Date post: | 10-Aug-2015 |
Category: |
Documents |
Upload: | paolo-vinella |
View: | 150 times |
Download: | 1 times |
Politecnico di Torino • Tongji University Shanghai • Politecnico di Milano
‘’ POLITONG ‘’ Sino-Italian Double Degree Project
Faculty of Information Technology Engineering
Electronic Engineering Degree
CRF
POWERTRAIN
TECHNOLOGIES
RFID TECHNOLOGY DEVELOPMENT AND
ITS APPLICATION IN ACCESS CONTROL
SYSTEMS
RESEARCH REPORT
Researcher: Paolo VINELLA
Professor: RongYong ZHAO, Tongji University
Pag. 1
Acknowledgements
First of all, I would like to thank the Italian and Chinese Universities for giving me the
opportunity to be engaged in a challenging degree course like Electronic Engineering.
The unique combination of such a skilling experience with an international double
degree project promoted by Politecnico di Torino, Politecnico di Milano and Tongji
University of Shanghai (China) like Politong, joint with the opportunity of a Reseach
Project inside Tongji University has enabled me to gain a set of effective engineering
knowledge mixed with an international challenging and wider academic context.
An huge thank to Professor RongYong ZHAO, that has followed me during the entire
path of the research project with patience, responsibility, skilled suggestions and polite
willingness.
Pag. 2
INDEX 1 Introduction to RFID Technology: Development, Industrial Applications ..................................................... 3
1.1 In brief: what an RFID system is ........................................................................................................................ 3
1.2 History and Development Stages of RFID ..................................................................................................... 5
1.3 Typical industrial applications ............................................................................................................................ 6
1.4 Tendency of RFID ................................................................................................................................................. 7
1.5 Basic communication principles between TAG and Reader ..................................................................... 8
2 Requirements Analysis: Automatic Door and Access Control .......................................................................... 9
2.1 The main idea ........................................................................................................................................................ 9
2.2 System design: main specifications................................................................................................................. 11
2.3 Permission IN/OUT (Green Led, Red Led) .................................................................................................... 12
2.4 Record person’s IN/OUT information ............................................................................................................ 12
2.5 Amount of people in real-time ........................................................................................................................ 13
2.6 Find rules with figures (Amount_In vs Time; Amount_Out vs Time) ..................................................... 14
2.7 Communication with meetings DB (system of visitors reservation) ...................................................... 15
3 Solution Design ............................................................................................................................................................. 17
3.1 Functional Design ................................................................................................................................................ 17
3.2 Database System Design ................................................................................................................................... 18
3.3 Software Work Flow ............................................................................................................................................ 21
3.3.1 TAG Identification ....................................................................................................................................... 21
3.3.2 People In Real Time .................................................................................................................................. 23
3.3.3 Add a visitor ................................................................................................................................................ 25
3.3.4 Computation of total people checks-in and checks-out in one day ........................................... 25
3.4 Software graphical user interface design ..................................................................................................... 27
3.4.1 Registration of an Employee inside the system: RFID TAG set up ............................................... 27
3.4.2 Real Time Tracking and Monitoring of the People Flow ................................................................ 28
3.4.3 People checks-in and checks-out as function of time..................................................................... 29
3.5 Product Selection ................................................................................................................................................ 30
3.5.1 Main criteria to properly choose an RFID commercial product ................................................... 30
3.5.2 Motorola RFID system .............................................................................................................................. 32
4 References ..................................................................................................................................................................... 37
5 Appendix: Motorola RFID solutions ....................................................................................................................... 38
Pag. 3
1 Introduction to RFID Technology: Development, Industrial Applications
1.1 In brief: what an RFID system is
RFID stands for Radio Frequency Identification and consists of a wireless non-contact system that
uses electromagnetic fields to transfer data (usually just to read it) from a TAG attached to an object
to a Reader. With the purpose of automatic identification of people and goods and their tracking.
The main uses include industries (for example, automobile during the assembly stage), livestock,
clothing, and even implanted in people.
The simplest TAGs, as we will see later in details, require no battery: the EM field both reads and
powers them. Furthermore, the connection TAG<->Reader can happen from several centimeters up
to several meters.
Basically, a TAG includes a radio-frequency EM field coil that modulates an external EM field to
transfer an ID number when queried by a READER device. The information is stored inside a very
small non-volatile memory. [ REF. 1 ]
1.1 - 1 Design basics of an RFID system
A more complete schematic view of a general and basic RFID system can be found in the following
picture. As we can see, the interrogation zone is completely wireless, and the transponders
communicate (send data) with an antenna, sometimes integrated in the reader that is able to send
the information read to the computer in a way that the PC can interpret (a specific protocol with
communication rules is used).
2) ID send (encoded radio signal)
RFID Software
on PC
READER
(both TX and RX)
TAG
(both TX and RX)
1) query
Pag. 4
1.1 – 2 Typical RFID system
TAGs can be classified in several ways. First of all, according to the way power is supplied:
Passive TAGs uses the radio energy transmitted by the reader. They are cheaper and more
compact;
Battery assisted passive TAGs rely on a small battery on-board activated when the TAG is
near the reader;
Active TAGs: they come with a battery inside, they are able to periodically transmit their ID
signal.
Generally, the presence of a battery makes the TAG more expensive and bigger in terms of physical
dimensions, however the reading distance usually increases. [ REF. 2 ] Furthermore, TAGs can be:
Read-only TAGs (factory programmed with specific information inside);
Read-write TAGs, kind of field programmable (for example, write once and read multiple).
TAG
IC
- Storing info
- RF signal modem
- Collecting DC power
- Other specific functions
ANTENNA
- Signal reception (RX) and
transmission (TX)
“INLAY coupling”
1.1 – 3 What a TAG basically consists of
Pag. 5
1.2 History and Development Stages of RFID
In 1945, Léon Theremin invented an espionage tool for the Soviet Union, which retransmitted
incident radio waves with audio information. Sound waves vibrated a diaphragm, which slightly
altered the shape of the resonator, which modulated the reflected radio frequency. Even though this
device was a covert listening device, not an identification tag, it is considered to be a predecessor of
RFID technology, because it was likewise passive, being energized and activated by waves from an
outside source. [ REF. 3 ]
Similar technology, such as the IFF transponder developed in the United Kingdom, was routinely
used by the allies in World War II to identify aircraft as friend or foe. Transponders are still used by
most powered aircraft to this day. Another early work exploring RFID is the landmark 1948 paper by
Harry Stockman, titled "Communication by Means of Reflected Power"). Stockman predicted that "...
considerable research and development work has to be done before the remaining basic problems in
reflected-power communication are solved, and before the field of useful applications is explored".
Mario Cardullo's device, patented on January 23, 1973, was the first true ancestor of modern RFID,
as it was a passive radio transponder with memory. The initial device was passive, powered by the
interrogating signal, and was demonstrated in 1971 to the New York Port Authority and other
potential users and consisted of a transponder with 16 bit memory for use as a toll device. The basic
Cardullo patent covers the use of RF, sound and light as transmission media. The original business
plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification,
automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle
performance monitoring), banking (electronic check book, electronic credit card), security (personnel
identification, automatic gates, surveillance) and medical (identification, patient history).
An early demonstration of reflected power (modulated backscatter) RFID tags, both passive and
semi-passive, was performed by Steven Depp, Alfred Koelle, and Robert Freyman at the Los Alamos
National Laboratory in 1973. The portable system operated at 915 MHz and used 12-bit tags. This
technique is used by the majority of today's UHFID and microwave RFID tags. [ REF. 4 ]
The first patent to be associated with the abbreviation RFID was granted to Charles Walton in 1983.
Pag. 6
Usually technology breakthroughs happen during wars and espionage stage of our history, when
the need of new automatic and fast tools joints the need of a fast development to gain advantage
against the enemy. RFID technology represents one of those scenarios, and it can be observed how
an initially military technology can be taken into account by scientists and engineers to further
extend its potential to real people needs. [ REF. 5 ] This motivation has brought RFID technology
toward a huge diffusion in the world, a global market whose revenues are every year of the order of
magnitude of several billion dollars. RFID systems are nowadays cheap, powerful and convenient.
1.3 Typical industrial applications
According to the specific demands and use scenarios, several kind of RFID systems can be used.
Nowadays, the RFID market portfolio is quite huge, and big producers like Motorola even offer a
partnership with other Companies that produce TAGs to extend the support to almost every
possible application of the RFID technology. The frequency band is a way to classify RFID systems:
Band Regulations Range Data
speed Remarks
Approx. TAG
cost in
volume US $
120–150 kHz (LF) Unregulated 10 cm Low Animal identification,
factory data collection $1
13.56 MHz (HF) ISM band worldwide 1 m Low to
moderate Smart cards $0.50
433 MHz (UHF) Short Range Devices 1–100 m Moderate Defence applications,
with active tags $5
868-870 MHz
(Europe)
902-928 MHz
(North America)
UHF
ISM band 1–2 m Moderate
to high EAN, various standards
$0.15
(passive
tags)
2450-5800 MHz
(microwave) ISM band 1–2 m High
802.11 WLAN,
Bluetooth standards
$25 (active
tags)
3.1–10 GHz
(microwave) Ultrawide band
to 200
M High
requires semi-active or
active tags $5 projected
Pag. 7
Signaling between the reader and the tag is done in different ways, depending on the frequency
band used by the tag. Tags operating on LF and HF frequencies are, in terms of radio wavelength,
very close to the reader antenna, only a small percentage of a wavelength away. In this near field
region, the tag is closely coupled electrically with the transmitter in the reader. The tag can
modulate the field produced by the reader by changing the electrical loading the tag represents. By
switching between lower and higher relative loads, the tag produces a change that the reader can
detect. At UHF and higher frequencies, the tag is more than one radio wavelength away from the
reader, requiring a different approach (backscattering). [ REF. 6 ]
1.4 Tendency of RFID
The potential of RFID technology is almost endless: the working principle of RFID is very simple, but
the number of applications is really huge and it grows proportionally with our fantasy and ability to
devise smarter solutions. RFID means nowadays more than just simple tracking. Its real potential
consists in creating a deep network of Readers and TAGs (that is, a multicast connection among
devices to track and detectors) to organize, detect and manipulate data. Once the TAG has been
scanned (that is, read), the information retrieved from it by the reader can be used to compute
certain decisions (more or less critical) that will interest that item itself.
A very smart example of RFID technology is in domestic environment (the so called domotics), and
directly touches everyday life of housewives. Image to have some products inside the fridge - for
example milk and other beverages and food. The fridge can integrate a reader that checks whether
the products’ expiration date has been reached or not. If yes, the fridge will show a warning
message on a display. Furthermore, if a product is missing inside the fridge, it can show an alert to
the user, suggesting him to buy the new product. [ REF. 7 ]
This system may be also integrated with a recycle bin (a second reader, that communicates with the
reader of the fridge). In fact, for example if it detects a bottle of milk inside it, and in the fridge there
is no milk anymore, it means that all the milk has finished and the suggestion to the housewife to
buy new milk can be prompted on a display. Obviously, a product inside the fridge or the recycle
bin can be scanned only if it integrates a TAG, detected by the two readers on which this intelligent
RFID system relies.
Pag. 8
The one quoted so far is just a simple example. Nowadays RFID systems are very useful and crucial
for real-time product tracking inside big logistics companies, as well as during assembly stages of
complex products. Radio frequency identification (RFID) is a rapidly growing technology that has the
potential to make great economic impacts on many industries.
While RFID is a relatively old technology, more recent advancements in chip manufacturing
technology are making RFID practical for new applications and settings, particularly consumer item
level tagging. These advancements have the potential to revolutionize supply-chain management,
inventory control, and logistics. [ REF. 8 ] [ REF. 9 ]
1.5 Basic communication principles between TAG and Reader
A very specific signal modulation is used to allow a TAG to be properly read by a Reader. We focus
on passive TAGs, that receive the power for supply directly by the EM field generated by the Reader.
The field must be always present so that the TAG can reply to the Reader.
Making things simple, the basic sequence of operations when a communication between a TAG and
a Reader happens consists of the following steps:
1) The Reader sends commands to the TAG by means of a modulation of the generated EM
field (which frequency is called carrier);
2) Once the command has been sent, the Reader stops transmitting and just keeps the carrier
active in order to keep the TAG powered on;
3) The TAG answers to the command by generating and modulating a reflected waveform,
forming a message. The TAG is capable of modulating the impedance of antenna, creating a
non-adapted system and a “waveform of answering”). This phenomenon is called
backscattering.
Pag. 9
2 Requirements Analysis: Automatic Door and Access Control
2.1 The main idea
After a brief introduction of RFID technology and its possible applications, we aim to focus with this
handbook on a very specific and widely adopted use of the Radio Frequency identification: the
access control of people through an automatic door.
From now on, we will try to develop the main sequence of steps for a complete design of this kind
of solution. We will start presenting the main problem, explaining what we want to realize and the
degree of functionalities that the final system should possess. Then we will transform the ideas in a
flow of operations, we will select the proper software-hardware couple and we will start to think
about engineering this solution. At the end, a brief software and hardware implementation will be
shown as reference for this kind of RFID application.
The electronic system that will be devised will rely on people identification through RFID technology.
In particular, an automatic door that provides access to a building (or office) should come with two
couples of antennas: one couple on the outer side of the door (which manages people that want to
access the office), and the other couple inside the door (in order to detect the traffic of people
exiting from the office).
When a person wants to enter, he will carry with him an identification card that contains an RFID
chip (that is, a passive tag) that works at 900MHz. At a distance of 3 or 4 meters far away from the
door, the outer couple of antennas should detect the card (and thus the person), identify the person
and check whether he can grant the access, storing the information in an appropriate way. If the
person is not allowed, the door must be kept closed and a red light should turn on. Vice versa, if the
access has been granted a green light can turn on and the door can open to welcome that person
inside the office.
Again, when a person inside the office would come outside, the inner couple of antennas should
identify again that person and monitoring / storing other useful data (for example, the time when
exiting happens).
This example can show how an essentially easy form of identification (the simple detection of a
unique ID of a TAG by means of antennas connected to a Reader) can bring to a quite complex
Pag. 10
implementation. We have just introduced the concepts of data storage, analysis and manipulation.
The real success of a good RFID implementation is not just a matter of reliable TAG detection and
reading: this is just the starting point of a process, of a more complex software-hardware
architecture, that is able to store, analyze, compute and retrieve a complete and wide set of data.
This is the truly complete meaning of a good identification. Identify means much more than just
simple hardware detection and tracking.
The following one is a very general and intuitive scheme of what the final solution will consist of.
Obviously this picture focuses more on hardware physical component. Just remember that the most
of work regards software, present inside the PC that manages the system itself:
2.1 – 1 A schematic intuitive view of the final system
In the following sub-paragraphs we will analyze some ideas that can be devised from this general
solution. We will see how those idea can be hints themselves to help building the physical and
logical structure of our system.
READER
AUTOMATIC DOOR
Inner Antenna couple A3-A4
Outer Antenna couple A1-A2
3 / 4 mt.
900 MHz
TCP/IP , 485
Pag. 11
2.2 System design: main specifications
Every engineered project must start from strict specifications coming from the customer that asks for
the design of a specific solution. For our system, those are the main specifications and building
blocks of the system:
A computer for data computation;
A system of four antennas (two couples), connected to a Reader;
A full-duplex interface and transmission protocol from Reader and computer (TCP/IP or 485
preferred);
Some software libraries provided from the hardware vendor of the Reader that allow basic
routines and help to write the system’s managing software relying on RFID;
Main software layer written in C# object-oriented programming language, on Visual Studio
2010 environment, and interacting with a Database;
SQL Database in which to store the information;
Need of recording specific data (IN/OUT information, amount of person in real time,
communication with a system of visitors reservation) and carrying out specific operations
(door opening or not according to red or green light).
Electronic access control systems using data carriers are used to automatically check the access
authorization of individuals to buildings, (commercial or event) premises, or individual rooms.
We tend to use an online systems, since the access authorization of a large number of people has
to be checked at just a few entrances. This is the case, for example, at the main entrances to office
buildings and commercial premises. In this type of system, terminals are connected to a central
computer by means of a network.
The central computer runs a database in containing authorization data. Changes to an individual’s
access authorization can be made by a single entry on the central computer of the access control
system. [ REF. 10 ]
This is advantageous, because it means that sensitive security areas can be protected against
unauthorized access. The data carriers of an online system only have to be able to store a small
Pag. 12
amount of data, for example a unique pass number, that will be used to query the database and
check whether the person carrying that card is allowed to access or not.
2.3 Permission IN/OUT (Green Led, Red Led)
The automatic door with which people will interact by means of RFID will provide useful information
to each person that tries to go in. We can image that if the person can grant the access, the door
will open and a green light will turn on to inform that the permission level of that person is sufficient
enough to step inside the office. Viceversa, if the person is not allowed to enter the office, the door
must be kept closed and a red light will visually inform that it is not possible to go on.
It is possible to couple the led lights with a complementary system that makes interaction between
the RFID system and people more “human”. A possible idea, that will be part of this project, is the
utilization of a synthesis device that is able to simulate the human voice. An electronic voice will
welcome the person inside the building or inform him that access can’t be granted. Some examples
could be: <<Good afternoon Mr. Zhong>>, <<Good morning Mrs. Annie>>, <<I am really sorry but
you have not been recognized from our database, and you cannot access this area. Please contact
the main reception>>. The voice can adapt according to the daytime. [ REF. 11 ]
2.4 Record person’s IN/OUT information
Every RFID system must rely on a strong software interface and data storage / retrieving system. In
fact, once the person’s identification TAG has been scanned from the Reader, and once the related
information is sent to the computer, a database must be queried to check whether that person can
grant the access. If the answer is positive, the door will open, otherwise, it will be kept close.
Obviously, for both the events proper information must be recorded back inside the database.
We have to devise and image the software as interaction between a main program, always
executing on the computer, and continuous interaction with a database that contains useful
information. We will see in the following chapters how we can model this structure, what information
the database should contain and how interactions with the main executing program should happen.
So far, it is important to keep in mind that the database must be a dynamic structure and contain
Pag. 13
both “static” field like record for every person and his unique ID and a “dynamic” part regarding the
real time recording of people getting in and/or out the office.
2.5 Amount of people in real-time
The structure we have to devise must record and keep track, for each unit of time, the number of
people inside the office. What does that mean? We can image two “global counters” (we avoid up
to now to go deeper inside programming): the first one that increments each time a person goes
inside and the second one that increments its value each time a person exits. Thus, for each unit of
time, the difference between the first and the second time will express the amount of people inside
the building in real-time. This data is very useful for different goals and applications:
the company to which the office belongs may have a security policy strategy that is function of
the number of people inside the building. If this number grows and overcomes a prefixed
threshold security problems may happen (for example, security people is trained to manage not
more than a certain amount of people standing in the same place);
the air conditioning system may interact with the
system we are building asking for the number of
people inside the room to vary the power of its
engine according with;
in case of alarm of fire (or other similar warning),
fireman would know immediately the number of
people to rescue;
the office might include intelligent camera system
that is able to detect the flow of people or suspicious
behaviors in corridors, and the real number of
people, detected by means of the RFID system, may
become crucial for this application as well.
Obviously, those are just examples and there might be other ones.
RFID System
AirCondition
System
Anti-fire Security System
Intelligent Camera System
Security System
2.5 – 1 RFID System interactions
Pag. 14
2.6 Find rules with figures (Amount_In vs Time; Amount_Out vs Time)
The RFID system that we aim to design will record in a database, for each person who grants the
access, the time at which that person goes inside the office and the time when the same person
exits from it. Obviously this kind tracking must be done only for people that grant the access. [ REF. 12 ]
We can image to plot the amount of people entering and exiting the office in respect to the time.
For example, we could deal with the following figures:
2.6 – 1 A schematic intuitive view of the final system
0 0
2
3 3
4
3 3
2
10
0
2
4
6
8
10
12
8.00 9.00 10.00 11.00 12.00 1.00 2.00 3.00 4.00 5.00
AM
OU
NT_
OU
T
TIME (HOUR)
People check-out as function of time
13
8
6
3
0 0 0 0 0 00
2
4
6
8
10
12
14
8.00 9.00 10.00 11.00 12.00 1.00 2.00 3.00 4.00 5.00
AM
OU
NT_
IN
TIME (HOUR)
People check-in as function of time
Pag. 15
In this example, we deal with a quite small number of people, and we can see how most of them
enter at 8 AM and exit at 4 PM. Starting from this data, that can be easily obtained querying the
database, it is possible to know how many people, at a given time, are inside the office.
For instance, how many people is inside the office after 1 PM? The result can be easily obtained by
considering the two plots from the start (8 AM) until the desired time (1 PM). In the previous plots,
this is highlighted with a red straight line. In fact, we just have to keep track, hour by hour, by means
of two counters that we have already named before, the incremental number of people entering
and the incremental number of people exiting. The difference between the first and the second
counter gives us the final result (that is, the number of people currently present inside the building
at a given time).
In our case:
{
2.7 Communication with meetings DB (system of visitors reservation)
One more freedom degree can be given to our system: the interconnection with a reservation
system. In fact, it seems legit to assume that not only employees could access the office. It is
common that, more or less frequently, a visiting person will show up once a meeting has been set
up in advance. What if that person needs to enter an RFID-protect environment? Usually the person
should go to the reception which provides him a temporary pass, which is based on RFID
technology as well and allows a temporary (and maybe also restricted) access. [ REF. 13 ]
We could thus imagine a second database, on which information regarding the people that will visit
the office in the following days is contained. When the visiting person uses his “visitor RFID card”,
our RFID system should be able to communicate with the database of reservations to check if that
visitor effectively can be recognized as a visitor or not. And again, the system of red/green light
should be used.
Pag. 16
Once he is recognized, maybe other actions can be taken: our RFID system may inform the
reception once check-in happens, so that an employee of the Company can come and welcome the
visitor.
Furthermore, it is possible to restrict the access for that person: for example, if inside the database of
visitors a specific visiting time frame is specified, the RFID system, after detecting the access attempt
of the visitor, can check whether that person effectively tries to check in at the right meeting time.
2.7 – 1 A schematic intuitive view of the final system
SYSTEM RFID
SYSTEM RESERV.
Card I.D.
{
Pag. 17
3 Solution Design
3.1 Functional Design
This chapter aims to focus on a detailed level of explanation concerning our system. Every system is
designed to carry out one or more than one main functions and it can be seen as the aggregation
of smaller sub-systems interconnected, each of which focused on a specific sub-task, that exchange
information and process data fed as input to the global system, and finally produce the overall result.
The IDEF0 (implemented through Microsoft Visio 2010) has been used to show the building blocks
(sub-functions). An idea for our RFID system that follows the specifications is the following:
3.1 – 1 IDEF0 system modelling
Computer System
A0
Computer System
A0
RFID Reader
A0
Antenna Out
A0
Antenna In
A0
TAG
A0
LED Driving
A0
Electronic Voice
A0
Door Opening/Close Device
A0
Managing Software
A0
Databases
A0
System Time Clock
User Input Requests
RFID System Output to User
LEDs, Door and Voice driving
Query
Data
Current Time
RFID Reader information
Pag. 18
Briefly speaking, a computer system is interconnected to the RFID Reader that, by means of two
couples of RFID antennas, is able to detect a TAG both from the inner side and the outer side of the
door.
On the computer, a real-time running software is able to detect the information (ID) coming from
the Reader and, after performing specific task with a database, is capable to execute algorithms to
drive the LEDs on the door, to control its opening/closing procedures and turn on an electronic
voice that informs the user of what is happening around him. [ REF. 14 ]
The database represent one of the core parts of the system and we will dedicate a paragraph for it.
3.2 Database System Design
The database (DB, for short) is an electronic collection of organized, reliable, non-redundant and
interconnected data, dynamically updated, that contains the specific information of the people
interacting with the RFID system. The DB must be seen as a hierarchical structure composed of
several connected parts (that is, tables) organized in such a way that when the main software
queries this structure all the relevant information must be provided in an useful format.
A possible basic structure of a database used by our system is shown below:
3.1 – 2 IDEF0 Database modelling
Employees
PK,FK1 ID [string]
Name [string] Surname [string] Title [string] Email [string] Access_Enabled [boolean]
In_Out
PK ID [string]
Date_Time [YY:MM:DD:HH:MM:SS] In_Out [1/0]
Visitors
PK ID [string]
Name [string] Surname [string] Company [string] Email [string] Visit_Starts [YY:MM:DD:HH:MM:SS] Visit_Ends [YY:MM:DD:HH:MM:SS]
In_Rejects
PK ID [string]
Date_Time [YY:MM:DD:HH:MM:SS]
ID Query from software
Employee_Type
PK ID [string]
SystemAdmin [0/1] GeneralManager [0/1] Receptionist [0/1]
1 1 1
1
N
N
N
N
1
1
Pag. 19
It is very important to highlight that this is just an example, a basic idea in which only the most
relevant information is shown. The database system can be extended according to specific
requirements asked by the customer.
We do not aim to focus on every specific implementation particular here, the goal of this handbook
is to give an introduction and a brief idea about a generic kind of database and how it can be used
and connected with the main software executing on a computer that is interfaced with the RFID
system.
The main tables of the DB include:
Employees: people working inside the Company, characterized by an unique ID (which is the
same one present in their personal RFID TAG card);
Employees Type: the table is required to specify the privilege level regarded to every kind of
employee; according to their privilege, the software can allow only certain operations;
Visitors: visiting people from the outside; like the employees they are characterized by an
unique ID but they are allowed to enter inside the building only for a given period of time;
In_Out: the table contains all the stored records of people entering end exiting the building,
specifying, for each of them, the entering and exiting time;
In_Rejects: information regarding people whose access has not been granted (that is, door
kept closed, red LED, etc…).
The database is continuously queried and updated by the software. In the diagram shown in the
previous page that describes the main shape of the database, it is possible to see a big arrow
coming from the “outer world”: it is the main query that the software performs to the database.
In fact, when an event happens (that is, an RFID read for example), the software must check a match
with the ID searching in the Employee table, but also inside the one of the Visitors.
Obviously, this is not the only interaction (direct connection) between the database system and the
software: in fact, the software itself can write (update) the tables In_Out or In_Rejects according to
the fact that a person grants or not the access. [ REF. 15 ]
Pag. 20
The software can dynamically vary the tables of the employees and the visitors, and so on.
Furthermore, the software can compute some outputs (for example, the amount of people in real
time) by querying and retrieving data from the table In_Out.
We will focus on this aspect (that is, the operative parts of the software) in the next section of this
chapter 3, that focuses on the work flow of the software.
The Database structure can be implemented using MySQL environment. For example, it is possible
to install a complete server solution on a PC like WAMP that also provides PHPMyAdmin control
panel that allows to easily create and setup the Database and its tables. For our example, this is a
possible output after using PHPMyAdmin tool:
3.1 – 3 MySQL Database Structure (Tables)
The one just quoted is a screenshot in which it is possible to identify the structure of the table
rfid_system, that is its tables. For each table, one or more fields need to be specified.
Obviously the number of entries (rows) in every table varies according to the need of the
management software, the time-evolution of the RFID system and other kind of events related to
the software-hardware interconnection. [ REF. 16 ]
Let us have a brief look inside the table Employees: this is its structure, as PHPMyAdmin shows us:
.
Pag. 21
3.1 – 4 MySQL Database, Employees table structure (Fields)
3.3 Software Work Flow
In this chapter, some flowcharts illustrating the main operations of the system will be shown. For
example, they will relate to set of operations like: start, execution, for example condition that if
matched green light, otherwise red light,… We will treat only some examples, the most relevant.
This workflow might be considered as raw reference when implementing the main software
executing on the machine to manage the RFID system. Software can be built starting from these
ideas and expanding it with more specific subroutines to add more functionalities and a better
degree of flexibility to your solution.
3.3.1 TAG Identification
This routine represents one of the main building blocks of the software running on the PC to
manage the RFID system. It regards the set of actions that need to be performed when a person
approaches close to the door and the RFID antenna detects a TAG in the proximity region. When
this action happens, the software has to check both inside the table of Employees and inside the
one of Visitors to check if the identified ID is present inside the database (and if the user has still
privileges to enter). If not, an error will be given and the door will not open, vice versa the system
will welcome the user inside the building.
Pag. 22
3.3.1 – 1 TAG identification flowchart
START
TAG ID detected?
Take ID as input
QUERY: select from Employees
table where ID matches the input ID
QUERY is null?
QUERY: select from Employees table where ID
matches the input ID
QUERY is null?
Turn ON RED light
Electronic Voice: «REJECT»
Write inside In_Reject DB
tables, recording input
ID and time
Turn ON GREEN light
Electronic Voice: «WELCOME»
Write inside In_Reject DB
tables, recording input
ID and time
Open DOOR
Turn ON GREEN light
Electronic Voice: «WELCOME»
Write inside In_Reject DB
tables, recording input
ID and time
Open DOOR
NO
YES
YESNO
YESNO
THE SAME FUNCTION CALL! Only the ID changes (but writing into In_Reject table
does not need to distinguish between Employee and Visitor!)
Pag. 23
In the flow chart just quoted we assume that the user, if found, has the right to access the building.
This assumption comes from a need of showing only the main idea and do not make the flowchart
too deep and complex. However, because inside the database other fields allow to check whether
the user (“Access_Enabled” for an Employee, “Visit_Starts” and “Visit_Ends” for a Visitor) is enabled
for the access, this further check actually needs to be performed. But it is just a matter of two more
nested IF conditions that needs to be checked after the QUERY returns a positive result – that is, it
effectively says that an user has been found. [ REF. 17 ]
3.3.2 People In Real Time
This script is one step closer toward the coding of the routine that computes the amount of people
in real time:
3.3.2 – 1 People in Real Time
START
User from GUI selects button
«View Real Time People»
Function Call
Retrieve information on
time (Year, Month, Day)
QUERY: select rows such that time is today
and ID is In but not Out
RETURN number of rows of the
QUERY
END
Pag. 24
Keeping in mind the structure of the tables that compose the database, it seems interesting to go
deeper regarding the QUERY just mentioned in this flow chart. We can make two assumptions:
Every person checks-in and then checks-out just one time every day. This is the easy
scenario, and the QUERY can assume the following structure:
SELECT ID FROM In_Out WHERE Date_Time=Today AND In_Out=1 AND ID NOT IN (
SELECT ID FROM In_Out WHERE Date_Time=Today AND In_Out=0 )
Every person can check-in and out more than one time ever day. For example, he goes out
for lunch time then comes back, or has to do something related to work outside the building
for some time, during the same day, and maybe even more than one time in the same day.
This situation in terms of QUERY is more complicated, and the structure can be modified as:
SELECT ID
FROM In_Out T1
WHERE T1.Date_Time=Today
AND T1.In_Out=1
AND P1.ID NOT IN ( SELECT ID
FROM In_Out T2
WHERE T2.Date_Time=Today
AND T2.In_Out=0
GROUP BY T2.ID
HAVING COUNT(*) = ( SELECT COUNT(*)
FROM In_Out T3
WHERE T3.Date_Time=Today
AND T2.In_Out=1
AND T2.ID=T3.ID ) )
Pag. 25
3.3.3 Add a visitor
The flow of operations to add a visitor to the Database is quite trivial, however it represent another
important part of the software and seems interesting to have a brief look at it. This procedure is
quite sequential, not too much checks need to be done nor conditional decisions are needed. We
assume that when the operator fills in the form with the visitor, the software already checks that all
required fields are full and that the input format is correct (for example, no letters in a phone
number fields, etc…):
3.3.3 – 1 Adding a new Visitor to the Database
3.3.4 Computation of total people checks-in and checks-out in one day
Given a time in a day, the software can compute until that moment and starting from the beginning
of the working day (that here we assume to be 8AM) the total number of checks-in and checks-on.
That is, the total number that the access door opened to let a person enter and the total opening
from the inside to the outside to let some of people that already entered going out. These counts
are given by two simple QUERIES. From the point of view of coding, the keyword COUNT(*) should
be used, after a selection returns a subset of the database both for the checks-in and for the
START
User from GUI selects button «Add Visitor»
New window opens, user fills in data about visitor
in a form
QUERY: write into Visitors
table the new entry
END
Pag. 26
checks-out. Finally, it is sufficient to assign those values to two variables and print their content
inside the graphical user interface.
Again, a brief flowchart illustrating the basics of this function is shown below:
3.3.4 – 1 Number of total Checks-in and Checks-out in one day
START
User from GUI selects button «Total Checks-in and out»
QUERY: number of entry in In_Out table when In_Out=1 for the current day
END
Function Call
Checks_In <= QUERY result count
QUERY: number of entry in In_Out table when In_Out=0 for the current day
Checks_Out <= QUERY result count
RETURN Checks_In and Checks_out
Pag. 27
3.4 Software graphical user interface design
Taking into account the Software Workflow routines, the next step is represented by the actual
coding of a software solution able to manage the RFID system. Again, in the following sub chapters
we provide a brief introduction, showing how the software can graphically interact with the user.
That is, the GUI (graphical user interface) design.
Every GUI needs to be designed in order to let the user feel comfortable with the software,
providing and highlighting the main functions and operations of the software and bringing them just
under the simple click of a mouse over a button in order to make easy the RFID software
management work.
This is why a few hints are present in the following paragraphs, where three main software interfaces
are partly developed and taken into account as starting idea for your own coding.
3.4.1 Registration of an Employee inside the system: RFID TAG set up
The first interface sets up a new RFID TAG, by associating an Employee personal information
(retrieved from the HR system) to it. The association is unique. Here the GUI design:
3.4.1 – 1 Add a new Employee to the RFID system
Pag. 28
As we can see, through this window it is possible to add a new Employee of the company to the
database, after fill up his personal information and his personal ID. While filling the ID field, the sub
field “Serial Number” of the RFID TAG (that is, the last part of the RFID ID sequence) will
automatically match the employee’s personal ID. The software allows to take under control the
relevant information concerning the RFID ID TAG that, it is important to specify again, is uniquely
associated to one employee.
Finally, by means of other software modules, it will be possible to specify to which areas of the
building the employee is able to get access. For example, we can exclude some doors to be opened
when he tries to access in order to restrict his privileges.
3.4.2 Real Time Tracking and Monitoring of the People Flow
Our RFID software is a real time complex environment, that acts by continuously monitoring the
activity of people in and out the building – that is, a tracking of people flow must be done. This
software window allows to check the current number of people inside the building, how many IN,
how many OUT and real time changing data in terms of check-in and check-out:
3.4.2 – 1 People Flow Tracking and Monitoring in Real Time
Pag. 29
As we can see, a table which is updated continuously shows every event (that is, RFID ID <-> Reader
communications). For example, we can see that in about the last thirty minutes, six actions
happened. Three employees successfully made a check-in, and the second one made a check-out
after a few minutes. Checks-in are highlighted in green, while checks-out in blue. If a reject happens
(and in the previous example it actually happens), the system shows a red highlight warning,
displaying again all the relevant information. [ REF. 18 ]
These events must be recorded inside the database, for future inspection. We already spent some
words discussing how important is to keep track of all the relevant information: this is why for every
entry we also keep track of the number of door where the check-in, check-out or reject happens.
A specific convention has been used: every door is numbered with two digits; the first one specifies
the floor, while the second one is the number of the door for that floor. For example, 3-2 means the
door number 2 of the 3rd floor.
3.4.3 People checks-in and checks-out as function of time
The last software graphical interface that is presented in this chapter is an idea of implementation
about the chapter “2.6 Find rules with figures (Amount_In vs Time; Amount_Out vs Time)”: an
interactive chart displaying people IN/OUT as function of time:
3.4.3 – 1 Checks-in and Checks-out as function of working time
Pag. 30
Two charts display the amount of successful checks-in and checks-out of people as function of time.
As we can see, a scrollbar situated in the lower side of the windows allows the user to adjust the
desired time of the current working day at which one wants to see the amount of people inside the
building at that time. In the example, at 1:30pm 180 people are physically present inside the building.
The software has been implemented using Microsoft Visual Studio 2010 Edition, with .Net
Environment and based on C# object-oriented coding language. [ REF. 19 ]
3.5 Product Selection
Once the software’s main idea has been devised, it is finally time to choose a proper hardware for
the RFID system. It will be basically a system made of:
Reader;
Antennas;
RFID ID compatible TAGS;
A proper protocol of communication with a computer system;
A set of DLL provided by the RFID system producer.
The last element of the list is more software-like, and it represents a very important parameter to be
taken into account when we select an RFID system rather than another one. DLL, aka Dynamic
Linked Library, is a more or less big package of software functions written by the RFID producer
which can be imported in the software environment we choose to utilize in order to implement our
RFID management software. The DLLs contain important routines in order to call, from an higher-
level software like C++, Java or C#, some low-level routines that are able to link directly the software
with the RFID hardware. We can think about a sort of “middleware” between the software we are
going to code and the RFID hardware system. [ REF. 20 ]
3.5.1 Main criteria to properly choose an RFID commercial product
It is time to buy the RFID hardware system that will be used for this project. How do we choose it?
Obviously some criteria should be accomplished in order to choose in a correct manner the best
product that suits our needs.
Pag. 31
Several factors can be considered. First of all, the fact that as engineers we have to accomplish our
customer’s specifications, the specifications themselves imply a first selection and discrimination
among products currently present on the market: some of those can include the frequency band,
the support for a certain number of antennas, the maximum distance at which a TAG can still be
read, the protocol and the connection with a computer system, an API support in order to help the
software coding. Other factors include obviously the price, some power requirements, and how the
RFID hardware system’s Company supports us in terms of customer assistance and documentation.
3.5.1 – 1 Main criteria to select some RFID hardware systems from the market
The market of RFID is a real jungle, but these criteria help a lot to walk through the wilderness and
pick up a solution that satisfies our needs. For this example, after searching over the web some
solutions, a possible system, which seems very valid, has been found: it is offered by Motorola and it
will be briefly introduced and presented in the following chapter.
COST
TAGs SUPPORTED BY READER
API SUPORT
PC CONNECTION / PROTOCOL
FREQUENCY BAND
MULTI-ANTENNA SUPPORT
TAGs MAX. READING DISTANCE
READER POWER SUPPLY WAY
SUPPORT / DOCUMENTATION
RFID
Vendors’
Offers
POSSIBLE
SOLUTIONS
Pag. 32
3.5.2 Motorola RFID system
Motorola possesses a quite strong product portfolio of RFID solutions, with more than 80 years of
industry leadership, the broadest RFID portfolio, accurately tested and proven RFID readers. The
Company has developed several strategies in the fields of radio communication devices, wireless
infrastructure, data capture and mobile computing products. The Company holds over 300 RFID
technology patents that have allowed it to deliver many industry firsts — including the first EPC RFID
handheld reader, the first EPC RFID portal system and the first EPC RFID mobile reader. Motorola
offers a business and industrial line of fixed, mobile, handheld and hands-free RFID readers that can
meet the needs of most any environment.
MOTOROLA RFID FIXED READER FX7400
The Motorola FX7400 RFID Reader packs the best-in-class RFID features into a sleek, attractive form
factor. With a low profile and impressive array of integrated features and functionality, the FX7400
makes RFID cost-effective for business class applications. Motorola ensures that the RFID reader
offers a high value with a low cost per read point.
Pag. 33
The FX7400 is easy to mount and manage. An auto discovery function helps detect devices once
they are plugged into the network; pre-defined configuration files simplify setup for various
applications and environments and a testing tool lets you verify that your FX7400 readers are up,
running and ready to put into operation. There is support for the Integrated Power over Ethernet
(PoE), while LLRP (low level reader protocol) support delivers seamless integration with the existing
IT infrastructure, including wireless LANs and standard middleware.
Highly integrated features, including PoE, GPIO and management software: provides a low cost per read
point — and a low TCO;
2-port and 4-port reader configurations: increases application flexibility and optimizes capital investments
EAHS (Environmental Air Handling Space): approved and suitable for plenum areas - operation within walls
and ceilings;
Open standards-based architecture:
• EPC standards-based defined reader management
• Auto-discovery
• Flexible firmware upgrade features
Next generation reader platform, including dense reader mode support: best-in-class read rates deliver
superior read performance;
Microsoft Windows CE 5.0 direct application hosting; 64 MB RAM/64 MB Flash: enables easy integration of
a wide range of thirdparty applications for fast application deployment; supports upgrading to meet future
requirements; maximizes product lifespan; provides outstanding investment protection;
EPC Global LLRP and RM interface support; comprehensive API support — .NET, C and Java: Simplifies
application development.
Full specifications:
Pag. 34
Finally, we can see further useful technical specification in which the FX7400 is compared with the
second fixed RFID reader currently offered by Motorola, the FX9500:
MOTOROLA RFID ANTENNA AN480
Motorola’s family of (RFID) Antennas offers the versatility and performance required to meet diverse
environmental and application needs. When used in conjunction with Motorola’s Fixed RFID Readers,
communication with Electronic Product Code compliant RFID tags is accurate, fast and efficient.
Pag. 35
The AN480 single port antenna offers maximum performance and flexibility. The low axial ratio is
nearly 50 percent lower than typical competitive devices, delivering a more uniform gain — and
better performance. The wide frequency range enables this antenna to be utilized in worldwide
deployments, providing cost-efficiencies and a simplified RFID infrastructure. The AN480 can be
installed throughout the enterprise in manufacturing and warehouse floor environments, or any
dock door receiving application. As with all Motorola antennas, the AN480 uses Motorola’s standard
mounting bracket - mounting the antenna for the first time or upgrading an existing Motorola
antenna with the AN480 is fast and easy.
Excellent wide frequency band antenna response covering 865 Mhz ~ 956 Mhz , ideally suited for global
deployments
Available in right and left hand polarization.
APPLICATIONS:
Ceilings and walls to create superior read zones around shelves
Doorways and chokepoints where boxes and pallets are moving through
Portals, outdoor gates and conveyors
Indoor and outdoor applications
Here a full-specs datasheet where this product is compared with the AN720, a more powerful of the
same series which is certificated compatible with the FX7400 reader as well:
Pag. 36
Finally, an useful detailed specification scheme is quoted below:
RFID TAGS: SELECTION
When it is about RFID TAGs, the market is really huge. A lot of Companies offer TAGs with different
form factors, materials, weight, cost and applications. Motorola, with the help of the Rutgers
University RFID Research Center, has developed the “RFID Tag Selection Report”, an huge report
that is a reference guide and resource that can help potential users identify the best tag(s) for their
prospective RFID application(s). The report includes RFID tag performance testing results, detailed
information about a wide range of RFID tags and information about providers of those tags. The
RFID readers and antennas used in this testing are all by Motorola. The TAGs come from an huge
variety of TAGs manufacturers. It is up to you to choose the TAGs that best fits your needs.
The solution of Motorola, from the Reader to the Antennas and the TAGs support is very complete.
From the technical datasheet it is possible that it completely matches our goal (the door access
control RFID system) and can thus be taken into account to be used as hardware part for our RFID
system.
Pag. 37
4 References
1. “Radio-frequency identification” – Wikipedia - http://en.wikipedia.org/wiki/Radio-
frequency_identification
2. “RFID (Radio Frequency Identification): Principles and Applications” - Stephen A. Weis, MIT CSAILB
3. An ebook regarding introduction on RFID – Novarex – www.rfid-soluzioni.com
4. “RFID Handbook - Fundamentals and Applications in Contactless Smart Cards and Identification” -
Klaus Finkenzeller, Wiley -
5. "Genesis of the Versatile RFID Tag" - http://www.rfidjournal.com/article/view/392/1/2
6. Landt, Jerry (2001). "Shrouds of Time: The history of RFID" -
http://www.transcore.com/pdf/AIM%20shrouds_of_time.pdf
7. Weis, Stephen A. (2007), RFID (Radio Frequency Identification): Principles and Applications -
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.5224
8. Daniel M. Dobkin, The RF in RFID: Passive UHF RFID In Practice, Newnes 2008 ISBN 978-0-7506-
8209-1, chapter 8
9. Bill Glover, Himanshu Bhatt ,RFID essentials, O'Reilly Media, Inc., 2006 ISBN 0-596-00944-5
10. Paolo Magrassi (2001). "A World Of Smart Objects: The Role Of Auto Identification Technologies" -
http://www.gartner.com/technology/home.jsp
11. RFID's Second Wave, BusinessWeek - http://www.businessweek.com/stories/2005-08-08/rfids-
second-wave
12. Roberti, Mark (2004-12-16). "EPCglobal Ratifies Gen 2 Standard". RFID Journal -
http://www.rfidjournal.com/article/view/1293
13. Bill Glover, Himanshu Bhatt, RFID Essentials, O'Reilly Media, Inc., 2006 ISBN 0-596-00944-5
14. "Radio Silence". The Economist. 7 June 2007 -
http://www.economist.com/node/9249278?story_id=9249278
Pag. 38
15. "What's New". Radio Frequency Identification (RFID) - http://www.acq.osd.mil/log/rfid/index.htm
16. Ilyas, edited by Syed Ahson, Mohammad (2008). RFID handbook : applications, technology,
security, and privacy. ISBN 9781420054996
17. "System and Method for Providing a Low and Narrow-Profile Radio Frequency Identification (RFID)
Tag" USPTO.GOV - http://appft.uspto.gov/netacgi/nph-
Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-
adv.html&r=1&p=1&f=G&l=50&d=PG01&S1=20100127876&OS=20100127876&RS=20100127876
18. Markus Hansen, Sebastian Meissner: Identification and Tracking of Individuals and Social Networks
using the Electronic Product Code on RFID Tags - https://tepin.aiki.de/blog/uploads/2007-hansen-
meissner-tracking-epc-rfid-ifip.pdf
19. FTC "Radio Frequency Identification: Applications and Implications for Consumers" (March 2005) -
http://www.ftc.gov/os/2005/03/050308rfidrpt.pdf
20. RFID faq - http://www.rsa.com/rsalabs/node.asp?id=2120#13
5 Appendix: Motorola RFID solutions
Finally, in the following pages, some PDFs coming from Motorola global website illustrating all the
main aspects and features of the RFID solutions offered by Motorola. The information of Motorola
RFID reported in the previous chapters come all from these PDFs.
Motorola rFID at-a-GlancEMaxIMIzE thE bEnEFIts oF rFID wIth Motorola’s coMplEtE rFID proDuct portFolIo
PAGE 3
thE InDustry’s broaDEst portFolIo oF rFID rEaDErsMotorola’s RFID products help companies and organizations increase visibility through automation and allow them to more efficiently manage their operations. And, no matter where you want to deploy RFID, we have a reader for your application. Only Motorola offers a business and industrial line of fixed, mobile, handheld and hands-free RFID readers that can meet the needs of most any environment — from the carpeted office space to the retail sales floor, the warehouse, the production line and even the dock doors. Our fixed readers completely automate the capture of inventory information. Our handheld readers allow workers to keep accurate inventories and locate specific assets quickly and easily. While our mobile and hands-free readers allow for dynamic and point of sale read points, enabling increased visibility throughout the enterprise.
tEstED anD FIElD provEn bEst-In-class solutIonsMotorola has more fixed, handheld and portal RFID systems installed than any other RFID provider, so you get the peace of mind that comes from choosing
RFID products that are well-tested in practically every industry — including warehousing, retail, transportation and logistics, manufacturing, government, aviation, energy and utilities. And when you choose Motorola, you get access to our industry-leading, world-class partner network so you can get your RFID solution up and running rapidly, reducing deployment time and cost and allowing you to begin reaping the benefits of RFID faster, for a faster return on investment.
a lonG hIstory oF InnovatIvE tEchnoloGy, InDustry FIrsts anD a wEalth oF rEal-worlD ExpErIEncE In your InDustryWhen you choose Motorola, you get leading edge RFID technology. We hold over 300 RFID technology patents that have allowed us to deliver many industry firsts — including the first EPC RFID handheld reader, the first EPC RFID portal system and the first EPC RFID mobile reader. And when it comes to experience, Motorola is unsurpassed. We’ve spent decades deploying some of the world’s largest and most successful RFID implementations in some of the world’s largest companies.
EvErythInG you nEED to GEt thE Most out oF rFID In your busInEssWhen you choose Motorola for your RFID solution, you get the peace of mind that comes with more than 80 years of industry leadership, the broadest RFID portfolio, the most tested and proven RFID readers, plus performance that consistently sets the industry benchmark. In addition, our RFID solutions complement Motorola’s broader enterprise mobility portfolio of radio communication devices, wireless infrastructure, data capture and mobile computing products. Now, you can deliver the information each and every one of your workers needs to automate manual processes, improve efficiency and increase task accuracy. The result? Your employees will work more efficiently and be more productive. You’ll get more value out of your RFID data. And you’ll enjoy a faster return on your RFID investment.
Motorola gives you:
product Description Geographic availability*
operating system cpu Memory Expansion
slot
hanDhElD anD hanDs-FrEE rFID rEaDErs
Mc3190-z Designed specifically for customer-facing and business environments, the MC3190-Z starts with Motorola signature rugged design and high performance, then adds the ergonomics required for all day comfort and ease of use. Our advanced, high efficiency RFID reader engine delivers faster read rates and higher throughput. The groundbreaking antenna combines the benefits of linear and circular polarization for superior read range and coverage. And the MC3190-Z increases application versatility with the ability to read RFID tags, as well as capture 1D and 2D bar codes.
• NA • LATAM • EMEA • APAC
Microsoft® Windows® Mobile 6.5
Marvell PXA320 @ 624 MHz
256MB RAM; 1GB Flash
N/A
Mc9090-G rFID The industrial-class MC9090-G RFID brings handheld, on-the-spot RFID capabilities to the most extreme environments. These multimodal RFID readers provide mobile workers with all the tools needed to get the job done right and fast — with 1D/2D bar code scanning, digital imaging, RFID tag reading and writing, and wireless connectivity to business applications. With handheld RFID, you’re able to extend RFID to remote areas where fixed readers cannot reach. And throughout the supply chain, workers are able to pinpoint items, handle exceptions, pricing audits and changes, stock picking and more right on the fly.
• NA • LATAM • Middle East • APAC
Microsoft® Windows® Mobile 6.1 Premium Edition
Intel XScale™ BulverdePXA270 @ 624 MHz
64MB RAM; 128MB ROM
SD/MMC card
Mc9090-z The industrial-class MC9090-Z RFID handheld reader gives your workers the ability to capture a comprehensive range of data in the harshest environments. From RFID tag reading and writing to image capture, 1D/2D bar code scanning and 1D scanning at extended ranges, this multi-function device enables data capture in remote areas where fixed RFID readers can’t reach. Built on Motorola’s advanced RFID reader engine, it delivers superior read rates and higher throughput for increased productivity. Single device simplicity translates into a simpler and more cost-effective mobility architecture, and anywhere, anytime wireless connectivity provides the real-time information needed to enable more strategic decision-making.
• NA • EU
Microsoft® Windows® Mobile 6.1 Premium Edition
Intel XScale™ Bulverde PXA270 @ 624 MHz
64MB RAM; 128MB ROM
SD/MMC card
Ds9808-r The DS9808-R hybrid presentation imager is the first combination 1D/2D bar code scanner and RFID reader for hands-free and handheld data capture. In addition to UHF RFID tags, the DS9808-R delivers record swipe speeds for 1D and 2D bar codes, as well as the ability to capture images and signatures. It can also capture and parse the PDF417 bar codes on U.S. driver’s licenses and other AAMVA compliant ID cards for auto-population.
• NA • LATAM (select countries)
N/A N/A N/A N/A
Motorola’s FaMIly oF rFID rEaDErs
product DescriptionGeographic availability* read points External
Interfaces network
FIxED rFID rEaDErs
Fx7400 Easy to deploy, use, and manage, the FX7400 fixed RFID reader is ideally suited for indoor, space-constrained, customer-facing environments. This high performance reader packs best-in-class RFID features and functionality into a sleek, attractive form factor that makes RFID cost-effective for business-class applications such as item-level inventory management, IT asset management and more. The plenum rating increases deployment flexibilty — this reader can be safely mounted above a drop ceiling or below a raised floor, virtually invisible to customers and employees. Power over Ethernet (POE) eliminates the need for costly power drops, while other advanced features such as auto-discovery and remote configuration simplify management and offer easy integration into your existing technology environment.
• NA • LATAM • EMEA • APAC
4 mono-static ports
2 inputs, 2 outputs, optically isolated (Terminal Block); USB Client — USB Type B
10/100 BaseT Ethernet (RJ45) with PoE support
Fx9500 The rugged Motorola FX9500 Fixed RFID Reader is built to perform in today’s toughest industrial environments, and ready to meet tomorrow’s most advanced challenges. High read performance lets you quickly move and track high volumes of densely tagged cases, pallets and items, with greater accuracy, even in RF-challenging environments and with RF-challenging materials. Longer read ranges, an IP53 sealing rating and an extremely durable design make the FX9500 ideal for large distribution center and yard management applications. Add options for 4- or 8-port configurations and mono-static/bi-static modes, and the FX9500 delivers complete control for optimizing advanced applications.
• NA • EMEA
FX9500-4: 4 mono-static or 2 bi-static portsFX9500-8: 8 mono-static or 4 bi-static ports
4 inputs, 4 outputs, optically isolated (Terminal Block); USB Host & Client (Type A & B); Serial (DB9)
10/100 BaseT Ethernet; RJ45
MobIlE rFID rEaDErs
rD5000 The rugged RD5000 Mobile RFID reader extends the reach of your RFID network. Self-contained and cable-free, this compact reader can be easily installed anywhere — on material handling equipment such as forklifts, on mobile carts, portable skate wheel conveyors or even in hard to reach places where a cabled fixed reader would not be practical. Designed for true mobility and rugged use, the device provides real-time wireless LAN connectivity so assets and inventory are easily tracked as they move throughout your operations.
• APAC (select countries)• LATAM (select countries)• NA
N/A N/A 802.11a/b/g; WPAN
PAGE 4
*Check SolutionBuilder for country-specific availability APAC = Asia Pacific; EMEA = Europe, Middle East, Africa; LATAM = Latin America; NA = North America
product Display Keyboard sealing Drop spec tumble tested Data capture wireless warranty recommended
service
hanDhElD anD hanDs-FrEE rFID rEaDErs
Mc3190-z 3 in. QVGA color
48-key alphanumeric
IP54; meets and exceeds MIL-STD 810F
4 ft./1.2 m across the operating temperature range
500 1.64 ft./ 0.5 m tumblesat room temperature(1,000 hits)
Gen 2 RFID tags, omnidirectional reading of 1D and 2D bar codes
802.11a/b/g; WPAN Bluetooth® (regional dependent)
1 year Service from the Start with Comprehensive Coverage
Mc9090-G rFID 3.8 in. QVGA color
53-keyalphanumeric
IP64 (electronicenclosure, displayand keypad)
6 ft./1.8 m drops per MIL -STD 810G specifications
2,000 3.2 ft./ 1 m tumbles at room temperature(4,000 hits)
Gen 2 RFID tags,omnidirectional reading of 1D and 2D bar codes; image capture
802.11a/b/g; WPAN Bluetooth®
1 year Service from the Start with Device Management (North America); Service from the Start with Comprehensive Coverage
Mc9090-z 3.8 in. QVGA color
53-key alphanumeric
IP64 (electronic enclosure, display and keypad)
6 ft./1.8 m drops per MIL -STD 810G specifications
2,000 3.2 ft./ 1 m tumbles at room temperature (4,000 hits)
Gen 2 RFID tags, omnidirectional reading of 1D and 2D bar codes; image capture
802.11a/b/g; WPAN Bluetooth®
1 year Service from the Start with Device Management (North America); Service from the Start with Comprehensive Coverage
Ds9808-r N/A N/A N/A 4 ft./1.2 m drops to concrete
N/A Gen 2 RFID tags; 1D/2D bar codes; images and signatures
N/A 3 years Service from the Start Advance Exchange Support
PAGE 5
Motorola’s FaMIly oF rFID rEaDErs (continued from page 4)
product DescriptionGeographic availability* read points External
Interfaces network
FIxED rFID rEaDErs
Fx7400 Easy to deploy, use, and manage, the FX7400 fixed RFID reader is ideally suited for indoor, space-constrained, customer-facing environments. This high performance reader packs best-in-class RFID features and functionality into a sleek, attractive form factor that makes RFID cost-effective for business-class applications such as item-level inventory management, IT asset management and more. The plenum rating increases deployment flexibilty — this reader can be safely mounted above a drop ceiling or below a raised floor, virtually invisible to customers and employees. Power over Ethernet (POE) eliminates the need for costly power drops, while other advanced features such as auto-discovery and remote configuration simplify management and offer easy integration into your existing technology environment.
• NA • LATAM • EMEA • APAC
4 mono-static ports
2 inputs, 2 outputs, optically isolated (Terminal Block); USB Client — USB Type B
10/100 BaseT Ethernet (RJ45) with PoE support
Fx9500 The rugged Motorola FX9500 Fixed RFID Reader is built to perform in today’s toughest industrial environments, and ready to meet tomorrow’s most advanced challenges. High read performance lets you quickly move and track high volumes of densely tagged cases, pallets and items, with greater accuracy, even in RF-challenging environments and with RF-challenging materials. Longer read ranges, an IP53 sealing rating and an extremely durable design make the FX9500 ideal for large distribution center and yard management applications. Add options for 4- or 8-port configurations and mono-static/bi-static modes, and the FX9500 delivers complete control for optimizing advanced applications.
• NA • EMEA
FX9500-4: 4 mono-static or 2 bi-static portsFX9500-8: 8 mono-static or 4 bi-static ports
4 inputs, 4 outputs, optically isolated (Terminal Block); USB Host & Client (Type A & B); Serial (DB9)
10/100 BaseT Ethernet; RJ45
MobIlE rFID rEaDErs
rD5000 The rugged RD5000 Mobile RFID reader extends the reach of your RFID network. Self-contained and cable-free, this compact reader can be easily installed anywhere — on material handling equipment such as forklifts, on mobile carts, portable skate wheel conveyors or even in hard to reach places where a cabled fixed reader would not be practical. Designed for true mobility and rugged use, the device provides real-time wireless LAN connectivity so assets and inventory are easily tracked as they move throughout your operations.
• APAC (select countries)• LATAM (select countries)• NA
N/A N/A 802.11a/b/g; WPAN
product Frequency tag protocol
host Interface protocols
Management protocols
rugged specs.
operating temp.
operating system
Memory warranty recommended service
FIxED rFID rEaDErs
Fx7400 902 MHz-928 MHz,865 MHz-868 MHzOther global frequencies as regionally defined
EPC Gen 2 (Dense Reader Mode)
LLRP + RM, C, Java API
RM 1.0.1 (with XML over HTTP/HTTPS and SNMP binding); AirBEAM firmware upgrade (Level 2 support)
• -4° F to +131° F-20° C to +55° C
Microsoft® Windows® CE 5.0 (Core)
64MB Flash; 64MB DRAM
1 year RFID Design and Deployment Services; Service from the Start On Site System Support
Fx9500 902 MHz – 928 MHz, 865 MHz – 868 MHz, and all sub-bands
EPC Gen 2 (Dense Reader Mode)
LLRP + RM RM 1.0.1 (with XML over HTT P/HTT PS and SNMP binding)
IP53 -4° to +131° F/ -20° to +55° C
Linux 128MB Flash; 128MB DRAM
1 year RFID Design and Deployment Services; Service from the Start Advance Exchange Support
MobIlE rFID rEaDErs
rD5000 902-928 MHz EPC Gen 2 (Dense Reader Mode)
N/A N/A IP66 -4° F to 122° F-20° C to 50° C
Microsoft® Windows® CE 5.0
64MB Flash; 64MB DRAM
1 year Advanced Services for RFID; Service from the Start On Site System Support
Description type/ Gain
Frequency range
operating temp. sealing Environmental worldwide
use services
rFID antEnnas
an200 The general purpose AN200 RFID antenna can be used reliably in a wide range of indoor and outdoor environments, from the warehouse to the production line to the docking zone. Its rugged design withstands a range of environmental conditions from extreme heat and cold to moisture and vibration. The AN200 Antenna can be used in standard RFID applications at power levels of up to 1 watt and in customized applications at power levels up to 20 watts.
General purpose,indoor/ outdoorRFID antenna
6 dBi
900-928 MHz (Will perform reasonably well in EU frequency in most applications)
-40° F to 149° F-40° C to 65° C
Supports weep holes
Cold, heat, temperature,shock, humidity, rain, salt fog, random vibration
•*
N/A
an400 The AN400 dual-element antenna brings a new level of operational efficiency to areas previously too large to accommodate RFID technology. The single housing packaging makes it cost-effective and ideally suited for bi-static operation. These high-performance area antennas are easy to mount on ceilings and walls to create superior read zones around shelves, doorways and dock doors — anywhere boxes and pallets are moving into and out of a facility.
High-performance dual RFID antenna, ideal for bi-static operation
6 dBi
900-928 MHz (Will perform reasonably well in EU frequency in most applications)
32° F to 122° F0° C to 50° C
Supports weep holes
Cold, heat, temperature,shock, humidity, rain, salt fog, random vibration
•*
N/A
an480 The AN480 single port antenna offers the flexibility and performance required to meet the needs of enterprises around the world. A perfect complement to Motorola’s FX7400 RFID Reader, the AN480 can be installed throughout the enterprise in manufacturing and warehouse floor environments or any dock door receiving application. A low axial ratio delivers a more uniform gain for superior performance. And as with all Motorola antennas, the AN480 uses our standard mounting bracket — so mounting the antenna for the first time or upgrading an existing Motorola antenna with the AN480 is fast and easy.
High-performance indoor wide band RFID antenna
6 dBi
865-956 MHz -40° F to 149° F-40° C to 65° C
IP54 Cold, heat, temperature,shock, humidity, rain, salt fog, random vibration
•
N/A
an610 The ulta-low profile small AN610 Slimline antenna offers the “picture-frame” discreet aesthetics needed in smaller workspaces, such as boutique apparel shops and bookstores. This easy-to-mount space-saving and stylish antenna is discreet enough for businesses with the most discerning customers, yet rugged enough to handle everyday life wherever you need an RFID reader: in a doorway, on an end-cap display, on shelves, above the counter as an RFID pad, on the wall.
Flat panel, slim line, ultra-low profile “picture-frame” aesthetic antenna
1.0 dBiL
864-868 MHz (EU Version)902-928 MHz (US Version)
-22° F to +149° F-30° C to +65° C
N/A N/A
•
N/A
an620 The ulta-low profile AN620 offers the same “picture-frame” discreet aesthetics as the AN610 in a slightly larger form factor that offers an increased read range. The AN620 is designed for larger customer-facing sales spaces — such as do-it-yourself or large department stores — where the increase in performance will ensure accurate reading of many items, while helping to minimize the volume of readers required. The AN620 offers the same rugged specifications as the AN610, and can be installed virtually anywhere in your customer-facing areas — from doorways and walls to shelves, end-cap displays, at the point-of-sale, under the counter or even above the counter as a RFID pad.
Flat panel, slim line, ultra-low profile “picture-frame” aesthetic antenna
4.0 dBiL
864-868 MHz (EU Version)902-928 MHz (US Version)
-22° F to +149° F-30° C to +65° C
N/A N/A
•
N/A
Motorola’s FaMIly oF rFID antEnnas
PAGE 6
Description type/ Gain
Frequency range
operating temp. sealing rugged tested worldwide
use services
rFID antEnnas
an710 The compact AN710 RFID antenna offers all the features required for carpeted and customer-facing environments. A low gain antenna (3.5 dBi), the AN710 is extremely compact and offers the sleek aesthetics needed for discreet installation in the most space-constrained spaces — for example, under the point of sale (POS) counter. And an integrated mounting bracket enables easy installation in minutes.
Compact generalpurpose indoorantenna
3.5 dBi
US and Canada:900-928 MHzEurope:865-868 MHz
-22° F to 158° F-30° C to 70° C
N/A N/A
•
N/A
an720 Similar to the AN710, the AN720 RFID antenna features a compact form factor and discreet aesthetics for customer-facing environments. Together, the two models provide coverage wherever you need it — the AN710 on the sales floor and the AN720 at the dock door or outdoor shopping areas. The device is built for rough environments — it’s impact and vibration resistant, and can withstand exposure to rain, snow and extreme temperatures.
Compact ruggedindoor-outdoorantenna
3.5 dBi
US and Canada:900-928 MHzEurope:865-868 MHz
-22° F to 158° F -30° C to 70° C
IP67 Cold, heat, temperature,shock, humidity, rain, salt fog, random vibration
•
N/A
Motorola’s FaMIly oF rFID antEnnas (continued from page 6)
rFID antenna notices
Repairs of Motorola RFID antennas for fixed readers may require the use of Motorola proprietary parts (and/or Motorola proprietary information). Motorola will sell these parts (and provide this proprietary information) only to end-user customers for self-service. Applicable in the U.S. For all other countries, please contact the Motorola account manager in your area for further details.
The antenna frequency specification and label is a characteristic trait of the antenna’s peak frequency response. The RFID reader, when professionally installed and selected for a country of operation, dictates the actual frequency of transmission/reception to ensure regulatory compliance for operation in a designated country. The actual frequency specification of the antenna is not material to regulatory compliance.
* The AN400 and AN200 will perform reasonably well in EU frequency in most applications.
Let Motorola Solutions help you make the most out of RFID in your business. For more information, please visit www.MotorolasolutIons.coM/rFID
PAGE 7
PAGE 1
PRODUCT SPEC SHEET MOTOROLA FX7400
MOTOROLA FX7400 BUSINESS-CLASS FUNCTIONALITY IN A COMPACT, SLEEK DESIGNThe Motorola FX7400 RFID Reader sets a new standard in design for indoor customer-facing and carpeted environments — packing best-in-class RFID features into a sleek, attractive form factor. With a low profile and impressive array of integrated features and functionality, the FX7400 makes RFID cost-effective for business class applications such as item-level inventory management, IT asset management and more. This standards-based device integrates easily into your existing technology environment, delivering superior performance and simplified management. Flexible enough to support your business needs today and in the future, the RFID reader offers outstanding value with a low cost per read point, investment protection and superior total cost of ownership (TCO). And the FX7400 expands our RFID fixed reader portfolio to serve both business-class and industrial environments.
EASY TO USE, DEPLOY AND MANAGEThe FX7400 is easy to mount and manage. The reader simply snaps into the supplied bracket. An auto discovery function helps detect devices once they are plugged into the network; pre-defined configuration files
simplify setup for various applications and environments and a testing tool lets you verify that your FX7400 readers are up, running and ready to put into operation. No outlet nearby? No problem. Integrated Power over Ethernet (PoE) gives businesses the freedom to place the FX7400 wherever it is needed most, without the hassle or cost associated with installing power outlets — ideal for the large open common areas in retail storefronts. LLRP (low level reader protocol) support delivers seamless integration with your existing IT infrastructure, including wireless LANs and standard middleware, such as IBM WebSphere and Microsoft BizTalk. And the ability to host third party applications further simplifies application deployment, allowing you to easily customize applications to meet your business needs today and tomorrow.
A SMART INVESTMENT WITH A LOW TOTAL COST OF OWNERSHIP (TCO)With the FX7400, you get big business benefits — effortless real-time accurate inventory visibility and a superior TCO. A choice of either two or four monostatic ports lets you purchase only what you need, no more no less. With the integrated optically isolated General Purpose Input/Output (GPIO) interface, there’s no need to purchase, install and manage additional hardware.
FIXED RFID READER FOR CUSTOMER-FACING ENVIRONMENTS
FEATURES
Highly integrated features, including PoE, GPIO and management software Provides a low cost per read point — and a low TCO
2-port and 4-port reader configurations Increases application flexibility and optimizes capital investments
EAHS (Environmental Air Handling Space) Approved and suitable for plenum areas - operation within walls and ceilings.
Open standards-based architecture: • EPC standards-
based defined reader management
• Auto-discovery • Flexible firmware
upgrade features
Seamlessly integrates with existing IT environments; enables remote and centralized management; simplifies and reduces the cost of set-up, deployment, testing and management
PRODUCT SPEC SHEET MOTOROLA FX7400
A flexible radio architecture minimizes the complexity of multinational deployments and simplifies the technology architecture in distributed environments. Integrated PoE support provides a substantial cost savings — up to $1000 per electrical drop. And our centralized remote management tools significantly reduce IT management time and cost.
END-TO-END LIFECYCLE SUPPORTNo matter what help you might need, we have you covered. Our full suite of services offers ‘from the manufacturer’ expertise throughout the entire lifecycle of your solution — from assessment, commissioning and rollout to ongoing training and day-to-day support. Our RFID Advanced Services provide the assistance you need
to architect your solution for your business, processes and environment, ensuring that your pilot or full-scale rollout is designed to deliver peak performance — and maximum benefits. And post deployment, Motorola’s Support Services provide the everyday support you need to keep your RFID solution up and running day in and day out, with service programs that include 24x7 on-site coverage and preventive maintenance visits.
For more information on how the FX7400 RFID Reader can benefit your business, please visit us on the web at www.motorolasolutions.com/FX7400 or access our global contact directory at www.motorolasolutions.com/contactus
SPECIFICATIONS CHARTPHYSICAL CHARACTERISTICS
Dimensions 7.7 in. L x 5.9 in. W x 1.7 in. D (19.56 cm L x 14.99 cm W x 4.32 cm D)
Weight 1.8 lbs ± 0.1 lbs (0.82 kg ± 0.05 kg)
Housing Material Die-cast aluminum, sheet metal and plastic
Visual Status Indicators
Multicolor LEDs: Power, Activity, Status and Applications
Mounting Keyhole and standard VESA (75mm x 75mm)
CONNECTIVITY
Communications 10/100 BaseT Ethernet (RJ45) w/ POE support; USB Client (USB Type B)
General Purpose I/O 2 inputs, 2 outputs, optically isolated (Terminal Block)
Power Supply +24Vdc or POE (IEEE 802.3af)
Antenna Ports FX 7400-4: 4 mono-static ports (Reverse Polarity TNC) FX 7400-2: 2 mono-static ports (Reverse Polarity TNC)
ENVIRONMENTAL
Operating Temp. -4° to +131° F/-20° to +55° C
Storage Temp. -40° to +158° F/-40° to +70° C
Humidity 5-95% non-condensing
REGULATORY COMPLIANCE
Safety UL 60950-01, UL 2043, IEC 60950-1, EN 60950-1
RF/EMI/EMC FCC Part 15, RSS 210, EN 302 208, ICES-003 Class B, EN 301 489-1/3
SAR/MPE FCC 47CFR2:OET Bulletin 65; EN 50364
Other ROHS, WEEE
HARDWARE, OS AND FIRMWARE MANAGEMENT
Memory Flash 64 MB; DRAM 64 MB
Operating System Microsoft® Windows® CE 5.0
Firmware Upgrade Web-based and remote firmware upgrade capabilities
Management Protocols
RM 1.0.1 (with XML over HTTP/HTTPS and SNMP binding); AirBEAM firmware upgrade (Level 2 support)
Network Services DHCP, HTTPS, FTPS, SSH, HTTP, FTP, Telnet, SNMP and NTP
Air Protocols ISO 18000-6C (EPC Class 1 Gen 2, v1.2)
Frequency (UHF Band) Global Reader: 902 MHz~928 Mhz, 865 MHz~868 MHz US (only) Reader: 902 MHz to 928 MHz
Power Output +15dBm to +30dBm
IP addressing Static and Dynamic
Host Interface Protocol
LLRP
API Support .NET, C and Java
Warranty The FX7400-4 and FX7400-2 are warranted against defects in workmanship and materials for a period of one year (12 months) from date of shipment, provided the product remains unmodified and is operated under normal and proper conditions.
RECOMMENDED SERVICES
Support Services Service from the Start Advance Exchange On-Site System Support Support
Advanced Services RFID Design and Deployment Services
Part number: SS-FX7400. Printed in USA 03/12. MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. ©2012 Motorola Solutions, Inc. All rights reserved.
Next generation reader platform, including dense reader mode support Best-in-class read rates deliver superior read performance
Microsoft® Windows® CE 5.0 direct application hosting; 64 MB RAM/ 64 MB Flash Enables easy integration of a wide range of third-party applications for fast application deployment; supports upgrading to meet future requirements; maximizes product lifespan; provides outstanding investment protection
EPC Global LLRP and RM interface support; comprehensive API support — .NET, C and JavaSimplifies application development
COMPREHENSIVE RFID ANTENNA PORTFOLIO FOR DIVERSE APPLICATION NEEDS
MOTOROLA RFID ANTENNA FAMILYMotorola’s family of Radio Frequency Identification (RFID) Antennas offers the versatility and performance required to meet diverse environmental and application needs — including customer-facing areas, warehouses and outdoor environments. When used in conjunction with Motorola’s Fixed RFID Readers, communication with Electronic Product Code (EPC™)-compliant RFID tags is accurate, fast and efficient. Vital components in reader-tag communications, our family of efficient, high-performance antennas can meet the needs of any RFID solution.
PRODUCT SPEC SHEETMOTOROLA RFID ANTENNA FAMILY
MOTOROLA RFID ANTENNAS— A VITAL RFID SYSTEM COMPONENTRFID Antennas complement the portfolio of Motorola enterprise mobility solutions that enable organizations to capture, move and manage critical information to and from every point of business activity. In combination with Motorola’s fixed readers, these efficient antennas deliver high-throughput, high capacity communication of EPC-compliant RFID tag data.
SERVICES COMPLETE THE SOLUTIONTo help you seamlessly and successfully integrate your RFID Antennas into your environment, Motorola offers a complete suite of services that span the entire solution lifecycle — from initial planning and assessment through ongoing training and support.
ON THE FLOOR ...
IN THE FIELD ...
IN THE WAREHOUSE ...
VERSATILITY AND PERFORMANCE TO MEET YOUR DIVERSE APPLICATION NEEDS
CHOOSE THE RIGHT ANTENNA FOR YOUR APPLICATION
NOTES:
The antenna frequency specification and label is a characteristic trait of the antenna’s peak frequency response. The RFID reader, when professionally installed and selected for a country of operation, dictates the actual frequency of transmission/reception to ensure regulatory compliance for operation in a designated country. The actual frequency specification of the antenna is not material to regulatory compliance.
ANTENNA AN200 AN400 AN480 AN610 AN620 AN710 AN720
ENVIRONMENT
Business-class • • • • •
Industrial-class – Indoor • • • • • •
Industrial-class – Outdoor • • • •
VALUE SOLUTION • •
COMPACT SLIM SLIM • •
HIGH PERFORMANCE/HIGH GAIN (DB) • • •
POLARIZATION R & L Circular R & L Circular/Dual R & L Circular L Circular L Circular L Circular L Circular
The AN400 and AN200 will perform reasonably well in EU frequency in most applications.
PRODUCT SPEC SHEETMOTOROLA RFID ANTENNA FAMILY
GENERAL PURPOSE SLIM LINE COMPACT
Motorola’s complete family of RFID antennas meets the needs of virtually any RFID application. Choose the antenna that is designed for your environment — carpeted, industrial or outdoors, delivers the right level of performance, meets mounting requirements and fits in your budget.
PRODUCT SPEC SHEETMOTOROLA RFID ANTENNA FAMILY
GENERAL PURPOSE
AN200: GENERAL PURPOSE ANTENNA FOR INDOOR OR OUTDOOR APPLICATIONGet the convenience of a versatile antenna that can be utilized throughout your enterprise, from the warehouse floor and production line to outside the dock door. Able to withstand extreme heat and cold as well as moisture and vibration, the AN200 is ideal for nearly any application, including retail, manufacturing, wholesale distribution, healthcare, government and more.
This all-purpose antenna can be used in standard RFID applications with power levels up to one watt, as well as custom high-power applications requiring up to 20 watts. The antenna is traditionally used in pairs, with right and left hand polarization.
FEATURES Supports drain holes for use in direct rain, snow or high humidity environments
APPLICATIONS Dock doors, portals, outdoor gates
AN400: HIGH-PERFORMANCE AREA ANTENNA FOR HIGH-CAPACITY, HIGH THROUGHPUT ENVIRONMENTSGet the capacity and range you need to enable RFID tag reading in large areas with the AN400 high-performance area antenna. This general-purpose area antenna is optimized to perform in all environments. Easy to mount on ceilings and walls, the AN400 enables the easy creation of superior read zones around shelves, doorways and dock doors — anywhere boxes and pallets are moving into and out of a facility.
These packaged, rectangular antenna arrays offer a wide read field and high-speed RF signal conversion for fast and optimal communication of EPC-compliant passive tag data. High-performance area antennas are typically used in applications requiring the longest read ranges and highest levels of performance. They meet standard technical requirements for any RFID implementation and are deployment-ready with Motorola RFID fixed readers.
FEATURES • Dual-element, ideal for bi-static operation. • Can be used as two separate mono-static antennas in one package.
APPLICATIONS • Ceilings and walls to create superior read zones around shelves• Doorways and chokepoints where boxes and pallets are moving through• Portals, outdoor gates and conveyors• RF-challenging environments
FEATURES • Excellent wide frequency band antenna response covering 865 Mhz ~ 956 Mhz , ideally suited for global deployments
• Available in right and left hand polarization.
APPLICATIONS • Ceilings and walls to create superior read zones around shelves• Doorways and chokepoints where boxes and pallets are moving through• Portals, outdoor gates and conveyors• Indoor and outdoor applications
AN480: WIDE BAND ANTENNA FOR WORLDWIDE USEThe AN480 single port antenna offers maximum performance and flexibility. The low axial ratio is nearly 50 percent lower than typical competitive devices, delivering a more uniform gain — and better performance. The wide frequency range enables this antenna to be utilized in worldwide deployments, providing cost-efficiencies and a simplified RFID infrastructure. The AN480 can be installed throughout the enterprise in manufacturing and warehouse floor environments, or any dock door receiving application. As with all Motorola antennas, the AN480 uses Motorola’s standard mounting bracket — mounting the antenna for the first time or upgrading an existing Motorola antenna with the AN480 is fast and easy.
PRODUCT SPEC SHEETMOTOROLA RFID ANTENNA FAMILY
SPECIFICATIONS AN200 AN400 AN480PHYSICAL
Dimensions without 11.1 in. L x 11.1 in. W x 1.9 in. D 28.3 in. L x 12.5 in. W x 1.5 in. D 10.2 in. L x 10.2 in. W x 1.32 in. D mounting screws: 281.9 mm L x 281.9 mm W x 48.3 mm D 717 mm L x 317 mm W x 38 mm D 259.1 mm L x 259.1 mm W x 33.5 mm D
Dimensions with 11.1 in. L x 11.1 in. W x 1.9 in. D 28.3 in. L x 12.5 in. W x 2.25 in. D 10.2 in. L x 10.2 in. W x 1.98 in. D mounting screws: 281.9 mm L x 281.9 mm W x 48.3 mm D 717 mm L x 317 mm W x 57.15 mm D 259.1 mm L x 259.1 mm W x 50.3 mm D
Connector Type “N” female Type “N” female (2 qty) Type ‘N’ female
Connector Position Rear Pig-tail
Mounting bracket Available separately
Weight 3 lbs./1.36 kg 7 lbs./3.2 Kg 2.5 lbs./1.13 kg
Casing Aluminum with plastic cover Aluminum with polycarbonate cover Aluminium with white plastic cover
OPERATIONAL
Freq. Range 900-928 MHz 865-956 MHz
Gain 6.0 dBiL 6.0 dBiL
VSWR (Return Loss) 1.22 : 1(20 dB) 1.3 : 1
Front to Back Ratio > 10dB 18 dB
Polarization LHCP or RHCP Port1- RHCP; Port2- LHCP LHCP or RHCP
3db Beam Width 60° 60° 65°
Max Power 20 watts 10 Watts 2 watts
Axial Ratio < 3 db 3.5 dB 1.5 dB
ENVIRONMENTAL
Oper. Temps -40° F to +149° F, -40° C to +65° C -13° F to +158° F, -25° C to +70° C
Environmental Sealing Weep holes IP54
Storage Temperature -40°F to +158° F, -40°C to +70° C
Vibration IEC-68-2-6 (10 to 150 Hz, 0.5 g, IEC-68 series one hour in each of two axes) (Random Vibration)
Humidity IEC-68-2-30 (-13° F to 104° F, -25° C to 40° C) IEC 68-2-30 24 hour cycles of 90% relative humidity
COMPLIANCE
TAA Compliant YES NO
Port to Port Isolation 38dB
SPECIFICATIONS AN610 AN620PHYSICAL
Dimensions: 10.8 in. L x 8.42 in. W x 0.47 in. D 15.39 in. L x 10.82 in. W x 0.47 in. D 275 mm L x 214 mm W x 12 mm D 391 mm L x 275 mm W x 12 mm D
Connector Type “N” female
Connector Position Side
Mounting bracket Integrated mounting holes
Weight 1.3 lbs./ 0.6 kg 2.2 lbs./ 1.0 Kg
Casing Superior Kydex
OPERATIONAL
Freq. Range 864-868 MHz (EU Version) 902-928 MHz (US Version)
Gain 1.0 dBiL 4.0 dBiL
VSWR (Return Loss) 1.4 : 1
Front to Back Ratio 18 dB 22 dB
Polarization LHCP
3db Beam Width 80° in both phases 75° horizontal , 48° vertical
Max Power 6 watts
Axial Ratio < 2 dB
ENVIRONMENTAL
Oper. Temps -22° F to +149° F, -30° C to +65° C
Storage Temperature -40° F to +158° F, -40°C to +70° C
Vibration IEC-68-2-6 (10 to 150 Hz, 0.5 g, one hour in each of two axes) (Random Vibration)
Humidity IEC-68-2-30 (-13° F to 104° F, -25° C to 40° C) 24 hour cycles of 90% relative humidity
PRODUCT SPEC SHEETMOTOROLA RFID ANTENNA FAMILY
FEATURES Flat panel, slim line antennas
APPLICATIONS Suitable for use in indoor environments: wall mount, doorways, under counter, above counter as an RFID pad, on shelves, on end-cap displays, POS etc.
SLIM LINE
AN600 SERIES: SLIM LINE, ULTRA-LOW PROFILE ANTENNAWhen your application calls for a “picture-frame” aesthetic antenna deployment, look to the newest ultra-low profile members of the Motorola family – the AN610 and AN620 Slimline Antennas. The AN610 and AN620 feature a simple, integrated mounting system that lets them stand just under one-half inch (12mm) from horizontal or vertical mounting surfaces. Space-saving and stylish, the outer housing is designed to be sleek and discreet enough to be at home in any business setting but rugged enough for indoor industrial environments. A perfect complement to the FX7400 RFID reader, the AN600 series antennas are ideally suited for use in wall mount, doorways, under counter, above counter as an RFID pad, on shelves, POS or end-cap displays like jewelry counter applications.
SPECIFICATIONS AN710 AN720PHYSICAL
Dimensions without 5.75 in. L x 5.75 in. W x 0.69 in. D 5.2 in. L x 5.2 in. W x 0.7 in. D mounting screws: 146.05 mm L x 146.05 mm W x 17.53 mm D 132.8 mm L x 132.8 mm W x 18.1 mm D
Dimensions with N/A mounting screws:
Connector Type ‘N’ female
Connector Position Pig-tail Rear
Mounting bracket includes articulating mount
Weight 1.1 lbs/0.5 kg 0.8 lbs/0.37 kg
Casing White ABS plastic Aluminium with white plastic cover
OPERATIONAL
Freq. Range 900-928 MHz (US) & 867-870 MHz (EU) 900-928 MHz (US) & 865-868 MHz (EU)
Gain 3.0 dBiL US/Canada: 3.0 dBiL; Europe: 3.5 dBiL
VSWR (Return Loss) 2 : 1 1.5 : 1
Front to Back Ratio > 10dB 8db
Polarization LHCP
3db Beam Width 80° 100°
Max Power 10 watts
Axial Ratio < 3 db 2 dB
ENVIRONMENTAL
Oper. Temps -22° F to +158° F, -30° C to 70° C -13° F to +158° F, -25° C to +70° C
Environmental Sealing IP 65 Vented IP67
Storage Temperature -40° F to +158° F, -40° C to +70° C -40° F to +158° F, -40°C to +70° C
Vibration EN 61373, IEEE 1478, Mil-810G MIL-STD-810
Humidity Not Spec’d IEC-68-2-30
COMPLIANCE
TAA Compliant YES
FEATURES • Industrial class, IP 67 rated
• Wide beam-width of 100 degree for wider coverage
• Ideal for short range applications to create targeted zones
APPLICATIONS • Suitable for use in Indoor and outdoor environments
• Indoors: In doorways, shelves, end-cap displays
• Outdoors: Doorways, small conveyors
PRODUCT SPEC SHEETMOTOROLA RFID ANTENNA FAMILY
FEATURES • Thin profile
• Low gain (~3dB) antenna for short range applications to create targeted zone
APPLICATIONS Suitable for use in Indoor environments: in doorways, on shelves, on end-cap displays, on conveyors, or POS etc.
COMPACT
AN700 SERIES: COMPACT ANTENNAS FOR CUSTOMER FACING ENVIRONMENTSThe AN700 Series antennas offer all the features required for carpeted and customer-facing environments. A perfect complement to Motorola’s FX7400 RFID Reader, the AN700 Series antennas are extremely compact, offering the aesthetics required for the most discreet installation in the most space constrained areas — for example, under the point of sale (POS) counter. The integrated mounting bracket enables easy installation in minutes. The AN710 is designed for inside the four walls. The rugged AN720 is designed to withstand exposure to rain, snow and extreme temperatures — ideal for the receiving dock doors or outdoor shopping areas.