COMPANY CONFIDENTIAL Optimizing Reader Performance Jim Peternel.

Slides:



Advertisements
Similar presentations
17 May Multiple Sites. 17 May Multiple Sites This presentation assumes you are already familiar with Doors and all its standard commands It.
Advertisements

RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
Using the Self Service BMC Helpdesk
ADABAS to RDBMS UsingNatQuery. The following session will provide a high-level overview of NatQuerys ability to automatically extract ADABAS data from.
NFC Forum Measurements
Cascading Style Sheets
How to use a scanner Throughout this slide show there will be hyperlinks (highlighted in blue) follow the hyperlinks to navigate to the specified Topic.
Speed to Market RFID at Liz Claiborne Solving an Internal Distribution Issue Brian O’Donnell 7/22/04.
Please see this weeks session overleaf; themed this week around Marking & Intercepting. You may (if you haven’t already) want to consider: 1.The game (in.
1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.
Tutorial 6 Working with Web Forms
Introducing Longhorn. What is it? Longhorn is Microsoft’s “most important software release since Windows 95” – due for release 2006 What this talk covers.
Tutorial 6 Working with Web Forms. XP Objectives Explore how Web forms interact with Web servers Create form elements Create field sets and legends Create.
The StarNet Analyzer. Contact SNA Department x172
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Palletizing the Easy Way
Lecture Notes #7 Radio Frequency Identification (RFID)
RFID Reader Management Requirements Margaret Wasserman ThingMagic
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Developer Conference 2007 Partnering to Develop Powerful Solutions RFID Demo Software James Peternel Software Engineer Lead.
IP Momentum Confidential Polycom IP Phone Provisioning Guide—Sylantro- hosted Service Release /06/05.
Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.
NORTEL NETWORKS CONFIDENTIAL CallPilot 150 Modem Access Jan 03, 2005 Version 1.5.
R F I D - Introductory Presentation - - Introductory Presentation -
RFID You Know You Need It Jim Peternel October 29, 2008
GAMMA MATCHES Ozaukee Radio club November 2013 A quick overview of the steps needed to adjust an antenna matching network usually seen on many older single.
Reading Data in Web Pages tMyn1 Reading Data in Web Pages A very common application of PHP is to have an HTML form gather information from a website's.
Forms and Form Controls Chapter What is a Form?
Copyright 2007, Information Builders. Slide 1 Maintain & JavaScript: Two Great Tools that Work Great Together Mark Derwin and Mark Rawls Information Builders.
Technician License Course Chapter 9 Lesson Module 21 Radio Frequency Exposure.
Mark Recoskie November 14, Agenda  Quick review of value proposition  Review of Warp r1v2 hardware and software  What’s new in Warp 3.0 hardware?
MINIATURE RFID READER 1.55 Square Inch UHF Generation 2 ISO C Combination RFID Reader/Writer Communicates with Active and Passive Tags
KW Agent Website Training Getting Good with Google.
RFid Technology TELE 480 Presentation. What is RFid? RFid is an ADC technology that uses radio- frequency waves to transfer data between a reader and.
VLAN Trunking Protocol
Rafe Donahue Brian Alano Tom Atkinson Brickworld 2014 June 12 Chicago
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
Operating Systems Lecture No. 2. Basic Elements  At a top level, a computer consists of a processor, memory and I/ O Components.  These components are.
76 © 1998, 1999, 2000 David T. Gray, Howard Duncan, Jane Kernan Frames When displaying information in a browser, it is sometimes useful to divide the display.
Tutorial 6 Working with Web Forms. XP Objectives Explore how Web forms interact with Web servers Create form elements Create field sets and legends Create.
Tutorial 6 Working with Web Forms. 2New Perspectives on HTML, XHTML, and XML, Comprehensive, 3rd Edition Objectives Explore how Web forms interact with.
Zero - G CONNECTING THE INTERNET OF THINGS. Introduction to Zero -G.
1 HTML Forms
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
C LICKERS IN THE C LASSROOM Basic Software Training  Angie Hammons  Educational Technology Specialist   102B University.
1 System Clock and Clock Synchronization.. System Clock Background Although modern computers are quite fast and getting faster all the time, they still.
Editing Attributes in ArcGIS Attributes – the data in records. e.g A parcel of land might be zone 3A residential. The field = TAG The attribute = 3A In.
Tutorial for Circulation Staff FIU Library
Tutorial 6 Working with Web Forms. 2New Perspectives on HTML, XHTML, and XML, Comprehensive, 3rd Edition Objectives Explore how Web forms interact with.
Radio Frequency Identification (RFID)
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
Review of HTML and CSS A (very) brief review of some key fundamentals to be aware of in IT-238.
ALSMS Upgrade Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
Installing the ALSMS Software on a Windows Platform Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
Access Portal LITE. Access Portal Lite “Access in a BOX” IPS with no screenIPS with screen.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Resolve common problems with wired and wireless networks. Objective – 2%
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
Redundant Bricks Configuration Example Lucent Security Products Configuration Example Series.
Esri UC 2014 | Technical Workshop | Enhancing Web Map Performance in ArcGIS Online Julia Guard & Melanie Summers.
Ashima Wadhwa Java Script And Forms. Introduction Forms: –One of the most common Web page elements used with JavaScript –Typical forms you may encounter.
Local Alarm Station Data Acquisition, Storage and Visualization for Radiation Portal Monitor (RPM).
Welcome! To the ETS – Create Client Account & Maintenance
Radio Frequency Identification (RFID)
Sametime Online Learning Space Tutorial
RFID Technology & It’s Uses
Introduction to Networking
XC-RF850-FCW Wiegand Demo
Check List Tool Kit A description of your check box can be placed here
Presentation transcript:

COMPANY CONFIDENTIAL Optimizing Reader Performance Jim Peternel

Slide 2 COMPANY CONFIDENTIAL Introduction How do you configure the reader for optimal performance? Depends on use cases Configure reader attributes for optimal performance We are focusing on fixed readers

Slide 3 COMPANY CONFIDENTIAL RFID Software Stack Network Readers IF4, IV7, IP30 BRI Server Radio Reader Side PC/Server Side Your Application Antennas Tag List BRI Parser 1.EPCID 2.Count, ANT, TIME 3.FIELD Data DSP RF Module

Slide 4 COMPANY CONFIDENTIAL RFID Software Stack Network Readers IF61 BRI Server RF Module Reader Side PC/Server Side Your Application Antennas Tag List BRI Parser 1.EPCID 2.Count, ANT, TIME 3.FIELD Data DSP Linux Power PC

Slide 5 COMPANY CONFIDENTIAL Reader’s Internal Tag List  When a tag is read, the reader adds it to its tag list.  Depending on the read command the reader may also return the EPC ID to you.  Whenever you issue a new read command to the reader it clears its internal tag list.  The READ POLL command which is used with REPORT=NO mode also clears the internal tag list.

Slide 6 COMPANY CONFIDENTIAL Reader’s Internal Tag List 1.Clear Tag List. 2.Start reading tags. 3.Decode Tag. 4.Check Tag List to see if its new tag. 5.Add Tag to internal list or update tag data in list. 6.Keep reading tags. READ

Slide 7 COMPANY CONFIDENTIAL Important Attributes IDTIMEOUT/IDTRIES ANTTIMEOUT/ANTTRIES SCHEDOPT SESSION INITIALQ INITTRIES TIMEOUTMODE

Slide 8 COMPANY CONFIDENTIAL Case One: Tag Speed Reading Test You want to test a single tag passing a single antenna. The goal of the test is to see how many times the tag can be read. This is a performance test and not a real use case. 5 K/H

Slide 9 COMPANY CONFIDENTIAL Case One: Tag Speed Reading Test When setting up an RFID station its good to determine how many times a tag can be read which helps you determine how reliable the station will work. For example, if you can consistently read a single tag 5 or more times then you can feel very certain that your read station will be very reliable.

Slide 10 COMPANY CONFIDENTIAL Case One: Tag Speed Reading Test ATTRIB SESSION=0 This is the only use case for setting it to zero. ATTRIB ANTS=1 ATTRIB SCHEDOPT=0 ATTRIB IDTRIES=1 ATTRIB ANTTRIES=1 ATTRIB INITIALQ=0 READ COUNT REPORT=NO Set the polling interval to a value greater than the amount of time the tag will be in the RF zone.

Slide 11 COMPANY CONFIDENTIAL Case Two: Portal You want to pass a pallet of tags through a portal using four antennas.

Slide 12 COMPANY CONFIDENTIAL Case Two: Portal The key to reading all of the tags is to make sure the reader does not reset any tags while they pass through the portal. You also want to make sure the reader cycles through all antennas. To do this, you need to determine how long the pallet will be in the read zone. Then set the IDTIMEOUT to a value greater than that. For example, let us assume that the pallet will be in the read zone for three seconds.

Slide 13 COMPANY CONFIDENTIAL Case Two: Portal I would set IDTIMEOUT=4000 (4 seconds). I want to force the reader to cycle antennas as fast as possible so I would set ANTTIMEOUT=0 which forces the reader to use ANTTRIES. I would then set ANTTRIES=1.

Slide 14 COMPANY CONFIDENTIAL Case Two: Portal ATTRIB SESSION=1 ATTRIB ANTS=1 ATTRIB SCHEDOPT=1 ATTRIB IDTIMEOUT=4000 ATTRIB ANTTIMEOUT=0 (forces reader to use ANTTRIES) ATTRIB ANTTRIES=1 ATTRIB INITIALQ=4 or 5 (play with this setting but do not make it too high) For the IF61 reader use: READ REPORT=EVENT Each EPC will be returned one time only. Count is always one so it is excluded.

Slide 15 COMPANY CONFIDENTIAL Case Two: Portal For the IF61 reader use: READ REPORT=EVENT Each EPC will be returned one time only. Count is always one so it is excluded.

Slide 16 COMPANY CONFIDENTIAL Case Two: Portal For all other readers (IV7, IF4, ETC): READ COUNT REPORT=NO Set the polling interval to a value greater than the amount of time the tag will be in the RF zone. This will prevent tags from being reset while in the read zone. For this example set it to 5 seconds. You can also use this mode with the IF61 if you want to see how many times you read each tag. Please note that with the IDTIMEOUT=4000, the tags will not be reset after they are read so most tags will only be read once. You can try setting IDTIMEOUT to a lower value however this could reduce read performance.

Slide 17 COMPANY CONFIDENTIAL Case Three: Conveyor One Tag Per Box You want to pass a box with ONE tag attached through a read zone on a conveyor.

Slide 18 COMPANY CONFIDENTIAL Case Three: Conveyor One Tag Per Box For this example we will assume there are three antennas. The key to reading the tag is to make sure you are cycling through all the antennas as quickly as possible. This is because you will not know which antenna the tag will be visible to.

Slide 19 COMPANY CONFIDENTIAL Case Three: Conveyor One Tag Per Box To do this you need spend as little time as possible on each antenna. To force the reader to cycle antennas as fast as possible: Set ANTTIMEOUT=0 which forces the reader to use ANTTRIES. Set ANTTRIES=1. You may also want to disable IDTIMEOUTS and use IDTRIES.

Slide 20 COMPANY CONFIDENTIAL Case Three: Conveyor One Tag Per Box ATTRIB SESSION=1 ATTRIB ANTS=1 ATTRIB SCHEDOPT=0 ATTRIB IDTIMEOUT=0 Forces reader to use IDTRIES ATTRIB ANTTIMEOUT=0 Forces reader to use ANTTRIES ATTRIB IDTRIES=1 ATTRIB ANTTRIES=1 ATTRIB INITIALQ=0 or 1

Slide 21 COMPANY CONFIDENTIAL Case Three: Conveyor One Tag Per Box For the IF61 reader use: READ ANT REPORT=EVENT Each EPC will be returned one time only. Count is always one so it is excluded.

Slide 22 COMPANY CONFIDENTIAL Case Three: Conveyor One Tag Per Box For all other readers (IV7, IF4) READ ANT COUNT REPORT=NO Use this method with other readers. Can be used with any reader (IF61 included) to see how many times the tag was read while passing through the read zone.

Slide 23 COMPANY CONFIDENTIAL Case Four: Conveyor Multiple Tags Per Box You want to pass a box with multiple tags attached through a read zone on a conveyor.

Slide 24 COMPANY CONFIDENTIAL Case Four: Conveyor Multiple Tags Per Box For this example we will assume there are three antennas. This is a tricky use case. You need to read all the tags however you need to cycle through the antennas as quickly as possible.

Slide 25 COMPANY CONFIDENTIAL Case Four: Conveyor Multiple Tags Per Box ATTRIB SESSION=1 ATTRIB ANTS=1 ATTRIB SCHEDOPT=1 ATTRIB IDTIMEOUT=2000 ATTRIB ANTTIMEOUT=0 Forces reader to use ANTTRIES ATTRIB ANTTRIES=1 ATTRIB INITIALQ=2 to 4 Depends on how many tags there are, you will need to play with this setting.

Slide 26 COMPANY CONFIDENTIAL Case Four: Conveyor Multiple Tags Per Box For the IF61 reader use: READ ANT REPORT=EVENT Each EPC will be returned one time only. Count is always one so it is excluded.

Slide 27 COMPANY CONFIDENTIAL Case Four: Conveyor Multiple Tags Per Box For all other readers READ ANT COUNT REPORT=NO Use this method with other readers. Can be used with any reader (IF61 included) to see how many times the tag was read while passing through the read zone.

Slide 28 COMPANY CONFIDENTIAL Comments or Questions

Slide 29 COMPANY CONFIDENTIAL Thank you.