a individual unit. The Barcode label does not contain product information. Encoded in the bar code are alphanumeric numbers that correspond to a specific product. It requires an external delivery system to maintain and utilize this information. Barcodes labels are very inexpensive to generate but the trade-off is the limitation of actual data being maintained at the product level. The label does not lend itself easily to automated tracking and requires an interface to back-end systems. Smart Cards Usually about the size of a typical credit card, there are two varieties. The simplistic model is a card with memory and utilizes the reader for functionality. The reader also provides the security element to insure the integrity of the card. The second type of Smart Card, in the form of a key fob (see Figure 1-7 on page 9), relies on an embedded microprocessor. Its function can be similar to a laptop computer but significantly smaller. It can add, delete or modify information stored on the card and has built in security functions. 8 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm Figure 1-7 Example of a key fob security token Interfaces for these types of cards are accomplished in several ways. They may utilize a smart card reader where the cards are inserted into the device. Another approach is proximity card/device, when they are in the general vicinity of a reader they can execute transaction in a wireless mode. A dual combination card combines the functionality of both into one card Radio Frequency (RF) ranges Radio Frequency (RF) is electromagnetic waves that have a frequency range of 30 Hz to 300 GHz. RFID typically utilizes the frequency between 30 Hz and 5.8 GHz. The frequency ranges are broken down into four categories. Each category provides unique qualities and may be utilized in a variety of ways. The waves generated at these different frequencies have the ability to pass through many types of materials but exhibit different characteristic or results. Low-Frequency (LF) 125 KHz 134 KHz High-Frequency (HF) 13.56 Mhz Ultra -High Frequency (UHF) 303.8 Mhz 433 MHz 868 MHz Microwave Frequency (MW) 915 MHz Impact of material characteristics with regard to RF The diagram in Figure 1-8 on page 10 represents how RF waves transmit through different types of materials. Special considerations should be made when selecting a RFID solutions to support a delivery system. Other factors should be considered when selecting the optimum frequency. Limitation of distance or speed are not addressed by this diagram. Materials which are lucent react very well in all frequency ranges. The RF waves will travel through the object with significant distortion. Absorbent materials react different to the higher frequency ranges. Chapter 1. Overview of Radio Frequency Identification (RFID) 9

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am United States RFID Frequency Range Micro wave 2400-2483.5 MHz & 5725-5850 MHz UHF 902-928 MHz Example Material Characteristics HF LF 13.56 MHz 125-134KHz RF - lucent RF - absorbent RF - opaque Fabric Oil Paper Product Plastic Wood Liquids Shampoo Water Graphite Metal Figure 1-8 Example Material Characteristics Simplified RFID system A simplified RFID system, as depicted in Figure 1-9, is composed of two main components. A transceiver (reader or write/read) with one or more attached antennas and a transponder (RFID tag). The integration of several additional components is required to effectively exploit RFID technology. These components are a Controller, Sensors, Annuciators, Actuators, and connectivity to back-end Business systems. Electromagnetic Field RFID Tag Reader Modulated UHF waves Figure 1-9 Simplified RFID system The transceiver or reader is responsible for transmitting and receiving signals in a defined target environment. The originating (AC power & clock cycle) signal in the form of an electromagnetic field is utilized (in a passive environment) by the transponder or RFID tag. The tag uses the signal to activate and generate a modulated wave, which is the corresponding analog signal. This signal is transmitted by the RFID tag which is used during the interrogation by the reader s antenna. The information that was received by the antenna is then 10 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm processed by the reader and converted into a digital form. This data stream is then forwarded the controller for additional processing. The controller(s) provide essential communication links between the reader and external entities. The functionality of the controller may be embedded into the reader or act as an individual component serving one or more readers. In addition, the controller provides the ability to incorporate different types of communication interfaces (RS232, RS485, 802.x, etc.). These interfaces may provide connectivity to Sensors, Annuciators, and Actuators that act as triggers. The response generated by the activation of a trigger(s) can enable or control specific reactions. Other interfaces may establish communication to other readers, controllers, or even back-end business systems. Sensors, Annuciators, Actuators may provide a certain level of automation to the RFID system. Figure 1-10 shows an example of an RFID system that might be used in a dock door receiving scenario. Reader Light Tree Controller Antennas Figure 1-10 Visual representation of an RFID system In a dock door scenario, discussed in Chapter 8, Running the Dock Door Receiving Scenario on page 183, incoming merchandise would activate a motion sensor device. As we step through the process, the response created by the motion sensor would initiate a trigger being set. In turn the controller receiving the trigger would activate the appropriate reader interrogation zone at a specific dock door. Chapter 1. Overview of Radio Frequency Identification (RFID) 11

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am The reader would interrogate the contents of the pallet of merchandise. The inventory list created by the reader could be reconciled against the invoice manifest of merchandise. At the completion of the interrogation process the controller would initiate another trigger to an Annuciators or Actuator indicating completion of the process. This may be in the form of an audible sound, visual light tree or even closing the Dock Door. Underneath the covers, the controller provides the interface with back-end business systems. Information about the inventory may feed or update different business systems depending on requirements. Depending of the business requirement and deliverable, information flow may be bidirectional from a controller. For example, the controller could provide information to the reader which will be broadcast to the active tag for update. Or in reverse, the reader providing a data stream to the controller that is destined to update a back-end system with new product information, inventory etc. 1.1.4 Antenna designs and functionality When designing an interrogation zone, several considerations must be taken into account. What are the expectations of the RFID solution? Is it being designed for Speed, Accuracy or Distance? It is easy to conclude based of the laws of physics (which govern electromagnetic fields, radio frequencies, and communication) that trying to accomplish all three simultaneously is not an achievable goal. However, optimizing any two of these, like speed and accuracy, may be accomplished. As you may suspect, not all antennas are created equal. Outside influences may have detrimental effects to the accuracy and dependability of the deployment and targeted solution. The basic function of an antenna is fundamentally the same, that is to transmit and receive. Then physics steps in. Length, size, power, frequency and other factors contribute to the overall design of the antenna. In an ideal world, the antenna pattern, as shown in Figure 1-11 on page 13, would be radiating while expanding across the X, Y, and Z axis. In this diagram, the Z axis would represent the antenna. The RF wave would radiate outward on the X & Y axis. Unfortunately the actual pattern is somewhat more complex. 12 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm Figure 1-11 Graphical representation of perfect broadcast Depending on the type of antenna selected, it s length, and the power applied to the transmission during a broadcast, a typical RF broadcast pattern would look similar to that shown in Figure 1-12. Chapter 1. Overview of Radio Frequency Identification (RFID) 13

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am x z Figure 1-12 Typical RF broadcast pattern Obstruction or objects may potentially distort this typical RF pattern if introduced. Most manufactures will provide a similar broadcast pattern for specific antenna designs. This information should provide a basis for establishing the interrogation zone. A spectrum analyzer can be utilized to validate the anticipated coverage and strength of the signal being broadcast from the antenna. To understand what influences may impact your design, a thorough site survey should be completed. It is probably the most essential task to be completed by the architect or integrator. The utilization of a spectrum analyzer to identify potential RF frequencies that may interfere will eliminate most of the guess work for the design. RF interference, signal strengths, or specific frequency ranges in a given area can be identified with other devices, but are usually specialized for specific tasks. These tools can be found as add-on items to notebook computers or amateur radio units. After a completed survey has identified or located an offending frequency, it is important to determine how the interference will be mitigated. This will increase the opportunity for a successful and error free deployment. 14 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm If the offending frequencies can not be eliminated, it may require shielding of the readers. The interrogation zone may be shielded by the use of an opaque material installed around the antenna to inhibit stray frequencies from interfering. Another solution is creating an interrogation zone similar to a sound booth. This design would utilize material which has both absorbent and opaque characteristics to capture and neutralize stray or interfering RF. 1.1.5 RFID tags Understanding the functionality of how an embedded antenna in a RFID tag performs, is critical for a successful deployment. The basic and most fundamental problem is insuring that sufficient power has been transmitted to a tag. There are a wide variety of antenna designs which attempt to provide optimal performance. For passive tag designs, the electromagnetic field that is generated by the readers should be received by the tag antenna at a right angle. Figure 1-13 shows how reader or tag location impacts optimal performance. Reader Non optimal Reader location Tag 90 o Reader 90 o Non optimal Tag location Figure 1-13 Reader location for optimum performance To compensate for tags which may not be orthogonal (right angle) to the wave, some designs have incorporated angles or turn in the dipole antenna (see Figure 1-14 on page 16). This allows the orientation of the tag or tagged component to have greater tolerance. This maximizes the coupling characteristics of the tag when passing by a reader. Chapter 1. Overview of Radio Frequency Identification (RFID) 15

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am Figure 1-14 Intermec Mini Dipole RFID tag insert Photograph courtesy of Intermec Technologies However, the tag performance is significantly better (power generated and overall distances from the reader) when a straight antenna is utilized in it s proper orientation. Several consideration for tag location on a item must be addressed when designing a Dock Door scenario. As discussed earlier, the optimum functionality for a passive tag is to be at a right angle to the reader s antenna. This could be accomplished by having specific predefined locations for the tag to be located, as represented in the following illustrations. Alternatives designs could incorporate multiple reader antennas located in such a way that the tagged object cannot be passed through without a successful read. These tag locations (see Figure 1-15 on page 17) will allow the box (case) to be situated in any orientation and will result in a successful read. 16 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm Figure 1-15 Individual case tag locations In Figure 1-16, the complexity of a successful read is compounded by internal product tags. They are at many orientations and may not be lucent. If they were opaque objects, they would affect the external read of the case. If the solution relied on one antenna and it was not able to penetrate the internal objects, the tag could not be read. Figure 1-16 Product Tags per case Chapter 1. Overview of Radio Frequency Identification (RFID) 17

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am Why stop there? In Figure 1-17, the case which was composed of 18 objects was expanded to a pallet with 18 cases shrink wrapped on it. A successful deployment of a dock door RFID solution could interrogate and identify the contents of each case, indicate how many cases were on the pallet, and identify the individual pallet. Figure 1-17 Illustration of the complexity for a Pallet, Case, and Product tags Figure 1-18 provides a more visual representation of a pallet of cases. Figure 1-18 Visual representation of a pallet of cases Dual-dipole is another approach which connects two dipole antennas in different orientations to a chip. This increases the chances of a successful read since the second antenna is usually positioned at a right angle to the first. Antennas may also be tuned to a specific frequency which provides the ability to address different packaged materials, contents, or environmental conditions where tags may be affixed. Depending on the type of target package, penetration or saturation may have different results at a specified frequency. 18 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm The absorption of the electromagnetic field by the medium presents additional challenges (see Figure 1-19). Figure 1-19 Absorption of the electromagnetic field when water is the medium The absorbing materials reduce the potential power available to the transponder. The degradation affects the overall performance and reliability of the tag. Different types of metals can influence the distribution of the electromagnetic fields. Depending on the properties of the materials in the target zone, different currents or eddy s may result in changes in the wave or potentially blocking it altogether. As depicted in Figure 1-20 on page 20, materials like aluminium packaging, cans for example, may present specific challenges to an electromagnetic fields. Design considerations should identify limitations or future expansion requirements which may result in the introduction of new requirements. Chapter 1. Overview of Radio Frequency Identification (RFID) 19

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am Figure 1-20 A general saturation chart with typical characteristic of frequency and sample items. 1.2 Transponders (RFID Tags) This section contrasts and compares passive and active tag technology. 1.2.1 Passive Tag Passive tags are very simplistic in design; they have no moving parts, no batteries. This type of tag is very well suited for adverse conditions such as temperature extremes and chemical or corrosive environmental conditions. These tags are typically smaller, less expensive and have the useful read range of up to 30 feet (approximately 9 meters). The tag utilizes the alternating electromagnetic field created by the Reader antenna coil. It generates a voltage by induction when the electromagnetic field penetrates the cross section of the transponder's antenna coil. This voltage is rectified and acts as the power supply for energizing of the microchip and memory in the tag. Then utilizing load modulation the transponder can transfers 20 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm encoded data from the tag s memory back to the reader on a modulated UHF wave. Figure 1-21 shows an example of a passive tag. Figure 1-21 Example of a passive tag - Intermec Butterfly RFID tag insert Photograph courtesy of Intermec Technologies 1.2.2 Active Tag These types of tag are usually designed to perform specialized task. It has an on-board power source (usually a battery) and does not require inductions to provide current as seen in the passive tags. The Active Tags may be designed with a variety of specialized electronics including microprocessors, different types of sensors or I/O devices. Depending on the target function of the tag, this information can be processed and stored for immediate or later retrieval by a reader. Active tags in general have an effective reading distance in excess of 100 feet. To provide a hypothetical example, a new chemical has a specific shelf life. This shelf life is determined by several factors 1) date manufactured 2) temperature variation 3) exposure to light. The micro processors in the Active tag could collect information about the environmental conditions and maintain an active log. Depending on the degradation of the new chemical due to the environmental condition, the shelf life may be decreased accordingly. The active tag would then transmit the unique identifier along with this updated information to the reader. There are several types of active tags, which act differently. One type referred to as a transmitter takes the lead role and communicates first to the reader. The tag continues to broadcast its data regardless if a reader is present. Chapter 1. Overview of Radio Frequency Identification (RFID) 21

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am Another type of active tag is referred to as transmitter/receiver (transponders). This type enters into a sleep mode (low power state) to conserve resources. The sleep mode is triggered by the lack of interrogation from a reader. Then the tag is awakened from the low power state, when the reader broadcasts a specific command. Other benefits of this type of tag are that they only broadcast if interrogated by the reader. This reduces the overall RF noise in the environment and conserves the battery life of the tag. Figure 1-22 on page 22 shows an example of an active tag from RF Code. Figure 1-22 Example of an active tag - RF Code Mantis tag Photograph courtesy of RF Code 1.2.3 Semi-Active (Semi-Passive) Tags Semi-Active Tags or battery-assisted tags differ from active tags in several ways. The battery is used for providing energy for the tags operation or functions and not transmission to the reader. These tags utilize the inductive characteristics of a passive tag to generate voltage and transmit the data to the reader. Since the tags are power assisted by battery, they are capable of reacting faster than a standard passive tag. Another advantage of battery-assisted is in the presence of materials which may inhibit the passive type tags from functioning properly. This would result in data transmission errors since that tag would not have sufficient power to operate correctly. 22 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm Semi-Active tags may be read up to approximately 100 feet and a high rate of speed. Ideal condition would utilize a modulated backscatter scheme with UHF or Microwaves. 1.2.4 Active or Passive tags can be RO, RW or WORM capable. Active or passive tags come with a variety of data access capabilities. Read Only (RO) This type of tag which has specific data that is burned permanently onto the microchip during manufacturing stages. Tag manufactures provides the data for the tag which is also referred to as factory programmed. Read Write (RW) Depending on the type of deployment scenario the reader may be used to modify tag data. If this is an active tag, it could utilize functions within the microchip to collect and update FLASH or (Ferroelectric Random Access Memory) FRAM memory. This tag is also referred to as field programmable or re-programmable. Manufacturing is the most expensive of the three types described and poses data security concerns for data integrity. Write Once, Read Many (WORM) WORM tags are widely used in the business sector today. They offer the ability for the user to modify or update information rather than the manufacturer of the tag. Compared to the RW tag, they provide a reasonable level of security and a much lower cost per tag. 1.2.5 Surface Acoustic Wave (SAW) Tags This type of technology is utilized in cell phones and other consumer electronics. It differs from the microchip-based tag technology since it does not require a direct current (DC) to perform data transmission. Rather it utilizes low-power RF waves to operate and is in the frequency range of Industrial, Scientific, and Medical (ISM) 2.45 GHz. The design of the tag utilizes a dipole antenna which is connected to an inter digital transducer. 1.2.6 A look under the covers of a RFID tag The composition of a passive RFID tag is very simplistic in design. The base or substrate layer of the tag is usually a thin plastic film. The antenna and chip are Chapter 1. Overview of Radio Frequency Identification (RFID) 23

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am then sandwiched between the substrate and the paper cover as depicted in Figure 1-23. Figure 1-23 Under the covers of an RFID tag Photograph courtesy of Intermec Technologies Figure 1-24 on page 25 and Figure 1-25 on page 26 are additional examples of RFID tags. 24 WebSphere RFID Premises Server Handbook: Solution Guide

Draft Document for Review February 4, 2006 2:14 am 7147ch01.fm Figure 1-24 Example of a chip size RFID tag as compared to a U.S. postage stamp Photograph courtesy of Intermec Technologies Chapter 1. Overview of Radio Frequency Identification (RFID) 25

7147ch01.fm Draft Document for Review February 4, 2006 2:14 am Figure 1-25 Example of a RFID tag insert Photograph courtesy of Intermec Technologies 1.3 Exploring RFID at the IBM Wireless Center of Excellence During the writing of this RedBook, IBM announced the opening of the Wireless Center of Excellence (see Figure 1-26 on page 27) facility located on the IBM Research Triangle Park campus in Durham, North Carolina. The facility offers potential adopters of RFID technology an opportunity to experience a real-world test environment in a working warehouse. This fully functional RFID enabled warehouse provides demonstration of RFID solutions, 26 WebSphere RFID Premises Server Handbook: Solution Guide