Ways of Benchmarking the UHF RFID Systems

Slides:



Advertisements
Similar presentations
Automating Software Module Testing for FAA Certification Usha Santhanam The Boeing Company.
Advertisements

The Best Solution for Student Tracking Welcome To The Laconic Student Guard (LSG)
Integrated Project – EC FP AspireRfid Solution Deployment Best Practices (beyond RFID Software and Middleware) ASPIRE Consortium Advanced Sensors.
Miss Penalty Reduction Techniques (Sec. 5.4) Multilevel Caches: A second level cache (L2) is added between the original Level-1 cache and main memory.
1. In industrialized nations, up to 30 percent suffer from food contamination In the US, 76 million people suffer and 5,000 die annually from food contamination.
Elements of a Microprocessor system Central processing unit. This performs the arithmetic and logical operations, such as add/subtract, multiply/divide,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Capacity Planning and Queuing Models.
08/16/01. Link Budgets for Cellular Networks Presented by Eric Johnson.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
08/16/01.
RFID Shelving Final Project: 19 Mar 2007 Guy Shtub Idit Gershoni.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
RFID passports How does is work? Step by step By: Einav Mimram.
Smart Kitchen Mid-Semester Demo March 2nd, 2006 Suppakrit Forbes Chatchayanusorn Charles Christopher Onyeama Nachiket Shelgikar Saravana Sivasankaran
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Federal Communications Commission Workshop on Radio Frequency Identification (RFID) October 7, 2004 SAMS ys Technologies.
The printed circuit board (PCB) design
1 Chapter Overview Creating Sites and Subnets Configuring Intersite Replication Troubleshooting Active Directory Replication.
Developing RFID Application In Supply Chain
Enhancing ERP System with RFID: Logistic Process Integration and Exception Handling Dickson K. W. CHIU Senior Member, IEEE Eleanna Kafeza Athens University.
Hospital Asset Tracking
Use Case Description Hospital Asset Tracking. Introduce the scenario – This scenario prototypes tracking valuable assets leaving the hospital building.
RFID (RADIO FREQUENCY IDENTIFICATION) Presented by Sreenesh Shenoy GM RFID & Software Stallion Systems and Solutions P Ltd.
Suriya, A. September 19, 2015, Slide 0 Atipong Suriya School of MIME March 16, 2011 FE 640 : Term Project Presentation RFID Network Planning using Particle.
EPCglobal Training Suite
LESSON Geometric Probability Distribution. VOCABULARY Geometric Setting – random variable meets geometric conditions Trial – each repetition of.

1 Selecting LAN server (Week 3, Monday 9/8/2003) © Abdou Illia, Fall 2003.
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
Yafeng Yin 1, Lei Xie 1, Jie Wu 2, Athanasios V. Vasilakos 3, Sanglu Lu 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
Notes from: ______________ ______________ Bell Work: Complete handout Check in homework A#5.33 pg #7, 10, 16, 18, 20, 22 Notes – Section 5.4 –
1. In industrialized nations, up to 30 percent suffer from food contamination In the US, 76 million people suffer and 5,000 die annually from food contamination.
USER IDENTIFICATION SYSTEM.
Doc.: IEEE /441r0 Submission April 2004 Roger Skidmore, WVCSlide 1 Overview of Prediction of Wireless Communication Network Performance Roger.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
Introduction to RFID Technology By: Vahid Bagher Poor 1.
In and Out Time Systems Sean McReynolds Daniel Eaton Daniel Lofgren Seth Looysen.
RFID, Surveillance and Privacy Radio-Frequency Identification (RFID), Surveillance and Privacy Ross Stapleton-Gray, Ph.D., CISSP Stapleton-Gray & Associates,
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
Lesson 6 – 2a Geometric Probability Distribution.
CS223: Software Engineering Lecture 19: Unit Testing.
Korea University Ubiquitous LAB. Chapter 8. Design selection Ph.D Chang-Duk Jung.
LIBRARY AUTOMATION USING RFID LIBRARY AUTOMATION USING RFID Presented by; Joju Mohan -67 Ninitha Xavier -68 Priyanka C.P -69 Rahul K.Raj -70.
RFID TAG READER TAG READER Abdullah Al-Faifi ) ) ) ) )
Submitted To:- Submitted By:- S.M. Arifuzzaman Sk. Rashed Mahmud ID:
DBM 384 Week 5 Learning Team Specialized Database Executive Summary Check this A+ tutorial guideline at 384/DBM-384-Week-5-Learning-Team-
By: Tarun Sharma Chinta Rahul SCSE VIT University
Smart Attendance System
Testing Tutorial 7.
PARKING AUTOMATION SYSTEM
Software Verification and Validation
Textbook Detection System With Radio-Frequency Identification
Radio Frequency Identification (RFID)
Cache Memory Presentation I
Chapter 10 – Integrating RFID Readers in Enterprise IT
Integration of cache System into MIPS Pipeline
Database Management Systems (CS 564)
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
XC-RF850-FCW Wiegand Demo
Chapter 1 Introduction.
Concurrency: Mutual Exclusion and Process Synchronization
ETSI update on Radio Frequency Identification
RFID (RADIO FREQUENCY IDENTIFICATION)
Week 10 Systems Development
Presentation transcript:

Ways of Benchmarking the UHF RFID Systems Damon Tsang 第一屆中國無線射頻識別基準測試發展論壇 暨 備忘協議簽訂儀式 March 1, 2008

A Typical UHF RFID System Main components contain: Reader Antennas Tags Computer software for controlling the reader to read from and write to tags IC Tag Antenna Tag External Interface Antenna Computer Software Reader 2018/12/27 CSL--A Chung Nam Company

Common Problems found in UHF RFID Systems Missing Tags - Out of read coverage - Insufficient output power Cross Reads - Reflection - Over power 2018/12/27 CSL--A Chung Nam Company

Scenario 1 – Read/Write Tags in An Assembly Line Antenna Read coverage 50 trials – Fail to read all tags Rec EPC ID RSSI 1 00000000000EA00000000001 -47 17 00000000000EA00000000017 -48 18 Missing 19 20 Tags 3 tags gone missing Outcomes: Shorter the antenna, narrower the reading range Only 17 tags are read due to out of range Conditions: Be able to read all 20 tags at the height of 0.75m Read with 1 antenna Output power at 28dBm Cont… 2018/12/27 CSL--A Chung Nam Company

Scenario 2 – Read/Write Tags in An Assembly Line 50 trials – Fail to read all tags Antenna Read coverage Wider read range Rec EPC ID RSSI 1 00000000000EA00000000001 -47 16 00000000000EA00000000016 -45 17 00000000000EA00000000017 -48 18 00000000000EA00000000018 -38  19 Missing 20 -58  Tags Conditions: Increase the height to 1m to cover wide read range Be able to read all 20 tags Read with 1 antenna Output power at 28dBm Outcomes: Higher the antenna, wider the reading coverage Be able to read more tags Only 19 tags are read due to the insufficient power Cont… 2018/12/27 CSL--A Chung Nam Company

Scenario 3 – Read/Write Tags in An Assembly Line 50 trials – Cross read occurs Output Power 28dBm -> 30dBm Rec EPC ID RSSI 1 00000000000EA00000000001 -55    19 00000000000EA00000000019 -47    20 00000000000EA00000000088 -50    21 -65    22 00000000000EA00000000098 -68    Conditions: Increase the height to 1m to cover wider read range Increase the output power to 30dBm Be able to read all 20 tags Read with 1 antenna Avoid cross reading of tags Outcomes: Higher the antenna, wider the reading coverage More output power to radiate the tags Be able to read all tags 2 more unwanted tags are read due to an increase of output power (cross read occurs) Cont… 2018/12/27 CSL--A Chung Nam Company

Scenario 4 – Read/Write Tags in An Assembly Line Set RSSI to -60 dBm 19 00000000000EA00000000019 -47    20 00000000000EA00000000088 -50    21 -65    22 00000000000EA00000000098 -68    50 trials – Perfect result! EPC ID RSSI 1 00000000000EA00000000001 -53   19 00000000000EA00000000019 -48   20 00000000000EA00000000020 -50    Solutions: Power increases from 28dBm to 30dBm Change the value of the RSSI Filter the unwanted tags < -60dBm 2018/12/27 CSL--A Chung Nam Company

Scenario 5 – Double Gate Door Benchmarking Forklift trucks are in queue waiting Database Checklist Rec EPC ID RSSI 1 00000000000EA00000000001 -38 2 00000000000EA00000000002 -47 Association 38 00000000000EA00000000038 -45 39 00000000000EA00000000039 -47 40 00000000000EA00000000040 -52 Out Conditions: Be able to read all 40 tags 4 antennas with output power at 32.5dBm each Outcomes: 40 tags are successful read against the backend database Cont… 2018/12/27 CSL--A Chung Nam Company

Scenario 6 – Double Gate Door Benchmarking Database Checklist Forklift trucks are in queue waiting Rec EPC ID RSSI 1 00000000000EA00000000001 -38 2 00000000000EA00000000002 -47 38 Missing 39 00000000000EA00000000039 -48  40 00000000000EA00000000040 -52 Association Go back & proceed again due to missing tags Outcomes: 1 tag is missing after checking against the backend database Conditions: Be able to read all 40 tags 4 antennas with output power at 32.5dBm each Solutions: Go back and pass the gate door again until all tags are read Cont… 2018/12/27 CSL--A Chung Nam Company

Scenario 7 – Double Gate Door Benchmarking Forklift trucks are in queue waiting Database Checklist Association 38 00000000000EA00000000038 -68 39 00000000000EA00000000039 Missing 40 00000000000EA00000000040 -52   Database Checklist Association Rec EPC ID RSSI 1 00000000000EA00000000001 -38 39 00000000000EA00000000039 -38 40 00000000000EA00000000040 -52 Conditions: Be able to read all 40 tags when passing thru 2 doors 8 antennas with output power at 32.5dBm each Outcomes: 1 tag is missing at the Door 1 100% read is at the Door 2 Improve the chance of success of the reading rate Shorten the queuing time Cont… 2018/12/27 CSL--A Chung Nam Company

Scenario 8 – Double Gate Door Benchmarking Forklift trucks are in a queue waiting Database Checklist 38 00000000000EA00000000038 Missing 39 00000000000EA00000000039 -35    40 00000000000EA00000000040 -52    Cross referencing Database Checklist 38 00000000000EA00000000038 -48    39 00000000000EA00000000039 -38    40 00000000000EA00000000040 Missing Outcomes: No identical missing tags read in 2 doors assuming that 100% read rate is achieved – no missing tags occur Improve the chance of success of the reading rate Shorten the queuing time Conditions: Be able to read all 40 tags when passing thru 2 doors 8 antennas with output power at 32.5dBm each Cont… 2018/12/27 CSL--A Chung Nam Company

CSL--A Chung Nam Company Summary Benchmarking a RFID system in an assembly line is based on the read coverage, output power, and RSSI to minimize missing tags and cross reads Benchmarking a RFID system using the double gate door system avoids missing tags, increases productivity, and reduces queuing time 2018/12/27 CSL--A Chung Nam Company

CSL--A Chung Nam Company Thank You!! Contact: damontsang@convergence.com.hk 2018/12/27 CSL--A Chung Nam Company