Think Innovation Think RFID

Download Think Innovation Think RFID

Post on 27-May-2015




0 download

Embed Size (px)


<ul><li> 1. Think Innovation Think RFID </li></ul><p> 2. Contents RFID Explained Introduction 4Where is RFID used?6Implementing/Deploying RFID7The Use of RFID9Research Activities Queens University Belfast18University of Ulster20Case Studies Ulster Carpets (Compete)24Kilpatrick (PPD)25Ashdale Engineering (SMART) 27Invest NI and R&amp;D Financial Assistance START Programme 30Compete Programme 31Product and Process Development Programme 32Knowledge Transfer Partnership Programme33SMART Award 34Managment Information System Programme (MIS)35Business Improvement Training Programme 36 1 3. RFID Explained 3 4. IntroductionIntroduction to Radio FrequencyIntroduction to Microwave (RF) (MW)Radio frequency (RF) refers to electromagnetic The electromagnetic spectrum shown in the waves that have a wavelength suited for usefigure below covers a wide range of waves with in radio communication. Radio waves aredifferent properties depending on the frequency, classified by their frequencies, which are f, of the wave. The wavelength, is related to expressed in kilohertz, megahertz or gigahertz.frequency through the speed of propagation Radio frequencies range from very low frequency(c = f) where c equals the speed of light in (VLF), which has a range of 10 to 30 kHz,free space. to extremely high frequency (EHF) which hasMicrowaves are usually defined as electromagnetic a range of 30 to 300 GHz. RF Technology iswaves in the frequency region from 300 MHz used in many different applications, such asto 30 GHz. This means that the wavelength in television, radio, mobile phones, radar andfree space has the same order of size as the automatic identification systems.components used for generation and detectionof microwaves. 4 5. RFID stands for Radio Frequency Identification.There are both active and passive tags. It uses radio frequency to identify objects. In itsPassive tags do not have their own energy source,most basic form, RFID requires two components: they are activated by the radio frequency field from the antenna of the RFID reader. These chips a Radio Signal Transponder, or tag, that isare intended for use in the consumer goodsattached to an object and contains identifyingindustry and the trade sector.information about the object to which it is attached and an antenna to communicate Active tags have a power supply, which means datathat information via radio waves;stored can be read at a much greater distance. a reader, which creates a radio frequency field Many toll systems, for example, function onthat detects radio waves to obtain information this principle. See Appendix 1 and 2 forin a tag.further information. In an RFID system, there is no line of sight requirement for product identification because the tags do not need to be seen by a scanner.Some form of number code is generally stored on the transponder. It encrypts information which is recorded in a database for access by authorised users. International organisations such EPCglobal are working to establish uniform worldwide standards for this number code. 5 6. Where is RFID used? RFID is already widely used across a broad range of industries. This table shows some RFID applications. Industry SectorSpecific Use ExamplesRetail Track and trace Product recalls Streamlined shipping and receiving Automated invoice reconciliation Shrinkage reduction Improved demand planningHealthcare Red Cross: monitoring blood banks Hospitals: monitoring medication routes from medicine cabinet to patient Pharmacy: drug recall (product pedigree) Prescription drugs: identifying counterfeit or falsely labelled medicationsLogistics Asset utilization: asset (e.g., containers, trucks, etc.) management, tracking and maintenance Improving operational efficiencies: volume planning and automated data capture through shipping route Safety and security: shipment route tracing and positive identification of package contents Automated customsAutomotive Capital asset management: container and tool management Part tracking: inventory management; assembly; theft control; brand authentication; distribution; recall; recycling Vehicle related: car identification; access control; tire pressureFood Industry Mad Cow Disease/Bird Flu: cow/bird pedigree, herd/flock history and details about the release into the food chain (Traceability) Restaurants: responding to outbreaks of food poisoningDepartment of Defence Supplies and materials management: track and trace; streamlined receiving; etc. Military assets management: asset utilisation, tracking and maintenanceSecurity/Policing Passport IDs Criminal trackingAirline Baggage handling 6 7. Implementing/Deploying RFIDRFID is a technology from which many uses To successfully implement/deploy RFID the and applications can be found that can addfollowing should be considered: value to a business. It also requires special skills. Planning Several companies in Northern Ireland haveCareful planning is essential to ensure that already adopted and implemented RFIDthe organisation benefits and to avoid risks. successfully. Success stories are includedIt will require creation of a new policy to adopt later in this document.the technology. Communication, education Both local universities have extensive experienceand training plans must also be in pace. in RFID ranging fundamental research and design Physics to application. Queens University Belfast andPhysics is a very important factor in the University of Ulster are the best source to supplyimplementation process. Selecting the right RFID skills to the local industry. Their laboratorieshardware (tags, reader, range of frequencies, can be used to analyse and characterise devices.number of reader etc) and designing the The first step in deploying RFID is to map out software are crucial. Therefore, the design requirements and to consider if other technologies stage and understanding the business model may be more suitable. A. SWOT analysis can are important factors for decision making help to tease out requirements.exercises. It is essential to identify/selectthe right partner to supply the hardware Some organisations will factor RFID into theirto provide the right solution. strategy, as RFID can be seen as part of the Six Sigma process of continuous improvement. Pilot The most important factor to any organisationThe pilot phase is critical. This phase is a test is Return on Investment. for project planning. It is important to carryout pilot trials before full scale implementation,in order to ensure that the hardware andsoftware works to plan. This phase can beused as a training step to familiarise staffwith the technology prior to full deployment.It is essential to review the design andspecification at this stage. 7 8. ProductionThe production phase or full scale phase isthe methodical scaling up of a well designedsystem. If the Planning and Pilot phases werecompleted with clear objectives and goals inmind, the implementation process can bevery smooth. Project management coupledwith clear goals is a key factor. Contingencyand flexibility need to be built into the projectas this technology is new to most companies.ODIN technologies developed the following model to implement/deploy RFID solution. Figure 1, illustrates 4 Ps to deploy RFID technology - source ODIN technologies.8 9. The Use of RFIDThe Use of RFID and its applications inThe once obscure acronym RFID (Radio Frequency manufacturing, logistics and supply chainIDentification, the use of electromagnetic waves management, retailing etc. to identify a physical object) has recently beenin the news in many contexts. In this document, RFID is a flexible technology that is convenient,we will try to explain how that single acronym easy to use, and well-suited for automatic used for a number of different, but related, It combines advantages not available with othertechnologies with distinct characteristics, identification technologies. RFID can be suppliedand examine some of the unique analog and RF as read-only or read/write, does not requireproblems encountered in designing RFID systems. contact or line-of-sight to operate, can function under a variety of environmental conditions, Unlike the barcode where identification is and provides a high level of data by line-of-sight, RFID technology and In addition, because the technology is difficult to its reliance on radio waves does not require counterfeit, RFID provides a high level of security.a line-of-sight for identification or a straight- line alignment between the tags and readers. RFID is similar in concept to bar coding. Bar code As new applications develop, the technology systems use a reader and coded labels that are will continue to evolve. Growth beyond todays attached to an item, whereas RFID uses a reader user-specific systems will occur as RFID is and special RFID devices that are attached to deployed across the marketplace and the an item. Bar code uses optical signals to transfer related hardware and software achieve information from the label to the reader; a high degree of harmonization. RFID uses RF signals to transfer information from the RFID device to the reader.Opportunities Radio waves transfer data between an item to which an RFID device is attached and an As the technology matures and applications RFID reader. The device can contain data aboutproliferate, RFID will facilitate global commerce the item, such as what the item is, what time and spur innovation and competitiveness. the device travelled through a certain zone, RFID technology increases visibility and perhaps even a parameter such as temperature. accountability in the supply chain. RFID will RFID devices, such as a tag or label, can beallow manufacturers, retailers, and suppliers attached to virtually anything from a vehicle to efficiently collect, manage, distribute, to a pallet of merchandise. and store information on inventory, business processes, and security controls. 9 10. Challenges The collection and use of personally identifiableinformation through RFID technologies As is common with emerging technologies,represents a key public policy challenge toseveral challenges must be overcome for the deployment and use of RFID technologies.the technology to mature to its full potential.In the case of RFID, these challenges include:Much of this concern is with the collection, maturation of RFID technology, harmonizationuse, and storage of the data rather than the of standards for hardware/software andtechnology itself. Industry-driven solutions wireless spectrum operations, privacy and are beginning to include a combination of security concerns, and implementation operational guidelines, technical solutions, cost barriers. As these technical and policyand educational campaigns. challenges are addressed, RFID will likelyAn RFID system consists of tag, antenna and reader,become the system of choice forwhich is illustrated commerce. Interoperability across various RFID systems,companies, and countries is critical to achievingwide-scale deployment of RFID technology.Development of technical standards for tags,readers, and interface systems; and allocationof operational limits for frequency andtransmission power will determine globalinteroperability. Initial system and implementation costsare still being refined; in the near-termAntennathis could prove to be an impediment to Each RFID system includes at least one antennalarge-scale adoption. Within small andto transmit and receive the RF signals. In somemedium-sized enterprises, although RFID systems, a single antenna transmits andprovides them with new opportunities to receives the signals; in other systems, onecompete in the global market, limited budgets,antenna transmits and one antenna receiveslack of in-house expertise, and a lack of accessthe signals. The quantity and type of antennasto new technologies could act as barriers used depend on the adoption.10 11. Reader However, it has become common within theindustry to interchange the terminology and refer The RFID reader directs the RF transceiver toto these devices as either tags or transponders. transmit RF signals, receives the encoded signal For the purposes of this overview, an RFID device from the tag through the RF transceiver, that actively transmits to a reader is termed an decodes the tags identification, and transmitsactive tag; an RFID device that only reflects the identification with any other data from theor backscatters transmission from a reader tag to the host computer. The reader may alsois termed passive. provide other functions. The user can change or customise the readers operations to suit The tags are programmed with data that identifiesa specific requirement by issuing commands the item to which the tag is attached. Tags canthrough the host computer or a local terminal. be either read -only, volatile read/write, or writeone/read many (WORM) and can be either activeor passive. In general, active tags use batteries Tagto power the tag transmitter (radio) and receiver. RFID tags are tiny microchips, in some cases These tags usually contain a greater number as small as a grain of sand, which hold unique of components than do passive tags. data identifying the object tagged. These tags,Therefore, active tags are usually larger in which have a small antenna attached, are readsize and are more expensive than passive tags. remotely by an RFID reader. Depending on In addition, the life of an active tag is directly the radio frequency used and the type of tag,related to battery life. RFID tags can be read in some instances upPassive tags can be either battery or to several kilometres away, although it is morenon-battery operated, as determined by the typical for RFID to be used in situations whereintended applications. Passive tags reflect the shorter transmission distances are adequate.RF signal transmitted to them from a reader or Tags can be passive (activated when read)transceiver and add information by modulating or active, equipped with their own micro-batterythe reflected signal. A passive tag does not use a and a transmitter.battery to boost the energy of the reflected signal. An RFID device that did not actively transmitA passive tag may use a battery to maintain to a reader was known as a tag. An RFID device memory in the tag or power the electronics that that actively transmitted to a reader was knownenable the tag to modulate the reflected signal. as a transponder (Transmitter + responder).11 12. Passive Tag However, the resulting power received at the reader is dependent on the fourth rather than Passive tags have neither a battery nor a the second power of the distance: Prec ? (1/r4), radio transmitter. Power to operate the tag ICand falls off very rapidly, so that receive-limited is obtained by rectifying RF energy intercepted range may also be only a few 10s of meters. by the tag antenna. The IC power required is typically some...</p>