The Insiders Guide To Working With RFID - atlasRFIDstore
The Insiders Guide To Working With RFID - atlasRFIDstore
The Insiders Guide To Working With RFID - atlasRFIDstore
GUIDE
TO WO R K I N G W I T H
RFID
atlasRFIDstore Books
atlasRFIDstore.com
The Insider’s Guide to
Working with RFID
SUZANNE SMILEY
atlasRFIDstore Books
Copyright © 2020 atlasRFIDstore
atlasRFIDstore
2014 Morris Avenue
Birmingham, AL 35203
United States of America
www.atlasRFIDstore.com
Preface
Preface 6
Introduction to RFID 10
Electromagnetic Spectrum 11
Main Types of RFID 15
Low Frequency 15
High Frequency & Near-Field Communication 17
Ultra-High Frequency 20
Types of RFID Worksheet 28
RFID Tags 31
What are RFID tags and how do they work? 31
What’s Inside an RFID tag? 32
Types of Tags 34
Positioning RFID Tags – SOAP Method 35
Size 36
Tag Attachment Methods 37
Application Surface Materials 38
Tag Special Features 39
The Relationship Between Tag Read Range and Size 42
Tag Customization Options 44
Customizable Features 44
Encoding RFID Tags 47
Conversions – Bits > Hex > ASCII 50
RFID Tag Worksheet 54
RFID Antennas 57
Size: Large or Small 58
Ruggedness: Indoor or Outdoor 59
Form Factor: External or Integrated 60
Frequency Range: US, EU, or Global 61
Polarization: Circular or Linear 62
Read Range: Far-Field or Near-Field 64
Strength: High or Low Gain 65
Coverage: Wide or Narrow Beamwidth 66
Direction: Directional or Omni-Directional 68
RFID Antenna Worksheet 70
RFID Readers 72
Types of Readers 72
RFID Reader Worksheet 84
RFID Cables, Connectors, & Adapters 87
Components of Coaxial Cables 87
RFID Cable Worksheet 99
RFID Printers 102
When to Invest in an RFID Printer 102
Types of RFID Printers 104
RFID Printer Worksheet 118
RFID Software 121
Software, Firmware, Middleware 121
RFID Software Worksheet 123
Important RFID Concepts 124
Regional Regulations 124
Frequency Hopping 130
UHF Security Measures 131
Custom Protocols & Interfaces 135
Factoring in the Environment 139
GPIO Capabilities 144
Multipath 146
Testing 151
Challenges 153
RFID Concepts Worksheet 159
Deploying RFID: 20 Questions & Answers 165
How do I know if RFID is right for my application? 165
Is there a chance RFID won’t work for me? 167
How much will an RFID system cost? 167
Can I try RFID before investing in a full system? 168
How do I choose my RFID hardware? 170
How do I choose my RFID tags? 170
Can I get RFID Tags pre-printed and pre-encoded? 170
What sort of software will I need for my RFID system? 170
Can I setup an RFID system without software? 171
Do I need a software engineer on staff ? 171
Who installs the RFID system? 172
Is there a recommended way to set up RFID hardware and
get started? 172
How many read zones are needed and where will they be
located? 173
There are items in my facility that contain liquids/metals;
does that mean RFID will not work for me? 174
What if I want to use RFID in my facility for more than one
application? Should I have separate RFID systems? 175
How long does a typical RFID system take to deploy? 175
How do I train my employees on RFID? 176
Where can I learn more about RFID? 177
Deploying RFID Worksheet 178
Learn more about RFID and Other Topics 181
Introduction to RFID
12
crates can be crucial to the company’s bottom line when one
is carrying valuable merchandise or a customer’s order. That
company needs to not only keep track of that merchandise
or order, but also potentially the crate itself, if it is one of the
company’s assets. RFID can be used to locate and track these
assets. Below are some additional beneits of using RFID:
Electromagnetic Spectrum
The electromagnetic spectrum is composed of various
frequencies of waves that are produced using electromagnetic
energy. A radio wave is essentially a disturbance through space
that carries energy from one place to another. Radio waves
oscillate, in that, while traveling the energy continuously
rises and falls in intensity. This oscillation is what is typically
depicted as a wave pattern consisting of peaks (highs) and
troughs (lows). The path from trough to trough, or peak to
peak, is considered a full wave cycle, and the number of cycles
that take place in one second is known as the wave’s rate of
13
oscillation.
Radio Waves
Radio waves are characterized by frequency and wavelength.
Frequency is measured in Hertz, and one Hertz is equal to
one full wave cycle per second; so, frequency is dependent
upon the wave’s oscillation rate.
14
Wavelength = Speed of Light (m/s) / Frequency in Hertz
299,792,458 / 865,000,000 = .3468 Meters = 34.68
Centimeters
Wavelength
Within the radio wave subset of the RF spectrum, there are
eight designated frequency bands:
Starting at the left side of the spectrum and moving right, the
wavelength gradually decreases. Very low frequency (VLF),
the irst frequency range on the left side of the spectrum, has
an average wavelength of around 55,000 meters. That means
that a VLF wave, from one peak to another (or one trough
to another), has an average distance of 55,000 meters, or
around 500 U.S. football ields stacked together. Because radio
wavelengths correlate with the speed of data transmission (i.e.
the longer the wavelength, the slower the data transmission
and vice-versa), VLF waves result in very low read rates;
therefore, VLF is not used commonly for RFID applications.
15
three that are typically used for RFID applications:
• Low frequency (LF)
• High frequency (HF)
• Ultra-high frequency (UHF)
16
Main Types of RFID
Low Frequency
The Low Frequency, or LF band, is between 30 kHz and 300
kHz with long wavelengths of around 2,400 meters. Because
there are multiple types of signals communicating on this
band, LF RFID systems are only allowed to use the small
range between 125 – 134 kHz. The large wave size allows LF
waves to penetrate metal and water which is unique to this
frequency band.
17
from a couple centimeters, up to about 50 centimeters in ideal
conditions. The short read range is due to dependence on
magnetic coupling.
LF tags are generally more expensive than HF and UHF
RFID tags, but vary in cost depending on the type and the
application. Usually, they cost anywhere from $0.70 - $20.00
per tag, and are powered solely via magnetic coupling –
meaning they could last indeinitely depending on the wear
and tear of the application. They come in a variety of shapes
and sizes, but all tags use the same type of magnetic coupling
for power and communication. These tags also have relatively
slow read rates because the data rate of transmission is very
low and it takes longer for the reader to receive and decode
the tag’s signal.
LF antenna/RFID reader combinations are available
depending on the application, and generally cost anywhere
from a couple hundred dollars up to a thousand dollars
(USD). Unlike other RFID tags, LF tags do not have security
standards, so they are not recommended for applications
where encrypted communication is a requirement.
18
General Frequency Range: 30 - 300 kHz
Primary Frequency Range: 125 - 134 kHz
Read Range: Contact - 10 Centimeters
Average Cost Per Tag: $0.75 - $5.00
Applications: Animal Tracking, Access Control, Car Key-
Fob, Applications with High Volumes of Liquids and Metals
Pros: Works well near Liquids & Metals, Global Standards
Cons: Very Short Read Range, Limited Quantity of Memory,
Low Data Transmission Rate, High Production Cost
19
or a little less than 2 school buses in length. High frequency,
like low frequency, uses magnetic coupling to communicate
between the tags and the RFID reader/antenna. HF waves
can pass through most materials except for water and dense
metals. Thin metals, like aluminum, can still be tagged with
HF tags and function normally.
20
rely on magnetic coupling as their power source so they tend
to last the lifespan of the application unless damaged by wear
and tear to the tag.
HF RFID readers are used with HF tags and are relatively low
in cost, generally not more than a few hundred USD. NFC
tags can be read with the same HF readers, including any
smartphones that contain HF/NFC readers. The ability to be
read by smartphones give HF/ NFC tags the ability to gain
widespread popularity in countless applications.
21
Average Cost Per Tag: $0.20 - $10.00
Applications: DVD Kiosks, Library Books, Personal ID
Cards, Poker/Gaming Chips, NFC Applications
Pros: NFC Global Protocols, Larger Memory Options,
Global Standards
Cons: Short Read Range, Low Data Transmission Rate
Ultra-High Frequency
Passive
The deining quality of passive UHF RFID systems (when
compared to active UHF RFID systems) is the way in which
the RFID tags function. Passive UHF RFID tags rely on
passive backscatter modulation to function and have no
additional power source. In short, this means that the RFID
reader sends its energy through the antenna as RF waves to the
UHF RFID tags in order for them to become energized and
22
respond back to the reader. The response is called backscatter
because the tag scatters back a portion of the energy that it
receives from the reader. Because there is no additional power
available to the tag other than what is provided by the reader,
these systems have a maximum read range of around 30
meters.
UHF RFID passive tags have some of the lowest costs due
to widespread adoption. Volume quantities of UHF RFID
tags can dip as low as $0.10 cents a tag while maintaining an
average read range of 2-5 meters. UHF RFID passive tags
have decreased in cost substantially over the years allowing
companies and individuals to use low-cost, label tags as
disposable asset identiiers.
Passive UHF tags are very sensitive to both liquids and metal.
This is because the UHF waves relect off, refract within, or
absorb into non-RF-friendly materials. Though performance
degradation in the presence of liquids and metals may
be dificult to overcome, interference can be mitigated
by analyzing the application environment and employing
techniques to overcome obstacles, such as installing RF
shielding and/or using metal-mount RFID tags.
Passive UHF tags come in many form factors and are usually
23
subdivided into categories like rugged, high-temperature, label
tags, high memory, etc. The tags tend to last the lifespan of
the application unless damaged by wear and tear, and because
they do not have batteries, their lifespan is not dependent on
a power source.
The hardware for UHF RFID system requires a more
signiicant investment than HF and LF system equipment.
Readers range between $450 for a low-cost reader up to over
$2,500 for a rugged handheld RFID reader.
24
• Race Timing
• Supply Chain Management
• Pharmaceutical Tracking
• Inventory Tracking
• IT Asset Tracking
• Laundry & Textile Tracking
• File Tracking
• Returnable Transit Item (RTI) Tracking
• Event & Attendee Tracking
• Access Control
• Vehicle Tracking
• Tolling
• Hospital Infant Tracking
• Animal Tracking
• Tool Tracking
• Jewelry Tracking
• Retail Inventory Tracking
• Pipe and Spool Tracking
• Logistics Tracking (Materials Management)
• DVD Kiosks
25
• Library Materials Tracking
• Marketing Campaigns
• Real-Time Location Systems
Facts
Primary Frequency Ranges: 860 - 960 MHz
Read Range: Near Contact - 25 Meters
Average Cost Per Tag: $0.09 - $20.00
Applications: Supply Chain Tracking, Manufacturing,
Pharmaceuticals, Electronic Tolling, Inventory Tracking, Race
Timing, Asset Tracking
Pros: Long Read Range, Low Cost Per Tag, Wide Variety
of Tag Sizes and Shapes, Global Standards, High Data
Transmission Rates
Cons: High Equipment Costs, Moderate Memory Capacity,
High Interference from Metal and Liquids
26
Because ETSI sets the standards for Europe, but when
purchasing tags and equipment, the standard can be called
either ETSI or EU denoting Europe.
Other
Because both ETSI and FCC were the irst major standards to
be approved, many countries either adopted one or the other,
or created their own standards* within a subset of either
frequency range. For example, Argentina chose to adopt
the FCC range of 902 – 928 MHz, while Armenia chose to
implement its own, smaller band of 865.6 – 867.6 MHz within
the ETSI range.
Although regional regulations like FCC and ETSI are typically
discussed using frequency ranges, there are other speciics that
each country regulates such as the amount of radiated power
(ERP or EIRP). Certain countries are stricter and regulate
where RFID can be used, the amount of frequency “hopping”
that must be used, or that a license is required to use RFID.
For more information on each country’s regulations – read “
How to Conform to Regional Regulations when using RFID”.
27
Active UHF RFID
Active UHF RFID systems do not rely on passive backscatter
to function; instead, they use an internal battery as a power
source. Because these tags contain a battery, they do not need
to be energized by an RFID reader; instead, they proactively
beacon at predetermined intervals. These beacons announce
the presence of the tag to any readers that are within range of
the tag. Active RFID readers detect the beacons from the tags
and pass them on to a host system for processing.
Active UHF RFID tags can have a very long read range due
to the internal battery, with beacons that can be detected by
readers over 100 meters away. The signal boosting power
received from the internal battery also helps these tags to
overcome any materials that usually hinder RF waves like
metal and water. Certain active RFID tags are engineered to
withstand harsh environments like extremely low temperatures
and rugged applications, including being able to continue
beaconing while being buried in snow or dirt.
Active RFID tags are relatively expensive because they
contain an internal battery and other electronics components.
Depending on their features (e.g. Wi-Fi, Bluetooth, GPS),
these tags cost $20 per tag and up. One drawback of active
tags is their limited lifespan. Because they rely on a battery for
power, these tags (like their batteries) can only last about 3-5
years (depending on beacon rate). While that timeframe works
well for some applications, other applications may require the
tags to be replaced.
28
tracking items like pipes and construction equipment is one
of the more popular uses for active RFID because laydown
yards encompass very large areas. Active tags can be installed
on materials and large assets outdoors and read by handheld
or vehicle mounted readers in order to obtain their location
information.
Primary Frequency Range: 433 MHz, (Can use 2.45 GHz
- under the Extremely High Frequency Range)
Read Range: 30 - 100+ Meters
Average Cost Per Tag: $25.00 - $50.00
Applications: Vehicle Tracking, Auto Manufacturing, Mining,
Construction, Asset Tracking
Pros: Very Long Read Range, Lower Infrastructure Cost
(vs. Passive RFID), Large Memory Capacity, High Data
Transmission Rates
Cons: High Per Tag Cost, Shipping Restrictions (due
to batteries), Complex Software may be Required, High
Interference from Metal and Liquids; Few Global Standards
29
Types of RFID Worksheet
1. RFID stands for:
a. Radio Frequency Identifying Detail
b. Radio Frequency Intricate Deployment
c. Radio Frequency Identiication
d. Radio Frequency Interrogation and Deployment
30
5. High Frequency RFID is commonly used for:
a. Access Control
b. Animal Tracking
c. Race Timing
d. Railway Management
31
c. Active tags include Bluetooth and Passive tags do
not
d. Passive tags have a longer read range than Active
tags
Answers: 1) C; 2) E; 3) E; 4) E; 5) A; 6) A; 7)
A&F, B&D, C&E; 8) E; 9) B; 10) D
32
RFID Tags
33
Quick Facts About UHF RFID Tags:
• Most do not have a battery, and are powered exclusively
by electromagnetic waves.
• Those with batteries (Battery-Assist Passive RFID Tags
and Active RFID Tags) can achieve much longer read
ranges.
• They do not require line of sight, unlike barcodes.
• The way that tags couple, or talk to, the RFID reader is
called “backscatter”.
• An algorithm on each tag called “Anti-Collision” deines
the order in which to reply if multiple tags are in the read
area.
• The read range can vary from inches to over 120 feet
depending on the tag.
• The integrated circuit (IC) has four memory banks –
EPC, TID, User, Reserved.
• Each type of tag has a uniquely shaped antenna to ensure
the best reactance.
34
The Four Memory Banks are as Follows:
EPC Memory Bank – contains the Electronic Product
Code which can vary in length from 96 to 496 bits. Some
manufacturers use a randomized, unique number, while others
use random repeating numbers.
User Memory Bank – the User memory bank can range from
32 bits to over 64k bits and is not included on every IC. If the
tag does possess a User memory bank, it can be used for user
deined data about the item. This could be information like
item type, last service date, or serial number.
Reserved Memory Bank – the Reserved memory bank
contains the access and lock passwords which enable the tag
memory to be locked by the user and require a password to
view or edit.
TID Memory Bank – the TID memory bank contains the
Tag Identiier which is a randomized, unique number that is
set by the manufacturer and cannot be changed. In order for
the reader to read this number instead of the EPC, the reader
settings must be changed to accommodate.
Because there is a chance that a tag’s EPC number is not
unique, it is imperative to check before purchasing. Speciica-
35
tions may denote either “unique, randomized EPC number”
or “Not guaranteed to be unique” (or some similar phrase). If
you purchase a tag without a unique randomized EPC num-
ber, it may need to be reencoded with a new, speciic number.
RFID readers are not able to differentiate between two tags
that share the same EPC value.
The EPC number of each tag is read to identify the tag as well
as the item that is tagged. If no software is used, the tag will
simply read the EPC number; but, by incorporating software,
it is possible to associate that number with a name, serial num-
ber, or even a picture on a database.
Types of Tags
Labels/Inlays
Labels and Inlays are two types of RFID tags that are
characterized by being paper thin and lexible. The main
difference in labels vs. inlays is that inlays are typically clear
and can be manufactured with or without adhesive. Labels
have a paper or poly (plastic) face so that that graphics or text
can be printed on them and read clearly.
Usually grouped together because of form factor and cost,
labels and inlays are cost effective and can be purchased as low
as $0.10 per tag when purchased in higher quantities. These
tags are manufactured on rolls of a few thousand and can be
run through an RFID printer to be printed and encoded.
36
Labels and inlays usually weigh less than a gram and vary
in length and width from about less than ½ an inch to over
several inches.
Hard Tags
UHF RFID hard tags are classiied as such because they are
rigid and thicker than the paper-thin labels/inlays. Hard tags
are made from many types of materials such as polycarbonate,
ceramic, ABS, steel, polystyrene, and polypropylene.
Because of the tougher exterior and larger size, these tags are
more expensive than labels and inlays. Depending on special
features, hard tags can range from just under $1 per tag to
over $15 per tag. Just like labels and inlays, these tags can also
be less expensive when purchased in higher quantities.
Hard tags vary greatly in size and weight. The smallest tags
are around 0.2 grams and the largest, rugged hard tags can
be over 250 grams. Shapes and sizes of hard tags vary greatly,
and can range from the size of a small pencil eraser to as large
as a license plate.
37
to consider them.
Size
The size of the tag is an important consideration when
purchasing. Not only does tag size matter because it needs
to it the size of the object being tagged, but also because of
the correlation between tag size and read range. In short, the
larger the tag, the longer the read range.
Most Important: Pre-purchasing
Orientation
The tag’s orientation, vertical or horizontal or otherwise, in
relation to the RFID system’s antenna is a critical factor in
achieving ideal read rates. To ind the orientation of the tag
that produces the best read rates, rotate the tag on a lat surface
and test it at different orientations. Of note, using circularly
polarized antennas helps to mitigate any issues caused by tag
orientation.
Most Important: Pre-purchasing, Post-purchasing, Testing
Angle
The steeper the angle of the tag, the shorter the read range.
When possible, ensure that the front of the tag directly faces
the antenna. Even a small angle could cause a decrease in the
tag’s read range. To mitigate this issue, it is best to an array of
antennas to cover tags from multiple angles.
Pitch, Yaw, & Roll are three additional aspects to consider that
fall under both orientation and angle. Testing to cover these
positions, will ensure the best read range is received with the
selected tag and system.
Most Important: Post-purchasing, Testing
38
Placement
Test readability in a variety of spots on the item to ind the
“sweet spot” that generates the best reads. On a cardboard
box for example, ind the side that will face the antenna/
reader and then test in various places on that face to ind the
one that produces the best results.
Most Important: Post-purchasing, Testing
39
conditions like the ones listed above will need special
attachment methods that have been proven reliable in similar
circumstances.
Temperature – As mentioned above in the exposure section,
make sure that the attachment method chosen has been tested
in similar conditions as your tagging environment. Extreme
temperatures will have different effects on the compound or
object used for attachment than the tag, like melting and/or
becoming brittle and breaking.
Application Lifespan – Choose a tag as well as attachment
method that will hold up the length of time that the item needs
to be tagged. Some attachment methods will slowly degrade
over time, depending on the chemical makeup. Evaluate the
attachment method chosen to ensure it can last the amount of
time the tag needs to stay on the item.
40
metal. Metal causes problems with RFID for two reasons –
irst, metal relects RFID waves and, second, RFID tags are
manufactured to perform on low-dielectric surfaces (plastic,
wood, cardboard) not high-dielectric surfaces like metal.
There are two easy ways to solve this issue, either purchase
a metal-mount tag that has a built-in, low-dielectric backing
or is tuned accordingly, or purchase a tag and place a low-
dielectric material such as foam, in between the tag and the
metal object.
41
Availability: Hard Tags, All-Surface Label Tags
42
Availability: Hard Tags
43
Chemical Resistance – Chemical resistance is a feature that
is used in the presence of airborne and water-based chemicals
so that the tag does not breakdown or corrode from exposure.
Availability: Hard Tags
44
tags, they can only send and receive data at just a fraction
of the distance of typical large tags. Some of the smallest
UHF tags can only be read from a few inches away. Generally
speaking, read range increases as the size of the tag increases,
with some of the biggest passive tags being able to read over
35 meters (115 feet).
The correlation between read range and size suggests that, for
each application, there must be a compromise between the
two in order to ind the ideal tag. In some applications, such
as tool tracking, the objects to be tagged can be so small, that
size isn’t negotiable; therefore, tags for that application will
have only a short read distance. When tracking items that are
more accommodating with regard to surface area – a medium
to long range tag can be chosen and provide a better balance
between size and read range.
Tag Customization Options
Contrary to off-the-shelf RFID tags, custom RFID tags can
be created with unique features for an application such as a
special adhesive backing, speciic data printed and encoded on
the tag, as well as a custom size and shape. Custom RFID tags
can be an advantage especially for applications that require
a large number of tags because the additional cost per tag
for customization can be offset by volume pricing. When
purchasing RFID tags, there are three levels of customization
available:
45
High Customization
Constructed from scratch to it a speciic application, these
tags have unique variables for almost all the options deined
below.
Semi-Customization
A semi-custom tag is usually an off-the-shelf tag that has
an increased level of customization from one or all of the
following: custom printing, encoding, or speciic backings or
attachment methods.
Low to No Customization
An off-the-shelf tag is basically a ready-to-go tag with the
possibility of some custom printing and encoding speciic to
the application.
Customizable Features
Detailed next are some of the options available for the varying
customization levels for RFID tags.
Attachment Methods
Many RFID applications require unique attachment methods
to best it the item to be tracked. While many off-the-shelf
RFID tags come standard with adhesive, customizable tags
can be created or purchased with attachment methods such as
extra strength adhesive, epoxy, or holes for mounting with zip
ties, or even screws.
Backings/Encasement
The material or substrate that makes up the back of an RFID
46
tag usually determines the ruggedness of an RFID tag. Most
inlays and labels have a PET or plastic backing followed
by a layer of adhesive. Because hard tags typically have an
external layer of encasement around them, a durable plastic,
or sometimes metal, makes up the backing in order to hold up
to more rugged applications.
Other backings can be used to create a special effect on how
the RFID tags behave. Metal-mount tags are afixed with
a special backing that provides separation from the metal
surface, absorbs RF energy, and then uses the metal surface as
a backplane to amplify the RF waves, thus enabling the tag to
work better on or in metal.
Another example is foam-backed RFID tags used for mounting
on metal or items with a large water content, such as the
human body. The foam spacer in between the tag’s antenna
and the mounting surface helps to minimize effects usually
present when mounting on these RF-unfriendly materials.
Face Stock
For inlays and labels, there are a few different types of material
that make up the front of the tag, or the tag’s face. The most
often used materials are clear PET (polyethylene terephthalate,
a type of plastic), white PET, and paper. Clear and white PET
can stand up to a few more environmental factors than paper,
and PET also keeps the printed text from fading quicker than
paper. However, paper is generally a cheaper face stock than
PET and is great for short-term applications like race timing.
When printing data onto the inlays or labels, the chosen face
stock will affect the printer ribbon as well. While paper face
stocks can accommodate a more economical wax or wax-resin
blend ribbon, PET face stocks require a more costly (and
more durable) full resin ribbon.
47
Data – Encoded
Customizing the encoded information on each tag is one of
the biggest advantages of using customizable tags. Off-the-
shelf tags are usually shipped from production pre-encoded
with either a random repeating number or random unique
number, but custom encoding can ensure that the data on the
tag is relevant to a speciic application.
Data – Printed
Printing custom information on an RFID tag, like human
readable text, 1D or 2D barcodes, or logos can be a great
way to visually customize tags for ease of use, additional
functionality, or marketing purposes. Printed data on tags is
a great way to quickly tell the difference between two tags or
visually gather information about the item that is tagged.
Memory
The memory size affects the amount of data that can be stored
on the RFID tag. Memory is expensive and most applications
don’t require extended memory, so most RFID tags have
similar memory sizes. However, it is possible to customize
the amount of memory on RFID tags – either by re-allocating
speciic bits to certain memory banks (depending on the tag’s
integrated circuit, or IC), or by customizing a tag with a high-
memory IC.
48
Encoding RFID Tags
All UHF RFID tags are delivered from each manufacturer
with a string of characters already encoded to the EPC mem-
ory bank. However, just because the EPC memory for each
tag is delivered encoded, that doesn’t mean the tag’s memory
shouldn’t be rewritten when the tag is being deployed. In fact,
in many applications, the EPC memory needs to be rewritten
as tags are deployed.
49
Tags that are NOT encoded with a unique, randomized EPC
number must be re-encoded before use. Some tags are sold
with every tag on the roll having identical EPC numbers;
others have purely randomized EPCs that are not guaranteed
unique.
To Do:
Determine if your tags have a unique, randomized, or
serialized EPC number. This can be done by checking the IC
speciications of the tag.
What to Encode
Regardless if the tag has a unique EPC or not, there are a
few reasons to re-encode the EPC number with unique
information. Below are a few common scenarios.
50
Preix, Item Reference, Partition, and Serial Number. The
most commonly used Identiication Scheme is SGTIN-96
which stands for Serialized Global Trade Item Number, 96-
bits.
To Do:
Determine which of the above encoding styles will best it
your application
0100 1111 0100 0010 0010 0010 0111 0101 0011 0011 0100
51
1000 0011 0101 0100 0010 0011 11110101 0011 0010 1100 0011
0101
Hex
Hex, or hexadecimal coding (also called base 16), is a method
that utilizes only 16 types of characters – letters A-F and
numbers 0-9. Each hexadecimal character represents a string
of four bits. Below is the same string of 96-bits above,
represented in hex.
0100 1111 0100 0010 0010 0010 0111 0101 0011 0011
4 F 4 2 2 2 7 5 3 3
0100 1000 0011 0101 0100 0010 0011 1111 0101 0011
4 8 3 5 4 2 3 F 5 3
2 C 3 5
52
ASCII
ASCII, or American Standard Code for Information
Interchange, is an encoding method that uses 128 speciic
characters, each represented by two strings of four bits.
ASCII can represent the entire alphabet (lower case and upper
case), numbers 0-9, as well as some special characters, such as
asterisks, question marks, and parenthesis. Below is the same
string of 96-bits above, represented in ASCII.
0100 1111 0100 0010 0010 0010 0111 0101 0011 0011
O B “ u 3
0100 1000 0011 0101 0100 0010 0011 1111 0101 0011
H 5 B ? S
53
To Do:
Determine which encoding format is best for your application
– hexadecimal or ASCII.
54
55
RFID Tag Worksheet
1. RFID tags communicate with RFID readers and
antennas via _______________ waves.
a. Electromagnetic
b. Refracted
c. Active
d. Passive
56
6. The SOAP Method is very important for
understanding -
a. Tag Memory
b. Tag Read Range
c. Tag Attachment Methods
d. Tag Types
57
d. Check to see if the encoded number is unique and
randomized
e. Any of the above, depending on your application
58
RFID Antennas
59
In addition to transmitting, antennas also receive the
information sent from the tags so the reader can decode it.
While antennas are usually described as “dumb devices” in
an RFID system, there are many different types, each with
distinguishing characteristics, which makes selecting the right
antenna extremely important.
Before selecting an RFID antenna for a speciic application,
consider the information below about antenna types and
options in order to make the right choice.
60
it in aesthetically. Small antennas are optimal for item level
reading and writing as well as for applications that require
smaller read zones like conveyor belt reading and personnel
access control applications.
Key takeaway: The size of the antenna should depend on
the space available in the application environment. Also
remember, generally the smaller the antenna, the shorter the
read range.
61
indoor applications. All RFID equipment has an operating
temperature range that should be strictly followed, otherwise
the equipment could work slowly, stop working, or react
negatively to temperatures outside of the speciied range.
For extreme temperature applications and/or low IP-rated
equipment, solutions exist as a “work around” – for example,
weatherproof enclosures and temperature-controlled
enclosures.
Key takeaway: Outdoor, non-climate controlled indoor, and
extreme temperature applications will require an antenna with
a high IP rating and/or a wide operating temperature range.
62
Key takeaway: Before purchasing a reader or antenna, decide
if the application is small enough or customer facing where it
would beneit from an integrated reader and antenna.
63
guide provided by GS1 and ensure that all parts of the RFID
system (tags, reader, and antenna) are all compliant within the
country they are operating.
Key takeaway: If the system will be operating somewhere
other than the US or Europe, double check the frequency guide
for each country’s speciic regulations. A global frequency
range antenna is a good fall back if the exact regulations aren’t
speciied.
LINEAR
POLARIZATION
CIRCULAR
POLARIZATION
64
Where this is important for an RFID application is how the
waves radiate and line up with an RFID tag’s antenna. A
circularly polarized antenna works well for applications where
the tagged item’s location will not be known or will be at
different angles and heights. Because the ield rotates, it allows
for a little more positional uncertainty for the tagged items
(e.g. reading tags on palletized boxes moving through a dock
door portal). Linearly polarized antennas are not as lexible
with tag angles and heights. If a linearly polarized antenna is
radiating waves on a horizontal plane, the receiving tag should
be horizontal as well and at a consistent height (e.g. reading
tags on rail cars). The same idea applies for linearly polarized
antennas that radiate waves on vertical planes.
Two types of circularly polarized antennas exist and are
differentiated by the way that they rotate: Right-Hand
Circularly Polarized (RHCP) antennas rotate counter-clock
wise, and Left-Hand Circularly Polarized (LHCP) antennas
rotate clockwise. The choice between LHCP and RHCP only
matters when there are two RFID systems with two separate
RFID readers in a small area. If two RHCP antennas are
facing each other in two separate systems, the waves could
collide and cause a large null zone in the middle where no tags
will be read. In this case, when these are facing, it would be
important to choose one LHCP and one RHCP in order to
create the best RF environment.
Key takeaway: Choosing a linearly polarized antenna or a
circularly polarized antenna depends on the environment of
the application and how the tagged items will pass by the
speciic antenna. If the tags will be at a constant height and
orientation, linear works well, if there is some unknown about
the heights and angles, circularly polarized antennas are better.
When in doubt, choose a circularly polarized antenna.
65
Read Range: Far-Field or Near-Field
The most important characteristic of an RFID antenna from
a user’s standpoint is usually the read range – i.e. how far the
RF waves will radiate in a geometric ield. Several factors
determine the read range generated by an RFID antenna
such as reader transmit power, amount of cable loss, coupling
technique, antenna gain, and antenna beamwidth.
Near Field
66
communicate with passive RFID tags up to 30 feet or more in
an optimal environment.
Long read range is not always optimal. In an application with
limited space, a greater read range could cause problems due
to reading too many tags at once (i.e. “stray” tag reads), instead
of one speciic tag or group of tags.
Key takeaway: Determine how far away the tagged items will
be from the antenna in order to establish if a far ield or near
ield antenna would be best for an application. An application
requiring proximity reads will generally beneit from a near
ield antenna.
67
same ield. (dBi = dBd + 2.15)
68
Some examples are included below.
69
Key takeaway: An antenna with a wide beamwidth will
generally have a lower gain and cover more area either
vertically or horizontally (or both); while a narrow beamwidth
will generally have a higher gain and read farther, but cover a
smaller area.
70
Key takeaway: Directional antennas read in one direction
and produce a cone-like ield, while omni-directional antennas
read 360 degrees on one plane.
71
RFID Antenna Worksheet
1. RFID Antennas are the _____________ of an RFID
system.
a. Brain
b. Arms
c. Heart
d. Eyes
72
5. Which of these is not a unit of measurement for
Antenna Gain?
a. dB
b. dBi
c. dBd
d. dBc
Answers: 1) B; 2) D; 3) A; 4) C;
5) D; 6) A; 7) C
73
RFID Readers
Types of Readers
Every year, new RFID readers hit the market with improved
usability and features, so it is important to know the pros and
cons of each reader as well as any additional features that
could make an impact on an RFID application. Before diving
into the features available on RFID readers, irst it is necessary
to understand the two major classes of readers recognized in
the industry.
Fixed Readers
Fixed readers are generally two-port, four-port, or eight-port,
high performance readers. These readers are the ‘workhorses’
in the industry because they provide high power and receive
sensitivity to non-mobile applications. Integrated readers
are a subset of ixed readers and are unique because they
are a reader and antenna combined into one unit. Integrated
readers may have one additional port, are usually non-mobile,
and are medium- to high-performance readers depending on
the speciic unit.
Mobile Readers
The irst subset of mobile readers can be classiied as mobile
74
computers, which also have an integrated antenna. No
additional antenna ports are available on these readers, but
there are plenty of other features, like onboard processing,
that enable these readers to run various programs while
maintaining high read rates. Sleds, a second subset of mobile
readers, are small RFID readers that connect to a smart device
through Bluetooth or an auxiliary port and use a downloaded
or custom-developed mobile application in order to function.
Most RFID readers are made with certain speciications,
options, and features that make them unique in comparison
to other readers on the market. Below is an outline of general
reader features followed by a break out of speciic options
and some information about each one.
Power Options
How the reader is powered is one of the irst things to note
when purchasing an RFID reader. In certain applications,
such as mobile, manufacturing, or warehouse-based, outlets
are limited or unavailable, which narrows down the power
options. Four options are available when deciding how to
power an RFID reader.
Power Adapter
The most common way to power an RFID reader is plugging
it into an outlet via a power adapter. Before using this method,
ensure that an outlet is in close proximity to where the reader
will be installed.
PoE
Another popular way to power an RFID reader is PoE, or
Power over Ethernet. PoE uses an Ethernet cable to both
power the reader and send/receive data. After setting up a
reader via PoE, cabling can be run up to 100 feet and still
reliably provide power to the reader. The advantage of using
75
PoE (vs. a power adapter) is the elimination of the need to
run AC power to a reader’s location, which may add up to
considerable savings in moderate to large deployments.
Battery
Generally speciic to mobile readers, batteries provide power
while allowing the reader to be cordless and mobile. Batteries
are very convenient but they still must be charged, usually
after several hours of continuous use. A best practice is to
have spare batteries along with a charging station that can
charge multiple batteries at once.
In-Vehicle
Applications that require an RFID reader within a vehicle (e.g.
truck, forklift, etc.) should consider a reader that has been
developed speciically for use in vehicles. Powering an RFID
reader through a vehicle is a great solution for reading RFID
tags while driving around large areas like laydown yards or for
reading pallets as a forklift picks them up. Not many readers
on the market have been designed speciically for such use,
but the ones that have are ruggedized and contain loose wires
that can be connected directly to the vehicle’s wiring.
Interconnectivity
RFID readers connect to host computers or networks and
communicate data in a variety of ways. Connecting to a
network allows readers more lexibility than being connected
directly to a computer; instead, they are able to communicate
with other programs and readers to create a connected and
resolute system.
Wi-Fi
Connecting to a network or a host computer can be done
via Wi-Fi for applications in a setting with a strong Wi-Fi
76
connection. Wi-Fi connectivity provides a cordless, lexible
option for RFID solutions. Wi-Fi and LAN ports are generally
the only options if the application needs to be connected to
a network. An additional advantage to an RFID reader on
a network is the ability to connect a printer or other smart
device to the reader.
Bluetooth
Bluetooth allows the reader to connect to a host computer
while remaining wireless. Bluetooth options are generally
available on handhelds - especially sleds - for connecting to
smart devices like phones and tablets.
LAN
A LAN, or Local Area Network, connection uses an Ethernet
cable to join a network. Once on the network, the reader can
interact with programs and other connected devices. If an
application’s needs change and a Wi-Fi connection is required
with a reader that is not Wi-Fi enabled, an Ethernet cable can
be used to connect the reader to a wireless bridge, allowing
the reader to have a Wi-Fi connection.
Serial
Serial ports use either a 9 pin serial or USB cable to connect
directly to a host computer. A serial connection is optimal for
simple applications with one reader and host computer and
no need for additional network capabilities.
Auxiliary Port
Some handheld sleds have the ability to connect either by
Bluetooth connection or by using the audio port (or auxiliary
port) on smart phones and tablets. Using the auxiliary port to
connect to the smart device frees up the Bluetooth connection
for the host device in case it needs to be used to connect to
77
another device.
Antenna Ports
When choosing a reader for an application, the user should
always check the amount of available antenna ports. Typically,
readers are available with two-ports, four-ports, and eight-
ports (without any additional devices, such as multiplexers).
Antenna hubs, or multiplexers, are available that can connect
up to 32 antennas to a single reader. When determining the
amount of antenna ports (or antennas) that an application
requires, irst decide upon the number of read zones required,
and, within each read zone, determine how much coverage is
needed in order to achieve the desired read rates.
Fixed Readers
Fixed readers usually come with two-ports, four-ports, or
eight-ports, depending on the reader. These readers can be set
up to cover one read zone or a few different ones, depending
on the speed and amount of tagged items.
Integrated Readers
Integrated readers are ideal for applications with a small read
zone and are usually more aesthetically pleasing so they can be
used in applications like retail or ile tracking. These readers
usually have one integrated antenna and one open antenna
port for connecting an additional antenna if needed.
Mobile/Handheld Readers
Typical mobile/handheld readers have one integrated antenna
and no additional antenna ports.
Multiplexers – Multiplexers, also called antenna hubs, can
be used in conjunction with RFID readers to increase the
amount of antennas able to connect to a single reader. With
certain conigurations, a single four-port ixed reader can
78
connect to up to 32 antennas. Of note, most multiplexers are
only designated for use with very speciic RFID readers.
GPIO Options
General Purpose Input/Output connections on RFID readers
are used for optional devices like light stacks and motion
detectors. Generally, readers read and write tags, but with the
addition of an auxiliary device connected through a GPIO
port, certain tag reads (or lack thereof) can be programmed
to trigger an event. These events, like turning on a green light
when a tag is read, provide audio or visual cues that can help
an application run smoothly and effectively. When deciding
to add an auxiliary device, it is important to understand the
amount of voltage it will need in order to perform effectively.
Some devices use much more voltage than the reader is able
to supply; in those cases, a GPIO box is required to provide
the extra power to the auxiliary device.
Inputs
GPI devices or General Purpose Input devices are connected
through the GPIO port and include items like motion
detectors and light-break sensors. GPI devices use electrical
signals to communicate with the reader. If the device sends a
signal to the reader, software commands the reader to perform
a function speciic to the application.
Outputs
GPO devices or General Purpose Output devices are
connected through the GPIO port and include items like
light stacks and annunciators. For example, if a reader
reads a certain tag, software can then tell the reader to send
an electrical signal telling the auxiliary device to perform a
speciic function, such as turning on a light.
79
Additional Utilities
On some RFID readers, additional ports or utilities are added
in order to provide new functionality that can either simplify
or enhance the current system. Below are a few common
examples of additional features on RFID readers and how
they can be used.
HDMI
One of the newest features on RFID readers is the addition
of an HDMI port. HDMI ports allow a display or monitor to
be directly plugged into the reader.
USB
USB ports are multifunctional on RFID readers and their
exact functionality is explained within each individual reader’s
speciications. While the USB port may function differently
on each reader, it can be used for data storage, data transfer,
powering, or for additional ancillary capabilities such as adding
a Wi-Fi dongle.
GPS
A mobile RFID reader with GPS capabilities is very useful
in large deployments, especially those spanning hundreds of
meters. GPS coordinates can be associated with the tag read,
allowing users to note a deined location of the asset.
Camera
In some applications, especially in remote areas, it is convenient
to have a camera outitted in a mobile reader in order to
document a tagged item’s status. This is especially helpful if
the handheld also has GPS capabilities that may enable the
tag read, photo, and GPS coordinates to be associated (geo-
tagged) and sent back for analysis. Pictures of tags can also be
stored for any needed inspection recording purposes.
80
1D/2D Barcode
The most common addition to a traditional mobile reader, 1D
and 2D barcode readers, are used in conjunction with the tag
read typically in applications like supply chain management.
They can be used in conjunction with RFID tags or, if a part
of the supply chain does not use RFID, the barcodes can be
used in lieu of RFID in small shipments.
Cellular Capabilities
Mobile RFID readers with cellular capabilities are used
frequently in remote sites that do not have access to Wi-Fi or
other connection alternatives. A cellular connection provides
an alternative method to transport tag reads or locations when
other connections aren’t readily available.
Onboard Processing
Onboard processing is typically associated with mobile
computing RFID readers, but is also available on many ixed
readers. A reader with a processor can run applications on the
reader instead of running them on a computer. This reduces
the need for a host computer in networked applications.
Readers with onboard processing typically have their memory
capacity outlined in the speciications, which is important to
note when developing an application. If the RFID reader
does not have the memory capacity to handle all the added
programs, SD card slots are featured on some readers for
expansion purposes.
Applications can take up most of an RFID reader’s memory,
but memory can also be used to store read data on the reader
itself. The ability to store and buffer tag read data is a great
beneit when a network connection is not available. By storing
tag reads, the data can later be uploaded to a network or host
computer when available.
81
API Options
An API, or Application Program Interface, is an important
facet to consider before purchasing an RFID reader, especially
before developing software. A carefully selected API allows
for more seamless communication between the hardware and
software/middleware.
Each manufacturer has its own API, so it is important
to investigate which API may be the best it for a speciic
development environment.
Reader Modules
Unlike inished RFID readers that can be deployed right out
of the box, reader modules are associated with a product
development cycle. This document is intended to guide you
through the development cycle and to help you understand
how inished readers differ from RFID reader modules.
82
experience or the time to spend on product design and
development, module customers have both hardware
engineering experience AND a inancial incentive to develop
from the modular level up. Most module customers fall into
one of two categories:
RFID enabling an existing product - Some customers already
have an electronic device (or a product that contains an
electronic device) into which they want to integrate RFID
technology. Examples might include a tablet, a smart cabinet,
or a thermal transfer printer.
Developing a new product with RFID capability - Some
customers are creating an entirely new product into which
they want to design RFID capability.
Price - Because the customer only pays for the hardware that
the application requires, mass scale implementations are often
much more cost-effective when the project leverages RFID
reader modules. In this case, the customer can avoid readers
that are otherwise “over-engineered” for the application in
question.
Flexibility - when developing using RFID reader modules,
the customer has greater lexibility to specify the module’s
frequency ranges, sensor options (Bluetooth/WiFi/GPS/
PoE), and processing power instead of being limited to a
inished reader’s existing design.
Form Factor - Where inished reader come with an existing
case, RFID modules enable customers to tailor it the RFID
reader’s inished dimensions based on the application’s needs.
83
Product Development Cycle for UHF Reader
Modules
ThingMagic recommends a three-step process as customers
move from proof-of-concept to full scale deployment using
RFID reader modules.
84
• Documentation and Design: Quick-start guide, access
to reference design H/W S/W iles, schematics, layout
iles, and Gerber iles/BOM component data sheets
are accessible in order to provide printed circuit board
manufacturers with detailed speciications
85
RFID Reader Worksheet
1. Without the addition of an antenna multiplexer, most
RFID readers can have -
a. Two antenna ports
b. Four antenna ports
c. Ten antenna ports
d. Eight antenna ports
e. A, B, & C
f. A, B, & D
86
5. What is an antenna multiplexer?
a. A device that allows a reader to connect to more
than one computer
b. A device that allows a reader to connect to another
reader
c. A device that allows a reader to connect to up to 32
antennas
d. A device that allows a reader to connect to up to 10
auxiliary devices
87
9. API stands for -
a. Applicable Programming Interference
b. Applicable Programming Interface
c. Application Programming Interface
d. Application Programming Interference
Answers: 1) F; 2) C; 3) B; 4) A; 5) C; 6) B; 7) E;
8) D; 9) C; 10) True
88
RFID Cables, Connectors, &
Adapters
89
Length – The longer the cable, the farther the energy has to
travel. No antenna cable is perfectly insulated; so, the farther
the energy travels, the more energy it will lose. In some
applications, the reader is farther from the antenna due to the
nature of the application. If a long cable must be used, it is
important to use the appropriate level of insulation required
to combat loss.
Insulation Rating – The higher the insulation rating, the
thicker and more protected the cable. The most common
ratings used with UHF coaxial cables are 195 series, 240 series,
and 400 series. The downside to a thicker, more insulated
cable is that the cable is less pliable and could be dificult to
position in a tight space.
Connectors – Connectors are located at both ends of a cable,
90
and their type is determined by the connectors on the reader
and antenna being used in the application. Later, this guide
will walk through what types of connectors are compatible
with each other.
Cable Loss
Cable loss is the amount of power lost from the cable and is
determined by the insulation rating and length of the cable. For
applications that need a system running at maximum power
to provide long read range or for tracking at high speeds - the
reader’s transmit power, cable loss, and antenna gain will play
key roles. Below is a chart documenting cable loss by length
for each insulation rating. This chart shows the correlation
between the two so that, if the cable must be lengthened, a
higher insulation rating can be used to offset the loss.
91
*Of note, because power is being measured on the decibel scale, for every 3 dB
reduction, the power is cut in half. A reduction of 6 dB would be only 25%
of the original power setting, and so on. Likewise, for every 3 dB increase, the
transmitted power doubles.
92
Additionally, if the power entering the antenna isn’t quite
enough, a higher gain antenna can be used. To calculate the
total system output of power at the antenna, the following
equation can be used:
30 dBm - 3 dB + 6 dB = 33 dBm
Please note that most regions limit the total power output
from the point of the antenna. For example, FCC regulations
limit the total power output to 4 watts or 36 dBm. Be sure to
check the regulations for your region to ensure your system is
in compliance.
Types of Connectors
Connecting a cable from the antenna to the reader in an RFID
system isn’t dificult – but purchasing the correct cable that
will join the hardware together can be a tedious task. Quite a
few types of cable connectors can be used, and each one is
dictated by the connectors on the hardware. The chart below
walks through the most popular types of coaxial connectors
with a little information about each.
93
RP-TNC connector, so they are the largest connectors com-
monly used in UHF RFID systems.
TNC – A relative of RP-TNC, the TNC connector is the
normal polarity version.
RP-SMA – A derivative of an SMA connector, an RP-SMA is
simply an SMA connector with the polarity reversed.
BNC – BNC is a less commonly used connector in UHF
RFID systems but is similar in size to a TNC connector. BNC
connectors allow for quicker attachment than most others,
but they are more likely to loosen over time.
94
The Threading
On a coaxial cable connector or adapter, the threading is ei-
ther on the outside of the connector in plain view, or on the
inside of the connector. Two terms are used for each of these
types of connectors.
Female/Jack – A Female, or Jack, connector is characterized
by having the threading on the OUTSIDE of the connector
Male/Plug – A Male, or Plug, connector is characterized by
having the threading on the INSIDE of the connector.
95
The Center Pin
The center pin of a coaxial connector is the component that
conducts the RF energy and is one key to identifying what
type it is and with what it is compatible. There are two options
when it comes to the center pin of a connector, normal
polarity or reverse polarity.
Normal Polarity
Examples include: TNC, SMA, N-TYPE, BNC
Female/Jack - A normal female/jack connector has the
threading on the outside and a hole in the center to receive
the male/plug’s center pin.
Male/Plug - A male/plug connector has the threading on
the inside and a metal center pin to insert into a female/jack
connector.
Key takeaway: Normal polarity = center pin is in the MALE
connector.
96
Reversed (RP) Polarity
Examples include: RP-TNC, RP-SMA
Female/Jack - A reverse-polarity female/jack connector still
has the threading on the outside, but, because the polarity has
been reversed, the center pin is on the inside of this connec-
tor.
Male/Plug - A reverse-polarity male/plug connector still has
the threading on the inside, but because the polarity as been
reversed, the hole is on the inside of this connector.
Key takeaway: Reverse polarity = center pin is in the FE-
MALE connector.
97
Connections
Ensuring two connectors will properly join and work as
expected can sometimes be a confusing and tedious task.
For example, if an RFID reader has an RP-TNC Female
connector, should it connect to a RP-TNC Male, a TNC
Female, or a TNC Male? These four types have similar names
and sizes, and ordering the incorrect type can add several days’
worth of delay to a project. Below are a few rules to go by, for
matching up the correct connectors.
98
Adapters vs. Cables
An adapter is used to join any two coaxial connectors that
would otherwise be incompatible. There are two scenarios
where a coaxial adapter may be required:
1. If one or both connectors on a cable is incompatible with
the RFID reader or antenna.
Purchasing a cable with the incorrect connectors can happen
99
easily; not only are some of them similarly named, but they
appear similar in pictures as well.
2. To save money when experimenting with different antennas
and readers.
If an application is still in the testing phase, several different
antennas and/or readers can be purchased for experimentation.
Instead of purchasing several cables with different connectors
to match each reader/antenna combination, one cable and a
few different adapters can be purchased instead. This can save
time and money during testing.
100
RFID Cable Worksheet
1. What is the difference between a connector and an
adapter?
a. A connector is at the end of a cable and an adapter
is a standalone piece with two sides.
b. An adapter is at the end of a cable and a connector
is a standalone piece with two sides.
c. An adapter connects the cable to a reader and a con
nector connects the cable to an antenna.
d. A connector connects the cable to a reader and an
adapter connects the cable to an antenna.
101
c. Regulated Polarity
d. Renewed Polarity
102
9. If the connector is SMA, and does have a center pin,
what does that indicate?
a. The connector is Female
b. The connector is a Jack
c. The connector is Male
d. The connector is a Jill
Answers: 1) A; 2) C; 3) A; 4) B; 5) E; 6) C; 7)
A; 8) A; 9) C; 10) B; 11) D; 12) A
103
RFID Printers
104
beneits of an RFID printer.
105
tags and unencoded tags. In low volumes, it typically pays to
NOT invest in an RFID printer; however, in higher volumes,
investing in an RFID printer is usually the wise choice.
As with the manual encoding process, you should calculate
the difference in cost across an entire year in order to obtain
a worthwhile igure. If the difference is higher than the cost
of the RFID printer, then it may be time to invest in an RFID
printer.
Printer Usage
Industrial (10,000+ tags per day)
Industrial printers are manufactured to be durable and able to
be used in most application environments. Industrial printers
stand out because of the sheer volume of labels they can print
in a day, week, or month. For demanding applications with a
large volume of labels, an industrial printer is the best-suited
option.
106
also designed to be aesthetically pleasing, so they can be used
in customer-facing applications.
Tag Type
Frequency
The most common type of RFID printer is a UHF Passive
RFID printer. UHF Passive RFID printers have an encoder
that operates at the 860-960 MHz frequency range. However,
there are also NFC and HF printers available. These printers
often look visually identical to their UHF Passive counterparts,
but they have an encoder that operates at the 13.56 MHz
frequency range.
Specialized Printers
Another tag-based printer option is a specialized printer for
tags like RFID cards and badges, foam backed tags, and all-
surface labels that have a metal backing. RFID cards and
badges generally aren’t on a roll, but sold individually; so,
normal RFID printers will not be able to read, write, or print
on these. Instead, a specialized card printer is required along
with specialized ribbon to print on the thick, plastic cardstock.
Because the industry is growing and new types of tags are
107
being made, new specialized printers and printer settings are
being released to keep up with demand (e.g. printers designed
for foam-backed and metal-mount tags).
Thermal Transfer
108
Thermal Transfer printing is typically used in RFID label
printing because of its general resistance to environmental
elements and longer lifespan. Thermal Transfer printing
requires purchasing a thermal transfer ribbon which is an
added cost associated with this type of printing (in comparison
to direct thermal). Thermal transfer involves the process of
heating up the printhead and pressing it to the back of the
thermal ribbon. The heated printhead melts the ribbon and
transfers the color to the front of the label, which creates the
printed text or image.
The pros of thermal transfer printing are long ink lifespan
and little reactance to heat, light, or abrasions. Another
positive aspect of this printing process is that there is a ribbon
in between the printhead and label, which acts as a buffer for
foreign items like dust and dirt. The ribbon helps keeps these
impurities out of the printed text or image as well as expands
the lifespan of the printhead. A negative aspect of printing
via thermal transfer is the reoccurring ribbon cost.
Due to the heavy use of Thermal Transfer printer with RFID
tags, the remainder of this guide will focus solely on Thermal
Transfer printing.
Printer Ribbon
For Thermal Transfer printing, the printer must be equipped
with a ribbon. Three groupings of ribbon are available for
printing on RFID labels: Wax Ribbon, Wax-Resin Ribbon,
and Resin Ribbon. Each of these ribbon types has its pros
and cons as outlined below.
109
• Should be used on paper labels, coated or non-coated
• Produces softer images
• Inexpensive
• Susceptible to smudges, scratches, and abrasions
• Printed images have a shorter lifespan
Facts about Wax-Resin Ribbon
• Mid-level melting point
• Should be used on coated paper labels like, glossy, smooth
surfaces, and synthetic labels
• Clear, sharp image
• Mid-level price point
• Resistant to certain chemicals, abrasions, smudges, and
scratches
• Printed images have a long lifespan
Facts about Resin Ribbon
• High melting point
• Should be used on synthetic labels and garment labels
• Clear, sharp images
• High price point
• Highest resistance against chemicals, abrasions, smudges,
and scratches
• Printed images have a very long lifespan
110
Card Printer Ribbon
Card Printer ribbon is a separate type of ribbon that is shaped
and spooled differently than ribbon for typical label printers.
These ribbons are available in solid black, monochrome, and
color varieties and can be purchased in the form of a cartridge
for ease-of-use.
Media
Media Types
As a general rule, there are two types of RFID tags: inlays/
labels and hard tags.
Hard tags can be encoded, but, because they are not on a roll
and generally thick, hard tags are usually encoded manually
(one of the main exceptions is cards/badges.)
Wet inlays and RFID labels can be run through an RFID
printer for encoding and printing purposes. The speciications
relating to media size and roll size are imperative to take into
consideration when purchasing a printer, as well as when
purchasing tags for that printer. Most printer data sheets have
a Media section that speciies the different sizes that can be
used with the printer. Below are a few facts about each.
Media Size
Width
Most printers use media width as one of the key features of
the printer. The media widths usually vary between 4 and 6
inches, depending on the printer.
Length
In printer data sheets, some manufacturers display the
maximum label length and others denote the minimum label
length. Generally, labels should be a minimum of 0.35” and
a maximum of 157” long; but, the speciic range depends on
111
the exact printer and the printer’s dots-per-inch, or DPI (a
measurement of the printer’s image resolution).
Thickness
Most labels will be in between 0.002” and 0.010” thick. For
thicker labels, an exact printer coniguration or special type
of printer will be required. Tags/labels with special backing
like foam or metal for metal-mount tags are prime examples
of tags that cannot be printed with a typical printer or printer
setting (see image on page 11).
Media Separation
Because tags are manufactured on a single long liner, back-
to-back, manufacturers created a way for RFID printers to
determine where one tag ends and the other begins. There are
a few of these separation indicators, and the one that is used
varies depending on manufacturer and tag type. The three
most common are called continuous, notch, and black-mark.
Before an RFID printer starts encoding/printing, it must
know what the separation indicator is in order to know when
to encode/ print.
Continuous
Like it sounds, continuous means that there is no separation
between each tag. For this type, the only way that the printer
knows one tag from the other is pre-entered tag measurements
during calibration.
Notch
Notch, or gap, separation is fairly common on tag rolls and
simply means there is a small area between each tag that the
printer uses to identify one tag from another. The printer can
tell from the reduction in thickness that no tag is in the space
between tags.
112
Black-Mark Separation
Black-Mark separation means that there is a black line that
varies in thickness indicating the area between two tags. The
printer identiies the color change and is able to use that as
the indicator that there is no tag in that space. (These black-
marks used for separation indicators between tags should not
be confused with black marks that some manufacturers use to
denote bad RFID tags.)
113
to re-roll the tags on a different size core. Both the outer roll and
inner core diameter speciications are available on most printer
data sheets.
114
Operating Frequency
RFID printers have an RFID reader inside of them, so it is
imperative to check which operating frequency the printer
uses. Most printers are set to the Global standard of 865 –
960 MHz, while others can be set to the US (902 – 928 MHz)
range, the EU (865 – 868 MHz) range, or even set to print and
encode HF and NFC tags (13.56 MHz).
Data Interface
Data Interface explains how the printer connects to a
computer or network. The most common data interfaces are
Wi-Fi, USB, RS-232, Ethernet, and Bluetooth.
For placing a printer on a network so that more than one
computer can print to it, you can use Wi-Fi, Bluetooth, or
Ethernet connections. To connect a printer with a single
computer directly, USB, RS232 (Serial Connection), Ethernet,
and Bluetooth can be used.
Power Source
Most RFID printers are powered by an AC cord, but mobile
printers are powered using rechargeable batteries that must be
charged every few hours depending on the size and type of
battery, as well as printer usage. For battery-operated printers,
it is useful to purchase additional batteries and a charging
cradle so that the application is not interrupted due to a
drained battery.
Operating Temperature
If the application is outside, or in a non-temperature controlled
environment, the printer’s operating temperature will be
important to consider. Most printers have similar operating
temperature ranges as RFID readers, unless the printer
115
speciically states that it can withstand harsh environments
and extreme temperatures. Printers, like RFID readers, can
overheat and shut down if they are not stored properly
according to their operating temperature speciications.
Host API
Application Programming Interface, or API, is a set of
protocols and tools on a device that allow a programmer to
build software to interact with that device. Manufacturers
create APIs in speciic programming languages such as
C#, Java, or their own, unique programming language. The
programming language in which the API is available can
be a signiicant advantage for a software programmer that
is proicient in that language. For users looking to create a
custom software for their RFID printer application, the Host
(or manufacturer’s) API programming language could be the
deciding factor between two or more devices.
Print Width
Most printers are available with either a 4 or 6-inch maximum
116
print width, which is important to note to ensure that the tag
isn’t too wide to be encoded and printed with the selected
RFID printer. If the tag width is smaller than 4 inches, it
can be used with any supported printer. Printers that have
a 6-inch print width will generally be more expensive than
printers with a 4-inch print width and allow more lexibility
when choosing media.
Cutter/Rewinder/Peeler/Auto-applicator
Some printer manufacturers can provide optional, user-
friendly capabilities that can be purchased on, or in addition
to, the printer. Below is a list of some of the more common
options.
Cutter – a cutter is positioned on the front of the RFID
printer at the bottom of the opening where the tags are
expelled. The cutter is used to cut the tags for you, instead of
having to use scissors or additional equipment.
Rewinder – a rewinder is a separate element that is very useful
when printing hundreds of tags because it carefully winds the
printed and encoded tags coming from the printer, onto a new
roll for ease-of-use.
Peeler – a peeler peels the tags off the liner as they come out
of the printer for more automated applications and ease-of-
use.
Auto-applicator – an auto-applicator is used in peel and stick
applications on conveyor belts, usually in conjunction with a
cutter and peeler, to replace the human element in the labeling
process.
Printer Software
A few different boxed printer software options are available to
use with an RFID printer. Printer software allows a computer
117
to interface with an RFID Printer in order to create and send
data for printing and encoding tags. Without out-of-the-
box software, tags can be printed and encoded by creating a
script in the printer’s programming language and sending it
to the RFID printer. Creating a script requires knowledge of
programming in the printer’s native language.
In order to print and encode tags without programming
knowledge, printer software can be purchased making
communication between the computer and printer seamless.
Each boxed printer software is different, but the basic
functionalities include creating or importing encoding data as
well as the data to be printed on the tag face. Boxed printer
software is designed to be easy to use, but can vary in price
depending on features and the number of printers licensed to
use the software.
Another option for interfacing with RFID Printers is to
design a custom software using the printer’s Host API and
programming language. Custom software is a good option
for companies that want to automate their printing or
create a piece of software with additional capabilities like
communication with other pieces of software or databases.
Printer Maintenance
Calibration
Because different RFID tags are used with RFID printers,
the printer must be calibrated for a speciic piece of media.
Calibrating is basically coniguring the printer settings to
operate with a speciic tag. There are two different types
of calibrating when talking about RFID Printers – RFID
Calibration and Media Calibration.
RFID Calibration refers to when the printer reads the tag and
determines the best antenna position and read/write power
for encoding to that particular tag.
118
Media Calibration refers to when the printer prints a few tags
in order to adjust settings to accommodate for the tag’s size
and the gap in between each tag.
Both types of calibration must be completed each time a new
tag/piece of media is placed inside the printer to be printed
and encoded. Typically, each printer is shipped with either a
booklet or loaded information about all the tags that can be
printed on that printer and their calibration settings.
Cleaning
Cleaning is an important part of upkeep with an RFID
printer. Printers in environments that produce a lot of dust,
ash, or dirt will start to slow down or stop working due to an
accumulation of debris inside the unit. For printers in this type
of environment, it’s important to clean the unit every couple
of weeks to a month depending on the accumulation. Once
every few months, even printers in cleaner environments will
need to be cleaned so that dust does not affect printing speed
or quality.
Cleaning a printer can be done carefully like any other
piece of equipment using cleaning cloths and/ or dusters.
Alternatively, a specialized cleaning kit can be purchased for
supported printers.S
Recurring Costs
Besides the obvious recurring costs of tags and ribbons, printers
may have a few maintenance or equipment replacement costs.
In addition to the cost of printer cleaning supplies, printheads
may sometimes need to be replaced (although this is rare).
Today’s printers are built with high-quality materials and are
made to last.
119
RFID Printer Worksheet
1. Typical RFID Printers print and encode which types of
RFID tags?
a. Hard tags and inlays
b. Labels and inlays
c. Cards and labels
d. Inlays and Badges
120
a. Wax-Resin Ribbon because it has a mid-level
melting point and price point
b. Resin Ribbon because of the clear, sharp images and
high chemical resistance
c. Wax Ribbon because of its low price point
and ability to be used on coated and non-coated
paper labels
d. None of the above
121
9. Which RFID Printer components will contribute the
most to your recurring costs if you’re consistently
printing tags?
a. Tags and Ribbon
b. Ink Cartridges and Tags
c. Printer Heads and Tags
d. Data Plans and Tags
Answers: 1) B; 2) D; 3) A; 4) C; 5) C; 6) A; 7)
B; 8) False; 9) A; 10) True
122
RFID Software
Application Software
By deinition, software is any set of machine-readable
instructions that directs a computer’s processor to perform
speciic operations. Thousands of software applications are
accessed daily by end-users, ranging from apps on our phones,
to some more specialized applications such as software built
for accessing and analyzing data collected by RFID systems.
Speedway Connect Software is an example of a software
application that provides a graphical user interface which
allows users to interact directly with RFID hardware. Generally
speaking, application software gives you the ability to get the
data that you are looking for, how and when you need it.
123
Firmware
Software that resides speciically on a hardware component
is called irmware. Firmware controls the operation of the
device on which it is hosted and does not typically initiate
communication with external devices, such as PCs. Device
irmware may be upgraded periodically to ix bugs and to add
new functionality to the hardware component. An example of
irmware is the Astra-Ex v4.19.2 for the ThingMagic Astra-
Ex reader. This particular irmware version contained no new
features; instead, its focus was on ixing bugs and improving
stability.
Middleware
Middleware is a piece of software that usually runs in the
background. It essentially is the “glue” that holds two other
pieces of software together and allows them to effectively
communicate. A common use of RFID middleware is a
service that communicates with and controls RFID readers in
order to gather data, which then may be analyzed and stored
in a database for consumption by a different user-facing
application.
124
RFID Software Worksheet
1. Software that resides on a hardware component is
called -
a. Application Software
b. Firmware
c. Middleware
d. API
Answers: 1) B; 2) A; 3) C; 4) B
125
Important RFID Concepts
Regional Regulations
Regional regulations are rules put in place by individual
countries to regulate the transmit frequency and output
power of RFID systems. In any country, these regulations
are important to know and abide by when purchasing and
deploying an RFID system.
Here are the most common questions and the relevant answers
about RFID power regulations.
126
The Federal Communications Commission or the FCC, is the
governing body that oversees these standards for the United
States in accordance with the Federal Communications Act.
The European Telecommunications Standards Institute better
known as ETSI, sets the standards for the European Union
for all Information and Communication Technologies which
includes RFID.
127
that the reader or tag cannot output more power than the
country allows.
Certain passive tags are also subjected to federal certiication
in order to be sold for and used in hazardous environments or
to pass unique, application-based speciications.
128
but only after obtaining a license through the government.
More commonly, countries only require licenses for certain
bands in the frequency range or for using a certain frequency
band at or over a speciic output power. If an UHF RFID
user does not get a license before going forward, they could
be subjected to large ines or company shut downs.
Output Power
Power output in dBm or watts varies per country and just
depends on what the government has decided works best with
their country’s pre-existing standards. Power in watts is usually
either 2 watts ERP or 4 watts EIRP.
Principle to Know
Effective Radiated Power (ERP) vs. Effective Isotropic
Radiated Power (EIRP)
129
The technical difference in the two is that ERP refers to the
gain in relation to a half-wave dipole antenna and EIRP refers
to the gain in relation to an ideal isotropic antenna. Some
countries provide output power in ERP and some provide it
in EIRP, and there is a big difference between them in terms
of how they are calculated.
Below is the relation between ERP and EIRP in terms of
Watts, and dBm.
130
_____ dBm – _____ dB + _____ dBi = _____ dBm EIRP
131
Remember to check and see if your country has any further
instructions on using RFID in that area, like special licenses.
Frequency Hopping
There are many issues that can arise during the testing phase
of an RFID system. One of the most common issues people
face is called reader collision. Reader collision occurs when two
readers transmit the same frequency at the same time, causing
interference in one another’s read zones. RFID readers utilize
“Dense Reader Mode” to coordinate with other readers so
no two readers interfere with each other. Dense Reader Mode
uses a technique known as “Frequency Hopping” in order to
achieve this. This is extremely useful for environments that
have multiple readers located closely within a facility.
Frequency Hopping Spread Spectrum (FHSS) is a method
used to rapidly switch transmitting radio signals among several
frequency channels.
The FCC has certain regulations in place with which RFID
readers must comply in order to transmit 1 W of output
power. The FCC allows high output power if the system:
• Uses FHSS
• Supports hopping across 50 channels (500 kHz wide)
between the operating frequencies of 902 - 928 MHz
• Transmits no longer than 0.4 seconds per channel
Frequency hopping is a technique mainly used to keep two
or more RFID readers from interfering with each other while
reading RFID tags in the same area. Each reader initiates its
operating program, and, once it receives a frequency hop
trigger signal, a frequency hopping sequence is then selected
from the available operating frequencies. The reader then
prompts the RF module to switch to a frequency channel
described in the hopping sequence and stays there for 0.4
132
seconds. Once completed, the reader will stop transmitting and
store the channel it was using. The reader will then continue
to use the same sequence if a new trigger signal arrives in
less than 30 seconds. Because of this rapid hopping among
various frequencies, multiple readers and tags are allowed to
communicate with one another with minimal, if any, reader
collision.
The nature of this technique allows for very minimal
interference since the probability of two readers transmitting
at the exact same frequency is very low. This comes in handy
when using multiple readers that have overlapping read zones.
The technique can be better illustrated in Figure 1 shown
below, where three readers are able to transmit signals within
a certain range of frequencies without any reader collision.
Security Breaches
Security breaches started as low-scale threats like hackers
133
reading tags and obtaining private information, but they
have grown into seven large global threats to UHF RFID
security. To be addressed in a later post, these seven threats
include hacking events like spooing, reverse engineering, and
eavesdropping.
Current Gen 2 tags do not have the capability to thwart all
threats, but two security measures in particular were developed
and applied to UHF Gen 2 tags in order to provide the irst
layer of protection against hackers – serialized TID numbers
and passwords.
TID Numbers
When the Gen 2 standard was released, it introduced serialized
Transponder ID (TID) numbers for identiication purposes.
While initially the concept of serialized TID numbers was
intended for identiication purposes (manufacturer’s codes,
etc.), the TID became widely used for the purpose of
authentication once cloning tags became achievable. TID
numbers, unlike EPC numbers, are locked after being written
at the factory and as a general rule cannot be tampered with.
Generally, to authenticate a tag that is suspected to be fake,
read the EPC memory bank and the TID memory bank and
record both numbers.
Passwords
Two password functionalities are currently available on Class
1 Gen 2 tags: the access password and the kill password. Both
passwords are stored on the reserved memory block and
come pre-encoded with zeros, which do not function as an
access or kill code.
Access Code
The access code on UHF Gen 2 tags must be written in order
to be used. Once written, the access code is stored on the
134
reserved memory bank along with the kill code and prevents
anyone from changing the ‘lock’ state without irst sending
the 32-bit code. Four lock states exist on each memory bank:
• Unlocked
• Perma-unlocked (can never be locked)
• Locked
• Perma-locked (can never be unlocked)
The access code can also prevent readers from reading the
reserved memory bank if it is locked. “Locking” the memory
bank enables it only to be read when the reader interrogates
it irst with the access code, and is the irst layer of security
generally used with UHF tags. After the access code has been
written and the selected memory bank has been locked, the
next step is to lock the access password so that users cannot
simply re-write it. It is important to note that a small piece
of software is usually required in order for the reader to
interrogate the tag using the access password. For speciics
on locking RFID tags, read Locking Memory on EPC Gen2
RFID Tags.
Kill Code
The kill code is used primarily for applications that require
tags to change state (or phase) to indicate a speciic event
has occurred. Applications like retail beneit from the kill
code because once an item is purchased the tag can be killed,
making it permanently unreadable. If this method is used, a
reader is generally set up at the register to send the kill code
after checkout. Using this state change, retailers are able to
know if an item was actually purchased versus stolen if it is
returned.
135
standard, the idea of security with UHF RFID tags has
changed drastically. The new standard takes UHF tags into
the 21st century - from two small security measures on Gen
2 tags, to intricate anti-counterfeiting measures and security
privileges on G2V2. EPCglobal and ISO were able to step up
security and anti-counterfeiting for this new standard by using
encryption and cryptologic keys.
While enhanced security measures along with the other
three new features are revolutionary, these features are not
required on all G2V2 tags. The chips will be customizable
based on which features the application needs. For example,
if a manufacturing application needed enhanced user memory
on tags in order to store increased information but did not
need cryptographic authentication, EAS functionality, or the
ability to be untraceable, the users can purchase the tag with
that one feature alone. Allowing these tags to be customizable
(16 combinations) enables them to be cheaper because one-
feature chips will be cheaper than chips with all four features.
Even though allowing the chips to be customizable is cost-
effective, it adds a huge barrier in the production timeline
and availability. Because manufacturers cannot predict which
combination will produce the biggest return-on-investment,
virtually no G2V2 chips have been put into production as of
mid-2016. Back in 2014, it was estimated these chips would be
put into production and available in different tag formats for
purchase by early 2016; but until the demand grows and large
companies place signiicant orders, these tags will not likely be
available in the near future.
136
Protocols are a certain set of rules that govern the exchange
of data through a communication connection. Most widely
used protocols deine small data exchanges that occur millions
of times a day like the Hypertext Transfer Protocol (HTTP)
or File Transfer Protocol (FTP). It is fair to say that most
people use protocols on a daily basis. Because RFID is built on
communication exchange, there are multiple protocols speciic
to RFID systems. Some higher-level, complex protocols are
constructed of component protocols; a common example of
that is the EPC Gen2 protocol.
The EPC Gen2 protocol is comprised of other protocols
like anti-collision protocols, air interface protocols, and
authorization protocols – just to name a few. Each exchange
of data must be deined in a protocol in order to not only
comply with rules set by the FCC and other regulatory bodies,
but also to gain widespread acceptance and usage. Protocols
can be created by a company a manufacturer, or a committee,
but must be approved by a governing body to be used.
137
the communication will take place between tag and reader,
while the standard deines items like memory allocation and
security methods.
Industries like these create standards and protocols in order to
create speciications to work toward universal adoption. This
allows users from all across the industry to read RFID tags
and ind tracking information in the same uniform way, and,
in this case, there is the added beneit of cost competition
between RFID vendors.
Added Beneit: Ease of use, and Potential Widespread
Adoption
Wiegand Protocol
138
The Wiegand Protocol is another example of a custom
protocol that can be used for added beneits. Wiegand is built
upon the Wiegand effect, discovered by John R. Wiegand,
which uses wires and magnetic properties to encode and
decode cards. Because this can be used with RFID, and not
just magnetic key cards – a protocol was created to describe
the communication between tag and reader with Wiegand
capabilities. The most common use for a Wiegand system is
in electronic access systems to enter gates or buildings.
In order to setup an electronic access system using RFID with
doors, locks, and gates, the readers most likely will need to
have Wiegand output capabilities. Wiegand output capabilities
on RFID readers are similar to GPIO abilities in that they
provide information to other Weigand protocol compatible
accessories like control systems for gates or magnetic locks
for door entry. The RFID tags used in the system will also
have to be programmed with Wiegand speciic coding.
Added Beneit: Enable Use with Wiegand systems/devices
Reader Interfaces
Reader manufacturers usually offer software Application
Program Interfaces (APIs) for RFID readers so that custom
software can be developed by end users to integrate the reader
into their business processes. Reader manufacturers may also
provide Software Development Kits (SDKs) which provide
sample code examples and other helpful documentation to
speed up the development and integration process of RFID
readers into their environment.
Two Gen2 interfaces exist that can help users integrate directly
with RFID readers and start reading and writing as well as
building custom applications.
API – Application programming interfaces are provided by
reader manufacturers and the functions of each may vary.
139
The primary disadvantage to using an API to build custom
software is if the application changes to a reader made by
another manufacturer. If this occurs, then the code will need
to be modiied using the new manufacturer’s API commands.
ALE – Application level events speciies an interface that
is basically a starting point for creating and writing custom
software. It gives users iltered and consolidated data capture
information for physical events and other related data.
Other custom interfaces exist on the market that provide
added beneits, such as Kathrein’s KRAI Interface.
140
Added Beneits: Optimized Antenna Polarization / Opti-
mized Read Field
141
Option: Use UHF labels approved speciically for use on
water-illed containers like the Omni-ID IQ 600 Labels and
the Conidex Silverline.
Option: Use UHF Near-Field tags approved for use on water-
illed containers like the Alien SIT tag and the SMARTRAC
Trap.
Option: Use regular UHF inlays or labels and place a spacer
between the liquid and the tag made from foam, silicon, or
another thick material (e.g. the Foam-Backed ShortDipole).
142
Whether the application is outdoors near lakes or ponds, or
indoors around water tanks or water-illed machinery, liquid
can play a role in an RFID application because it absorbs RF
energy.
143
(such as in rugged environments). When embedding an RFID
tag, always leave one side with no metal covering and protect
it with epoxy or something similar to ensure it can be read.
(NOTE: an RFID tag completely encased in metal cannot be
read).
144
causing null zones. Fluorescent lights become more of a
problem the closer they are to the RFID system or tagged
object.
145
application environment, try using an RF Power Mapper that
detects RF energy and then map out where exactly it is. Then
shielding can be installed to keep the waves from interfering
with the RFID system.
GPIO Capabilities
Most ixed RFID readers have a GPIO port, or General
Purpose Input / Output port, that enables additional
functionality, such as visual or audio signals. Unlike other
ports on RFID readers, the GPIO port has only two settings
– high (i.e. “on”), or nothing. The high signal acts as a trigger
for GPO devices because it sends voltage through the port to
trigger them to perform a certain action; likewise, an incoming
high signal from a GPI device can act as a trigger the reader
uses to perform a predetermined action.
146
functionality like audio or visual signals. Most ixed RFID
readers have GPIO ports that allocate certain voltage levels
to input and output electric signals. Within each GPIO port
are several pins and each pin either outputs or inputs a trigger
signal.
The number of pins in a GPIO port varies with the RFID
reader, and it is important to note how many pins exist
because most GPIO devices require 3, 4, or more pins in
order to operate. It is also crucial to understand the amount
of voltage each pin will provide to the GPIO device. Some
readers’ GPIO ports do not allocate enough voltage to power
a GPIO device. In those cases, even though the reader has a
GPIO port, a GPIO box is necessary to power to the device.
147
Why use a GPIO device?
As mentioned above, GPIO devices provide additional
functionality that can improve an application. Many different
types of devices can be added to an RFID system by way of
a GPIO port such as stack lights, motion detectors, buzzers,
and indicators. Below are examples of where an application
could beneit from a GPIO device.
Stack Lights – GPO, Output - Because there are a variety of
available colors in most stack lights, these devices can often
be seen in a security or access control application. In a high
security area, the ability to have one light turn green when the
reader detects a valid RFID tag/card and one light turn red if
it doesn’t, adds easy visibility for staff.
Motion Detectors – GPI, Input – For RFID systems
in manufacturing or warehousing applications, a motion
detector can be used to send an input signal to tell the reader
when to begin transmitting in order to read RFID tags. Such
functionality works well in applications with randomly timed
tagged objects moving through a certain area like a dock door.
Multipath
If you currently have an RFID system, or are thinking about
purchasing one, there are a few terms that should be in the
back of your mind when you start setting up your system.
The RF energy that your reader generates is sent out
148
in electromagnetic (EM) waves and like any wave, their
propagation is impacted greatly by their surroundings. Some
travel in direct lines, and some move out at different angles
from the bore sight (or center of the antenna). In order to
better anticipate the paths RF waves travel in your system, you
need to have a deeper understanding of EM waves.
149
Refraction
Not as big of a concern as relection in RFID systems, refraction
is when the EM waves pass through a speciic material at an
angle and changes angles when it passes through. A typical
example of refraction is when light waves pass through water
and propagates at a different angle through the water. Water
and other dielectric materials between the tag and antenna can
refract the EM wave.
Diffraction
When RF waves seem to bend around objects instead of
passing through them, it is called diffraction. Metal poles,
corners of buildings, and other corners of metallic objects
are where this is seen the most.
Absorption
When an EM wave is absorbed by the object that it is sent
toward it is called absorption. Specialized absorbent material
like carbon loaded foam for example work well to absorb
EM waves. Water and most materials absorb RF waves to an
extent as well as refracting, relecting or diffracting.
Multipath
The deinition of multipath is “when two or more favorable
radio paths exist between the reader antenna and the tag.”
When the reader sends a signal to the antenna to ‘ping the
tag’ the antenna doesn’t just send one beam of RF waves
straight forward. The reader antenna sends waves on several
different paths in order to pick up the tag’s signal. This is
where relection, refraction diffraction and absorption come
into play.
Each path besides the direct path is at a small angle from the
center and has a high probability of experiencing relection,
150
refraction, diffraction or absorption depending on the
materials or objects in the vicinity. That poses a problem when
you have more than one tag in the read ield, and you only
want to read a speciic subset of tags. One way to mitigate this
problem would be creating a tunnel type of enclosure with RF
shielding materials. For example, if you were using a conveyor
belt RFID system to read tagged boxes on the warehouse
loor, but only want to read the speciic set of tags coming
through the conveyor belt, installing the reader antennas in a
contained tunnel will create a boundary from the effects of
multipath.
Another problem area with multipath is if the direct RF wave
intersects with another RF wave with a different phase, it
will create a null spot in your read ield. Null spots can occur
multiple times in your read zone. In a null spot, your RFID
tag will not be read by the antenna because the out of phase
waves will cancel each other out.
The phase of a wave is deined as the distance between the
irst zero-crossing and the point in space deined as the origin.
That basically states that if the waves have the same frequency
and do not intersect each other, the waves are ‘in phase’. If
you have two waves that either have two different frequencies
or do intersect each other, these waves are called ‘out of
phase’. See the drawing below for more information.
151
The waves above are ‘out of phase’ waves
In-phase waves will intersect in the same phase, thus creating
constructive interference. You can see below that constructive
interference strengthens the wavelength making it possible
to read well outside the normal read range of that antenna.
An example of that would be if your antenna typically reads
around 6 feet, in one area where two RF waves come together
at the same phase, your antenna would be able to read a few
feet more.
152
Determining the exact area that is a null zone or an extended
read zone is not a trivial process. In order to determine these
areas, you would have to move the tag around on the x, y, and
z axis.
All of the information about EM waves and multipath above
can help you to anticipate how to get the most out of your
RFID system. If you effectively design the area surrounding
your system, you can avoid the different effects of multipath.
Testing
Testing is key to launching a successful RFID implementation.
While RFID works well in a wide variety of environments,
testing is necessary to ind the optimum RFID tags, readers,
and antennas for your application and environment.
Testing is a simple, low-cost, and effective way to see if your
idea for your business can improve your operations without
having to make a major purchase decision.
Testing is extremely important because there are many factors
that can affect the ability to read RFID tags consistently – the
environment in which the tag is being read, the orientation of
the tag on the object, the antenna gain, and reader settings are
just a few of the factors that can affect your ability to capture
reads.
There is not one RFID tag, reader, or antenna that works best
for every situation. Most products have been created to it a
speciic need because every business situation will be unique
in some way. For example, if you are tagging a cardboard box,
you’ll use a very different tag than if you are tagging a steel
beam.
So, before assuming RFID is right for you and spending a
lot of money on readers, tags, antennas, and the software
necessary to bring it all together, start small.
153
Customizable RFID tag sample packs and development kits
are a great place to begin. Tag sample packs can be customized
speciically for your application – combining an assortment
of tags that should perform well in your situation. During
your testing, a customized sample pack will make it easier to
select the tag that works best with your operation.
An RFID development kit is a low-cost and effective way of
testing your idea before you make a major purchase decision.
Each development kit is a little different, but all development
kits include:
• An RFID reader
• An antenna (which is sometimes integrated directly into
the device)
• An antenna cable (if the antenna isn’t directly integrated)
• Tag samples, and
• Access to the testing software you will need to get started.
The four major categories of RFID Development Kits are
4-port reader development kits, integrated reader development
kits, USB reader development kits, and handheld reader
development kits. Each type of development kit has its own
pros & cons and some it certain applications better than
others.
The four-port reader is great for applications where you will
need lots of coverage. The four ports allow users to attach
multiple antennas to a single reader (depending on the reader
and setup, the number can range from 4 to 32 antennas).
With the ability to attach additional antennas, users can cover
more ground and have the added lexibility of being able to
choose from a wide array of antenna options. Depending on
the kit selected, you have options for Wi-Fi and Power-over-
Ethernet.
The integrated reader is a lower-cost option than the four-
port reader. It has an antenna integrated inside of it, as well
154
as an additional antenna port which gives users the option to
add another antenna if needed. If you only need one or two
antennas, this may be the best option for you. Like the four-
port readers, you also have Wi-Fi and Power over Ethernet
options.
The USB reader is the least expensive of the RFID readers
and is a great it for desktop and close proximity applications.
It is also a great it if you are just getting into RFID and
want to start with an inexpensive option. Because of its size
and power output, its read range is much less than any other
reader. Additionally, due to having a serial connection, USB
readers must be connected to a host computer and cannot be
placed on a network like other RFID readers.
The handheld reader is a mobile RFID reader with an
integrated antenna. It is great for applications where you are
on the move, and don’t want to be restricted to a single point
for reading tags. Most handheld readers also have the ability
to read various types of barcodes. Because many units are
also full-ledge mobile computers, they are typically the most
expense type of RFID reader you can buy.
As I mentioned earlier, a development kit is great for testing
because it allows users to try out different approaches to
various applications. With the ability to test multiple types of
antennas and tags, an RFID Development kit can help you
asses your business idea to see if RFID can improve your
operation without spending a tremendous amount of money.
Challenges
Facing challenges when installing a new system or procedure
is expected, but it helps to consider potential problems
before installation. Large and small companies, as well as
individuals, thinking about installing an RFID system have
numerous things to consider before making a purchase. If
155
the potential user prepares thoroughly and completes enough
due diligence up front, it should reduce unplanned issues mid
and post-installation. Unfortunately, even the most prepared
organization might run into a few issues during installation
due to the unpredictable nature of RFID when implemented
in a new environment.
Deploying an RFID system can present many challenges;
below are the four most common challenges (and ways to
mitigate them).
156
reach a substantial size, generally speaking, small problems
usually do not receive the return on investment (ROI) needed
to offset the initial (and potentially ongoing) cost of installing
an RFID system. Sometimes, automating a personal (i.e. non-
business related) problem may lead to a very lucrative product
or process, but because RFID systems are still relatively
expensive, careful analysis should be undertaken in order to
ensure RFID will produce a signiicant ROI.
157
necessary, incorporating metal-mount tags onto metal items
and introducing RF blocking materials or shielding are two
ways to improve the functionality of an RFID system.
Mitigating Water – Mitigating problems with water-illed
items is less complex than mitigating RFID applications that
are exposed to water. Tracking items that are illed with liquid
including bottles, barrels, and even the human body can be
done if the right precautions are taken. For example, adding a
small piece of foam between the tag and the water-illed item
can usually improve read range signiicantly.
RFID tags and equipment that are exposed to water pose an
entirely different problem. Hardware exposed to water will
typically need a higher IP rating and, if an RFID reader is
involved, sheltered from direct water exposure. This can
be accomplished with the use of antennas and cables rated
for outdoor use and, for readers, weatherproof enclosures.
Additionally, RFID tags exist that are rugged enough to be
exposed to water, like rain and snow, without a problem, but
they are more expensive than inlays or paper RFID tags.
Underwater RFID applications are few and far between. The
only type of RFID tag that can be read through water is a tag
that uses magnetic coupling to communicate with the reader,
such as LF technology. Even then, the read range will not
exceed more than a few centimeters and should be thoroughly
tested before implementation.
Besides water and metal, other factors, such as magnetic ields,
may also play a major role in affecting an RFID system. The
best way to determine how much read range an RFID system
will receive is through thorough testing. It is also a smart idea
to map out the area to get a better understanding of where RF
waves might relect, refract, or absorb.
158
RFID is a technology that has the ability to change the way
that people interact with items, but it comes with a cost. Over
the years, RFID tags and hardware have gone down in price
and have become more accessible to consumers; however, the
technology is still not inexpensive enough to justify buying
a system without irst calculating the potential return on
investment.
Most RFID systems are different and can include an array of
hardware options, from a couple of ixed readers, antennas,
and GPIO adapters, to one handheld reader with a built-in
antenna. Before purchasing any system, it is important to
understand the general cost breakdown for an RFID system.
Start-up (i.e. near-term) costs and recurring (i.e. long-term)
costs are both very important to consider. Start-up costs are
described as the amount spent to get an RFID system up
and running as well as integrated with current systems. Start-
up costs include readers, tags, software, and other hardware
equipment. Recurring costs such as software contracts, and
consumables are costs that reoccur monthly or yearly that
keep an RFID system up and running.
Development kits and sample packs of tags are a good way
to get started with RFID before investing too much money.
Purchasing a development kit and sample pack is a cost-
effective way to see if an RFID system could be the solution
to the business problem at hand.
159
aren’t met quickly enough.
In order to properly implement RFID, consumers must choose
the best it equipment and tags and then test thoroughly. As a
best practice, time should be spent before purchasing to fully
vet the hardware and tag options available in order to learn
about potential pros and cons. After readers and antennas are
selected, purchasing a few different types of tags for testing
is strongly recommended. Ordering various types in small
quantities allows for lexibility during the testing process.
Rushing through purchasing and testing could lead to larger
problems down the road. Sometimes the installation and
testing can take several weeks or months, but that extra time
will pay dividends later.
160
RFID Concepts Worksheet
1. In terms of RFID, what is regulated?
a. Frequency range of transmissions
b. Power levels of emissions
c. Antenna Gain
d. RFID Readers, Active Tags, and Certain Passive
Tags
e. A, B, & C
f. A, B, & D
161
b. To ensure that you are on the right frequency
c. To ensure that you are receiving backscatter from
the tag
d. To ensure that you are not violating regional
regulations
162
9. Which of the following is the correct order of steps for
locking Gen2 tags?
a. Lock the selected memory bank, Write the access
password, Lock the access password
b. Write the access code, Perma-lock the access code,
Lock the kill code
c. Write the access code, Read the access code, Lock
the selected memory banks
d. Write the access code, Lock both the kill and access
codes, Try to read the tag
163
RF Waves
c. Liquids, Metals, UV Lights, and Additional RF
Waves
d. Liquids, Metals, Halogen Lights, and Additional RF
Waves
164
c. Accounting for Cable Loss
d. Staying under budge
17. What are the four most commonly faced problems when
deploying an RFID system?
a. Being Unrealistic, Wasting Time & Products, the
Environment, Testing Procedures
b. Being Unrealistic, the Environment, Budget
Restrictions, Testing Procedures
c. Being Unrealistic, the Environment, Budget
Restrictions, Lack of Proper Planning
d. Being Unrealistic, Saving Time, the Environment,
Lack of Advanced RFID Knowledge
165
20. What two items are a good way to get started with RFID
before investing too much money?
a. Readers & Antennas
b. USB Reader & Sample Tags
c. Development Kits & Sample Tags
d. An Integrated Reader & Sample Tags
Answers: 1) F; 2) C; 3) A; 4) D; 5) F; 6) B; 7) C; 8) B;
9) A; 10) D; 11) A; 12) B; 13) D; 14) C; 15) C; 16) A;
17) C; 18) A; 19) D; 20) C
166
Deploying RFID: 20 Questions &
Answers
167
environmental factors which play an important role in the
success of an RFID system. Through individual testing or
consulting with an RFID expert to conduct a site survey, each
potential read zone in a facility should be examined in order
to determine:
• Which challenges exist that would never need to be
overcome if an RFID system were to be deployed?
• Which speciic types of readers, tags, and antennas would
be required in order to achieve a company’s goals?
• Which process changes (if any) would be required in
order to ensure RFID tags can successfully be read?
168
for a speciic application:
169
systems. Recurring costs are ongoing costs that are needed
in order to keep a system functional; these costs can recur
weekly, monthly, or yearly.
Some examples of start-up costs might include:
• RFID Hardware - Readers, antennas, cables, etc.
• RFID Tags - Reusable tags for ixed assets or tags for
one-time purchase
• Software - Custom development costs and/or initial
license cost
• Services - Installation and testing/tuning
• A few examples of recurring costs could include:
• Support Contract - For additional support for a deined
period of time for the system
• Software - Annual maintenance fees
• Consumable Supplies - RFID tags (if they can’t be
reused), printer ribbon, etc.)
170
different RFID tags and ind the ideal one for each application.
Testing multiple tag types and sizes is an important and
necessary task to ensure optimum performance from the
RFID system.
171
How do I choose my RFID hardware?
A large selection of RFID hardware is available and speciic
types of RFID equipment are better suited for certain
environments; so, choosing the right hardware for any given
application can be a tedious process. In any situation, once a
selection is made, rigorous testing is key to ensure success.
172
desires. In many cases, it makes sense to start small with the
basic necessary functionality, while architecting the software
to accommodate for future expansion of all desired features
and functionality. As the RFID application matures, so can
the software. This crawl-walk-run methodology allows a
company time to become familiar with the ins and outs of
its application and better determine exactly what features and
functionality will be of most use.
173
step. Whether allocating an existing internal resource or hiring
an outside resource, a company will need to employ a software
engineer (or engineers) to develop a custom software solution
for its RFID system.
174
about the 6 factors that affect read range.
Because even small changes in an environment can have
large effects on an RFID system, there is no guarantee that
a particular zone (once tuned) can simply be replicated
throughout a facility. Ideally, the settings for a well-tuned
read zone setup can act as a starting point from which each
additional read zone can be tested and tuned.
In short, no – there is no ideal recommended way to setup
RFID hardware. Each case is different and requires thorough
testing. Below are a few helpful tips when setting up an RFID
system for the irst time.
• Keep the RFID reader and antenna(s) as close as possible
in order to reduce the length of antenna cabled needed
and, thus, cut down on cable loss.
• When mounting RFID antennas, test different locations
and antenna angles in order to get the best results. Also,
testing different types of antennas may be beneicial.
During tag selection, do not simply settle for a tag that
works. Test different types in order to ind the ideal RFID
tag (or tags) for your application.
• Test different settings on the reader (e.g. transmit power,
search modes/sessions, etc.) in order to ensure best
results.
175
to scan items within an inventory closet. Moreover, installing
read zones at various stages of a manufacturing process
allows a user to know exactly where any given (tagged) item is
on the facility loor. Some companies may only be interested
in knowing if an item is in the facility. In these cases, read
zones would only be necessary at the facility’s entrances/exits.
Ultimately, the amount of read zones required and where those
zones should be located depends on the type of application
as well as the amount of data needed to achieve the desired
results.
176
If it makes more sense (from a business perspective – data
access, user access, etc.) for the systems to be combined, then
they should be combined. If the business case dictates that the
systems should be separate or standalone, then they should be
separate. The answer to whether a new RFID system should
be combined with an existing one or a separate standalone
system should be created, should be determined during the
business problem deinition and scoping phase of the project.
177
• Develop a new process
• Proof of Concept
» Prototype Testing
• Debug
• System Adaptation
• Pilot Implementation
• Full Implementation
» System deployment
» Training
• Continuous Improvement
» Monitoring
» Collect feedback from users
178
on the cost of the system as well as the rate of return on
investment; however, properly implemented RFID systems
tend to fully pay back within 1 to 3 years.
179
Deploying RFID Worksheet
1. What are the two main reasons that RFID would not be
suitable for an application?
a. Application Feasibility
b. Read Range Feasibility
c. Integration Feasibility
d. Cost/ROI Feasibility
e. A&D
f. A&B
g. A&C
180
6. Where are the best places for RFID Read Zones within
an application?
a. At every entrance and exit
b. At every point it is necessary to gather data
c. At every 20 to 30 feet, dependent on read range
d. It depends on the square footage of your warehouse
181
We’re atlasRFIDstore
atlasRFIDstore was founded in 2008. We started out as one
person with a vision, and today our team numbers just over
35 talented individuals. We began life as part of a startup
in Birmingham, Alabama’s burgeoning tech scene, and
we’re proud to remain and participate in the revitalization of
Downtown Birmingham.