การเลอกเทคโนโลย การเลอกเทคโนโลย RFIDRFID ทเหมาะสมกบทเหมาะสมกบการใชงานการใชงานการใชงานการใชงาน
ApiwatApiwat ThongprasertThongprasertThai RFID Cluster (TRFIDC)
เครอขายวสาหกจ (คลสเตอร) อารเอฟไอด
The content and the design in this proposal are owned by Thai RFID Cluster and are
[email protected] August 20102010
TESA
The content and the design in this proposal are owned by Thai RFID Cluster and are protected by international copyright law. A written permission from Thai RFID Cluster must be obtained prior to any disclosure to any third party or prior to the use in any
project in which Thai RFID Cluster is not the subcontractor.
Confidential & proprietaryConfidential & proprietaryTESA Special Group
Confidential & proprietary
What is RFID?What is RFID?What is RFID?What is RFID?
Confidential & proprietary
What is RFID?What is RFID?
RFID d f “R di F Id ifi i ” • RFID stands for “Radio Frequency Identification”
• “ Electronic data storage system with additional • …Electronic data storage system, with additional computing capacity and security, powered by magnetic or electromagnetic fields instead of physical contacts…”
• RFID is one of Auto-ID Technology
• RFID is not Wireless Barcode, and is not Barcode replacement
Confidential & proprietary
What is RFID?What is RFID?
Confidential & proprietary
Source: Scientific American Inc.
What is RFID?What is RFID?
Confidential & proprietary
Source: Scientific American Inc.
RFID Brief HistoryRFID Brief History
• 2nd world war
• Identifying Friend or Foe (IFF) for aircraft
Market grow quickly in last few years due to technology • Market grow quickly in last few years due to technology improvement, price reduction, standardization, advancement in corporate IT system.advancement in corporate IT system.
• Auto-ID Lab founded at MIT in 1999
• Auto-ID Lab + EAN + UCC = EPCGlobal in 2003
• Walmart adoption in 2003. Followed by Metro, TESCO, p yTarget, Best Buy, Albertson
Confidential & proprietary
Architecture & ComponentsArchitecture & ComponentsArchitecture & ComponentsArchitecture & Components
Confidential & proprietary
RFID RFID System ArchitectureSystem Architecture
••TagsTags
••ReadersReaders
••MiddlewareMiddleware••MiddlewareMiddleware
••SoftwareSoftware
Confidential & proprietary
Types of RFID TagsTypes of RFID Tags
Passive Tags:Passive Tags:Passive RFID tags have no internal power supply. It relies entirely on the energy of the interrogator (reader) signal to entirely on the energy of the interrogator (reader) signal to power up and transmit a response. Most of UHF passive tags signal by backscattering the carrier wave
•Power comes from the field of reader•Low cost & very durable
Confidential & proprietary
Types of RFID TagsTypes of RFID Tags
Active Tags:Active Tags:Active RFID tags have their own internal power source, which is
d t d t t it i l t th used to power up and to transmit a response signal to the reader. Active RFID tags provides greater communication range and more reliable than passive RFID tags.
• Incorporate a battery• Applications: long range tagging and road tolling
Properties of Wavetrend
Confidential & proprietary
Types of RFID TagsTypes of RFID Tags
Battery Assisted Passive (BAP):Battery Assisted Passive (BAP):Also known as Semi-Passive Tags or Semi-Active Tags, It is similar to active tags in that they have their own power source to maintain volatile memory tags in that they have their own power source to maintain volatile memory and powers the microchip, but the battery does not power the broadcasting of a signal back to the reader. The tag communicates back to the reader by reflecting and modulating the reader signal, just like passive tag.
Properties of MotorolaProperties of Alien Technology
Confidential & proprietary
Types of ReadersTypes of Readers
Fixed ReadersFixed Readers• Automation solution with stationary
devices
Fixed ReadersFixed Readers
• Fast, Easy and Convenient• Reliable and Durable
Various Form Factor (Panel Tunnel)• Various Form Factor (Panel, Tunnel)
Confidential & proprietaryConfidential & proprietary
Types of ReadersTypes of Readers
Handheld ReadersHandheld Readers
• Portable Solution• Fast, Easy and Convenient• Reliable and Durable• Various Form Factor • Support wireless and/or LAN
Confidential & proprietaryConfidential & proprietary
RFID types & frequencyRFID types & frequencyRFID types & frequencyRFID types & frequency
Confidential & proprietary
RFID FrequencyRFID Frequency
d dInductive Radiative
LF MF HF UHFVHF
Frequency (Hz) 100k 1M 10M 100M 1G 10G
Wavelength(m) 3000 300 30 3 0.3 0.03
Common RFID bands
125/134 kHz
13.56 MHz
860-960 MHz
2.4 GHz
Confidential & proprietary
Frequency ComparisonFrequency Comparison
Confidential & proprietary
Radiation PatternRadiation PatternRadiation PatternRadiation Pattern
Confidential & proprietary
Inductive antenna PatternInductive antenna PatternFrom “Selecting Equipment”From Selecting Equipment
TOMAS GRAJALES, Vice President R&DDynasys Technologies Inc.
www.rfidusa.com
“LF & HF RFID Radiation Pattern”
Confidential & proprietary
Radiative Antenna PatternFrom “Selecting Equipment”From Selecting Equipment
TOMAS GRAJALES, Vice President R&DDynasys Technologies Inc.
www.rfidusa.com
“UHF & Microwave RFID Radiation Pattern”
Confidential & proprietary
RadiativeRadiative Antenna PatternAntenna PatternFrom “Selecting Equipment”
TOMAS GRAJALES, Vice President R&DDynasys Technologies Inc.
www.rfidusa.com
Confidential & proprietary
Radiative MultiRadiative Multi--Path PatternPath PatternFrom “Selecting Equipment”
TOMAS GRAJALES, Vice President R&DDynasys Technologies Inc.
www.rfidusa.com
“NULL SPOT”
Confidential & proprietary
Radiative ReaderRadiative Reader
Confidential & proprietary
RFID StandardsRFID StandardsRFID StandardsRFID Standards
Confidential & proprietary
RFID Type & StandardRFID Type & Standard
Confidential & proprietary
EPC Standard Tag ClassesEPC Standard Tag ClassesRFID Gen 2 - What is it? - Smart RFID!
SkyRFID Inc.http://www.skyrfid.com/RFID_Gen_2_What_is_it.php
EPC Class 0 Write once and read many times (WORM) tag (obsoleted) EPC Class 1 Has Gen 1 and Gen 2, WMRM (Write Many Read Many) Tag,
Now Gen 2 is widely accepted and used world‐wideEPC Class 2 Not yet completed, are enhanced Gen 2 Class 1 tags plus an extended
TAG ID (TID), extended user memory, authenticated access control and additional features
EPC Class 3 Battery‐assisted passive tags , also called semi‐passive tags plus feature of power source to supply power to the tag and/or its sensors and or
h l d l b lsensors with optional data logging capabilities.EPC Class 4 Active tag technology with a battery and can initiate communications
with a reader or with another tag, has optional user memory, optional d d t l i bilitisensors, and data logging capabilities
Confidential & proprietary
What affects range What affects range What affects range What affects range
Confidential & proprietary
What affects RangeWhat affects RangeFrom “Selecting Equipment”From Selecting Equipment
TOMAS GRAJALES, Vice President R&DDynasys Technologies Inc.
www.rfidusa.com
- Noisy environmentDo a site survey/consider other RFID readersFor LF and HF limit antenna sizeFor LF and HF limit antenna size
Use noise cancellation techniques and balunsKeep antenna feeder cable away from noisePower supply noisePower supply noise
- Antenna size and patternB ildi t i ibl f LF d HFBuilding antenna is possible for LF and HF
Rule of thumb- one to one range to sizeLarge Voltages are presentAntenna must be rated for right power
UHF antennas are smaller and available
Confidential & proprietary
What affects RangeWhat affects RangeFrom “Selecting Equipment”From Selecting Equipment
TOMAS GRAJALES, Vice President R&DDynasys Technologies Inc.
www.rfidusa.com
- Position of tag relative to AntennaView attached slides
- Transmit PowerTransmit PowerFixed readers for max rangePortables one to one read
- Reader processing speed- Reader processing speed-Large price difference for large computing powerHF d t t f 30 t /-HF detects an average of 30 tags/sec
-UHF detects an average of 150 tags/sec - UHF multi-path
Confidential & proprietary
Mix of Goods/EnvironmentMix of Goods/Environment
EM field
Oil in PlasticPaper Package
Aluminum can
PlasticWater in Plastic
Aluminum can
Foil Pack
CeramicMetalPowder/Dust on Plastic
Source: IE TechnologyNote: Testing under IET Lab Environment
Confidential & proprietary
Note: Testing under IET Lab Environment-UHF Alien 9780 with 1 Linear and 1 Circular Antenna
How tags interact with readersHow tags interact with readers
A tAntenna range
RF field form (reflections drop outs)
Number of bytest d (reflections, drop outs)
Unintended reads
to read
Number of tagsUnintended reads
of tags in read field
Mix of goods on pallet (cans, liquids, …)
Available reading timeSpeed of movement
Placement of tags (orientation, handling, hiding/shielding)
Confidential & proprietary
g/ g)
Frequency ComparisonFrequency ComparisonFrequency ComparisonFrequency Comparison
Confidential & proprietary
RFID Technology BasicsRFID Technology Basics
Main Frequency
Energy Supply
Estimated Costs
Estimated Costs
Field of ApplicationFrequency
BandsSupply Costs
(‘Passive’ Transponder)
Costs (‘Passive’-Type
Reader)100 – 135 Passive/BAP 20-100 ฿ 1k-30k ฿ Car Immobilizers, Animal kHz ID, Access Control
13.56 MHz Passive/BAP 20-150 ฿ 2k-30k ฿, 400k ฿ (Gate)
Card systems, Smart Labels, Personal ( ) ,Identification, Payment, Library,
433-900 MHz Passive/BAP/Active
10-100 ฿ 30k -100k ฿ Item/Pallet Identification, Logistics Supply chainActive Logistics, Supply chain
2.45 GHz Passive/BAP/Active
10-100 ฿ 30k -100k ฿ Container(e-seal), vehicle-ID, Item/Personal , /tracking, RTLS
Confidential & proprietary
Frequency Frequency Comparison (Summary)Comparison (Summary)
Confidential & proprietary
RFID versus BarcodeRFID versus BarcodeRFID versus BarcodeRFID versus Barcode
Confidential & proprietary
Barcode TechnologyBarcode Technology
Left GuardPattern
Center GuardPattern
Right GuardPattern
Left GuardPattern
Center GuardPattern
Right GuardPattern
Odd Parity
Even Parity
1St tV
DIGITIZING
12345 6789050System Digit
Manufacturer
Identification
Product
Identification
Check Digit
StopCheck31Start
•• Barcode 1 dimension
t
THRESHOLD
•• Barcode 2 dimensionInformation and pictures from “Motorola”
Barcode 2 dimension
Confidential & proprietary 35
RFID versus BarcodeRFID versus Barcode
RFID BarcodeData Storage Sufficient Limited
Line of sight No need Required
Cost Higher but dropping Low
Widespread Less Yes
R b t Y NRobustness Yes No
Others • Tags are reusable • Human readable
• Multiple reading ability • Authentication and encryption
available
Confidential & proprietary
Complementary use of Barcode and RFIDComplementary use of Barcode and RFID
BarcodeBarcode
Picture from www.epcglobalinc.org
RFIDRFID
Confidential & proprietary
RFID AdoptionRFID AdoptionRFID AdoptionRFID Adoption
Confidential & proprietary
RFID TodayRFID Today
P P ROI i ifi li iROI i ifi li i••Proven Proven ROI in specific applicationROI in specific application••Very helpful in complex processesVery helpful in complex processes••Various type, form, standard for selectionVarious type, form, standard for selection••Entrenched in Closed LoopEntrenched in Closed Loop••ItemItem--Level Tracking benefits InLevel Tracking benefits In--Company Company
and Value Beyond The Supply Chain and Value Beyond The Supply Chain ••MultiMulti--Technology IntegrationTechnology Integration••Integrated with Sensing Technology (Temperature)Integrated with Sensing Technology (Temperature)
Confidential & proprietary
Impacts of RFIDImpacts of RFID
‘Di it l’ W ld‘Di it l’ W ld‘Digital’ World >>>>‘Digital’ World >>>>
<<<< ‘Real’ World<<<< ‘Real’ World
“Missing Link” >>>>“Missing Link” >>>>
RFID is playing in an important role in integration and link RFID is playing in an important role in integration and link between software and business in realbetween software and business in real‐‐worldworld
Confidential & proprietary
Existing WaysExisting Ways
••Human errorHuman error
••NonNon‐‐IT skillIT skill••Not realNot real‐‐timetime
••Forget!Forget!
••Low productivityLow productivity
••HandHand‐‐Writing/MisreadWriting/Misread
Low productivityLow productivity
••MiscommunicationMiscommunication
Confidential & proprietary
RFID wayRFID way
•• RealReal‐‐time informationtime information
•• Higher AccuracyHigher Accuracy••More informationMore informationRFID
Reader
••High productivityHigh productivity
••Reduce excessive laborReduce excessive labor
Confidential & proprietary
What is the information inside?What is the information inside?
Example of tag data standard following EPC Global Example of tag data standard following EPC Global StandardStandardStandardStandard
GTIN: the EAN UCC Global Trade Item NumberGTIN: the EAN.UCC Global Trade Item Number, (here, a serialized version)
SSCC: the EAN.UCC Serial Shipping Container Code GLN th EAN UCC Gl b l L ti N bGLN: the EAN.UCC Global Location Number GRAI: the EAN.UCC Global Returnable Asset Identifier GIAI: the EAN.UCC Global Individual Asset Identifier GID: General Identifier
Confidential & proprietary
RFID Case StudyRFID Case StudyRFID Case StudyRFID Case Study
Confidential & proprietary
Reference CaseReference Case
Thai Coal Importer Weighs RFID's BenefitsSCG Logistics is using an active RFID solution to track theSCG Logistics is using an active RFID solution to track the weight of trucks before and after they load up with coal at a port facility in Thailand.
By Claire Swedberg
Mar. 11, 2010—SCG Logistics Management Co., a logistics and , g g , gtransportation firm based in Thailand's Ayuthaya province, has deployed an RFID system at its coal import operations, to track the amount of coal being loaded onto trucks. After using the system for Wiroteone year, the company has found that wait times are reduced and billing is more accurate, based on automating what was previously a labor‐intensive system of tracking the weights of trucks and the
Ngamsukkasamesri, general manager of Identify RFID
coal loaded within them. To date, SGC reports, the system has reduced the operation time of weighbridge employees by 30 to 40 percent.
Confidential & proprietary
Identify received award for RFID Identify received award for RFID transportation managementtransportation managementtransportation managementtransportation management
May 06, 2010 - Identify has implemented RFID fleet y , y pmanagement for SCG logistics to enhance its operation on the delivery of raw material including coal, and lignite. Identify'ssolution is integrated with weight bridge to automate the operation on the weight station Besides this solution is alsooperation on the weight station. Besides, this solution is also integrated with account management to reduce the manual operation on billing process.
SCG Logistics has proposed this solution for Thailand ICT Excellence Award 2009 in the area of innovation implementation. This award is designed to encourage and praise any companieswho employ IT to enhance the operation within theirwho employ IT to enhance the operation within their organizations. Among the total competitors, SCG Logistics is received Thailand ICT Excellence Awards 2009.
Confidential & proprietary
Reference Case: Reference Case: ระบบบรการจดการคลงสนคาโดยระบบบรการจดการคลงสนคาโดยใชเทคโนโลยใชเทคโนโลย RFIDRFIDใชเทคโนโลย ใชเทคโนโลย RFIDRFID
Smartsoft Technolgy Ltd.11/103 Moo 10 , Taradkhul ,
MaungnonthaburiNonthaburi 11000 Thailand
T l 66 2 5274021Tel. +66 2 5274021Fax. +66 2 9665580
Web: www.RFIDtoday.net
การบรหารคลงสนคาในปจจบน มความตองการเพมสมรรถนะการทางานของคลงสนคา ใหรองรบปรมาณการผลตทจะเพมขน และมมาตรฐานการทางาน รวมถงการตรวจสอบทดข น ดวยการนาระบบมาตรฐานการทางาน รวมถงการตรวจสอบทดขน ดวยการนาระบบ
RFID เขามาใชบรหารจดการคลงสนคา ในขนตนระบบ RFID ถกนาเขามาใชเพอตดตามสนคา ตงแตการผลต การจดเกบ ไปจนถงการ
จาหนาย
Confidential & proprietary© Copyright 2008‐2010 Smartsoft Technology Ltd 47
จาหนาย
RFID warehouse architecture
Confidential & proprietary 48
ความสามารถในการทางานของโปรแกรมบนรถยกสนคา
• เปนโปรแกรมทางานในลกษณะ Graphic User Interface• Interface กบ RFID Reader รน IN510 ผานทาง RS232 และ LAN พรอมทง Interface กบอปกรณ วดความสงการยกของ Lift เพอระบพรอมทง Interface กบอปกรณ วดความสงการยกของ Lift เพอระบตาแหนงการจดเกบในระดบชนได (Option)•โหมดการทางานอตโนมต ทงทาหนาทรบสนคาเขาจดเกบ ยายสนคา และโหลดสนคา
RFID T • แสดงขอมลของสนคาทนทเมอทาการอาน RFID Tag เชนหมายเลข Tracking , Order• แสดงตาแหนงการจดเกบสนคาทนททอาน RFID tag หรอแสดงตาแหนงการจดเกบลาสดของสนคาชนนนเพอทาการยายสนคาการจดเกบลาสดของสนคาชนนนเพอทาการยายสนคา• แกไขปลายทางการจดเกบไดดวยพนกงาน พรอมบนทกขอมลตาแหนงการจดเกบสนคาดวย Location Tag แบบอตโนมต• ระบบรบคาสงโหลดสนคาอตโนมตผานทางระบบ WLAN บอกรายละเอยด
โ ใ โ โ ของสนคาทจะโหลด ชองทางในการโหลด จานวนสนคาทตองโหลด พรอมแจงตาแหนงสนคาอตโนมต• ตรวจสอบการโหลดสนคาอตโนมตทงหมายเลข Order ชองทางการโหลด และจานวนในการโหลดพรอมระบบแจงเตอนเมอโหลดสนคาผดโหลด และจานวนในการโหลดพรอมระบบแจงเตอนเมอโหลดสนคาผด พรอมทงบนทกความผด• เกบสถตการทางานของพนกงานโดยอตโนมต สามารถนามาคานวณ KPI ของพนกงานได
Confidential & proprietary© Copyright 2008‐2010 Smartsoft Technology Ltd 49
Reference CaseReference Case
April 2009 by Rosa ChenApril 2009, by Rosa Chen
Cameras and RFID Produce Better HarvestCameras and RFID Produce Better HarvestSecurity technology used in agricultural applications provides opportunities for manufacturers distributors and system integrators to think outside the box formanufacturers, distributors and system integrators to think outside the box for business prospects.
“…Now, RFID tags can be attached to baskets or tanks, which become RFID‐enabled carriers These carriers will have all information on the
“ A id f b i tl b fi i l f h i t bilit th
RFID‐enabled carriers. These carriers will have all information on the shrimp,… RFID automates the data capture for these processes, linking the information to traceability software…”
“… Aside from being greatly beneficial for shrimp traceability, the initial investment of the technology typically takes one to two years to make a full return on investment,” said Wongkomet. “We are continuously seeing expansion and adoption of new users. So far, it y g p p ,has been slow, but customers are becoming more interested as success of the technology spreads…”
Confidential & proprietary
Reference Case: Reference Case: Traceability in Shrimp Processing Traceability in Shrimp Processing
f i jf i jManufacturing ProjectManufacturing Project
*Thailand Innovation Award *Thailand Innovation Award 20052005
*Showcase in Thailand RFID Forum *Showcase in Thailand RFID Forum 20082008
*Showcase in Motorola Eco*Showcase in Motorola Eco‐‐partner partner 20072007, Malaysia, Malaysia
* Published in RFID Journal & leading * Published in RFID Journal & leading RFID websites in Asia, Europe, AmericaRFID websites in Asia, Europe, America
Customer Company name: Charoen Pokphand Foods Public Company Project name:Traceability in Shrimp Processing Manufacturing ProjectTraceability in Shrimp Processing Manufacturing Project
Project scope: Traceability system, production planning, Productivity using37 RFID terminals, 5 Desktop RFID readers 4,000 Reusable RFID tags 1 set of RFID Middleware, Gateway ver. 1.3 (XML)
Project time frame: 1 year for Pilot, 1 year for roll‐out (Dec 2005‐Dec2007)
Confidential & proprietary
Reference Case: Reference Case: SupplySupply--Chain ManagementChain Management
*Thailand’s first UHF *Thailand’s first UHF RFID, EPC & RFID, EPC & WalmartWalmartCompliantCompliant ProjectProject
Customer Company name: Calcomp Company (Petchaburi)Project name: Walmart Compliance ProjectProject scope Tracking finish goods through supplyProject scope: Tracking finish goods through supply‐
chain complied with Walmart RFID using6 UHF RFID Readers (AWID)2 ALR 9800 (Alien Technology)2 ALR‐9800 (Alien Technology)2 RFID printers (Printronix)1 RFID middleware (OAT)RFID labels
Confidential & proprietary
RFID labels
Tips for RFIDTips for RFIDTips for RFIDTips for RFID
Confidential & proprietary
Tips for RFIDTips for RFID
•• Understand your needs understand RFIDUnderstand your needs understand RFIDCriteria for implementing RFID
•• Understand your needs, understand RFIDUnderstand your needs, understand RFID• System is not just tags and readers, it is integration system• Consider total cost of investment (including maintenance)
• Proportion (HW, SW, Implementation)• Hidden Cost
• Consider tangible and intangible benefitsg g• Compare with alternative technologies• Case Study and Benchmark• Choosing Vendors• Prepare for change management• Continuous Improvement• Continuous Improvement• ROI !!!
Confidential & proprietary
Thai RFID Cluster (TFRIDC)Thai RFID Cluster (TFRIDC)Thai RFID Cluster (TFRIDC)Thai RFID Cluster (TFRIDC)
Confidential & proprietary
MissionMissionพนธกจพนธกจ
พนธกจของเครอขายวสาหกจพนธกจของเครอขายวสาหกจ RFIDRFIDพนธกจของเครอขายวสาหกจ พนธกจของเครอขายวสาหกจ RFID RFID
“สรางความเขมแขงใหกบผประกอบการไทยในการสราง Local Value-added โดpการนาเทคโนโลย RFID ไปประยกตใชงาน
โดยการทางานในเชงรก เพอสรางความรวมมอระหวางผประกอบการ ผใชงาน ผพฒนา นกลงทน และหนวยงานผประกอบการ ผใชงาน ผพฒนา นกลงทน และหนวยงานราชการ เพอสรางความเขมแขงใหกบผประกอบการ RFID
ไทย โดยมรายไดจากการสรางมลคาเพมและบรการใหกบโดยมรายไดจากการสรางมลคาเพมและบรการใหกบ
ภาคเอกชน และการสนบสนนจากภาครฐ”
Confidential & proprietary
ขอบเขตและแบบรางการทางานของเครอขายฯขอบเขตและแบบรางการทางานของเครอขายฯ
Confidential & proprietary
Thai RFID ClusterThai RFID ClusterThai RFID ClusterThai RFID Cluster’Excellence in RFID’’Excellence in RFID’
• E-mail: [email protected], Apiwat thong@gmail [email protected]
Confidential & proprietary