Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. RFID System Lifecycle University of Houston RFID Programming Spring 2007
  2. 2. RFID Deployment Framework <ul><li>The decision to deploy RFID technology in an enterprise is a business decision, not a technology decision. </li></ul><ul><li>Should be driven by business drivers such as competitive advantage, creating new services to deliver more value to customers, streamlining operations, or complying with rules and regulations </li></ul><ul><li>Right reasons: Alignment of strategy, and execution . </li></ul>
  3. 3. RFID Deployment Framework <ul><li>Conceptual framework: </li></ul><ul><ul><li>Identify problems and surrounding issues </li></ul></ul><ul><ul><li>Define possible solutions and their attractiveness (ROI etc) </li></ul></ul><ul><ul><li>Create a plan for successful deployment and support </li></ul></ul>Identify Business Problem Define & Pilot solution Build & Deploy solution Sustain & Improve Organizational mobilization Knowledge Base
  4. 4. RFID Deployment Framework <ul><li>Identify Business Problem </li></ul><ul><ul><li>Strategic imperative & Competitive assessment </li></ul></ul><ul><ul><li>Vendor assessment and Selection </li></ul></ul><ul><ul><li>High-level cost-benefit analysis & Stakeholder analysis </li></ul></ul><ul><ul><li>Existing process discovery </li></ul></ul><ul><ul><li>Scenarios </li></ul></ul><ul><li>Define and Pilot Solution </li></ul><ul><ul><li>Technical architecture (robust and scalable) </li></ul></ul><ul><ul><li>Business and organizational architecture (process flows, stakeholder alignment) </li></ul></ul><ul><ul><li>Risk identification and mitigation plan </li></ul></ul><ul><ul><li>Detailed cost-benefit analysis & stakeholder buy-in </li></ul></ul><ul><ul><li>Pilot selection and execution </li></ul></ul><ul><ul><li>Detailed business plan </li></ul></ul><ul><ul><li>Success metrics </li></ul></ul>
  5. 5. RFID Deployment Framework <ul><li>Build and Deploy Solution </li></ul><ul><ul><li>Sourcing & procurement </li></ul></ul><ul><ul><li>Solution build (tracking, lessons from pilot, resources, authority, milestones, SMEs) and testing (unit, module, and system levels) </li></ul></ul><ul><ul><li>Stakeholder communication and training </li></ul></ul><ul><ul><li>Business and technology infrastructure testing </li></ul></ul><ul><ul><li>Marketing </li></ul></ul><ul><li>Sustain and Improve </li></ul><ul><ul><li>Problem resolution </li></ul></ul><ul><ul><li>Process improvement </li></ul></ul><ul><ul><li>Product improvement </li></ul></ul><ul><ul><li>Results tracking </li></ul></ul>
  6. 6. RFID Deployment Framework <ul><li>Knowledge Base </li></ul><ul><ul><li>Locating and leveraging sources of tacit and explicit knowledge </li></ul></ul><ul><ul><li>Creating knowledge map </li></ul></ul><ul><ul><li>Locating knowledge gaps </li></ul></ul><ul><ul><li>Involving top management and sponsors </li></ul></ul><ul><li>Organizational mobilization </li></ul><ul><ul><li>Soft skills - motivating and aligning people to get results </li></ul></ul><ul><ul><li>Often the most difficult and most important to achieve </li></ul></ul><ul><ul><ul><li>Communicate shared vision </li></ul></ul></ul><ul><ul><ul><li>Engage support and resistance </li></ul></ul></ul><ul><ul><ul><li>Institutionalize results and lessons </li></ul></ul></ul>
  7. 7. RFID Sourcing Decision <ul><li>Develop In-house vs. outsource </li></ul><ul><ul><li>Focus on core competency </li></ul></ul><ul><ul><li>Availability of resources </li></ul></ul><ul><ul><li>Tax benefits </li></ul></ul><ul><ul><li>Quality of hardware, software, and expertise </li></ul></ul><ul><ul><li>Timeline </li></ul></ul><ul><ul><li>Proprietary concerns </li></ul></ul><ul><ul><li>ROI/ clear benefits to outsourcing </li></ul></ul>
  8. 8. RFID Deployment Execution <ul><li>Key Steps </li></ul><ul><ul><li>Site Survey </li></ul></ul><ul><ul><li>Installation Procedure </li></ul></ul><ul><ul><li>Safety </li></ul></ul><ul><ul><ul><li>People </li></ul></ul></ul><ul><ul><ul><li>Equipment </li></ul></ul></ul>
  9. 9. Site Survey <ul><li>Purpose: identify all sources of interference </li></ul><ul><ul><li>Since the signal coming from the tag is very small, it can be swamped by the signal from other RF Sources. Goal is to see all invisible electronic, magnetic, and radio waves that flow through a location and then design an RFID network to live within the environment </li></ul></ul><ul><li>Full Faraday Cycle Analysis </li></ul><ul><ul><li>Analysis of ambient electromagnetic noise (AEN) </li></ul></ul><ul><ul><li>RF past loss contour mapping (PLCM) </li></ul></ul><ul><li>Product or SKU testing </li></ul><ul><ul><li>Check for RF signature. Test reflection, absorption etc. </li></ul></ul><ul><ul><li>Output: Facility diagram </li></ul></ul><ul><ul><li>Places for interrogators </li></ul></ul><ul><ul><li>Sources of interference </li></ul></ul>
  10. 10. Site Survey <ul><li>To identify all sources of interference, you may need to collect RF interference data for a 24-h period </li></ul><ul><li>A Spectrum analyzer can be used to capture the sources of interference </li></ul> ~s.d.k/subpage2.htm
  11. 11. Site Survey <ul><li>Spectrum analyzer measures power (voltage) versus frequency </li></ul><ul><li>An antenna needs to be attached and tuned to the needed frequency to measure field strength </li></ul><ul><li>The analyzer will “sweep” across frequencies </li></ul><ul><li>The antenna has to be placed in the middle of the interrogation zone </li></ul><ul><li>The monitoring procedure should be performed for 24 hours </li></ul><ul><li>Spikes mean RF interference </li></ul>
  12. 12.
  13. 13. Installation <ul><li>RFID equipment must be tested before installation begins </li></ul><ul><li>Obtain copies of the latest firmware and any application software </li></ul><ul><li>Compare the location with the previously obtained diagram and see whether new sources of interference were added </li></ul>
  14. 14. Installation <ul><li>Make sure the radiation patterns of antennas cover the needed interrogation zones </li></ul><ul><li>Proper cables must be used to connect the interrogator to each antenna </li></ul><ul><li>A cable of wrong length and configuration can: </li></ul><ul><ul><li>Prevent operations </li></ul></ul><ul><ul><li>Damage equipment </li></ul></ul><ul><ul><li>Illegal </li></ul></ul>
  15. 15. Installation <ul><li>Record cable locations on the site diagram </li></ul><ul><li>After all the hardware and software is installed, test the system. </li></ul>
  16. 16. Safety <ul><li>In any industrial environment there are many sources of Electro-Static Discharge (ESD) </li></ul><ul><li>ESD can occur when two surfaces rub or separate repeatedly </li></ul><ul><ul><li>Example: conveyor belt </li></ul></ul>
  17. 17. Safety <ul><li>ESD can damage the tag (IC) </li></ul><ul><li>ESD is a common cause of tags not working properly </li></ul><ul><li>ESD can also damage interrogator, but this is less likely </li></ul><ul><li>However, is an interrogator is not properly grounded, ESD can also damage the IC of the interrogator </li></ul>
  18. 18. Safety <ul><li>In order for any electrical system to work properly, it must be grounded </li></ul><ul><li>Most modern facilities have an earth ground with the AC power line </li></ul><ul><li>The earth ground is required for electrical safety to give a safe path to ground for any AC power short that might occur as well as for ESD </li></ul><ul><li>Lack of proper grounding and equipment is dangerous of people and equipment </li></ul>
  19. 19. Human Safety <ul><li>RF Signals contain energy – the same type of energy used in microwave ovens – so there is the potential of injury if power level is high enough </li></ul><ul><li>Regulations establish the maximum power that can be safely used </li></ul>February 5 th , 2007 Research News Military Shows Off Experimental Heat Ray The military demonstrates a &quot;heat ray&quot; developed as a way to disperse threatening crowds. Officials say the electro-magnetic device does no permanent damage, but makes people feel as if their skin is burning. the ray gun penetrates 1/64th of an inch into the skin. (
  20. 20. Human Safety <ul><li>Do not exceed the recommended power level; do not try to “customize” a system </li></ul><ul><li>Do not use an antenna that has not been recommended by a manufacturer </li></ul><ul><ul><li>A highly directional antenna can concentrate RF energy so that it exceeds safe limits </li></ul></ul><ul><li>Do not intentionally permit long exposure to the RF energy </li></ul>
  21. 21. Human Safety <ul><li>Local regulations may require signs that inform people that RF equipment is in use </li></ul><ul><li>Make sure that RF equipment does not interfere with other mission critical systems </li></ul><ul><li>Some medical implants can be damaged by RF equipment </li></ul>X-Ray Backscatter Technology The TSA is testing a new technology based on EM Backscatter which provides a high-resolution image at the Phoenix airport. Critics claim that the technology is too invasive. The procedure is 100% voluntary at present.
  22. 22. Equipment Safety <ul><li>Mount RFID equipment in such a way that it won’t get damaged by people and other processes </li></ul>
  23. 23. Conclusion <ul><ul><li>Deploying RFID is a business decision </li></ul></ul><ul><ul><li>RFID Deployment Framework </li></ul></ul><ul><ul><li>RFID Deployment Execution </li></ul></ul>
  24. 24. <ul><li>References </li></ul><ul><ul><li>RFID Field Guide: Deploying Radio Frequency Identification Systems, Bhuptani, M. and Moradpour, S., Sun Microsystems Press, Prentice Hall, 2005. </li></ul></ul><ul><ul><li>RFID for Dummies, Sweeney, P. J. Wiley Publishing, 2005. </li></ul></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul>