SlideShare a Scribd company logo
IN140703 Service support
technologies 20.9.2016
Pirita Ihamäki Phd. Mc.S.
pirita.ihamaki@samk.fi
Satakunta University of Applied Sciences, Unit Rauma
Content
• Basics of RFID
• RFID
• Functional Classification of RFID Tranponders
• RFID Generations
• Applications and Frequency Selection
• Commonly Used Frequency Band for RFID Systems
• How does an RFID system work?
• RFID business
• Active versus passive tags
• Active tags
• Passive tags
• Workshop
Satakunta University of Applied Sciences, Unit Rauma
Basics of RFID
• RFID = Radiofrequency identification
• RFID systems use radio waves
• RFID systems have two main elements, which
are the device used to carry this information
and the equipment used to automatically
capture or retrieve the information.
• The devices that store and carry the
information are called trasponders or tags.
Satakunta University of Applied Sciences, Unit Rauma
RFID
Satakunta University of Applied Sciences, Unit Rauma
Basics of RFID
• Industry commonly referred to RFID as tags
mainly due to their physical shape and the fact
that they are mostly used to tag pallets or cases
of goods, the name transponder reflects better
the function of these devices.
• The device that is used to capture and transfer
information is commonly called a reader, because
in earlier RFID systems they were only able to
read the information sen by the transponders.
Satakunta University of Applied Sciences, Unit Rauma
Functional Classification of
RFID Tranponders
• A functional classification of RFID
transponders is based on their electronic
product code (EPC) class.
• EPC is the application of specific type of RFID
technology within the consumer package
goods industry. Within this classification, RFID
transponders are divided into different classes
and generations.
Satakunta University of Applied Sciences, Unit Rauma
RFID Generations
• Generation 1., Class 0: Passive tags with read-
only functionality. These are also called write
one, read many (WORM) transponders. These
transponders are programmed at the factory
with their unique identification number. The
user is not able to change it or include
additional information.
Satakunta University of Applied Sciences, Unit Rauma
RFID Generations
• Generation 1., Class 0+: These are also WORM
transponders. They differ from Generation 1,
Class 0 transponders in that it is the user who
programs them. After they have been
programmed by the user, no further
programming or changing of data is allowed.
Satakunta University of Applied Sciences, Unit Rauma
RFID Generations
• Generation 1., Class1: These transponders were similar
to Generation 1 Class 0 or =+ transponders, but could
be read by interrogators from other companies.
Generation 1, Class 1 transponders have evolved into
the different transponders from Generation 2.
• Generation 1 transponders employ proprietary data
structures and can be read only by interrogators
manufactured by the same vendor.
• This means the elimination of duplicate reads within
the read range.
Satakunta University of Applied Sciences, Unit Rauma
RFID Generations
• Generation2, Class 1: These transponders are
WORM transponders. They are also
programmed at the factory, but they can be
read with equipment from different vendors,
support the higher rates, and have more noise
immunity than the Generation 1
transponders.
Satakunta University of Applied Sciences, Unit Rauma
RFID Generations
• Generation2, Class 2: These transponders are
rewritable transponders. They can be written
several times by the user using equipment
differently from the vendor’s equipment.
• Generation 2, Class 3: These transponders are
the semipassive or battery-assisted
transponders.
Satakunta University of Applied Sciences, Unit Rauma
RFID Generations
• Generation2, Class 4: This refers to active
transponders.
• Generation 2, Class 5: These transponders are
essentially interrogators. Transponders that
follow Generation , Class 5 must be able to do
power other transponders.
Satakunta University of Applied Sciences, Unit Rauma
Applications and Frequency
Selection
• RFID systems come in different flavors from the
point of view of the frequency they use.
Selecting the most adequate frequency is a
function of two variables: the technological
developments of systems at the different
operating frequencies – directly related to the
cost of systems – as well as the properties of
electromagnetic waves at those different
frequencies.
Satakunta University of Applied Sciences, Unit Rauma
Commonly Used Frequency
Band for RFID Systems
Frequency Band Frequency Range Tyoical Frequencies Used in
RFID Systems
Low Frequency (LF) 100kHz-500 kHz 125 kHz, 134,2 kHz
High FreQuency (HF) 10 MHz -15 MHz 13,56MHz
Ultra High Frequency (UHF) 400 MHz-950mHz 866 Mhz Europe, 915 MHz
United States
Microwaves (ųW) 2.4 GHz-6.8 Ghz 2.45 Ghz, 3.0 Ghz
Satakunta University of Applied Sciences, Unit Rauma
How does an RFID system
work?
• The RFID system uses a tag, which is a paper and
metallic label, composed of a microchip with a
coiled dipolar antenna.
• The label combination may be covered with a
plastic protective cover, which can be transparent
or not.
• The RFID label or tag is affixed onto a container or
package or onto an item, such as a book or CD.
Satakunta University of Applied Sciences, Unit Rauma
How does an RFID system
work?
• Today these RFID tags and bar codes are being used
together.
• When you get your luggage tag to the airport, check it
out carefully. Actually, the luggage tag will probably
have five copies of the bar code on the outside of the
luggage tag; if an RFID is also used, there will be one
passive RFID tag in the middle of that label.
• It may be a sandwich of two pieces of paper, with the
inside filling a passive RFID tag and the outside a
standard bar code.
Satakunta University of Applied Sciences, Unit Rauma
RFID business
• RFID business or experiment with this technology it is not
that costly.
• The price for a complete kit with a reader, antenna, and
sample tags runs from several hundred dollars.
• The RFID technology is more about data, the business
process, and systems thinking than it is about the
technology.
• Just purchasing the equipment is one small part of a
multiple set of solutions with RFID. The other part of the
solution set is to analyze and examine your business
process of the manufacturing or movements of goods.
Satakunta University of Applied Sciences, Unit Rauma
Active versus passive tags
• RFID tags are either active or passive.
• Active tags have a battery for a source of power to store
data or to transmit a radio signal with the data.
• As such, they perform similar to your portable radio and
can be read over a great distance, with a limit of over 100
feet (30 meters).
• Active tags are significantly more costly than passive tags.
• The active tag is usually encased in a hard shell for
protection, because these tags are used in rugged
environments.
Satakunta University of Applied Sciences, Unit Rauma
Active tags
• Active tags are used usually encased in a hard shell for
protection, because these tags are used in rugged
environments.
• These active tags are used for a variety of purposes,
such as tracking the time and temperature of fresh
Alaskan salmon. The tags are placed in a box an of
Salomon that is to be kept at a constant temperature
near freezing for the journey from the ship to a carried
of transportation systems: a barge, truck or airfreight.
• Other active tags might be attached to boxes of cargo
destined for a war zone for the military.
Satakunta University of Applied Sciences, Unit Rauma
Passive tags
• The passive tag needs to be closer to the reader
than the active tag. The passive tag has no
battery.
• Passive tag very attractive for containers of
products, but not necessarily on each individual
item on the container.
• One of the key areas in logistics where active tags
are being used is the shipping of cargo entering
marine ports.
Satakunta University of Applied Sciences, Unit Rauma
WORKSHOP
WorkShop
• The divided groups of 5 people.
• Design system concept of using RFID
technology.
• ”The flow of ideas from one field into another
often takes curious and ambivalent paths”.
Satakunta University of Applied Sciences, Unit Rauma
Results
• Groups make presentations and present for
result for other groups.
• What kind of systems concepts of using RFID
you have designed?
Satakunta University of Applied Sciences, Unit Rauma
Thank you for your attention!

More Related Content

What's hot

Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
Mandar Jagtap
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
kunal13309
 
Tracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFIDTracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFIDMetalcraft Inc
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
nikshaikh786
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
Francisco Carabez
 
Rfid
RfidRfid
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification
Suman Dey
 
Rifd
RifdRifd
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
15225763
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
Akash Maurya
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
R1x g22 rfid ii
R1x g22 rfid iiR1x g22 rfid ii
R1x g22 rfid ii
cairo university
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
Sheel Bhadra Yadav
 
Towards the Internet of Things: An introduction to RFID
Towards the Internet of Things: An introduction to RFIDTowards the Internet of Things: An introduction to RFID
Towards the Internet of Things: An introduction to RFIDMiguel Pardal
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
nikshaikh786
 
Rfid sourya cse
Rfid sourya cseRfid sourya cse
Rfid sourya cse
sourya kumar
 
RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food Systems
MohsinAga1
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
Anal Mandal
 
RFID
RFIDRFID

What's hot (20)

Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Tracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFIDTracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFID
 
Ioe module 3
Ioe module 3Ioe module 3
Ioe module 3
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Rfid
RfidRfid
Rfid
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification
 
Rifd
RifdRifd
Rifd
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
 
RFID PROTOCOL
RFID PROTOCOLRFID PROTOCOL
RFID PROTOCOL
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
R1x g22 rfid ii
R1x g22 rfid iiR1x g22 rfid ii
R1x g22 rfid ii
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
Towards the Internet of Things: An introduction to RFID
Towards the Internet of Things: An introduction to RFIDTowards the Internet of Things: An introduction to RFID
Towards the Internet of Things: An introduction to RFID
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
Rfid sourya cse
Rfid sourya cseRfid sourya cse
Rfid sourya cse
 
RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food Systems
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 
RFID
RFIDRFID
RFID
 

Viewers also liked

WordPress Beginners Workshop
WordPress Beginners WorkshopWordPress Beginners Workshop
WordPress Beginners Workshop
The Toolbox, Inc.
 
Maakuntauudistus, Tampere 17.8.2016 Tuomas Pöystin esitys
Maakuntauudistus, Tampere 17.8.2016 Tuomas Pöystin esitysMaakuntauudistus, Tampere 17.8.2016 Tuomas Pöystin esitys
Maakuntauudistus, Tampere 17.8.2016 Tuomas Pöystin esitys
Sosiaali- ja terveysministeriö / yleiset
 
Lapsen ja perheen tilanteen sekä tuen tarpeen arviointi
Lapsen ja perheen tilanteen sekä tuen tarpeen arviointiLapsen ja perheen tilanteen sekä tuen tarpeen arviointi
Lapsen ja perheen tilanteen sekä tuen tarpeen arviointi
THL
 
Apteekkiverkko 2025
Apteekkiverkko 2025Apteekkiverkko 2025
Apteekkiverkko 2025
Sitra
 
Chapter 4 (4
Chapter 4   (4Chapter 4   (4
Chapter 4 (4
k_shrifi
 
Prevención y Tratamiento de las úlceras por presión: Guía de consulta rápida....
Prevención y Tratamiento de las úlceras por presión: Guía de consulta rápida....Prevención y Tratamiento de las úlceras por presión: Guía de consulta rápida....
Prevención y Tratamiento de las úlceras por presión: Guía de consulta rápida....
GNEAUPP.
 
Varhaiskasvatus, koulu ja oppilaitos lapsen ja nuoren hyvinvoinnin tukena suu...
Varhaiskasvatus, koulu ja oppilaitos lapsen ja nuoren hyvinvoinnin tukena suu...Varhaiskasvatus, koulu ja oppilaitos lapsen ja nuoren hyvinvoinnin tukena suu...
Varhaiskasvatus, koulu ja oppilaitos lapsen ja nuoren hyvinvoinnin tukena suu...
THL
 
Superficies de apoyo de aire estático para prevenir lesiones por presión Un e...
Superficies de apoyo de aire estático para prevenir lesiones por presión Un e...Superficies de apoyo de aire estático para prevenir lesiones por presión Un e...
Superficies de apoyo de aire estático para prevenir lesiones por presión Un e...
GNEAUPP.
 
Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näk...
Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näk...Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näk...
Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näk...
THL
 
Suunnitelma perhekeskustoimintamallin toimeenpanemiseksi ja perhekeskuksen yd...
Suunnitelma perhekeskustoimintamallin toimeenpanemiseksi ja perhekeskuksen yd...Suunnitelma perhekeskustoimintamallin toimeenpanemiseksi ja perhekeskuksen yd...
Suunnitelma perhekeskustoimintamallin toimeenpanemiseksi ja perhekeskuksen yd...
THL
 
Production name, logo & ident
Production name, logo & identProduction name, logo & ident
Production name, logo & ident
Sonali Narane
 
Doc. posicionamiento 13 - enfermeras consultoras
Doc. posicionamiento 13 - enfermeras consultorasDoc. posicionamiento 13 - enfermeras consultoras
Doc. posicionamiento 13 - enfermeras consultoras
GNEAUPP.
 
παιδιά που ονειρεύονται όπως και συ
παιδιά που ονειρεύονται όπως και συπαιδιά που ονειρεύονται όπως και συ
παιδιά που ονειρεύονται όπως και συ
pipi_f
 

Viewers also liked (13)

WordPress Beginners Workshop
WordPress Beginners WorkshopWordPress Beginners Workshop
WordPress Beginners Workshop
 
Maakuntauudistus, Tampere 17.8.2016 Tuomas Pöystin esitys
Maakuntauudistus, Tampere 17.8.2016 Tuomas Pöystin esitysMaakuntauudistus, Tampere 17.8.2016 Tuomas Pöystin esitys
Maakuntauudistus, Tampere 17.8.2016 Tuomas Pöystin esitys
 
Lapsen ja perheen tilanteen sekä tuen tarpeen arviointi
Lapsen ja perheen tilanteen sekä tuen tarpeen arviointiLapsen ja perheen tilanteen sekä tuen tarpeen arviointi
Lapsen ja perheen tilanteen sekä tuen tarpeen arviointi
 
Apteekkiverkko 2025
Apteekkiverkko 2025Apteekkiverkko 2025
Apteekkiverkko 2025
 
Chapter 4 (4
Chapter 4   (4Chapter 4   (4
Chapter 4 (4
 
Prevención y Tratamiento de las úlceras por presión: Guía de consulta rápida....
Prevención y Tratamiento de las úlceras por presión: Guía de consulta rápida....Prevención y Tratamiento de las úlceras por presión: Guía de consulta rápida....
Prevención y Tratamiento de las úlceras por presión: Guía de consulta rápida....
 
Varhaiskasvatus, koulu ja oppilaitos lapsen ja nuoren hyvinvoinnin tukena suu...
Varhaiskasvatus, koulu ja oppilaitos lapsen ja nuoren hyvinvoinnin tukena suu...Varhaiskasvatus, koulu ja oppilaitos lapsen ja nuoren hyvinvoinnin tukena suu...
Varhaiskasvatus, koulu ja oppilaitos lapsen ja nuoren hyvinvoinnin tukena suu...
 
Superficies de apoyo de aire estático para prevenir lesiones por presión Un e...
Superficies de apoyo de aire estático para prevenir lesiones por presión Un e...Superficies de apoyo de aire estático para prevenir lesiones por presión Un e...
Superficies de apoyo de aire estático para prevenir lesiones por presión Un e...
 
Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näk...
Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näk...Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näk...
Jaana Nevalainen: Työllisyyspalvelujen uudet järjestelyt sote-uudistuksen näk...
 
Suunnitelma perhekeskustoimintamallin toimeenpanemiseksi ja perhekeskuksen yd...
Suunnitelma perhekeskustoimintamallin toimeenpanemiseksi ja perhekeskuksen yd...Suunnitelma perhekeskustoimintamallin toimeenpanemiseksi ja perhekeskuksen yd...
Suunnitelma perhekeskustoimintamallin toimeenpanemiseksi ja perhekeskuksen yd...
 
Production name, logo & ident
Production name, logo & identProduction name, logo & ident
Production name, logo & ident
 
Doc. posicionamiento 13 - enfermeras consultoras
Doc. posicionamiento 13 - enfermeras consultorasDoc. posicionamiento 13 - enfermeras consultoras
Doc. posicionamiento 13 - enfermeras consultoras
 
παιδιά που ονειρεύονται όπως και συ
παιδιά που ονειρεύονται όπως και συπαιδιά που ονειρεύονται όπως και συ
παιδιά που ονειρεύονται όπως και συ
 

Similar to Service support technologies 20.9.2016

Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Publicis Sapient
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
Mouhanad Alkhaldi
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
Kaveen Gayathma
 
The Power of UHF RFID Antennas.pdf
The Power of UHF RFID Antennas.pdfThe Power of UHF RFID Antennas.pdf
The Power of UHF RFID Antennas.pdf
EnCStore Private Limited
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
lisbala
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
Rbalasubramani
 
RFID Part-19
RFID Part-19RFID Part-19
RFID Part-19
Techvilla
 
RFID
RFIDRFID
Selectingtags Final
Selectingtags FinalSelectingtags Final
Selectingtags Final
SeanWatson
 
Rfid3
Rfid3Rfid3
Rfid3
kunal13309
 
RFID
RFIDRFID
RFIDdont
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in libraries
Nabi Hasan
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
musicalmood
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFIDMiguel Pardal
 
ZKK Sdn Bhd
ZKK Sdn BhdZKK Sdn Bhd
ZKK Sdn Bhd
Nizzura Mukhtar
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
ashish pal
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
Nadeem Raza
 

Similar to Service support technologies 20.9.2016 (20)

rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
The Power of UHF RFID Antennas.pdf
The Power of UHF RFID Antennas.pdfThe Power of UHF RFID Antennas.pdf
The Power of UHF RFID Antennas.pdf
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
RFID Part-19
RFID Part-19RFID Part-19
RFID Part-19
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
RFID
RFIDRFID
RFID
 
Selectingtags Final
Selectingtags FinalSelectingtags Final
Selectingtags Final
 
Rfid3
Rfid3Rfid3
Rfid3
 
RFID
RFIDRFID
RFID
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in libraries
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFID
 
ZKK Sdn Bhd
ZKK Sdn BhdZKK Sdn Bhd
ZKK Sdn Bhd
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 

More from Pirita Ihamäki

IN140703 service support technologies 6.10.2016
IN140703 service support technologies 6.10.2016IN140703 service support technologies 6.10.2016
IN140703 service support technologies 6.10.2016
Pirita Ihamäki
 
IN140703 service support technologies 4.10.2016
IN140703 service support technologies 4.10.2016IN140703 service support technologies 4.10.2016
IN140703 service support technologies 4.10.2016
Pirita Ihamäki
 
IN140703 service support technologies 29.9.2016 part 2
IN140703 service support technologies 29.9.2016 part 2IN140703 service support technologies 29.9.2016 part 2
IN140703 service support technologies 29.9.2016 part 2
Pirita Ihamäki
 
IN140703 service support technologies 26.9.2016
IN140703 service support technologies 26.9.2016IN140703 service support technologies 26.9.2016
IN140703 service support technologies 26.9.2016
Pirita Ihamäki
 
IN140703 service support technologies 22.9.2016
IN140703 service support technologies 22.9.2016IN140703 service support technologies 22.9.2016
IN140703 service support technologies 22.9.2016
Pirita Ihamäki
 
IN140703 service support technologies 8.9.2016
IN140703 service support technologies 8.9.2016IN140703 service support technologies 8.9.2016
IN140703 service support technologies 8.9.2016
Pirita Ihamäki
 
Palvelumuotoilun suunnittelusta johtamiseen
Palvelumuotoilun suunnittelusta   johtamiseenPalvelumuotoilun suunnittelusta   johtamiseen
Palvelumuotoilun suunnittelusta johtamiseen
Pirita Ihamäki
 
Palvelumuotoilun juuret
Palvelumuotoilun juuretPalvelumuotoilun juuret
Palvelumuotoilun juuret
Pirita Ihamäki
 
Service support technologies 6.9.2016
Service support technologies 6.9.2016Service support technologies 6.9.2016
Service support technologies 6.9.2016
Pirita Ihamäki
 
Geokätköilyä - välineitä opetukseen ja matkailuun
Geokätköilyä - välineitä opetukseen ja matkailuunGeokätköilyä - välineitä opetukseen ja matkailuun
Geokätköilyä - välineitä opetukseen ja matkailuun
Pirita Ihamäki
 

More from Pirita Ihamäki (10)

IN140703 service support technologies 6.10.2016
IN140703 service support technologies 6.10.2016IN140703 service support technologies 6.10.2016
IN140703 service support technologies 6.10.2016
 
IN140703 service support technologies 4.10.2016
IN140703 service support technologies 4.10.2016IN140703 service support technologies 4.10.2016
IN140703 service support technologies 4.10.2016
 
IN140703 service support technologies 29.9.2016 part 2
IN140703 service support technologies 29.9.2016 part 2IN140703 service support technologies 29.9.2016 part 2
IN140703 service support technologies 29.9.2016 part 2
 
IN140703 service support technologies 26.9.2016
IN140703 service support technologies 26.9.2016IN140703 service support technologies 26.9.2016
IN140703 service support technologies 26.9.2016
 
IN140703 service support technologies 22.9.2016
IN140703 service support technologies 22.9.2016IN140703 service support technologies 22.9.2016
IN140703 service support technologies 22.9.2016
 
IN140703 service support technologies 8.9.2016
IN140703 service support technologies 8.9.2016IN140703 service support technologies 8.9.2016
IN140703 service support technologies 8.9.2016
 
Palvelumuotoilun suunnittelusta johtamiseen
Palvelumuotoilun suunnittelusta   johtamiseenPalvelumuotoilun suunnittelusta   johtamiseen
Palvelumuotoilun suunnittelusta johtamiseen
 
Palvelumuotoilun juuret
Palvelumuotoilun juuretPalvelumuotoilun juuret
Palvelumuotoilun juuret
 
Service support technologies 6.9.2016
Service support technologies 6.9.2016Service support technologies 6.9.2016
Service support technologies 6.9.2016
 
Geokätköilyä - välineitä opetukseen ja matkailuun
Geokätköilyä - välineitä opetukseen ja matkailuunGeokätköilyä - välineitä opetukseen ja matkailuun
Geokätköilyä - välineitä opetukseen ja matkailuun
 

Recently uploaded

OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 

Recently uploaded (20)

OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 

Service support technologies 20.9.2016

  • 1. IN140703 Service support technologies 20.9.2016 Pirita Ihamäki Phd. Mc.S. pirita.ihamaki@samk.fi Satakunta University of Applied Sciences, Unit Rauma
  • 2. Content • Basics of RFID • RFID • Functional Classification of RFID Tranponders • RFID Generations • Applications and Frequency Selection • Commonly Used Frequency Band for RFID Systems • How does an RFID system work? • RFID business • Active versus passive tags • Active tags • Passive tags • Workshop Satakunta University of Applied Sciences, Unit Rauma
  • 3. Basics of RFID • RFID = Radiofrequency identification • RFID systems use radio waves • RFID systems have two main elements, which are the device used to carry this information and the equipment used to automatically capture or retrieve the information. • The devices that store and carry the information are called trasponders or tags. Satakunta University of Applied Sciences, Unit Rauma
  • 4. RFID Satakunta University of Applied Sciences, Unit Rauma
  • 5. Basics of RFID • Industry commonly referred to RFID as tags mainly due to their physical shape and the fact that they are mostly used to tag pallets or cases of goods, the name transponder reflects better the function of these devices. • The device that is used to capture and transfer information is commonly called a reader, because in earlier RFID systems they were only able to read the information sen by the transponders. Satakunta University of Applied Sciences, Unit Rauma
  • 6. Functional Classification of RFID Tranponders • A functional classification of RFID transponders is based on their electronic product code (EPC) class. • EPC is the application of specific type of RFID technology within the consumer package goods industry. Within this classification, RFID transponders are divided into different classes and generations. Satakunta University of Applied Sciences, Unit Rauma
  • 7. RFID Generations • Generation 1., Class 0: Passive tags with read- only functionality. These are also called write one, read many (WORM) transponders. These transponders are programmed at the factory with their unique identification number. The user is not able to change it or include additional information. Satakunta University of Applied Sciences, Unit Rauma
  • 8. RFID Generations • Generation 1., Class 0+: These are also WORM transponders. They differ from Generation 1, Class 0 transponders in that it is the user who programs them. After they have been programmed by the user, no further programming or changing of data is allowed. Satakunta University of Applied Sciences, Unit Rauma
  • 9. RFID Generations • Generation 1., Class1: These transponders were similar to Generation 1 Class 0 or =+ transponders, but could be read by interrogators from other companies. Generation 1, Class 1 transponders have evolved into the different transponders from Generation 2. • Generation 1 transponders employ proprietary data structures and can be read only by interrogators manufactured by the same vendor. • This means the elimination of duplicate reads within the read range. Satakunta University of Applied Sciences, Unit Rauma
  • 10. RFID Generations • Generation2, Class 1: These transponders are WORM transponders. They are also programmed at the factory, but they can be read with equipment from different vendors, support the higher rates, and have more noise immunity than the Generation 1 transponders. Satakunta University of Applied Sciences, Unit Rauma
  • 11. RFID Generations • Generation2, Class 2: These transponders are rewritable transponders. They can be written several times by the user using equipment differently from the vendor’s equipment. • Generation 2, Class 3: These transponders are the semipassive or battery-assisted transponders. Satakunta University of Applied Sciences, Unit Rauma
  • 12. RFID Generations • Generation2, Class 4: This refers to active transponders. • Generation 2, Class 5: These transponders are essentially interrogators. Transponders that follow Generation , Class 5 must be able to do power other transponders. Satakunta University of Applied Sciences, Unit Rauma
  • 13. Applications and Frequency Selection • RFID systems come in different flavors from the point of view of the frequency they use. Selecting the most adequate frequency is a function of two variables: the technological developments of systems at the different operating frequencies – directly related to the cost of systems – as well as the properties of electromagnetic waves at those different frequencies. Satakunta University of Applied Sciences, Unit Rauma
  • 14. Commonly Used Frequency Band for RFID Systems Frequency Band Frequency Range Tyoical Frequencies Used in RFID Systems Low Frequency (LF) 100kHz-500 kHz 125 kHz, 134,2 kHz High FreQuency (HF) 10 MHz -15 MHz 13,56MHz Ultra High Frequency (UHF) 400 MHz-950mHz 866 Mhz Europe, 915 MHz United States Microwaves (ųW) 2.4 GHz-6.8 Ghz 2.45 Ghz, 3.0 Ghz Satakunta University of Applied Sciences, Unit Rauma
  • 15. How does an RFID system work? • The RFID system uses a tag, which is a paper and metallic label, composed of a microchip with a coiled dipolar antenna. • The label combination may be covered with a plastic protective cover, which can be transparent or not. • The RFID label or tag is affixed onto a container or package or onto an item, such as a book or CD. Satakunta University of Applied Sciences, Unit Rauma
  • 16. How does an RFID system work? • Today these RFID tags and bar codes are being used together. • When you get your luggage tag to the airport, check it out carefully. Actually, the luggage tag will probably have five copies of the bar code on the outside of the luggage tag; if an RFID is also used, there will be one passive RFID tag in the middle of that label. • It may be a sandwich of two pieces of paper, with the inside filling a passive RFID tag and the outside a standard bar code. Satakunta University of Applied Sciences, Unit Rauma
  • 17. RFID business • RFID business or experiment with this technology it is not that costly. • The price for a complete kit with a reader, antenna, and sample tags runs from several hundred dollars. • The RFID technology is more about data, the business process, and systems thinking than it is about the technology. • Just purchasing the equipment is one small part of a multiple set of solutions with RFID. The other part of the solution set is to analyze and examine your business process of the manufacturing or movements of goods. Satakunta University of Applied Sciences, Unit Rauma
  • 18. Active versus passive tags • RFID tags are either active or passive. • Active tags have a battery for a source of power to store data or to transmit a radio signal with the data. • As such, they perform similar to your portable radio and can be read over a great distance, with a limit of over 100 feet (30 meters). • Active tags are significantly more costly than passive tags. • The active tag is usually encased in a hard shell for protection, because these tags are used in rugged environments. Satakunta University of Applied Sciences, Unit Rauma
  • 19. Active tags • Active tags are used usually encased in a hard shell for protection, because these tags are used in rugged environments. • These active tags are used for a variety of purposes, such as tracking the time and temperature of fresh Alaskan salmon. The tags are placed in a box an of Salomon that is to be kept at a constant temperature near freezing for the journey from the ship to a carried of transportation systems: a barge, truck or airfreight. • Other active tags might be attached to boxes of cargo destined for a war zone for the military. Satakunta University of Applied Sciences, Unit Rauma
  • 20. Passive tags • The passive tag needs to be closer to the reader than the active tag. The passive tag has no battery. • Passive tag very attractive for containers of products, but not necessarily on each individual item on the container. • One of the key areas in logistics where active tags are being used is the shipping of cargo entering marine ports. Satakunta University of Applied Sciences, Unit Rauma
  • 22. WorkShop • The divided groups of 5 people. • Design system concept of using RFID technology. • ”The flow of ideas from one field into another often takes curious and ambivalent paths”. Satakunta University of Applied Sciences, Unit Rauma
  • 23. Results • Groups make presentations and present for result for other groups. • What kind of systems concepts of using RFID you have designed? Satakunta University of Applied Sciences, Unit Rauma
  • 24. Thank you for your attention!