RFID Arena

Categories

Introduction to Retail RFID Technology, part 4 - Readers and antennas

The article series introducing the basics of RFID ends with the fourth part, which discusses readers and antennas.

Author: Toni Heijari

A reader (interrogator) is connected to an antenna that can be either integrated into a device or external. When the antenna is external, there are one or several RF connectors which are used to connect the antenna to the RFID reader. In passive UHF RFID systems, a eader equipped with a suitable antenna generates the necessary power for powering up the tag IC. The energy and message are transferred via electromagnetic waves and they are captured by the tag antenna. The tag uses the backscatter method to deliver its message back to the RFID reader. It reflects a part of the reader's signal back to the reader, but simultaneously modulates its message into the backscatter signal.

about the readers

There are different kinds of RFID readers available on the market depending on the use case and user environment. The readers can be roughly divided into two categories - mobile and fixed readers. Mobile readers are designed for portable use and are easy to carry along while performing inventory for example on the shop floor. There are several types of fixed readers - they can be used at point-of-sale, in RFID gate solutions and for area reading.

Nordicid _retail _nordicidmedeaacd _500pxwide

A reader can add different operations into the tag. It can read or write information into different memory banks located in the tag. It can also lock the tag in order to prevent future read / write operations that are performed without a correct password, or it can completely kill the tag. The last option means that the tag cannot be used anymore.

There are a few different standards that are used in UHF RFID. Nowadays, the ISO 18000-6C is the only standard which is used on a wide scale. There are some RFID readers in the market that support other standards as well. These standards define specifically how the communication between the reader and the tag is established and carried out. They also define the used commands, memory allocations and anti-collision algorithms. The last one is needed for communicating in environments where multiple tags are located in the reading area.

The read distance between the reader and the tag is affected by the reader output power, the gain of the reader antenna, the gain of the tag antenna and the sensitivity of both the reader and the tag IC. In UHF RFID, the reading distance can be more than 10 meters.

About the antennas

The antenna transforms the conducted power into radio waves which travels wirelessly in the environment nearby. The radiation pattern of the used antenna defines where the transmission is sent. Usually in UHF RFID, directive antennas are in use. This means that antenna has a clear direction in which it radiates. There are also omni-directional antennas which do not have a specific radiation direction.

There are some other parameters that define the performance of the antenna as well. The gain describes how much the antenna radiates in a specific direction. The polarization of the antenna is also important as the tag antennas are generally linearly polarized. If the reader's antenna is linearly polarized, it must be ensured that the polarization of the tag and the reader are the same (vertical or horizontal). In addition, there are antennas that are either circularly or dual-linearly polarized. Using these kinds of antenna in a reader makes the system more orientation insensitive. Another antenna parameter is efficiency. This indicates the amount of power the antenna radiates in comparison to the power which is fed to the antenna.

To sum up the article series, we have now introduced to you the basics of RFID technology in retail environment. The basics are applicable in other business areas as well.

Read also the previous parts:

Introduction to Retail RFID Technology, part 1

Introduction to Retail RFID Technology, part 2 - Radio technology and radio waves

Introduction to Retail RFID Technology, part 3 - Tags

23 comments on “Introduction to Retail RFID Technology, part 4 - Readers and antennas”

  1. Posted 15 July 2016 at 07:04:20

    Thanks for sharing this post. Wonderful article , well written. also very informative. keep sharing like that. Thanks...

  2. Posted 21 July 2016 at 05:37:16

    I blog frequently and I really thank you for your information. The article has truly peaked my interest. I will book mark your blog and keep checking for new information about once per week. I opted in for your RSS feed too.

  3. Posted 23 July 2016 at 09:27:31

    Good quality products are always a great thing for all the communities because in this way the society becomes great.
    Thanks

  4. Posted 30 July 2016 at 18:43:19

    Thanks for making such a cool post which is really very well written.will be referring a lot of friends about this.

  5. Posted 04 August 2016 at 13:50:20

    Your posts are always appreciable and readable. that's why i like Your Blog. i bookmarked this post. Thanks for sharing this..

  6. Posted 09 August 2016 at 13:50:02

    this is very quite nice post. i like your writing style as always. thanks for sharing with us.

  7. Posted 31 August 2016 at 15:06:58

    I blog frequently and I really thank you for your information. The article has truly peaked my interest. I will book mark your blog and keep checking for new information about once per week. I opted in for your RSS feed too.

  8. Posted 06 September 2016 at 12:15:12

    I like visiting you site since I always come across interesting articles like this one.Great Job, I greatly appreciate that.Do Keep sharing!

  9. Posted 08 September 2016 at 19:34:15

    Great blog. All posts have something to learn. Your work is very good and i appreciate you and hopping for some more informative posts.

  10. Posted 21 September 2016 at 05:54:24

    Truly impressive article. This type of wonderful assortment of new thoughts. I'll certainly return. Thanks for sharing ideas.

  11. Gravatar of KirsikkaKirsikka
    Posted 27 September 2016 at 09:11:53

    Hi,

    we are happy you enjoyed the article. For a ful list of technical articles, please check:
    http://rfidarena.com/rfid-now.aspx?groupby=Technical%20Articles

    BR, Kirsikka

  12. Posted 11 October 2016 at 14:13:15

    Superb post but I was wondering if you could write a litte more on this subject? I'd be very grateful if you could elaborate a little bit further. Many thanks!

  13. Gravatar of KirsikkaKirsikka
    Posted 12 October 2016 at 09:28:50

    Hello,

    what kind of information are you looking for? We have a broad selection of technical articles, what subject would you like to read more of?

    BR,

    Kirsikka

  14. Posted 25 December 2016 at 17:53:49

    This website has very good content. Thank you for the great article I did enjoyed reading it, I will be sure to bookmark your blog and definitely will come back from again.

  15. Posted 24 October 2017 at 08:43:37

    Proposition adjusting organizations can moreover check your paper for dialect structure, style, and complement botches, despite checking and really refering to your sources as demonstrated by the documentation style you require. Having right references is the route to a productive piece. Thesis Writing Service

  16. Posted 24 October 2017 at 09:39:45

    Norton.com/setup Online Help – Step by Step guide for Norton Setup, Download & complete installation online. We are providing independent support service if in case you face problem to activate or Setup Norton product.

  17. Posted 24 October 2017 at 09:40:30

    Norton.com/setup Online Help – To enable this protection for your Windows or Mac PC, all you need to do is download, install and activate the Norton Setup. But, before you start with the downloading process, remember to uninstall the already installed security software or antivirus (if any) from your device. This is mandatory to avoid any software conflict issue.

  18. Posted 24 October 2017 at 09:41:33

    Norton.com/setup Online Help – To enable this protection for your Windows or Mac PC, all you need to do is download, install and activate the Norton Setup. But, before you start with the downloading process, remember to uninstall the already installed security software or antivirus (if any) from your device. This is mandatory to avoid any software conflict issue.

  19. Posted 24 October 2017 at 12:21:11

    I blog often and I truly thank you for your data. The article has really topped my advantage. I will book stamp your blog and continue checking for new data about once every week. I selected in for your RSS channel as well.

  20. Posted 24 October 2017 at 14:12:01

    what sort of data would you say you are searching for? We have a wide determination of specialized articles, what subject might you want to peruse a greater amount of?

  21. Posted 25 October 2017 at 07:51:29

    jackoffporn - http://adultphonechatsluts.com
    granny phone sex - http://jackoffwithmommy.com/tag/granny-phone-sex
    phone sex jobs - http://wbmttphonesexjobs.com
    gangbang whore - http://thefornicationstation.com/girls

  22. Posted 15 November 2017 at 01:15:19

    mcafee.com/activate have the complete set of features which can protect your digital online life of the computing devices, and it not only help you to protect it but also it can maintain the stability of your computer, increase the speed with inbuilt PC Optimisation tool.

  23. Posted 21 November 2017 at 19:29:43

    mcafee.com/activate have the complete set of features which can protect your digital online life the computing devices, and it not only help you to protect it but also it can maintain the stability of your computer, increase the speed with inbuilt PC Optimisation tool.

Post a comment

Keep in touch

Send me more info!
Send me a Newsletter!
Send me a Magazine!
Contact info