31.01.2013 Views

Optimizing Processes with RFID and Auto ID, 2009

Optimizing Processes with RFID and Auto ID, 2009

Optimizing Processes with RFID and Auto ID, 2009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bartneck/Klaas/Schoenherr<br />

<strong>Optimizing</strong> <strong>Processes</strong> <strong>with</strong> <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong>


<strong>Optimizing</strong><br />

<strong>Processes</strong><br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

<strong>and</strong> <strong>Auto</strong> <strong>ID</strong><br />

Fundamentals, Problems <strong>and</strong> Solutions,<br />

Example Applications<br />

Editors:<br />

Norbert Bartneck, Volker Klaas,<br />

Holger Schoenherr<br />

Executive Editor:<br />

Markus Weinlaender<br />

Publicis Publishing


Bibliographic information published by the Deutsche Nationalbibliothek<br />

The Deutsche Nationalbibliothek lists this publication in<br />

the Deutsche Nationalbibliografie; detailed bibliographic data<br />

are available in the Internet at http://dnb.d-nb.de.<br />

The editors, translator <strong>and</strong> publisher have taken great care <strong>with</strong> all<br />

texts <strong>and</strong> illustrations in this book. Nevertheless, errors can never be<br />

completely avoided. The publisher, author <strong>and</strong> translator accept no liability,<br />

regardless of legal basis. Designations used in this book may be<br />

trademarks whose use by third parties for their own purposes could<br />

violate the rights of the owners.<br />

www.publicis.de/books<br />

Contact for authors <strong>and</strong> editors: gerhard.seitfudem@publicis.de<br />

ISBN 978-3-89578-330-2<br />

Editor: Siemens Aktiengesellschaft, Berlin <strong>and</strong> Munich<br />

Publisher: Publicis Publishing, Erlangen<br />

© <strong>2009</strong> by Publicis KommunikationsAgentur GmbH, GWA, Erlangen<br />

This publication <strong>and</strong> all parts thereof are protected by copyright.<br />

All rights reserved. Any use of it outside the strict provisions of the<br />

copyright law <strong>with</strong>out the consent of the publisher is forbidden <strong>and</strong> will<br />

incur penalties. This applies particularly to reproduction, translation,<br />

microfilming or other processing, <strong>and</strong> to storage or processing in electronic<br />

systems. It also applies to the use of extracts from the text.<br />

Printed in Germany


Preface<br />

Herbert Wegmann<br />

Herbert Wegmann is the manager of the Factory Sensors Division<br />

at Siemens AG, Industry Sector. Moreover, he is entrusted <strong>with</strong><br />

the management of the group-wide AG <strong>RF<strong>ID</strong></strong> initiative.<br />

<strong>RF<strong>ID</strong></strong> – the abbreviation for Radio Frequency Identification – has a<br />

real magic meaning. Contactless identification of all kinds of objects<br />

<strong>with</strong> electronically writeable data carriers in the absolutely low cost<br />

area <strong>with</strong> ranges of several meters provides an opportunity for several<br />

new applications: the ideas range from remote control systems<br />

for logistics centers (“internet of things”) to an intelligent refrigerator<br />

that can automatically order goods.<br />

However, contactless radio identification is not innovation as such<br />

<strong>and</strong> has been in use for industrial applications for a long time now.<br />

As a leading manufacturer of <strong>RF<strong>ID</strong></strong> systems, Siemens introduced the<br />

first industrial <strong>RF<strong>ID</strong></strong> system to the market 25 years ago. Moby M – the<br />

name of this first product – achieved a read distance between the<br />

transponder <strong>and</strong> antenna of, at most, 40 mm. However, the data carriers<br />

already had a storage capacity of 64 bytes. In the meantime,<br />

<strong>RF<strong>ID</strong></strong> is used successfully in several areas. However, despite the dynamism<br />

displayed by the development of <strong>RF<strong>ID</strong></strong>, it is not the only option<br />

available for identifying all kinds of objects. Optical codes such as<br />

barcodes – as printed on all consumer goods in supermarkets – are<br />

admittedly seen as outdated. However, the specific advantages of the<br />

optical processes that, for example, take effect <strong>with</strong> the 2D matrix<br />

code, can justifiably compete <strong>with</strong> <strong>RF<strong>ID</strong></strong> systems in some of their<br />

applications.<br />

Technology fascinates people <strong>and</strong> is the key to economic progress.<br />

However, technology <strong>with</strong> no application focus only follows an end in<br />

itself. Therefore, this book takes a look at both aspects: technical<br />

basics <strong>and</strong> successful applications. In doing so, the issue here is how<br />

existing processes can be optimized by using <strong>RF<strong>ID</strong></strong> <strong>and</strong> optical codes,<br />

5


Preface<br />

reducing costs, <strong>and</strong> increasing quality. Several chapters describe how<br />

automatic identification systems can be applied in a technically reliable<br />

<strong>and</strong> economically viable manner – from the factory floor to hospitals.<br />

I am proud of the fact that the authors who have compiled such an<br />

exceptional scope in terms of content are all employees at our company<br />

or at least worked for Siemens previously for several years.<br />

Their contributions clearly emphasize Siemens’ technological <strong>and</strong><br />

solution expertise for <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong>. Therefore, my sincere<br />

thanks go to all of the authors <strong>and</strong> the editorial team of Norbert Bartneck,<br />

Volker Klaas, <strong>and</strong> Holger Schoenherr. Special thanks also go to<br />

Leslie Miller, Michael LaGrega <strong>and</strong> Markus Weinlaender <strong>and</strong> Kerstin<br />

Springer for their project management <strong>and</strong> comprehensive editorial<br />

work.<br />

6


Contents<br />

1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14<br />

1.1 Historical Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br />

1.2 Proven in several applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

1.3 Innovation as a driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21<br />

Part 1: Technical Fundamentals<br />

2 <strong>RF<strong>ID</strong></strong> technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br />

2.1 What is an <strong>RF<strong>ID</strong></strong> system? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br />

2.2 The components of an <strong>RF<strong>ID</strong></strong> system . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

2.2.1 Reading device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

2.2.2 Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />

2.2.3 Transponders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29<br />

2.3 Classification of <strong>RF<strong>ID</strong></strong> systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br />

2.3.1 Passive systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br />

2.3.2 Semi-active systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br />

2.3.3 Active systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35<br />

2.4 Frequency b<strong>and</strong>s <strong>and</strong> their properties . . . . . . . . . . . . . . . . . . . . . . 35<br />

3 Optical codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38<br />

3.1 Success <strong>and</strong> limits of barcodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38<br />

3.2 St<strong>and</strong>ards regarding the 2D code . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br />

3.2.1 Technology st<strong>and</strong>ards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br />

3.2.2 Application st<strong>and</strong>ards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40<br />

3.3 Data Matrix Code features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41<br />

3.3.1 Data Matrix Code structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41<br />

3.3.2 Codable data <strong>with</strong> Data Matrix ECC200 . . . . . . . . . . . . . . . . . . . 42<br />

3.3.3 Error correction <strong>and</strong> security aspects . . . . . . . . . . . . . . . . . . . . 43<br />

3.4 Application <strong>and</strong> marking methods . . . . . . . . . . . . . . . . . . . . . . . . . 44<br />

3.4.1 Application of labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44<br />

3.4.2 Direct marking processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45<br />

3.4.3 Verification of the Code Quality . . . . . . . . . . . . . . . . . . . . . . . . . 47<br />

3.5 Reading systems <strong>and</strong> their properties . . . . . . . . . . . . . . . . . . . . . . 48<br />

3.5.1 Components of a data matrix reading system . . . . . . . . . . . . . 48<br />

3.5.2 Stationary reading systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48<br />

3.5.3 Mobile reading systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50<br />

7


Contents<br />

8<br />

3.5.4 Physical <strong>and</strong> technical data integration . . . . . . . . . . . . . . . . . . 50<br />

3.6 Achieve good read results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52<br />

3.6.1 Optimization of the optical conditions . . . . . . . . . . . . . . . . . . . 53<br />

3.6.2 Minimization of the material ambient conditions’ influence 54<br />

3.6.3 Meeting the technological requirements . . . . . . . . . . . . . . . . . 55<br />

3.7 Outlook <strong>and</strong> new developments . . . . . . . . . . . . . . . . . . . . . . . . . . . 55<br />

4 System architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57<br />

4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57<br />

4.1.1 Software in <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems . . . . . . . . . . . . . . . . . . . 57<br />

4.1.2 System characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br />

4.1.3 <strong>Processes</strong>, applications, <strong>and</strong> marginal conditions . . . . . . . . . 58<br />

4.2 System levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60<br />

4.2.1 Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60<br />

4.2.2 Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61<br />

4.2.3 Application levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62<br />

4.2.4 Edgeware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63<br />

4.3 Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64<br />

4.3.1 System interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64<br />

4.3.2 Communication layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64<br />

4.3.3 Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65<br />

4.4 Data flow <strong>and</strong> data management . . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />

4.4.1 <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />

4.4.2 Object identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67<br />

4.4.3 Distributed mobile databases . . . . . . . . . . . . . . . . . . . . . . . . . . 67<br />

4.4.4 Hybrid approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br />

4.5 System management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br />

4.5.1 Device management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br />

4.5.2 Edge server management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69<br />

4.5.3 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69<br />

4.5.4 Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70<br />

4.5.5 Extendibility <strong>and</strong> adaptability . . . . . . . . . . . . . . . . . . . . . . . . . . 70<br />

4.5.6 Invoicing functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71<br />

4.6 The EPCglobal Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71<br />

4.6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71<br />

4.6.2 EPCIS <strong>and</strong> ALE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72<br />

4.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72<br />

5 System selection criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74<br />

5.1 <strong>Auto</strong>matic identification <strong>with</strong> Data Matrix Code . . . . . . . . . . . . . . 75<br />

5.2 “Open Loop” applications <strong>with</strong> <strong>RF<strong>ID</strong></strong> . . . . . . . . . . . . . . . . . . . . . . . . 77<br />

5.3 “Closed Loop” applications in <strong>RF<strong>ID</strong></strong> . . . . . . . . . . . . . . . . . . . . . . . . . 78<br />

5.4 Conclusion: both technologies complement each other . . . . . . . 80


Contents<br />

6 St<strong>and</strong>ardization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82<br />

6.1 Why is st<strong>and</strong>ardization important? . . . . . . . . . . . . . . . . . . . . . . . . . 82<br />

6.2 St<strong>and</strong>ardization basics for <strong>RF<strong>ID</strong></strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83<br />

6.3 The central <strong>RF<strong>ID</strong></strong> st<strong>and</strong>ard ISO 18000 . . . . . . . . . . . . . . . . . . . . . . . 85<br />

6.4 Further useful st<strong>and</strong>ards <strong>and</strong> guidelines . . . . . . . . . . . . . . . . . . . . 86<br />

6.5 St<strong>and</strong>ardization of visual codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88<br />

6.6 St<strong>and</strong>ardization through EPCglobal <strong>and</strong> GS1 . . . . . . . . . . . . . . . . 89<br />

6.7 Conclusion <strong>and</strong> forecast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90<br />

Part 2: The Practical Application of <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong><br />

7 Process design <strong>and</strong> profitability . . . . . . . . . . . . . . . . . . . . . . . . . . . 94<br />

7.1 The fear of bad investment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94<br />

7.2 It all starts <strong>with</strong> visions <strong>and</strong> objectives . . . . . . . . . . . . . . . . . . . . . . 95<br />

7.3 How does the company work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96<br />

7.4 The business case for <strong>RF<strong>ID</strong></strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98<br />

7.4.1 The concept of the calculation of profitability . . . . . . . . . . . . . 98<br />

7.4.2 Procedure for <strong>RF<strong>ID</strong></strong> projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99<br />

7.5 The <strong>RF<strong>ID</strong></strong> business case in practice . . . . . . . . . . . . . . . . . . . . . . . . 101<br />

7.6 Technology can inspire – but it must “fit” . . . . . . . . . . . . . . . . . . 103<br />

8 Introduction to the practical application of <strong>RF<strong>ID</strong></strong> . . . . . . . . . . 104<br />

8.1 Feasibility test / Field test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105<br />

8.1.1 Objectives of a feasibility test/field test . . . . . . . . . . . . . . . . . . 105<br />

8.1.2 Performing the tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106<br />

8.1.3 Results of the feasibility/field test . . . . . . . . . . . . . . . . . . . . . . 107<br />

8.2 Solution design <strong>and</strong> pilot operation . . . . . . . . . . . . . . . . . . . . . . . 108<br />

8.2.1 Objectives of pilot operation . . . . . . . . . . . . . . . . . . . . . . . . . . 109<br />

8.2.2 Results of pilot operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110<br />

8.3 Roll-out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110<br />

Part 3: Current Applications – from the Factory<br />

to the Hospital<br />

9 Manufacturing control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114<br />

9.1 The dilemma of modern competition . . . . . . . . . . . . . . . . . . . . . . 114<br />

9.2 The production of individualized serial products . . . . . . . . . . . . 117<br />

9.3 <strong>Auto</strong>nomous production systems <strong>with</strong> <strong>Auto</strong> <strong>ID</strong> . . . . . . . . . . . . . . 118<br />

9.4 Decentralizing production data <strong>with</strong> <strong>RF<strong>ID</strong></strong> . . . . . . . . . . . . . . . . . . 121<br />

9.5 Technical requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122<br />

9.6 Is <strong>RF<strong>ID</strong></strong> worthwhile in Production? . . . . . . . . . . . . . . . . . . . . . . . . 123<br />

9


Contents<br />

10 Production logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126<br />

10.1 Logistics <strong>and</strong> corporate success . . . . . . . . . . . . . . . . . . . . . . . . . 126<br />

10.2 <strong>Processes</strong> in production logistics . . . . . . . . . . . . . . . . . . . . . . . . 127<br />

10.3 <strong>RF<strong>ID</strong></strong> in production logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128<br />

10.4 Application examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130<br />

10.4.1 <strong>Auto</strong>matic order consolidation increases efficiency . . . . . . 130<br />

10.4.2 <strong>RF<strong>ID</strong></strong> optimizes picking for assembly provision . . . . . . . . . 131<br />

10.4.3 Transparent processes in reusable transport trusses . . . . . 131<br />

10.4.4 Replenishment is ensured . . . . . . . . . . . . . . . . . . . . . . . . . . . 132<br />

10.4.5 The matching seat for the right car . . . . . . . . . . . . . . . . . . . 132<br />

10.5 Summary <strong>and</strong> forecast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133<br />

11 Container <strong>and</strong> Asset Management . . . . . . . . . . . . . . . . . . . . . . 135<br />

11.1 Requirements for Container Management . . . . . . . . . . . . . . . . 135<br />

11.1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136<br />

11.1.2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137<br />

11.1.3 St<strong>and</strong>ardizing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137<br />

11.1.4 Technical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139<br />

11.1.5 Data structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139<br />

11.1.6 Additional peripheral processes . . . . . . . . . . . . . . . . . . . . . . 141<br />

11.2 Economic viability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141<br />

11.3 Container <strong>and</strong> Asset Management in Practice . . . . . . . . . . . . . . 142<br />

11.4 Business models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145<br />

11.4.1 Rental . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145<br />

11.4.2 Sale <strong>and</strong> repurchase model . . . . . . . . . . . . . . . . . . . . . . . . . . 146<br />

11.5 Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146<br />

12 Tracking <strong>and</strong> Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148<br />

12.1 Application areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149<br />

12.1.1 Discrete manufacturing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149<br />

12.1.2 Process industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151<br />

12.1.3 Tracking <strong>and</strong> Tracing in logistics . . . . . . . . . . . . . . . . . . . . . 152<br />

12.2 Drivers for Tracking <strong>and</strong> Tracing . . . . . . . . . . . . . . . . . . . . . . . . 153<br />

12.2.1 Corporate advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153<br />

12.2.2 Legal regulations <strong>and</strong> st<strong>and</strong>ards . . . . . . . . . . . . . . . . . . . . . . 153<br />

12.2.3 Consumer protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153<br />

12.2.4 Transparency for end users . . . . . . . . . . . . . . . . . . . . . . . . . . 154<br />

12.3 Advantages of Tracking <strong>and</strong> Tracing . . . . . . . . . . . . . . . . . . . . . 154<br />

12.3.1 Reactive Quality management . . . . . . . . . . . . . . . . . . . . . . . . 155<br />

12.3.2 Proactive Quality Assurance . . . . . . . . . . . . . . . . . . . . . . . . . 155<br />

12.4 Tracking <strong>and</strong> Tracing in practice . . . . . . . . . . . . . . . . . . . . . . . . . 155<br />

12.5 Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157<br />

10


Contents<br />

13 Optimization of Supply Networks . . . . . . . . . . . . . . . . . . . . . . . 158<br />

13.1 Increasing variety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158<br />

13.2 Change of the dem<strong>and</strong>s on business processes . . . . . . . . . . . . . 159<br />

13.3 New business processes require new technologies . . . . . . . . . . 161<br />

13.4 Advantages of <strong>RF<strong>ID</strong></strong> employment across the board . . . . . . . . . . 162<br />

13.5 Further development options . . . . . . . . . . . . . . . . . . . . . . . . . . . 164<br />

14 Vehicle logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167<br />

14.1 Special requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167<br />

14.2 Technical basis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168<br />

14.3 Application scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169<br />

14.3.1 Utilization at automobile groups . . . . . . . . . . . . . . . . . . . . . . 170<br />

14.3.2 Fleet management for public local transport . . . . . . . . . . . . 172<br />

14.3.3 Dock <strong>and</strong> yard management . . . . . . . . . . . . . . . . . . . . . . . . . . 174<br />

15 <strong>RF<strong>ID</strong></strong> at the airport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177<br />

15.1 <strong>Processes</strong> in airport logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177<br />

15.2 Areas of use for <strong>RF<strong>ID</strong></strong> in airport logistics . . . . . . . . . . . . . . . . . . 180<br />

15.2.1 Process optimization on the airside <strong>and</strong> l<strong>and</strong>side . . . . . . . . 180<br />

15.2.2 <strong>RF<strong>ID</strong></strong> on container transport container transport systems . 181<br />

15.2.3 <strong>RF<strong>ID</strong></strong> BagTag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182<br />

15.2.4 <strong>RF<strong>ID</strong></strong>-supported servicing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183<br />

15.2.5 Improvement in the catering area . . . . . . . . . . . . . . . . . . . . . 184<br />

15.2.6 <strong>RF<strong>ID</strong></strong> in Cargo Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185<br />

15.2.7 Advantages due to <strong>RF<strong>ID</strong></strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186<br />

15.3 Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186<br />

16 Postal automation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188<br />

16.1 <strong>Auto</strong> <strong>ID</strong> in postal logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189<br />

16.2 <strong>RF<strong>ID</strong></strong> – the innovative <strong>Auto</strong> <strong>ID</strong> technology . . . . . . . . . . . . . . . . . 191<br />

16.2.1 <strong>RF<strong>ID</strong></strong>-based application systems . . . . . . . . . . . . . . . . . . . . . . . 193<br />

16.3 Outlook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196<br />

16.3.1 Printable transponders <strong>with</strong> polymer technology . . . . . . . . 196<br />

16.3.2 <strong>RF<strong>ID</strong></strong> transponders <strong>with</strong> visual, readable information . . . . 196<br />

16.3.3 “Internet of things” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196<br />

16.3.4 <strong>RF<strong>ID</strong></strong> in future postal logistics . . . . . . . . . . . . . . . . . . . . . . . . 197<br />

17 <strong>RF<strong>ID</strong></strong> in hospitals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198<br />

17.1 Potential of <strong>RF<strong>ID</strong></strong> in the health sector . . . . . . . . . . . . . . . . . . . . . 198<br />

17.2 Reference projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199<br />

17.2.1 Jacobi Medical Center <strong>and</strong> Klinikum Saarbruecken . . . . . . . 199<br />

17.2.2 MedicAlert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200<br />

17.2.3 “Klinikum rechts der Isar” . . . . . . . . . . . . . . . . . . . . . . . . . . . 201<br />

11


Contents<br />

17.3 The economical value of <strong>RF<strong>ID</strong></strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . 204<br />

17.4 <strong>RF<strong>ID</strong></strong> in the future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204<br />

17.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207<br />

Part 4: How to proceed?<br />

18 <strong>RF<strong>ID</strong></strong> – printed on a roll . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210<br />

18.1 Protection of trade marks <strong>with</strong> printed electronics <strong>and</strong> <strong>RF<strong>ID</strong></strong> . 211<br />

18.1.1 Trade mark protection for flawless mixtures . . . . . . . . . . . . 211<br />

18.1.2 Dine <strong>with</strong>out disgust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212<br />

18.1.3 Identifiability creates clarity in the supply chain . . . . . . . . 212<br />

18.2 Technological basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213<br />

18.3 Possible solutions using printed <strong>RF<strong>ID</strong></strong> . . . . . . . . . . . . . . . . . . . . 215<br />

19 <strong>RF<strong>ID</strong></strong> <strong>and</strong> sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217<br />

19.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217<br />

19.2 Technical basis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218<br />

19.2.1 Schematic structure of <strong>RF<strong>ID</strong></strong> sensors . . . . . . . . . . . . . . . . . . 218<br />

19.2.2 Decentralized sensor data storage . . . . . . . . . . . . . . . . . . . . 219<br />

19.2.3 Systems available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219<br />

19.2.4 Central sensor data storage . . . . . . . . . . . . . . . . . . . . . . . . . . 222<br />

19.3 Initial applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223<br />

19.3.1 Temperature monitoring for blood preserves . . . . . . . . . . . 223<br />

19.3.2 Quality assurance for worldwide container transports . . . 224<br />

19.4 Possible future applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224<br />

19.4.1 Temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224<br />

19.4.2 Temperature <strong>and</strong> relative air humidity . . . . . . . . . . . . . . . . 225<br />

19.4.3 Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225<br />

20 <strong>RF<strong>ID</strong></strong> security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227<br />

20.1 Data protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227<br />

20.1.1 Personal profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228<br />

20.1.2 External attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228<br />

20.2 Information security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230<br />

20.2.1 Protection of saved data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230<br />

20.2.2 Protection of data transmission . . . . . . . . . . . . . . . . . . . . . . . 230<br />

20.3 Classic protection measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231<br />

20.3.1 Symmetrical encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231<br />

20.3.2 Problems in the use of symmetrical encryption . . . . . . . . . 232<br />

20.4 Protection against complex threats . . . . . . . . . . . . . . . . . . . . . . 233<br />

20.4.1 Creation of <strong>RF<strong>ID</strong></strong> clones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233<br />

20.4.2 Protection measures by means of certificate-based<br />

solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234<br />

12


Contents<br />

20.4.3 Asymmetric cryptography <strong>and</strong> PKI . . . . . . . . . . . . . . . . . . . . 235<br />

20.4.4 <strong>RF<strong>ID</strong></strong> <strong>and</strong> PKI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235<br />

20.5 Security in <strong>RF<strong>ID</strong></strong> st<strong>and</strong>ardization . . . . . . . . . . . . . . . . . . . . . . . . . 236<br />

21 Epilogue: En route to the “internet of things” . . . . . . . . . . . . 238<br />

Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245<br />

Editor <strong>and</strong> authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247<br />

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252<br />

13


1 Introduction<br />

Holger Schoenherr<br />

The effort put forth to clearly <strong>and</strong> unambiguously describe objects<br />

<strong>and</strong> persons in our vicinity is as old as humankind. Names are a central<br />

element of all cultures <strong>and</strong> languages <strong>and</strong> are the root of our personal<br />

identity. Names create a basis for the targeted exchange of information:<br />

they form an access index for a specific quantity of information<br />

about an individual or item. Names can, therefore, be defined<br />

as information that is allocated to a person, an item, an organizational<br />

unit, or a term in turn enabling its/their identification <strong>and</strong> individualization.<br />

The machine readability of the name <strong>and</strong> its symbolization play a central<br />

role in the automation of business processes. Therefore, innumerable<br />

items bear machine-readable individual descriptions such as<br />

plain text, barcodes, or electronically stored information: goods on a<br />

supermarket shelf, post consignments, machine parts, workpieces,<br />

transport containers, or <strong>ID</strong> card documents. <strong>Auto</strong>matic identification<br />

includes the assignment, allocation, transmission, <strong>and</strong> processing of<br />

these descriptions. The results are then available for informational<br />

purposes, further analyses, statistics, control tasks, <strong>and</strong> for decisionmaking.<br />

It is essential that the processes <strong>and</strong> conditions from the real<br />

world are directly depicted in the world of information systems (IT).<br />

This results in enormous advantages for the entire value-added chain<br />

from production via logistics to the consumer.<br />

Today, optical codes are the most common <strong>with</strong> an estimated share of<br />

75 % of the total occurrence of identification systems. Symbols are<br />

captured by scanners that beam the barcode <strong>and</strong> measure the light<br />

reflected. The information included is decoded <strong>and</strong> processed by IT<br />

systems. In addition to the reflection principle, there are also scanners<br />

that function similarly to a digital camera. A world <strong>with</strong>out optical<br />

codes is hardly conceivable any more. In the meantime, there are<br />

some 50 common specifications that are structured in a one-dimensional<br />

or multidimensional way, depending on their application, in<br />

which they require differing amounts of space <strong>and</strong> vary in their stor-<br />

14


1 Introduction<br />

age capacity. Billions of objects are marked in this manner; prominent<br />

examples include the barcodes on the articles in supermarkets.<br />

However, 2D <strong>and</strong> Data Matrix Codes have been established in industrial<br />

manufacturing processes. The reasons for this are the high storage<br />

density, robustness, <strong>and</strong> attachment options on a multitude of<br />

surfaces. A detailed explanation of the current state of the technology<br />

is covered in Chapter 3.<br />

In addition to optical systems, Radio Frequency Identification (<strong>RF<strong>ID</strong></strong>)<br />

also plays a decisive role. The Scottish physicist James Clerk Maxwell<br />

(1831-1879) is recognized as the most important pioneer of this radio<br />

technology. When he postulated “Maxwell’s equations”, named after<br />

him, he did not suspect the speed at which radio technology would<br />

exp<strong>and</strong> during the subsequent centuries (Fig. 1.1). In addition to other<br />

excellent scientists such as Heinrich Rudolf Hertz <strong>and</strong> Guglielmo<br />

Marchese Marconi, Maxwell was largely responsible for providing the<br />

basic contribution to the description of the entity, spread, <strong>and</strong> transmission<br />

of electromagnetic waves. The phenomenon of transmitting<br />

signals through the “airwaves” enabled humankind to push forward<br />

to new communication dimensions: the radio age had commenced.<br />

However, also in view of the huge steps forward, the idea of tiny, radio-emitting<br />

devices on items was dismissed as utopia up until well<br />

into the 20 th century.<br />

Since 2000, <strong>RF<strong>ID</strong></strong> has gained a high level of recognition, although this<br />

technology has already established <strong>and</strong> proven itself for several years<br />

in industry <strong>and</strong> company logistics. This has to do <strong>with</strong> the storing of<br />

information directly on physical objects using mobile data carriers.<br />

The data can then be read <strong>and</strong> written wirelessly.<br />

Fig. 1.1 With the equations named after him, James Clerk Maxwell also laid<br />

the foundations for <strong>RF<strong>ID</strong></strong> (Photo: Pixtal)<br />

15


1 Introduction<br />

1.1 Historical Development<br />

What use does wireless communication <strong>with</strong> items have? One response<br />

was born during the Second World War. In unclear air-to-air<br />

encounters, one’s own aircraft <strong>and</strong> the enemy’s aircraft were frequently<br />

confused, which resulted in fatal consequences. That is why<br />

scientists from the US Navy research laboratory (NRL) as well as British<br />

experts started working on a system to distinguish allies <strong>and</strong> enemies<br />

in 1937. When the radar signal from the ground station strikes<br />

a device that is located onboard it responds <strong>with</strong> a code <strong>and</strong> transmits<br />

it to the interrogator ground station’s radar frequency. The analysis<br />

of this information enabled the identification of all aircraft, in turn<br />

distinguishing between allies <strong>and</strong> enemies. Because the device transmits<br />

<strong>and</strong> responds, it was called the transponder, which is a description<br />

that has been maintained up to present times for the <strong>RF<strong>ID</strong></strong> data<br />

carriers. The further-developed forms of the transponder are now onboard<br />

all aircraft today <strong>and</strong> are essential for air traffic control as well<br />

as the effective management of flight progress (Fig. 1.2).<br />

With this view, we have approached the most important aspects of<br />

<strong>RF<strong>ID</strong></strong>. Communication is wireless, in which there is no need for a visual<br />

connection.<br />

No manual operation is required, in which the information that was<br />

previously stored is transmitted. <strong>Processes</strong> that to date were complex<br />

<strong>and</strong> not transparent have become transparent as a result. On the other<br />

h<strong>and</strong>, this provides the opportunity for a targeted exertion of influence.<br />

Admittedly, the first transponders were as large as a suitcase, correspondingly<br />

heavy <strong>and</strong> were high energy consumers. Developments in<br />

the field of transmission technology, integrated circuits, <strong>and</strong> semiconductor<br />

technology soon made them significantly smaller <strong>and</strong> at<br />

the same time this led to higher performance transponders. At the<br />

Fig. 1.2 The basic principle of <strong>RF<strong>ID</strong></strong> is still used for the identification of aircraft<br />

today. This simple transponder can transmit a four-digit code as well as<br />

the aircraft’s altitude (Photo: Garmin Ltd.)<br />

16


1.1 Historical Development<br />

Fig. 1.3 We can no longer envisage today’s commerce <strong>with</strong>out barcodes – as<br />

shown here at a modern scanner checkout counter. (Photo: Wincor Nixdorf)<br />

outset of the 1970s, article surveillance systems were introduced in<br />

sales rooms. To begin <strong>with</strong>, single-bit transponders were used, in<br />

which, technically speaking, they were simple LC elements that only<br />

displayed their presence in the read field. If a customer “forgot” to<br />

pay for an article, a high-pitched beep reminds them when passing<br />

through the scanner gate at the exit. Such devices are installed in virtually<br />

all department stores nowadays.<br />

At about the same time, barcodes were implemented as an optical<br />

identification system for commerce. In 1974, Wrigley’s chewing gum<br />

was the first product marked <strong>with</strong> a barcode that was machinescanned<br />

in supermarkets. The triumphal march of the barcode <strong>and</strong><br />

st<strong>and</strong>ards connected <strong>with</strong> it such as the European Article Number<br />

(EAN) were inexorable (Fig. 1.3). Therefore, the barcode only needed<br />

a little less time for wide scale market penetration than <strong>RF<strong>ID</strong></strong>, because<br />

the first barcode patent was already applied in the USA in 1949.<br />

At the beginning of the 1980s, applications for marking livestock arrived<br />

<strong>and</strong> consequently the use of <strong>RF<strong>ID</strong></strong> for individualization spread.<br />

As opposed to article surveillance systems, a comparatively large<br />

memory is required for these transponders, enabling the storage of<br />

data such as an unambiguous number or the animal’s date of birth.<br />

The USA <strong>and</strong> Norway developed <strong>RF<strong>ID</strong></strong>-based toll systems. <strong>RF<strong>ID</strong></strong> was<br />

also introduced in production work for manufacturing controlling.<br />

The first industrial <strong>RF<strong>ID</strong></strong> systems, such as Moby M from Siemens,<br />

were still designed as active components from a device-related view-<br />

17


1 Introduction<br />

Fig. 1.4 Siemens has provided <strong>RF<strong>ID</strong></strong> to industry for 25 years: on the left-h<strong>and</strong><br />

side “Moby M” from 1983, <strong>and</strong> on the right-h<strong>and</strong> side the current Simatic<br />

RF300 system.<br />

point (Fig. 1.4), for which a battery provided the energy that was required<br />

to operate the internal circuit elements of the transponders.<br />

Despite this, the range was only a few centimeters.<br />

With the foundation of the <strong>Auto</strong><strong>ID</strong> Lab at the Massachusetts Institute<br />

of Technology (MIT), a new chapter in the history of <strong>RF<strong>ID</strong></strong> technology<br />

was opened. <strong>RF<strong>ID</strong></strong> literally became the synonym for automatic identification<br />

<strong>and</strong> for the automatic transparency of logistical processes.<br />

The terms “internet of things” <strong>and</strong> “<strong>RF<strong>ID</strong></strong>” have been inseparably connected<br />

since then. The target: a global solution for the comprehensive<br />

tracking of articles based on a biunique number. All articles according<br />

to this approach are equipped, by the manufacturer, <strong>with</strong> an <strong>RF<strong>ID</strong></strong><br />

transponder, in turn enabling automatic recording all along the supply<br />

chain. The data gained reflects the status of the full supply chain<br />

at all times <strong>and</strong> thereby enabling its comprehensive optimization.<br />

This concept is based on very low cost <strong>and</strong> at the same time high-performance<br />

disposable transponders, the so-called Smart labels <strong>with</strong><br />

sufficient memory <strong>and</strong> a range of several meters.<br />

Furthermore, a global data st<strong>and</strong>ard – the Electronic Product Code<br />

(EPC) – <strong>and</strong> a global IT system for the provision of individual product<br />

information are defined.<br />

1.2 Proven in several applications<br />

<strong>Auto</strong> <strong>ID</strong> <strong>and</strong> <strong>RF<strong>ID</strong></strong> are effective as backbone technologies for the future<br />

global economy. There are various reasons that make wide scale introduction<br />

a necessity. Therefore, the worldwide export of articles<br />

18


1.2 Proven in several applications<br />

grew four times faster than production in 2005, when measured related<br />

to the gross national income (GNI). Added value cycles spread<br />

out worldwide, in turn adapting to the changing market requirements<br />

highly dynamically. Competition among companies is global;<br />

static supplier relationships give way to dynamic sourcing, which is<br />

controlled via the Internet. Therefore, for example, in the automotive<br />

industry the manufacturers’ own real net output ratio will drop from<br />

35 % in 2006 to 25 % in 2015. However, the structure of added value<br />

changes. The deliveries to date predominantly consisted of similar<br />

type components. However the trend now is towards knowledgebased<br />

supplies. In addition to automotive engineering, the aircraft industry<br />

also exemplifies this. Here, complete segments or assemblies<br />

are delivered prefabricated. Agility, fast reaction times, <strong>and</strong> the ability<br />

to react flexibly to the end manufacturer’s changes form the basic<br />

requirements of all suppliers. Finally, the customers’ requirements<br />

regarding the products’ increase – similar articles that are “mass produced”<br />

become less <strong>and</strong> less accepted, especially for high-price technological<br />

articles. This development towards “mass customization”<br />

requires vast consistency of the processes – from design to production.<br />

The logistics chain also plays a decisive role. Deliveries must arrive<br />

at the customer’s location as was ordered <strong>and</strong> be coordinated<br />

<strong>with</strong> precise timing in the correct order – only in this way is it possible<br />

to realize the just in time <strong>and</strong> just in sequence concepts. The systems<br />

for automatic identification are also essential here.<br />

Wireless automatic identification is already “state-of-the-art” for production<br />

technology in many cases. <strong>Auto</strong>matic control of the production<br />

processes based on individual object data is the focus for these<br />

applications. For example, spray robots in automotive engineering<br />

are controlled dependent on the car body shape (e.g. cut-out for a<br />

sunroof) (Fig. 1.5). In brief: the products bear all the information for<br />

their processing <strong>and</strong> assembly. This enables the implementation of<br />

fully new, decentral manufacturing controlling concepts. The automatic<br />

recommencement of manufacturing using the status information<br />

that is directly stored on the workpiece is a further advantage.<br />

The data carriers that are used are robust <strong>and</strong> move in closed loops<br />

<strong>with</strong> the workpieces or workpiece carriers. At the end of a run, the<br />

data are saved, the transponder is deleted, <strong>and</strong> then sent into the next<br />

circulation. If the number of runs increases, the cost share of a transponder<br />

per run is naturally reduced. Therefore, such applications often<br />

pay off <strong>with</strong>in less than two years.<br />

Foodstuffs, drugs, <strong>and</strong> technical components are three completely<br />

different application areas. For example, the full integrity of the pro-<br />

19


1 Introduction<br />

Fig. 1.5 Where vehicles are painted in the automobile industry, <strong>RF<strong>ID</strong></strong> has<br />

shown to be “state-of-the-art” for several years now. (Photo: Duerr AG)<br />

duct is essential <strong>with</strong>in the pharmaceuticals supply chain. It must be<br />

guaranteed that the correct <strong>and</strong>, above all, original drug is provided<br />

to the patient. The term “E-Pedigree” describes the “electronic family<br />

tree” of such products. Moreover, gapless proof of the origin <strong>and</strong> stations<br />

of the supply chain will become compulsory in the future. This<br />

is only possible if automatic identification technology is used. The 2D<br />

code is favored at item level <strong>and</strong> <strong>RF<strong>ID</strong></strong> at the box <strong>and</strong> pallet levels.<br />

However, current experiments in the pharmaceuticals industry are<br />

also directed at testing the performance capability of <strong>RF<strong>ID</strong></strong> at item level.<br />

One reason for this is that <strong>RF<strong>ID</strong></strong> could also be used as an electronic<br />

authentication certificate.<br />

Furthermore, the administration of assets is one of the most promising<br />

areas for the application of <strong>RF<strong>ID</strong></strong>. Here, above all, it is a question<br />

of the stock optimization of the transporter wagons, circulatory containers,<br />

<strong>and</strong> tools required. On the one h<strong>and</strong>, sufficient quantities of<br />

these assets must be available in order to be able to produce <strong>and</strong> supply.<br />

On the other h<strong>and</strong>, assets are fixed capital <strong>with</strong> no direct yield, in<br />

turn making it desirable to strive for the lowest possible stock.<br />

Thanks to <strong>RF<strong>ID</strong></strong>, the life cycle can be reconstructed <strong>with</strong>out a gap <strong>and</strong><br />

for assets that leave the area of accessibility of a company <strong>with</strong> a clear<br />

statement that can be made as to where an asset is located. In addition,<br />

thanks to the <strong>RF<strong>ID</strong></strong> transponders on various objects, it is also<br />

possible to add further processes to <strong>RF<strong>ID</strong></strong>-supported asset management,<br />

<strong>and</strong> thereby further increasing the profitability of this respective<br />

solution.<br />

20


1.3 Innovation as a driver<br />

Moreover, numerous specialized <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> applications can be<br />

found in individual industries. The identification of patients in the<br />

healthcare sector, management of supply logistics for automobile<br />

manufacturers, or controlling luggage transport platforms at airports<br />

are just some selected examples.<br />

1.3 Innovation as a driver<br />

The history of automatic identification is marked by constant innovation.<br />

All new developments enable new applications. However, at the<br />

same time restrictions such as the read rate remain. Things that we<br />

could not possibly dream of 10 years ago are a reality today. Additionally,<br />

today’s problems are resolved tomorrow, by using elegant solutions.<br />

Technologists <strong>and</strong> scientists work on varied topics of which<br />

three should be emphasized here.<br />

One of the most important objections to the mass use of <strong>RF<strong>ID</strong></strong> transponders<br />

today is the data carrier costs. One possible approach to the<br />

solution to this is the use of printed electronic circuits. The materials<br />

that are used are polymers <strong>with</strong> semiconductor properties. The advantage:<br />

the integrated circuit of an <strong>RF<strong>ID</strong></strong> data carrier can be produced<br />

in just one single process step. That saves on costs <strong>and</strong><br />

smoothes the way for transponders in the 1 cent range.<br />

The enrichment of <strong>RF<strong>ID</strong></strong> <strong>with</strong> additional functions results in a new dimension<br />

of applications. Today, sensors for recording ambient parameters,<br />

such as temperature, pressure, <strong>and</strong> acceleration are already<br />

combined <strong>with</strong> <strong>RF<strong>ID</strong></strong> transponders. These are the first three<br />

steps to autonomous, intelligent systems that interact <strong>with</strong> their environment.<br />

We envisage transponders in the future that make decisions<br />

independently that are based on ambient data.<br />

Within the course of decentralization <strong>and</strong> mobilization of information,<br />

fully new aspects of data security become increasingly important.<br />

If, for example, <strong>RF<strong>ID</strong></strong> transponders are used as an authentication<br />

proof for drugs, it must be technically impossible to copy the microchip<br />

included. The use of asymmetrical cryptography in passive lowcost<br />

transponders is beneficial here.<br />

However, the inventiveness of engineers <strong>and</strong> scientists is not merely<br />

restricted to the radio protocols or the chip design. On the contrary,<br />

the promising linkage of a long range <strong>and</strong> acceptable storage capacity<br />

along <strong>with</strong> the lowest transponder prices also make fully new archi-<br />

21


1 Introduction<br />

tecture in production <strong>and</strong> logistics systems conceivable. The key word<br />

“internet of things” makes the exact direction clear: towards distributed,<br />

autonomous systems that do <strong>with</strong>out a central control component,<br />

which is similar to the Internet. The mobility of the data<br />

achieved by <strong>Auto</strong> <strong>ID</strong> <strong>and</strong> <strong>RF<strong>ID</strong></strong> forms the basis of a new development<br />

step in the design of those complex systems that are increasingly affecting<br />

our lives.<br />

22


Part 1<br />

Technical Fundamentals


2 <strong>RF<strong>ID</strong></strong> technology<br />

Dieter Horst<br />

The abbreviation <strong>RF<strong>ID</strong></strong> has also been current outside professional circles<br />

for a few years. The massive spread of these systems in trade <strong>and</strong><br />

logistics <strong>and</strong> not least the hype triggered by UHF-<strong>RF<strong>ID</strong></strong> helped the<br />

term on its way to the IT press <strong>and</strong> even to daily newspapers. But what<br />

does this term actually mean?<br />

2.1 What is an <strong>RF<strong>ID</strong></strong> system?<br />

<strong>RF<strong>ID</strong></strong> st<strong>and</strong>s for Radio Frequency Identification – unfortunately, this is<br />

not very meaningful. Therefore, I propose the following definition:<br />

24<br />

An <strong>RF<strong>ID</strong></strong> system comprises of at least one reading device <strong>and</strong> one<br />

mobile data storage unit that can be read contactlessly by a reading<br />

device using a high frequency transfer procedure.<br />

Reader device<br />

Transmitter<br />

Receiver<br />

Data<br />

Energy<br />

Data<br />

Fig. 2.1 Illustration of an <strong>RF<strong>ID</strong></strong> system<br />

Transponder


2.2 The components of an <strong>RF<strong>ID</strong></strong> system<br />

Even if the term Reader purely indicates reading alone, reading devices<br />

can generally also write in practice. All <strong>RF<strong>ID</strong></strong> systems have a common<br />

factor: the data are transferred using high frequencies, that is to<br />

say, by using electromagnetic waves. In several cases, even the energy<br />

required for reading or writing the data storage unit is also transferred<br />

<strong>and</strong> thereby reduces the manufacturing expense for the transponder<br />

to a minimum.<br />

Various terms are used in connection <strong>with</strong> the processing of transponders,<br />

which provide information about the application:<br />

• Identification: Here we mean the recognition of a transponder,<br />

the simplest variant of an <strong>RF<strong>ID</strong></strong> system. Often, read-only systems<br />

for which the transponder manufacturer allocates a series number<br />

(<strong>ID</strong>) that is linked by the user to the object to be identified.<br />

• Mobile data storage unit: This form of identification can frequently<br />

be found among industrial applications. The principle is<br />

that all the important data are saved <strong>and</strong> updated as required in the<br />

transponder <strong>and</strong>, therefore, on the object to be identified. For this<br />

purpose, an <strong>RF<strong>ID</strong></strong> system is required that on the one h<strong>and</strong> enables<br />

writing <strong>and</strong> reading, <strong>and</strong> on the other h<strong>and</strong> provides a larger data<br />

volume. The user memories here are all in the region of several 10<br />

Kbytes, which is more than sufficient for many practical applications.<br />

• Locating: A special type of the <strong>RF<strong>ID</strong></strong> system is used to locate objects<br />

(Real Time Location System, RTLS). These systems’ decisive property<br />

is the provision of location information for an object (in addition<br />

to its identification). However, the determination of the location<br />

information is technically rather expensive.<br />

2.2 The components of an <strong>RF<strong>ID</strong></strong> system<br />

2.2.1 Reading device<br />

There are several synonymous terms for the <strong>RF<strong>ID</strong></strong> reading device:<br />

Read-Write device, Scanner, Reader, <strong>and</strong> Interrogator. The terms<br />

scanner <strong>and</strong> reader should not be taken too literally as the devices can<br />

normally also write.<br />

The reading device has the task of accepting comm<strong>and</strong>s from the<br />

higher-ranking controller <strong>and</strong> executing them independently. Fig.<br />

2.2 shows the most important reader components.<br />

25


2 <strong>RF<strong>ID</strong></strong> technology<br />

Interfaces<br />

Fig. 2.2 Block diagram of a reading device<br />

Digital part<br />

Generally, a microcontroller takes over the control of the reading device.<br />

The processing power can differ widely here, varying from an 8bit<br />

microcontroller via digital signal processors (DSPs) or programmable<br />

logic (FPGA) up to a 32-Bit processor <strong>with</strong> a real-time operating<br />

system. Here it becomes apparent that reading devices frequently<br />

deal <strong>with</strong> far more complex tasks than merely reading a transponder.<br />

Finally, the application decides what performance capability is required.<br />

Analog part<br />

Considerable parts of the robustness <strong>and</strong> performance capability of<br />

an <strong>RF<strong>ID</strong></strong> reading device are determined by the analog circuitry. The<br />

response signals from transponders are nearly always very weak.<br />

Therefore, a high-performing receiver that can deal <strong>with</strong> both weak<br />

signals <strong>and</strong> various interferences is the centerpiece of a good reader.<br />

The transmission signal is also generated in the analog part. At the<br />

same time, it is important to ensure that the transmitter provides a<br />

signal that is as “clean” as possible, i.e. free of phase noise <strong>and</strong> spurious<br />

emissions. This is important for the performance capability,<br />

avoidance of disturbances, <strong>and</strong> adherence to legal stipulations. The<br />

transmitter must also be thermally stable <strong>and</strong> robust: for example,<br />

the removal of the antenna during operation must not cause damage<br />

to the transmitter. The transmitter output can be up to 10 W.<br />

Interfaces<br />

The major task of <strong>RF<strong>ID</strong></strong> reading devices is communication. Therefore,<br />

they often have several interfaces (Fig. 2.3):<br />

26<br />

RS-232<br />

Ethernet<br />

Dig. I/O<br />

LED<br />

Digital part Analog part<br />

μC<br />

FPGA<br />

DSP<br />

RAM<br />

FLASH<br />

Transmitter<br />

Receiver


2.2 The components of an <strong>RF<strong>ID</strong></strong> system<br />

• Serial interfaces (RS232, RS422) are the most common. They are<br />

necessary to connect the device to a PC or a programmable logic<br />

controller control (mostly via multifunctional communication<br />

modules).<br />

• The Ethernet interface is becoming increasingly common, whether<br />

as the st<strong>and</strong>ard variant that is known from the world of IT or as a<br />

robust industrial version <strong>with</strong> real-time capability. Especially in<br />

logistics, the Ethernet is highly significant as it integrates particularly<br />

easily into IT systems.<br />

• Digital inputs are frequently used to trigger a read process, for<br />

example, by using proximity switches, infrared sensors, <strong>and</strong> photoelectric<br />

barriers. This can minimize the mutual disturbances as the<br />

reader only transmits if a transponder is nearby. It is also, therefore,<br />

possible to increase the maximum passage speed of the object<br />

as the reading device can execute the read process <strong>with</strong>out any<br />

time delay.<br />

• Digital outputs are important for <strong>RF<strong>ID</strong></strong> access control systems (activating<br />

the opener) <strong>and</strong> logistics applications (traffic lights to indicate<br />

a successful read process). A digital output should be robust,<br />

able to cope <strong>with</strong> short circuits, <strong>and</strong> provide some output power, in<br />

turn enabling the desired devices to be connected.<br />

• LEDs can also be regarded as an optical interface. When commissioning<br />

or troubleshooting, it is rather useful if certain conditions<br />

such as “Transponder in the field” or “Communication error” are<br />

displayed directly on the device.<br />

Fig. 2.3 Interfaces on an <strong>RF<strong>ID</strong></strong> reading device<br />

27


2 <strong>RF<strong>ID</strong></strong> technology<br />

2.2.2 Antennas<br />

All <strong>RF<strong>ID</strong></strong> readers have one antenna or more. They serve to emit the<br />

transmission output in a suitable manner <strong>and</strong> to record the transponder<br />

signal <strong>and</strong> supply it to the receiver. In some cases, separate antennas<br />

are used for transmission <strong>and</strong> reception. However, normally just<br />

one that fulfills both tasks is deemed sufficient.<br />

The style <strong>and</strong> shape of the antennas are as varied as the areas of use<br />

for <strong>RF<strong>ID</strong></strong>. The major factors are the desired application (e.g. required<br />

reading distance, grouping ability), the required protective category<br />

(e. g. resistance to dust, water, temperatures, shock/vibration), the<br />

data carriers used, <strong>and</strong> their storage capacity as well as the <strong>RF<strong>ID</strong></strong> technology<br />

<strong>and</strong> frequency used. Fig. 2.4 demonstrates the considerable<br />

differences: in the background there is an antenna for 13.56 MHz,<br />

which is used to identify up to 44 crates in a gate configuration. On<br />

the other h<strong>and</strong>, the small h<strong>and</strong>held write <strong>and</strong> read device Simatic<br />

RF310R <strong>with</strong> an internal antenna reads a data carrier that is only the<br />

size of a button.<br />

Normally, the antenna is connected to the reader via a 50 Ohm coaxial<br />

cable. When the devices are installed <strong>and</strong> operated, always ensure<br />

careful h<strong>and</strong>ling of the antenna cables, as bends or crushing will<br />

change their impedance, causing excessive attenuation <strong>and</strong> can in the<br />

end reduce the performance of the <strong>RF<strong>ID</strong></strong> system.<br />

Fig. 2.4 Comparison of the HF systems Simatic RF310R<br />

<strong>with</strong> Moby D ANT NF (in the background)<br />

28


2.2.3 Transponders<br />

2.2 The components of an <strong>RF<strong>ID</strong></strong> system<br />

There are several terms that describe the <strong>RF<strong>ID</strong></strong> data storage unit: mobile<br />

data storage unit (MDS), tag, label, Smart label, <strong>and</strong> radio label.<br />

Its actual task is best described by using the made-up word transponder.<br />

It consists of the English verbs “transmit” <strong>and</strong> “respond” <strong>and</strong> describes<br />

the property of the <strong>RF<strong>ID</strong></strong> data storage unit, responding to inquiry<br />

signals. Only very few systems differ from this principle <strong>and</strong><br />

transmit actively <strong>with</strong>out requests. The simplest form of transponder<br />

consists of a chip <strong>and</strong> an antenna. More complex forms use external<br />

memory <strong>and</strong> further additional circuits, depending on the requirements.<br />

Fig. 2.5 A selection of various transponders<br />

Communication between the reading device <strong>and</strong> transponder takes<br />

place via the so-called air interface, which determines exactly how<br />

<strong>and</strong> <strong>with</strong> which comm<strong>and</strong>s the data exchange takes place. Air interfaces<br />

are often st<strong>and</strong>ardized in order to make the products of various<br />

suppliers interoperable (cf. Chapter 6). The great variety of transponder<br />

models is shown in Fig. 2.5. The large, heat-resistant transponder<br />

MDS U589 is illustrated on the top left-h<strong>and</strong> side. It weighs 600 grams<br />

<strong>and</strong> can h<strong>and</strong>le temperatures of up to 220° C (cyclic). In contrast to<br />

this, the only 10 × 4.5 mm large “Pill” is illustrated at the front center,<br />

a tool data carrier that can be installed flush in metal, e.g. for the<br />

identification of milling heads in tool machines.<br />

29


2 <strong>RF<strong>ID</strong></strong> technology<br />

2.3 Classification of <strong>RF<strong>ID</strong></strong> systems<br />

2.3.1 Passive systems<br />

For passive <strong>RF<strong>ID</strong></strong> systems, the transponder does not have its own energy<br />

source: energy is fed to most systems externally. Normally this<br />

takes place via high-frequency transmission, in rare cases also via<br />

light, sound, pressure, temperature, or other mechanisms. Special<br />

models of passive systems require no energy at all, in which they are<br />

simply based on physical effects.<br />

While the development of a high-performance passive transponder<br />

requires quite some effort, this principle provides a number of advantages:<br />

• It is easy to produce the transponder (only a chip <strong>and</strong> an antenna<br />

are required)<br />

• They have a virtually unrestricted life cycle <strong>and</strong> are service-free<br />

(no battery)<br />

• They can be extremely miniaturized<br />

• Very low costs are possible (to the order of < 0.10 euros)<br />

Systems <strong>with</strong> inductive coupling in the LF/HF range<br />

The oldest <strong>RF<strong>ID</strong></strong> systems are based on energy transfer via a high-frequency<br />

magnetic field <strong>with</strong> inductive coupling, i.e. using the transformation<br />

principle. Fig. 2.6 shows the principle: The transmitter in<br />

the reading device drives current through the antenna coil, thereby<br />

creating a high-frequency magnetic field. Alternating voltage is produced<br />

in the transponder coil by induction <strong>and</strong> is available for operating<br />

the transponder chip after rectification. Data is transferred to<br />

the reader via load modulation. At the same time, a resistive load is<br />

switched to the antenna coil in the transponder according to the modulation<br />

of data. This results in a voltage drop at the reader’s transmission<br />

coil – albeit minimal – can be detected <strong>and</strong> analyzed in the reader<br />

electronics (receiver).<br />

The frequencies that are usually used are 125 kHz (LF) or 13.56 MHz<br />

(HF), as these b<strong>and</strong>s are especially attractive combined <strong>with</strong> the high<br />

permissible output power <strong>and</strong> they can be used worldwide. Read<br />

ranges in excess of one meter can be accomplished. However, at the<br />

same time large antenna coils are required (e.g. 60 × 80 cm), which<br />

30


2.3 Classification of <strong>RF<strong>ID</strong></strong> systems<br />

Resonant<br />

Transmitter Antenna circuit Tag chip<br />

~<br />

Receiver<br />

Fig. 2.6 Inductive coupling<br />

Inductive coupling<br />

definitely creates a problem for some applications. It is necessary to<br />

resort to different technology such as UHF in this case.<br />

Their easily predictable field behavior is a frequently underestimated<br />

property of inductive systems. This is important if it comes down to<br />

reading transponders in a defined range. As the reader’s magnetic<br />

field drops very rapidly at increasing distances (<strong>with</strong> the third exponent),<br />

on the one h<strong>and</strong> there is a really small transitional range<br />

(where the transponder is still or no longer recorded), <strong>and</strong> above all<br />

not overshooting. This makes the technology very interesting for industrial<br />

applications if, for example, several readers are installed in<br />

assembly lines <strong>with</strong>in a restricted space. Mutual disturbances <strong>and</strong><br />

overshooting are virtually excluded, making the systems extremely<br />

reliable.<br />

Systems <strong>with</strong> electromagnetic coupling in the UHF range<br />

Whereas the UHF range (300-3,000 MHz) used to be more or less<br />

exclusively dominated by active or semi-active systems, passive <strong>RF<strong>ID</strong></strong><br />

transponders have also been on the market since around 2003. Philips<br />

(now NXP Semiconductors) was one of the forerunners <strong>with</strong> the<br />

UCODE family, which was st<strong>and</strong>ardized in ISO 18000-6 at a later date.<br />

Further products from various manufacturers followed suit, enabling<br />

the passive UHF system technology to spread fast. The introduction of<br />

<strong>RF<strong>ID</strong></strong> in large business groups’ supply chains had a significant influence.<br />

Logic<br />

31


2 <strong>RF<strong>ID</strong></strong> technology<br />

Fig. 2.7 Passive UHF <strong>RF<strong>ID</strong></strong> system<br />

As opposed to the inductive systems where the magnetic field component<br />

is primarily used, the passive UHF systems are characterized by<br />

genuine electromagnetic coupling: both electrical <strong>and</strong> magnetic components<br />

are emitted. In order to be able to achieve ranges of five<br />

meters <strong>and</strong> more, a transmission output of 2 watts or more is required<br />

(regionally restricted by legal regulations). Normally, a dipole<br />

antenna is used in the transponder that couples in the wave <strong>and</strong> feeds<br />

the signal to the chip where it is rectified <strong>and</strong> provides current (Fig.<br />

2.7). The achievable energy is very low, making modern, low-power<br />

circuit designs necessary in order to be able to use the principle at all.<br />

The transponder’s response signal is transmitted to the reader via<br />

modulated backscatter. At the same time, the chip varies the antenna’s<br />

impedance in the modulation cycle <strong>and</strong> its reflection properties<br />

as a result. Therefore, effective data transfer takes place by reflecting<br />

the signal that is transmitted. The reader must transmit an unmodulated<br />

signal (CW, continuous wave), while the transponder responds.<br />

Systems <strong>with</strong> inductive coupling in the UHF range<br />

The magnetic field component is also used in the UHF range by a new<br />

technology. The term Near Field Communication (NFC) is often used,<br />

indicating the use of the near field, which is similar to the inductive<br />

systems in the LF range. Observe the danger of confusion <strong>with</strong> the<br />

data transmission st<strong>and</strong>ard NFC, which is based on an <strong>RF<strong>ID</strong></strong> air interface<br />

(ISO 14443) [1]. Several advantages are achieved by using inductive<br />

coupling, such as non-sensitivity to water <strong>and</strong> a clearly limited<br />

32<br />

DSP<br />

UHF reader device<br />

~<br />

Transmission signal<br />

Receive signal<br />

Antenna<br />

Transponder<br />

Antenna,<br />

e.g. dipole,<br />

length typ. λ/2<br />

~ 15 cm<br />

Chip


2.3 Classification of <strong>RF<strong>ID</strong></strong> systems<br />

field, which are “paid for”, however, by an extremely low range (a few<br />

decimeters).<br />

Application is simple. The antennas from the reader <strong>and</strong> transponder<br />

must be arranged in an optimized manner for the magnetic component.<br />

Normally, small Loops are used. Fig. 2.8 shows a typical arrangement<br />

form for a near-field transponder. You can clearly recognize<br />

the loop as the antenna for the magnetic component, but also as<br />

the so-called shortened dipole (me<strong>and</strong>er-shaped structure) through<br />

which the transponder can also be read over greater distances.<br />

Fig. 2.8 Near-field-transponder (Photo: NXP Semiconductors)<br />

The major use of the near-field transponders is for so-called item-level-tagging,<br />

or in other words for equipping individual products <strong>with</strong><br />

<strong>RF<strong>ID</strong></strong> transponders (e.g. drugs packaging). The inductive technology<br />

also enables detection of the transponders on difficult materials such<br />

as metal (blister packaging). Separation during the read process is a<br />

further advantage because overshooting rarely occurs. This is required,<br />

for example, if used in cashier systems.<br />

Single-bit transponder<br />

Probably the oldest form of passive tagging can be found in anti-theft<br />

systems. It consists of a simple parallel resonant circuit <strong>and</strong> is read by<br />

the reading device as it varies the transmission signal over a small<br />

range, determining the voltage change for the antenna at the tag’s<br />

resonance frequency: a simple, but effective process. The tag’s information<br />

content is limited, but it suffices for its respective purpose.<br />

33


2 <strong>RF<strong>ID</strong></strong> technology<br />

2.3.2 Semi-active systems<br />

For semi-active <strong>RF<strong>ID</strong></strong> systems, the transponders require a battery as a<br />

power supply. However, they do not use it for active transmission.<br />

These systems are interesting if the higher requirements of the application<br />

cannot be met by passive systems, e.g. a higher range or additional<br />

functions that require more energy than can be provided by the<br />

field. Unfortunately, this coin has another side: semi-active systems<br />

are always more expensive than passive systems, have a restricted<br />

life-cycle, <strong>and</strong> also have a less favorable environmental balance because<br />

the battery normally must be disposed of as hazardous waste.<br />

Furthermore, the battery often cannot be replaced.<br />

Simple systems<br />

Systems using the technology of the semi-active transponder were already<br />

available several years ago. The simplest of these has a very<br />

simple logic circuit that has a very low power consumption <strong>and</strong> is constantly<br />

supplied <strong>with</strong> energy by the battery. Its only purpose is the<br />

uninterrupted modulation of the antenna <strong>with</strong> the bit pattern to be<br />

emitted. If the transponder reaches a high-frequency query signal<br />

(generally in the UHF range), this pattern is reflected by backscatter<br />

<strong>and</strong> analyzed in the reading device. As this process requires hardly<br />

any power, even small batteries can be used for several years. Depending<br />

on the complexity, this can bridge a distance of several meters.<br />

However, this advantage has diminished <strong>with</strong> the advent of passive<br />

UHF systems, in which such systems are becoming less significant.<br />

Complex systems<br />

The use of an additional energy source on the transponder makes<br />

more sense if a considerably broader scope of system performance is<br />

required. For example, this can be necessary in order to provide large<br />

storage capacity for achieving high data transfer rates <strong>with</strong> particularly<br />

robust transmission or for combining <strong>RF<strong>ID</strong></strong> <strong>with</strong> additional sensors<br />

for measuring environmental factors, such as temperature, pressure,<br />

<strong>and</strong> acceleration (cf. Chapter 19).<br />

Moby U from Siemens is a particularly efficient semi-active system. It<br />

was especially developed for the industrial market, in particular automobile<br />

production <strong>and</strong> has performance characteristics that cannot<br />

be realized <strong>with</strong> a passive system. Its active range limiter is a unique<br />

feature. Virtually all UHF <strong>RF<strong>ID</strong></strong> systems (both active <strong>and</strong> passive) over-<br />

34


2.4 Frequency b<strong>and</strong>s <strong>and</strong> their properties<br />

shoot, which can lead to considerable problems in industrial <strong>and</strong> logistical<br />

processes. Moby U enables the user to parameterize the desired<br />

reading range in steps of 0.5 m. Transponders that are further<br />

away are ignored. Otherwise, only locating systems (RTLS) for which<br />

the analysis of the localization data that can be used to eliminate<br />

overshooting can offer similar advantages.<br />

2.3.3 Active systems<br />

Only very special requirements necessitate the use of genuine active<br />

systems. If even more performance is required than for semi-active<br />

systems, active transmission must take place. At the same time, active<br />

transponders are fully powered by one battery. They generate their<br />

own transmission signal, which is actively emitted to the reading device.<br />

The known users of this kind of <strong>RF<strong>ID</strong></strong> systems include locating systems<br />

(RTLS) whose major task is both the identification <strong>and</strong> determination<br />

of the location of an object.<br />

2.4 Frequency b<strong>and</strong>s <strong>and</strong> their properties<br />

The term <strong>RF<strong>ID</strong></strong> already implies one of its most important characteristics,<br />

namely the use of radio frequency to fulfill the identification<br />

task. The spectrum of the electromagnetic waves, however, is very<br />

wide; the frequencies that are used for communication can range<br />

from a few kHz to approx. 100 GHz. As these frequencies have differing<br />

properties <strong>and</strong>, therefore, influence the functionality of <strong>RF<strong>ID</strong></strong> systems<br />

decisively, “the” <strong>RF<strong>ID</strong></strong> system <strong>with</strong> “that” frequency does not exist;<br />

instead, several realizations have become established. As the use<br />

of radio transmitters – which <strong>RF<strong>ID</strong></strong> systems are counted as – are governed<br />

by m<strong>and</strong>atory regulations from national authorities, you must<br />

check whether the frequency is approved in the country of use <strong>and</strong> a<br />

valid permit is available before commissioning an <strong>RF<strong>ID</strong></strong> device. The<br />

CE-mark is important in Europe, the FCC <strong>ID</strong> in the USA (both are normally<br />

printed on the device). If you have any doubts, contact the manufacturer<br />

before switching the device on. If the regulations are violated,<br />

you may interfere <strong>with</strong> vital frequency b<strong>and</strong>s (such as rescue services).<br />

The most important frequency b<strong>and</strong>s for <strong>RF<strong>ID</strong></strong> <strong>and</strong> its properties are<br />

briefly listed below.<br />

35


2 <strong>RF<strong>ID</strong></strong> technology<br />

Low frequency: 9-148.5 kHz<br />

This range is intended for the so-called inductive applications; the interesting<br />

range for inductive <strong>RF<strong>ID</strong></strong> systems is around 119-135 kHz as<br />

very high field strengths are permissible there. In particular, systems<br />

for the identification of animals can be found in this range. However,<br />

automobile immobilizer systems also utilize this frequency. The high<br />

ranges in excess of one meter that can be realized in this area are positive.<br />

However, its proneness to disturbances near electrical engines,<br />

switching power supplies, CRT displays, <strong>and</strong> other sources of interference<br />

which cause the emission of a relatively low-frequency disturbance<br />

spectrum.<br />

High-frequency: 13.56 MHz<br />

This spectrum, which is only 14 kHz wide, is highly popular among<br />

inductive <strong>RF<strong>ID</strong></strong> systems because the high maximum field strength<br />

makes large ranges possible. However, the simple antenna design is<br />

also advantageous (only a few turns) on the reader <strong>and</strong> transponder<br />

sides. Only very heavy interferences normally result in disturbances<br />

at 13.56 MHz. The only downfall is the size of the antennas. Fig. 2.4<br />

makes it clear of the size that is necessary in order to achieve larger<br />

ranges.<br />

Ultra-high frequency: 865-868 MHz<br />

This spectrum, which has been available in Europe for a few years,<br />

has reached high significance in the meantime. This is due to the attractive<br />

passive UHF systems that are operated in the frequency b<strong>and</strong>.<br />

Especially the high permissible output power of 2 W ERP in Europe or<br />

4 W EIRP in the USA makes options possible that were only open to the<br />

semi-active systems (at corresponding high costs) before the frequency<br />

spectrum was released.<br />

The fact that this b<strong>and</strong> cannot be used worldwide is a disadvantage to<br />

a certain extent. Therefore, the US equivalent is 902-928 MHz <strong>and</strong> the<br />

Japanese spectrum is established at 952-954 MHz. This increases<br />

technical expenditure as well as the costs for certification <strong>and</strong> approvals<br />

for the reading devices. On the other h<strong>and</strong>, transponders can be<br />

designed using broadb<strong>and</strong>, in turn enabling their international use.<br />

36


Microwaves: 2400-2483.5 MHz<br />

2.4 Frequency b<strong>and</strong>s <strong>and</strong> their properties<br />

Although this classical “microwave” b<strong>and</strong> has many users (including<br />

WLAN), it is also attractive for <strong>RF<strong>ID</strong></strong>. The high b<strong>and</strong>width is the most<br />

important advantage, as it enables radio technology that cannot be<br />

realized in other spectrums. Therefore, the signals fluctuating due to<br />

interference (fading) can be avoided. Very high bit rates <strong>and</strong> the measurement<br />

of propagation time between transmission <strong>and</strong> return (e.g.<br />

for RTLS) are also possible. The low output power that is deemed permissible<br />

is disadvantageous <strong>and</strong> normally results in the transponders<br />

having to be equipped <strong>with</strong> batteries.<br />

References<br />

[1] Jari-Pascal Curty et.al.: Design <strong>and</strong> Optimization of Passive UHF <strong>RF<strong>ID</strong></strong> Systems.<br />

Springer 2007<br />

37


3 Optical codes<br />

Kirsten Drews<br />

For some 40 years, there has been a constantly increasing requirement<br />

to label items in industry <strong>and</strong> trade <strong>with</strong> automatically readable<br />

markings <strong>and</strong>, therefore, to enable identification during the course of<br />

the entire production process <strong>and</strong> the supply chain up to the end customer.<br />

3.1 Success <strong>and</strong> limits of barcodes<br />

The greatest success so far was the linear codes (also: 1D codes, Barcodes),<br />

for example, the EAN codes on sales packaging. However, barcodes<br />

display some very distinct restrictions, maintaining the need<br />

for further developed technology:<br />

• Analog data encoding (measurement of the bar widths <strong>and</strong><br />

spacing)<br />

• High space requirements, above all for the width for larger data<br />

quantities<br />

• Use of labels that are necessary or a restriction on printing on<br />

paper or plastic<br />

• Poor data security<br />

• Reading that is only possible from one direction or omni-directional<br />

scanning that is only possible <strong>with</strong> expensive additional<br />

measures.<br />

In addition to the developments in the field of radio technology<br />

(<strong>RF<strong>ID</strong></strong>), optical encoding technologies were also researched further.<br />

Piled linear codes, such as PDF417 or Codablock, or the even more<br />

effective two-dimensional digital codes (also the so-called Matrix<br />

codes, 2D codes), can achieve the following objectives:<br />

• Reduction of required space<br />

• Simplification of omni-directional reading<br />

38


3.2 St<strong>and</strong>ards regarding the 2D code<br />

• Tolerance regarding low contrasts due to digital encoding<br />

(binary code)<br />

• Increasing the codable data volume <strong>and</strong><br />

• Increasing the read security by employing high-performance<br />

error correction processes.<br />

Moreover, processes were found to apply matrix codes directly to the<br />

workpiece by using various different effective marking processes.<br />

This hindered loss of the codes, ensuring high robustness against external<br />

influences during the product’s life cycle. This saves also the<br />

cost for the label application. The term Direct Part Marking (DPM) was<br />

established for this direct marking of the workpieces <strong>and</strong> merch<strong>and</strong>ise.<br />

3.2 St<strong>and</strong>ards regarding the 2D code<br />

According to a study by the Fraunhofer-Institut [1] covering nearly<br />

100 companies in Germany, st<strong>and</strong>ards have a particularly high st<strong>and</strong>ing<br />

for users of <strong>Auto</strong> <strong>ID</strong> technology as they ensure the free availability<br />

of a technology on the market at reasonable prices, comparability of<br />

components, <strong>and</strong> their compatibility above <strong>and</strong> beyond company<br />

boundaries <strong>and</strong> continents.<br />

NASA proved to be a driver of the technology for several years.<br />

Research took place in collaboration <strong>with</strong> manufacturers of marking<br />

<strong>and</strong> coding processes in the Symbology Research Center in Huntsville,<br />

Alabama, which was jointly founded by NASA <strong>and</strong> CiMatrix Corp.,<br />

Massachusetts in 1997 <strong>with</strong>in the scope of a “Space Act Agreement”.<br />

The focus was to find a highly compact <strong>and</strong> secure marking solution<br />

that does not use labels. Two NASA documents were the result of these<br />

activities, the “St<strong>and</strong>ard for applying Data Matrix Identification Symbols<br />

on Aerospace Parts” (NASA-STD-6002) <strong>and</strong> the manual “Application<br />

of Data Matrix Identification Symbols to Aerospace Parts using<br />

Direct Part Marking Methods/Techniques” (NASA-HDBK-6003).<br />

3.2.1 Technology st<strong>and</strong>ards<br />

However, the essential organization for st<strong>and</strong>ardization of 2D codes<br />

just as for <strong>RF<strong>ID</strong></strong> technology is the international specialists’ association<br />

AIM Global (Association for <strong>Auto</strong>matic Identification <strong>and</strong> Mobility). In<br />

addition to several known barcodes, in the meantime nearly ten dif-<br />

39


3 Optical codes<br />

Fig. 3.1 Examples of 2D codes: QR Code (a), Data Matrix ECC200 (b), <strong>and</strong><br />

Aztec Code (c)<br />

ferent 2D codes have been st<strong>and</strong>ardized by AIM. These include the<br />

code types Aztec, QR code, Maxi code, Dot code A, Code one, <strong>and</strong> the<br />

Data Matrix Code in the ECC000-140 <strong>and</strong> ECC200 variants (Fig. 3.1).<br />

You can also download code specifications for several stacked barcodes<br />

<strong>and</strong> combined code types from the AIM website (www.aimglobal.org).<br />

Data Matrix ECC200 has been implemented the most so far.<br />

3.2.2 Application st<strong>and</strong>ards<br />

In addition to the technical st<strong>and</strong>ards, several applications are also<br />

based on the Data Matrix Code.<br />

On the one h<strong>and</strong>, subsequent to NASA’s activities, the US Department<br />

of Defense, DoD, has decided to prescribe a binding requirement on<br />

its suppliers that all expensive, serialized, inventoried expendable<br />

components that are decisive for the use or placing of an order are<br />

identified <strong>with</strong> coded data content according to the prescribed regulations<br />

based on the Data Matrix Code ECC200. This specification is<br />

known as the U<strong>ID</strong> (Unique Identification) MIL-STD-130 <strong>and</strong> is being<br />

introduced worldwide following several additions to the specification.<br />

Also the Data Matrix Code ECC200 contains a unique identifier<br />

worldwide.<br />

On the other h<strong>and</strong>, Data Matrix Code was approved by GS1 as an additional<br />

option for use as an EAN code. The so-called EAN Data Matrix is<br />

viewed as especially appropriate for use on small items, for example<br />

in the jewelry or cosmetics sectors.<br />

In the healthcare sector, the EHIBC (European Health Industry Business<br />

Communication Council) <strong>and</strong> GS1 force the use of different processes<br />

when st<strong>and</strong>ardizing the coding st<strong>and</strong>ards, each of which pro-<br />

40<br />

a) b) c)


3.3 Data Matrix Code features<br />

vides alternatives to using barcodes, matrix codes, <strong>and</strong> <strong>RF<strong>ID</strong></strong>. At the<br />

end of 2007, GS1 reported that the European medical technology association<br />

EUCOMED decided to adopt the GS1 coding – a combination<br />

of EAN 128 <strong>and</strong> the EAN Data Matrix.<br />

3.3 Data Matrix Code features<br />

Matrix codes consist of similar-sized elements or cells <strong>and</strong> a search<br />

pattern. The data are coded in the binary depiction as dark or bright<br />

cells as opposed to barcodes where the spacing between as well as the<br />

width of the lines is decisive for their respective meaning. Matrix<br />

codes can also still be interpreted in case of slight contrast differences.<br />

The different matrix codes vary in several of their parameters, e.g.<br />

fixed or variable size, error correction options, the type of search pattern,<br />

the cell form or codable data quantity, <strong>and</strong> in the symbol sets<br />

that are supported.<br />

3.3.1 Data Matrix Code structure<br />

The objective of developing the Data Matrix code was to create a dynamically<br />

changeable code in terms of its size (dependent on the<br />

space available), the resolution of the marking process <strong>and</strong> the reading<br />

conditions, <strong>and</strong> <strong>with</strong> reference to a square or right-angled format.<br />

Furthermore, the code should enable the storage of high data quantities<br />

<strong>with</strong>in the smallest possible space.<br />

This was achieved by designing the search pattern for finding the<br />

code fast as well as simultaneously functioning as an indicator for the<br />

number of cells, columns, <strong>and</strong> the size of the matrix elements. This<br />

made the code size scaleable as desired (resolution-dependent). At<br />

the same time, you can select either a square or right-angled form of<br />

depiction. For better structuring <strong>and</strong> readability, the search patterns<br />

are re-inserted above a certain data quantity, forming a basic pattern<br />

by combining 4 × 4 or 16 × 16 Data Matrix Codes.<br />

The L-shaped finder border (Fig. 3.2) serves to detect the location of<br />

the code quickly in the image after image recording by using a search<br />

algorithm. At the same time, the code can be at any position in the<br />

image. Following this, the frequency pattern is determined by using<br />

the opposite pattern of the alternating border regarding what num-<br />

41


3 Optical codes<br />

Finder border,<br />

solid border<br />

Fig. 3.2 Data Matrix code structure<br />

ber of rows <strong>and</strong> columns are to be expected in the data area, <strong>and</strong> also<br />

determining, therefore, the size of the cells. By default, the code is<br />

depicted in black on a white background. However, an inverse depiction<br />

<strong>with</strong> white on a black background is also permissible.<br />

The st<strong>and</strong>ard requires a quiet zone of one cell’s width minimum<br />

around the code in order to cleanly separate the code <strong>and</strong> background.<br />

The number of columns <strong>and</strong> lines ranges from a 10 × 10 matrix<br />

to a maximum of 144 × 144 columns <strong>and</strong> lines. The largest rectangular<br />

version has 16 lines <strong>and</strong> 48 columns. The majority of Data Matrix<br />

codes that are used is in the region of up to 48 × 48 cells.<br />

One of the Data Matrix’ special strengths is that the code can be applied<br />

to a part directly using various marking processes, that is to say,<br />

<strong>with</strong>out a label. However, the st<strong>and</strong>ard’s requirements here can very<br />

often not be adhered to <strong>with</strong>out incurring very high costs. Therefore,<br />

the actual directly marked codes seldom correspond 100 % to the<br />

st<strong>and</strong>ard. Depending on the form of the background, for example<br />

concave or convex, distortions occur. The marking systems are not<br />

set ideally or the backgrounds are not prepared accordingly, in turn<br />

resulting in cells that are too large or small or create scratches <strong>and</strong><br />

changes to the background color. Moreover, it is a special challenge to<br />

read 2D codes <strong>with</strong> an image processing system that must tolerate<br />

additional influences, e.g. material reflections, trapezoid-shaped distortions<br />

due to sloping angles of viewing or shadows that are cast by<br />

uneven surfaces.<br />

3.3.2 Codable data <strong>with</strong> Data Matrix ECC200<br />

Data Matrix Codes support a wide range of coding schemes that also<br />

determine the codable data quantity.<br />

The coding schemes available are ASCII, Text, C40, ANSI X12, EDIFACT,<br />

<strong>and</strong> Base 256. The use of special code words enables switching<br />

between the symbol sets or to special coding, such as the EAN Data<br />

42<br />

Data area<br />

Alternating border


3.3 Data Matrix Code features<br />

Matrix. As for the code word 232, the data structure of the Data Matrix<br />

code would correspond to the EAN 128 St<strong>and</strong>ard.<br />

Table 3.1 Quantity structure of the codable characters for Data Matrix ECC200<br />

Number:<br />

Lines × Columns<br />

Figures 0-9 Alphanumerical<br />

(0-9, a-z, spaces)<br />

The QR <strong>and</strong> Aztec 2D codes also enable the coding of a similar data<br />

quantity <strong>and</strong> are, therefore, equally suitable for data management on<br />

an object as in data matrix. This distinguishes these codes clearly<br />

from the barcodes that have the primary task of coding an identifier<br />

<strong>and</strong> the recourse to a centrally held database that is associated <strong>with</strong> it.<br />

2D codes, therefore, push forward into the area that is typically an<br />

<strong>RF<strong>ID</strong></strong> technology strength, namely remote carrying of data on the object.<br />

However, a considerable advantage of the <strong>RF<strong>ID</strong></strong> technology is that<br />

the data carriers can be re-written several times over.<br />

3.3.3 Error correction <strong>and</strong> security aspects<br />

8 bit ASCII<br />

(byte 0-255)<br />

10 × 10 6 3 1<br />

48 × 48 348 259 172<br />

144 × 144 3116 2335 1556<br />

One of the most fundamental differentiation features between 2D<br />

codes <strong>and</strong> barcodes is their far-reaching capability to recognize errors<br />

<strong>and</strong> to correct them. This capability is also described by using the<br />

term ECC for “Error Correcting Code”. It is already possible to correct<br />

the Data Matrix codes ECC000 to ECC140 to a certain extent. However,<br />

ECC200 is the only Data Matrix code that utilizes the powerful Reed-<br />

Solomon (RS) algorithm for error recognition <strong>and</strong> correction.<br />

One of the RS process’ particular strengths is that it also provides<br />

good results in case of burst or block errors. This is practically relevant<br />

because, despite the data bytes being spread over the entire data<br />

field in case of the soiling of the code, several bits belonging to a character<br />

are affected together. Consequentially, the data coding for the<br />

Data Matrix code includes redundancies.<br />

A 10 × 10 Data Matrix code as such already requires five error bytes<br />

for coding three data bytes, but can then correct more serious faults<br />

on more than 50 % of the data field. The data to error bytes ratio improves<br />

considerably for larger codes. However, it is always ensured<br />

43


3 Optical codes<br />

that up to 28 % of the data field can be faulty <strong>with</strong>out an incorrect<br />

reading resulting. We must observe that smaller faults of the finder<br />

<strong>and</strong> frequency edge can also result in non-reading as they are not included<br />

in the error correction process. In this case, the ability to compensate<br />

for such errors primarily depends on the reading capabilities<br />

of the camera systems.<br />

2D codes also meet high dem<strong>and</strong>s pertaining to data consistency <strong>and</strong><br />

availability <strong>with</strong> their direct marking options. Mechanically effective<br />

marking processes also ensure that towards the end of a product life<br />

cycle, the code can be found <strong>and</strong> remains readable. In cases where<br />

labels or <strong>RF<strong>ID</strong></strong> tags have failed, for example <strong>with</strong> medical instruments<br />

that are sterilized hundreds of times over, 2D codes have proven their<br />

suitability.<br />

In the future, a fully different kind of security view should not remain<br />

unobserved in the eyes of industry. If the availability of appropriate<br />

reading devices was still a restricting factor in the past due to relatively<br />

high prices, nowadays several mobile phones <strong>with</strong> a camera <strong>and</strong><br />

decoding algorithms can easily be re-equipped as 2D code reading<br />

systems. Hacker attacks <strong>and</strong> unauthorized access to company data are<br />

simplified due to this. Therefore, it makes sense to utilize cryptographic<br />

processes for security in those cases involving sensitive data.<br />

3.4 Application <strong>and</strong> marking methods<br />

3.4.1 Application of labels<br />

Generally, printing a label under controlled conditions leads to print<br />

results closer to st<strong>and</strong>ards <strong>and</strong> comparatively high contrasts. This<br />

considerably simplifies the requirements of the reading systems,<br />

making the respective use of inexpensive devices possible. A further<br />

advantage of labels is that the material properties as opposed to some<br />

mechanical marking processes are not changed. However, robust, durable<br />

availability requires expensive label material.<br />

In particular when dealing <strong>with</strong> high quantities, the cost for highquality<br />

<strong>and</strong> at the same time reasonably durable labels play a significant<br />

role. In this case, it is worthwhile to check for alternative options<br />

for direct marking of objects.<br />

44


3.4.2 Direct marking processes<br />

3.4 Application <strong>and</strong> marking methods<br />

Initially, it has to be checked if the object to be marked changes its<br />

mechanical sturdiness due to the marking process. If this is the case,<br />

e.g. for heavily burdened workpieces or very thin materials, then<br />

some processes such as drilling or laser etching by removal cannot be<br />

used. Furthermore, the material must basically be suitable for the<br />

marking means selected. The manufacturers of the marking devices<br />

<strong>with</strong> their extensive experience <strong>with</strong> most of the materials are the appropriate<br />

partners for analyzing suitable materials. Alternatively, we<br />

recommend carrying out respective tests. Below we have selected<br />

some of the many possible methods for direct workpiece <strong>and</strong> product<br />

marking.<br />

Printing<br />

Direct marking using inkjet printing has stood the test of time on<br />

many different materials such as paper <strong>and</strong> cardboard packaging <strong>and</strong><br />

collapsible boxes, wood, cork, ceramics, stone, <strong>and</strong> some metals. As<br />

the ink is only applied to the surface of the material, the marking has<br />

no effect on the material properties.<br />

High-performance thermotransfer printers that transfer the ink to<br />

the material via an ink ribbon, which is systematically heated, offer<br />

an alternative to inkjet printers. Although these printers do not permit<br />

such high material speeds, they are nonetheless suitable for matrix<br />

codes due to their high resolution. Laser printers, which are familiar<br />

to us from their use in our offices, also meet the requirements<br />

for printing 2D codes. However, they are primarily used for document<br />

management when printing on paper.<br />

Laser labeling<br />

The best known process for laser use is engraving, which changes the<br />

surface of the object mechanically by material removal. The high-impact<br />

laser beam evaporates the material in a controlled manner. A<br />

cavity is formed that is made visible, rich in contrast, by using corresponding<br />

lighting. The throw-off created (material protrusions) on<br />

the sides of the engraved groove are critical as they hamper the code’s<br />

homogeneous illumination.<br />

With laser etching, the uppermost layer of several material layers is<br />

removed under laser exposure. In as far as attention was paid to a<br />

45


3 Optical codes<br />

good contrast between the covering layer <strong>and</strong> the base layer, an easily<br />

readable marking is thereby created. This process is used on circuit<br />

boards <strong>and</strong> special plastic labels that are suitable for use <strong>with</strong> this laser<br />

process.<br />

The color change to the material when heated is used by tempering<br />

during heat treatment. Without too strong of an effect on the material,<br />

the color change is utilized for marking, especially on metal. As<br />

opposed to engraving, this process does not create any cavities in the<br />

surface <strong>and</strong> is, therefore, well-suited for use <strong>with</strong> objects that must be<br />

kept sterile. However, such marking only remains durable if the material<br />

is not heated further because the marking can degenerate.<br />

Especially all when working <strong>with</strong> plastics, a controlled color change is<br />

desired. A suitable doping of the plastic material <strong>with</strong> the impact of<br />

the laser can achieve targeted color combinations <strong>and</strong> high contrasts.<br />

If plastic is prepared accordingly, the laser can also make an embossed<br />

marking by foaming material fractions. However, this results<br />

in fuzzy edges between the light <strong>and</strong> dark cells <strong>and</strong> can only be used<br />

successfully for large format codes.<br />

The flexibility <strong>and</strong> suitability of laser marking only has one disadvantage<br />

– the purchase costs for a laser marking system are high compared<br />

to other methods <strong>and</strong> only pay-off, if there are high quantities<br />

of the products to be marked.<br />

Pin marking<br />

Pin marking technology, which is relatively stress-free for the material,<br />

is also cheap to purchase as opposed to laser marking (Fig. 3.3).<br />

This method strikes a hard metal pin against the material <strong>with</strong> an upwards<br />

<strong>and</strong> downwards movement, providing a sequence of interconnected<br />

craters. Dotpin marking can also be used for hard metals <strong>with</strong>out<br />

any problems. The low costs <strong>and</strong> speed are comparable to laser<br />

marking, which make this marking technology for matrix codes highly<br />

attractive. The craters created during pin marking are circularshaped<br />

<strong>and</strong> the displaced material is deposited at the edge of the crater<br />

in a small mound. This form leads to special challenges for reading<br />

devices as the shadows cast by the craters can sometimes be seen<br />

as rings (to their special form also known as “donuts”) <strong>and</strong> can, sometimes<br />

be seen as half-moon-shaped crescents or if the base of the crater<br />

is fully reflected, as small, bright dots in the image. Not all code<br />

reading systems are capable of recognizing <strong>and</strong> decoding such codes<br />

reliably.<br />

46


Fig. 3.3 Effects of the lighting for pin-marked codes<br />

(left to right: 2 × dark field variants, diffused direct light)<br />

Further alternative marking methods<br />

3.4 Application <strong>and</strong> marking methods<br />

The processes of scribing, drilling, <strong>and</strong> etching have a major effect on<br />

the material. When drilling, take into account that the undefined<br />

backgrounds in the drilled holes can trigger rather dem<strong>and</strong>ing read<br />

tasks.<br />

3.4.3 Verification of the Code Quality<br />

Testing the successful application of the code subsequent to marking<br />

is decisive for a stable process. As the quality of nearly all codes deteriorates<br />

during the life cycle, it is advised to start <strong>with</strong> the best possible<br />

code quality. The high-performance reading systems then serve<br />

as a security reserve for unexpected events or deteriorated codes, in<br />

turn guaranteeing process stability even under conditions that become<br />

less favorable. In order to achieve this, we recommend using a<br />

verification system directly after application of the marking.<br />

During the course of this verification, a code reading system carries<br />

out measurement of the code quality under constant conditions <strong>with</strong><br />

regard to mounting <strong>and</strong> lighting arrangement, based on various parameters.<br />

These parameters are defined in several international st<strong>and</strong>ards.<br />

Each of the parameters is allocated to a quality level from A<br />

(excellent quality) to D (poor quality), or F (inadequate quality). The<br />

target is to stabilize as many as possible of the parameters on level A<br />

or B, <strong>with</strong> isolated exceptions in C. Quality D or F codes should not be<br />

channeled into the process.<br />

As well as recognizing that the marking process is possibly not appropriate<br />

for the material, the settings for the marking devices can<br />

also be optimized by using the values provided. If there is a sufficient<br />

underst<strong>and</strong>ing of the marking technology, required servicing measures<br />

for the marking systems can even be deduced from the worsen-<br />

47


3 Optical codes<br />

ing of certain parameters, e.g. a necessary tool change for a pin<br />

marker.<br />

3.5 Reading systems <strong>and</strong> their properties<br />

3.5.1 Components of a data matrix reading system<br />

Code reading systems include the following components:<br />

• Camera unit consisting of a lens, sensor, <strong>and</strong> image capturing unit<br />

• Lighting<br />

• Controller unit, consisting of process <strong>and</strong> communication<br />

interfaces<br />

• Housing <strong>and</strong> physical connection technology.<br />

Depending on the task, these elements can vary widely <strong>with</strong> regard to<br />

their construction form <strong>and</strong> integration. You can see this immediately<br />

when comparing stationary code reading systems <strong>and</strong> manual<br />

reading systems. However, you can also find very small reading systems<br />

among the fixed mounting systems (stationary code reading<br />

systems), where fix-focus lenses, some LEDs such as lighting, <strong>and</strong> the<br />

entire image capturing <strong>and</strong> processing unit as well as a communication<br />

interface are integrated into the housing. There are modular systems<br />

at the other end of the scale that can be supplemented flexibly<br />

<strong>with</strong> matching lighting <strong>and</strong> lenses <strong>and</strong> offer various communication<br />

interfaces. Whereas some of the devices are mainly suitable for uncomplicated,<br />

high-contrast applications, the other products are used<br />

in the area of dem<strong>and</strong>ing direct marking, e.g. in the automotive <strong>and</strong><br />

aviation industries.<br />

3.5.2 Stationary reading systems<br />

The use of stationary reading systems enables fully automatic data<br />

collection <strong>with</strong>out constant monitoring or operation by a person.<br />

These fixed installed reading systems are used in several form factors:<br />

As PC-based image processing systems, intelligent cameras <strong>with</strong><br />

a compact design, or <strong>with</strong> a remote camera head. We still must distinguish<br />

between the image processing systems that support the reading<br />

of matrix codes as a side function <strong>and</strong> pure code reading systems<br />

<strong>with</strong> a SW user interface that is exclusively optimized for the parame-<br />

48


3.5 Reading systems <strong>and</strong> their properties<br />

terization of the code read task. Moreover, there are still variants that<br />

are designed as verification systems.<br />

Compact code reading systems are the largest market segment for<br />

reading Data Matrix Codes. Fix-focus position lenses, lighting, <strong>and</strong> an<br />

analysis device are combined in one casing. The devices frequently<br />

offer a default parameter setting, making it possible, as it were, to<br />

demonstrate the reading capability for codes directly out of the box.<br />

At the same time, the user is supported by installed focusing <strong>and</strong> target<br />

aids, which also make installation on-site easier.<br />

As the dem<strong>and</strong>s of the reading task increase for direct markings or<br />

critical installation situations for which the read distances are not<br />

covered by fixed lenses, compact structured reach their limits, which<br />

also cannot be overcome by optimal parameter settings. The more<br />

flexible modular code reading systems enable the free selection of<br />

the lens <strong>and</strong>, therefore, a high degree of freedom regarding the distance<br />

to the object <strong>and</strong> the size of the read window. Furthermore, the<br />

lighting is offered as an externally connectable unit that can then, for<br />

example, also be positioned at a specific angle to the reading device in<br />

order to avoid total reflection (Fig. 3.4).<br />

In line <strong>with</strong> the trend to miniaturize, sub-compact reading devices<br />

<strong>with</strong> dimensions not exceeding 60 mm in any direction have also<br />

been available for a few years now. In most cases, these devices are<br />

derived from the HW technology of manual reading devices. How-<br />

Fig. 3.4 When reading from needled Data Matrix Codes on cast iron,<br />

we recommend using contrasting lighting (Photo: W. Geyer)<br />

49


3 Optical codes<br />

ever, the result is the restriction of reader performance to more or<br />

less unproblematic codes <strong>and</strong> installation situations. But, as the experience<br />

of users leads to constantly better marked codes, these readers<br />

will also be used for directly marked codes. The compactness of the<br />

devices goes along <strong>with</strong> limited communication options or external<br />

interface converters, making the costs of the solution as a whole,<br />

higher.<br />

3.5.3 Mobile reading systems<br />

If it is not possible to ensure that the same or a similar part can always<br />

be read in the same position in an identification application <strong>with</strong> 2D<br />

codes, the option of using a mobile reading system is available. The<br />

flexibility of these systems is advantageous. However, they always require<br />

an operator. Manual systems for reading 2D codes must include<br />

CCD array sensors <strong>and</strong> are frequently equipped <strong>with</strong> complex lighting<br />

mechanics, which also enable the reading of low contrast direct<br />

marks.<br />

Inexpensive systems that use a few LEDs for lighting are available on<br />

the market for reading 2D codes on paper <strong>and</strong> labels. Most of these<br />

devices can also read 1D codes <strong>and</strong> stacked codes. The restriction here<br />

is often that the code is too wide due to the rectangular shape of the<br />

image window. Occasionally combined systems can be found that<br />

overcome this problem by using a scanner as well as a CCD matrix<br />

camera to read the barcodes.<br />

In order to read directly marked 2D codes successfully, a lighting concept<br />

is required that adjusts <strong>and</strong> optimizes the light. Reading devices<br />

that are available on the market use variable lighting for this purpose,<br />

which is changeable between light-field <strong>and</strong> dark-field lighting<br />

<strong>and</strong> also the so-called “light pipes”, which utilize the reflecting properties<br />

of materials to supply light evenly from the sides.<br />

3.5.4 Physical <strong>and</strong> technical data integration<br />

The decision to use <strong>Auto</strong> <strong>ID</strong> technology never indicates only a locally<br />

restricted application – it is always accompanied <strong>with</strong> a far-reaching<br />

change to the IT processes <strong>and</strong> data management. In particular, in<br />

case of logistics applications such as the organization of the materials<br />

flow to manufacturing, the technology quickly jumps over company<br />

limitations <strong>and</strong> requires the integration of customer <strong>and</strong> supplier<br />

data. Local use of the coded information only suffices for closed<br />

50


3.5 Reading systems <strong>and</strong> their properties<br />

manufacturing processes. However, this is increasingly viewed as<br />

wastage as, once applied, a 2D code is available for the entire product<br />

life cycle.<br />

Stipulations must take various viewpoints into consideration for successful<br />

integration. Some of these go beyond the requirements of<br />

<strong>RF<strong>ID</strong></strong> systems:<br />

1. Should data management take place on the object (large code) or<br />

should the code only include an identifier <strong>and</strong> further data be kept<br />

centrally?<br />

2. Should the code be used for process control or for documenting<br />

product tracking?<br />

3. Should the connection to the main level take place via a programmable<br />

logic controller (PLC) or an IT system?<br />

4. Do images of the codes or possibly also only fault patterns have to<br />

be archived or is short-term availability from the reading device’s<br />

memory sufficient?<br />

5. Should display functionality be provided for the system operator?<br />

The most important interfaces are the connections to the other automation<br />

l<strong>and</strong>scape participants (machine-machine-interface) <strong>and</strong> the<br />

user interfaces (man-machine-interface), which is briefly discussed<br />

below.<br />

Application communication interfaces<br />

Due to the limitations of barcodes, central data management is the<br />

st<strong>and</strong>ard for several logistics applications where the Data Matrix Code<br />

replaces a barcode. When simply upgrading a barcode scanner, connection<br />

via a serial RS232 interface often suffices. On the one h<strong>and</strong>,<br />

the code strings can be passed on securely via this interface <strong>and</strong> the<br />

reading device can be parameterized at the same time. The USB interface<br />

has similar significance. However, this assumes a PC as its communication<br />

partner.<br />

Normally, bus systems such as Industrial Ethernet or RS485 <strong>with</strong> the<br />

Profinet, Ethernet-IP, or Profibus DP protocols are already in use in<br />

the production environment. To reduce complexity, the existing bus<br />

systems are also used for connecting the code readers. Due to the<br />

high b<strong>and</strong>width, Industrial Ethernet is the top choice for the data-intense<br />

transmission of images. There are also systems available on the<br />

51


3 Optical codes<br />

market which allow data separation: parameterization <strong>and</strong> image<br />

transfer are transmitted to PCs via Industrial Ethernet <strong>and</strong> the process<br />

data are transmitted to a PLC via Profibus. In particular, if parts<br />

identification via a matrix code triggers the next processing steps,<br />

this solution can be optimal regarding the total costs.<br />

Operator interfaces<br />

The concepts used for the available code reading systems vary widely<br />

<strong>with</strong> regard to the operator interface. Most systems are supplied <strong>with</strong><br />

parameterization software that is used to make initial system settings<br />

<strong>and</strong> in case of any faults. Many suppliers assume that code reading<br />

systems are used as barcode scanners for which also no image is required<br />

by the user during operation. Some devices provide considerably<br />

more comfort. A monitor can be connected via the integrated<br />

VGA interface to display the camera images <strong>and</strong> other analysis data –<br />

a function that is especially important in case of recognition problems.<br />

This incorporates correspondingly powerful analysis software<br />

that must become more intelligent <strong>with</strong> the fewer parameters provided.<br />

Integrated Web servers provide the option to operate the devices<br />

<strong>with</strong>out using additional programs.<br />

3.6 Achieve good read results<br />

The target of all identification tasks is to capture the data from all of<br />

the objects to be identified <strong>with</strong>in as short a period as possible <strong>and</strong><br />

fault-free. The <strong>Auto</strong> <strong>ID</strong> technology supports in this respect the avoidance<br />

of errors (for example, transmission errors in case of manual<br />

data capture) <strong>and</strong> also implementing secure reading. At the same<br />

time, a reading rate of 100 % is sought.<br />

In industrial <strong>and</strong> logistical applications, non-reading that is reported<br />

is far preferable to unnoticed faulty reading, because in case of the<br />

non-reading, the object that is in question can be phased out <strong>and</strong> subsequently<br />

recorded manually. On the other h<strong>and</strong>, faulty reading causes<br />

incorrect data stocks <strong>and</strong> even, possibly, brings production to a halt.<br />

For practical applications, the requirements of the read rate normally<br />

fluctuate between 99 % <strong>and</strong> 99.99 %. In its implementation, this<br />

means that the users accept non-reading of 100 per 10,000 parts, depending<br />

on how high the costs are for manual intervention <strong>and</strong> on<br />

the value of the marked objects.<br />

52


3.6.1 Optimization of the optical conditions<br />

3.6 Achieve good read results<br />

The use of a CCD camera for reading codes makes a relatively high<br />

degree of flexibility possible <strong>with</strong> regard to system installation. Neither<br />

the reading distance nor the angle are pre-defined statically <strong>and</strong><br />

can, therefore, be optimized using the total optical system consisting<br />

of the sensor, lens, <strong>and</strong> lighting. However, the most important target<br />

is always to achieve a high read rate <strong>and</strong> this requires the observation<br />

of certain recommendations <strong>and</strong> framework conditions.<br />

The following criteria basically have a positive effect on high read<br />

rates <strong>and</strong> short decoding times:<br />

• Quality of the codes (contrast, adherence to st<strong>and</strong>ards (quiet zone,<br />

uninterrupted finder <strong>and</strong> alternating borders, <strong>and</strong> cell shape)<br />

• Low distortion due to placing the reading device as vertically as<br />

possible to the object’s surface <strong>and</strong> the code<br />

• Reflection-free <strong>and</strong> homogeneous code background<br />

• Stable positioning, above all <strong>with</strong> regard to the rotation of the code<br />

in the image window (several reading devices permit restriction of<br />

the search window <strong>and</strong> angle via parameters, thereby restricting<br />

the duration of the search)<br />

• Matching code size <strong>and</strong> camera resolution ratio. A ratio of at<br />

least 5 × 5 pixels per matrix cell has proven ideal for secure<br />

read results.<br />

Generally, the requirements are not excessively stringent for reading<br />

printed or laser codes on paper, labels, or other “cooperative” surfaces<br />

on which good contrasts <strong>and</strong> codes conform to the st<strong>and</strong>ards can<br />

be achieved. Therefore, mostly compact reading devices <strong>with</strong> integrated,<br />

ring-shaped lighting have become established for these reader<br />

tasks. Mostly these devices also have fixed focal lengths or socalled<br />

fixed focus lenses, stipulating the distance <strong>and</strong> image window<br />

size <strong>with</strong>in a narrow scope.<br />

The direct marks for which the above-mentioned optimized ratios<br />

cannot be achieved pose a greater challenge. The following measures<br />

can be employed to improve the read results:<br />

• Calculation of the optical system for a accurately focused image<br />

<strong>and</strong> the optimum code size for the selected field-of-view. This often<br />

results from the possible positioning accuracy of the code, which<br />

can fluctuate widely between the applications, <strong>and</strong> where its<br />

improvement may cause rather high costs for mechanics.<br />

53


3 Optical codes<br />

• Optimization of the uniformity of the code <strong>and</strong> the contrast via a<br />

material <strong>and</strong> distance-dependent lighting concept.<br />

• Minimizing the optical distortion due to positioning the camera as<br />

vertically as possible while observing any possible reflections. A<br />

slight angle of 10 to 20 degrees has often proven ideal, especially<br />

when using the integrated lighting as total reflections can occur<br />

here.<br />

Fig. 3.5 The influence of illumination on contrast <strong>and</strong> readability of a laser<br />

2D code (left-h<strong>and</strong> side: Ring light, right-h<strong>and</strong> side: Diffused axial lighting)<br />

Depending on the state of the code <strong>with</strong> reference to mechanical material<br />

changes (protrusions or material removal) as well as the roughness<br />

<strong>and</strong> reflectivity of the material can become highly challenging<br />

<strong>with</strong> regard to lighting techniques. Fig. 3.5 shows some of the effects.<br />

3.6.2 Minimization of the material ambient conditions’<br />

influence<br />

The material initially does not influence the sensory recording in case<br />

of an optical system (although the reflection properties of the material<br />

must be taken into consideration), as opposed to radio technology,<br />

which might be affected by water or metal in the surroundings. However,<br />

soiling of the lenses or the object due to dust or oil can influence<br />

the reader’s success in the long-term. You can only protect them<br />

against insidious, worsening read rates <strong>with</strong> corresponding protective<br />

methods <strong>and</strong> regular cleaning if a fundamental elimination of the<br />

problem is not possible.<br />

You must also take into consideration for all identification applications<br />

that the quality of the code tends to deteriorate during a multilevel<br />

production process <strong>with</strong> possible intermediate periods of storage.<br />

For example, we would like to refer to slight rust traces that may<br />

54


3.7 Outlook <strong>and</strong> new developments<br />

dramatically change the reflection properties of the object after a<br />

storage phase. We can only control such effects by analyzing the process<br />

in detail, the parts concerned, <strong>and</strong> the conditions, which must be<br />

observed <strong>with</strong> foresight.<br />

Generally speaking that isolated non-reads that occur provide highly<br />

dem<strong>and</strong>ing challenges to the diagnosis functions of a reading device.<br />

As a minimum, a reading device should provide the opportunity to<br />

save errorneous images including the read parameters used <strong>and</strong> time<br />

stamps. At the same time, it is then also possible to reconstruct effects<br />

such as a time-dependent change of ambient light.<br />

3.6.3 Meeting the technological requirements<br />

When working <strong>with</strong> matrix cameras, inadequate positioning of the<br />

code <strong>and</strong> resulting in a code outside of the camera’s field-of-view is a<br />

common error source. Therefore, when selecting a code reading system,<br />

the performance properties, the integration into an automation<br />

system <strong>and</strong> mechanics should also be observed. The following questions<br />

should be answered:<br />

• How precisely can I position <strong>and</strong> what size must the field of view<br />

be? Might I need a higher camera resolution?<br />

• How many parts must be read per second? Do I need especially<br />

high-performance reading devices or special parameter settings by<br />

more accurate definition of code type <strong>and</strong> orientation, in order to<br />

achieve faster reading results?<br />

• How can I trigger image capturing? Can I distinguish the objects in<br />

such a manner that a trigger signal can be created by a proximity<br />

switch? Or do I require a self-triggered image acquisition where a<br />

code is continually searched for in the image (which indicates the<br />

need for a high-performance system)?<br />

The answers to these questions have a considerable influence on the<br />

selection of the reading system that is appropriate for the respective<br />

application.<br />

3.7 Outlook <strong>and</strong> new developments<br />

Following the first years of careful testing, matrix code technology<br />

has developed to become a recognized alternative to barcodes <strong>and</strong><br />

<strong>RF<strong>ID</strong></strong> in the meantime. At the same time, common efforts of recent<br />

55


3 Optical codes<br />

years by industry <strong>and</strong> suppliers in the area of st<strong>and</strong>ardization have<br />

led to growing trust <strong>and</strong> a common underst<strong>and</strong>ing of the correct application<br />

of the 2D code <strong>and</strong>, in particular, the Data Matrix code.<br />

With the expansion of the application areas <strong>and</strong> number of uses,<br />

there is a current trend in the use of budget systems, above all for<br />

unproblematic marks. Moreover, the increased performance capability<br />

of processors, along <strong>with</strong> further efforts to improve analysis software,<br />

has reduced the risk of unread codes.<br />

The selection of code formats in the 2D range does not st<strong>and</strong> still <strong>with</strong><br />

the st<strong>and</strong>ardized codes. New applications <strong>and</strong> requirements drive innovation<br />

forward <strong>and</strong> new code types are developed, which could become<br />

tomorrow’s st<strong>and</strong>ard. In the meantime there are codes on the<br />

market <strong>with</strong> an external form that can adapt flexibly to the space<br />

available <strong>and</strong> codes that, in addition to the pure information, also<br />

contain security features for product authentication.<br />

St<strong>and</strong>ardization, innovative progress, <strong>and</strong> the specific properties of<br />

Data Matrix codes <strong>and</strong> other 2D codes such as low space requirements,<br />

minimal costs for marking, <strong>and</strong> non-sensitivity pertaining to<br />

environmental influences will ensure 2D codes’ long-term place<br />

among the important <strong>Auto</strong> <strong>ID</strong> technologies.<br />

References<br />

[1] Fraunhofer-Institut für Materialfluss und Logistik (IML): Marktbefragung<br />

April 2004<br />

56


4 System architecture<br />

Peter Schrammel<br />

<strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems provide computer systems <strong>with</strong> access to<br />

the physical world of things. This means that relevant data can be automatically<br />

recorded directly at the object location, thereby enabling<br />

process control <strong>and</strong> optimization. The mobility of real objects largely<br />

requires a spatial distribution of the infrastructure requiring management.<br />

The recorded data must also be preprocessed in order to<br />

extract their business benefit. This chapter deals <strong>with</strong> the requirements<br />

<strong>and</strong> solutions regarding the architecture, data processing,<br />

management, <strong>and</strong> operation of these systems.<br />

4.1 Overview<br />

The architecture of a system is understood as the totality of components<br />

(hardware <strong>and</strong> software) as well as their arrangement <strong>and</strong> interaction.<br />

The architecture specifies the important properties of a system,<br />

thereby determining its options <strong>and</strong> limits. On the other h<strong>and</strong>,<br />

the architecture concept depends on the required properties of the<br />

system. In <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems, these are particularly determined<br />

by the characteristics of the realizable business processes.<br />

4.1.1 Software in <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems<br />

An <strong>RF<strong>ID</strong></strong> or <strong>Auto</strong> <strong>ID</strong> application is nearly always an automated system<br />

that displays <strong>and</strong> supports the business process. It spans all the system<br />

levels (Fig. 4.1), from objects equipped <strong>with</strong> transponders to the<br />

device infrastructure, Edgeware to the business logic, i.e. right up to<br />

the display of local, company-wide, <strong>and</strong> sometimes even cross-corporate<br />

business processes.<br />

57


4 System architecture<br />

Fig. 4.1 System levels in <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems (comp. [1])<br />

4.1.2 System characteristics<br />

In <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems, we distinguish between closed <strong>and</strong> open<br />

systems. In closed systems, the objects are only recorded <strong>with</strong>in an<br />

institution to stay there or keep returning back to them. An open system,<br />

on the other h<strong>and</strong>, permits utilization by many users for their<br />

own application; the object flow is usually not a circuit. Therefore, the<br />

transponder on a car chassis could, for example, be used by the manufacturer<br />

for production control, by the dealer for inventory purposes,<br />

<strong>and</strong> by a commercial customer for the administration of the car<br />

fleet.<br />

A further characteristic is the type of interaction between the system<br />

<strong>and</strong> object. This take place, for example, on an assembly line or<br />

through manual h<strong>and</strong>ling such as during the inventory of IT equipment<br />

<strong>with</strong> a mobile recording device.<br />

In central systems, the business logic takes place centrally; one example<br />

is a pet register <strong>with</strong> which veterinarians <strong>and</strong> authorities can ascertain<br />

information on the animal <strong>and</strong> owners by reading the injected<br />

transponder. Such a system is organized locally, when this information<br />

is stored on the transponder <strong>and</strong> could be read offline anywhere.<br />

Decentral systems are applied wherever local processing <strong>and</strong> control<br />

are required, which a central system can no longer cope <strong>with</strong>, for example<br />

in an automation system.<br />

4.1.3 <strong>Processes</strong>, applications, <strong>and</strong> marginal conditions<br />

The process flow in a typical <strong>RF<strong>ID</strong></strong> application (Fig. 4.2) first requires<br />

the initialization of the transponder. This is achieved by optically <strong>and</strong><br />

electronically programming <strong>and</strong> issuing them <strong>with</strong> a unique number,<br />

which is also affixed to the object. The now uniquely identified object<br />

then passes the various identification points in the process such as<br />

58<br />

Inter-enterprise level<br />

Enterprise level<br />

Process level<br />

Access level<br />

Device level<br />

Object level


4.1 Overview<br />

goods shipment, for example. At the end of the life cycle, the transponders<br />

in some systems can be detached from the object <strong>and</strong> destroyed.<br />

As the physical environment (metal, liquids, antenna alignment,<br />

etc.) influences the transponder’s reading quality, other technical<br />

<strong>and</strong> organizational measures are required apart from the optimization<br />

of the <strong>RF<strong>ID</strong></strong> hardware, which need to be coordinated by the<br />

entire system.<br />

Initialization Equipping Palletization<br />

<strong>RF<strong>ID</strong></strong><br />

printer<br />

Disposal<br />

<strong>RF<strong>ID</strong></strong><br />

cash till<br />

Sales<br />

Fig. 4.2 Typical <strong>RF<strong>ID</strong></strong> process in Logistics<br />

Inventory<br />

Goods shipments<br />

Goods entry<br />

The concrete requirements of the system depend on the properties of<br />

the application, whether only tracking or real-time control takes<br />

place, for example, or the size of the recordable units at goods receipt<br />

or whether only manual recording takes place <strong>with</strong> a mobile recording<br />

device. However, <strong>RF<strong>ID</strong></strong>-supported processes do not only take place<br />

<strong>with</strong>in a company but can also be designed to overlap <strong>with</strong> business<br />

partners. The tracking of goods transport, for example, is a globally<br />

distributed process that not only involves suppliers <strong>and</strong> customers<br />

but also logistics <strong>and</strong> transporting companies as well as institutions<br />

such as customs, banks, <strong>and</strong> insurance companies. A further requirement<br />

is contained in the question of who is to receive what information<br />

when, in what form, <strong>and</strong> how fast.<br />

59


4 System architecture<br />

4.2 System levels<br />

<strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems are usually hierarchically structured. The<br />

data volume decreases from the bottom upwards, while the latency<br />

period increases. Many fast reacting systems perform preprocessing<br />

in the lower levels, so that the higher levels are only confronted <strong>with</strong><br />

the information actually required for the fulfillment of their tasks.<br />

Then again, central monitoring, remote administration, <strong>and</strong> optimization<br />

are also required.<br />

4.2.1 Components<br />

An <strong>RF<strong>ID</strong></strong> system consists of a multitude of components:<br />

• transponders<br />

• <strong>RF<strong>ID</strong></strong> devices such as <strong>RF<strong>ID</strong></strong> readers or <strong>RF<strong>ID</strong></strong> printers<br />

• automation devices such as programmable logic controllers (PLC),<br />

signal lights, photoelectric barriers, <strong>and</strong> other sensors<br />

• mobile reading devices (PDAs, h<strong>and</strong>helds) for executing<br />

mobile applications<br />

• network <strong>and</strong> communication structure<br />

• Edgeware such as a component of <strong>RF<strong>ID</strong></strong> middleware, which<br />

abstracts the subjacent hardware l<strong>and</strong>scape <strong>and</strong> provides an<br />

interface for recording <strong>and</strong> writing data, for data preprocessing,<br />

<strong>and</strong> device maintenance<br />

• Edge servers for Edgeware <strong>and</strong> local business logic processes<br />

• The actual middleware serves transparent, secure data distribution<br />

in the corporate network.<br />

• Enterprise Resource Planning (ERP) systems are responsible for<br />

the secondary processes. They maintain all the information<br />

required for the execution of central business logic.<br />

• There are often <strong>RF<strong>ID</strong></strong> repositories between ERP und Edge servers,<br />

in remote systems for performance reasons or as an interface to<br />

external systems.<br />

• Clients such as interfaces to human users<br />

• External interfaces for the connection to further systems<br />

60


4.2.2 Topologies<br />

4.2 System levels<br />

The system topology describes the arrangement of these components<br />

in the system. Fig. 4.3 shows the topology of a globally distributed<br />

<strong>RF<strong>ID</strong></strong> system. Such a decentral system consists of a local infrastructure<br />

at every location, which is maintained <strong>and</strong> controlled by an Edge<br />

server, which in turn represents the gateway to the central system.<br />

Remote data processing is offset by local system administration. The<br />

simplest architecture can be achieved <strong>with</strong> a local system, consisting<br />

of (mobile) <strong>RF<strong>ID</strong></strong> reading devices <strong>and</strong> transponders <strong>with</strong> all the required<br />

information only (data-on-tag).<br />

Mobile <strong>RF<strong>ID</strong></strong> reading devices assume a special status because they can<br />

fulfill various tasks in the system. Apart from a purely offline system,<br />

Admin<br />

client<br />

Local<br />

client<br />

<strong>RF<strong>ID</strong></strong><br />

printer<br />

Company A, Vienna headquarters<br />

Company A, location 2:<br />

Shanghai<br />

<strong>RF<strong>ID</strong></strong><br />

reader<br />

Business<br />

clients<br />

SPS<br />

LAN<br />

LAN<br />

Company A, location 1:<br />

Amsterdam<br />

LAN<br />

<strong>RF<strong>ID</strong></strong><br />

reader<br />

DB server<br />

Application<br />

server<br />

Edge<br />

server<br />

<strong>RF<strong>ID</strong></strong><br />

reader<br />

Internet<br />

VPN<br />

Fig. 4.3 Globally distributed <strong>RF<strong>ID</strong></strong> system<br />

EdgeEdgeserverserver<br />

Internet<br />

Company A, location 3:<br />

Hamburg<br />

LAN<br />

Company B,<br />

London headquarters<br />

WLAN<br />

Signal lamp<br />

Photoelectric barrier<br />

Application<br />

server<br />

<strong>RF<strong>ID</strong></strong><br />

reader<br />

Mobile<br />

<strong>RF<strong>ID</strong></strong><br />

reader<br />

61


4 System architecture<br />

online application is also possible during which only the Edgeware<br />

<strong>and</strong> a client are located on the MDE for operator information purposes,<br />

while the local business logic is executed on a stationary Edge<br />

server.<br />

4.2.3 Application levels<br />

In <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems, the application logic is located at all levels<br />

(Fig. 4.4), as tasks should always be performed on the lowest level<br />

possible. This already starts at the transponder: if an <strong>RF<strong>ID</strong></strong> has a sensor<br />

function, for example, then it makes sense that the transponder<br />

itself executes algorithms for the filtering, evaluation, <strong>and</strong> storage of<br />

environment measurement data in order to reduce the communication<br />

volume via the air interface to the greatest possible extent [2].<br />

The reader often allows for the prefiltering of recorded transponders<br />

(transponder access) so that only data, in which it is actually interested,<br />

are registered on the Edge server in the first place.<br />

Edgeware (device access) consists of several levels: the readers are<br />

controlled at the lower levels, just as in the activation <strong>and</strong> deactivation<br />

of the RF field, for example. Transponder recognition <strong>and</strong> further<br />

comm<strong>and</strong>s for communication <strong>with</strong> the individual transponders are<br />

initiated from the levels above. Then, the read-in raw data have to be<br />

transformed into higher data types or the writable data coded into<br />

binary format. The final step is comprised of filtering <strong>and</strong> aggregation<br />

operations. The real-time control functions are displayed in the<br />

local business logic on this basis.<br />

Security<br />

Fig. 4.4 Application levels in <strong>RF<strong>ID</strong></strong> systems<br />

62<br />

Monitoring<br />

Administration<br />

Business clients<br />

Central business logic<br />

<strong>RF<strong>ID</strong></strong> repositories<br />

Local business logic<br />

<strong>RF<strong>ID</strong></strong> data access<br />

<strong>RF<strong>ID</strong></strong> transponder access<br />

<strong>RF<strong>ID</strong></strong> transponder logic


4.2 System levels<br />

Data distribution to the local business logic <strong>and</strong> external systems<br />

takes place at the middleware level. This level is usually carried out as<br />

a repository where the data are persistently stored. Information users<br />

periodically retrieve new data (Pull Principle) or are informed of new<br />

data (Push Principle).<br />

The local business logic executes the processes that are displayed in<br />

an ERP system (Enterprise Resource Planning) <strong>and</strong> provides interfaces<br />

to clients for controlling <strong>and</strong> monitoring processes. Cross-level<br />

topics include security <strong>and</strong> management functions such as system administration,<br />

monitoring, <strong>and</strong> configuration.<br />

Apart from the functionality of communication <strong>with</strong> the transponders,<br />

so-called “intelligent” <strong>RF<strong>ID</strong></strong> readers have become a trend, whereby<br />

Edgeware <strong>and</strong> even sometimes the local business logic run on a<br />

remote controllable device.<br />

4.2.4 Edgeware<br />

Edgeware is responsible for device <strong>and</strong> transponder access, thereby<br />

separating the business logic from interaction <strong>with</strong> the hardware. The<br />

Edgeware reduces the data volume (e.g. <strong>with</strong> processing rules) <strong>and</strong><br />

only transfers compressed information to higher levels [3]. <strong>RF<strong>ID</strong></strong> system<br />

application st<strong>and</strong>ards were developed for the interface to the<br />

business logic, headed by the EPCglobal Application Level Events<br />

(ALE) Interface [4]. Important Edgeware concepts are the abstractions<br />

of the physical reading devices to logical devices. This allows the business<br />

logic to request data from “goods receipt” for example, <strong>with</strong>out<br />

having to know the number of real <strong>RF<strong>ID</strong></strong> reading devices installed<br />

there or the manufacturer of these readers. This enables the regrouping<br />

or exchange of <strong>RF<strong>ID</strong></strong> components <strong>with</strong>out changes to the business<br />

logic.<br />

The interface to the business logic can either be event-based, i.e. the<br />

business logic reacts to events generated by the Edgeware, or it is controlled<br />

by the application, i.e. it actively starts operations via the<br />

Edgeware.<br />

A further Edgeware task area is raw data processing (e. g. filtering of<br />

duplicate, unimportant, or incorrect events), the aggregation of transponder<br />

data (e.g. of cartons on a pallet or the articles in a carton) <strong>and</strong><br />

the derivation of additional information (e.g. the direction of movement<br />

or the number of objects). Stored data must be interpreted <strong>and</strong><br />

the writing processes automatically verified. Events must also be<br />

63


4 System architecture<br />

temporarily stored if they cannot be immediately processed by the<br />

business logic.<br />

4.3 Integration<br />

<strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems are not independent systems; they usually<br />

require connection to existing systems resulting in external system<br />

interfaces. A large number of various devices <strong>with</strong>in a dynamic system<br />

l<strong>and</strong>scape is a challenging integration task.<br />

4.3.1 System interfaces<br />

System interfaces are communication channels to existing further<br />

systems. On the lower levels, these are interfaces to real-time interaction<br />

(e.g. <strong>with</strong> an automation system) for local sensors or displays as<br />

well as to interaction <strong>with</strong> users. Control of these interfaces should<br />

not take place via the direct business logic but rather via the<br />

Edgeware. Typical external interfaces at higher levels are existing databases,<br />

SMS gateways, <strong>and</strong> banking interfaces in <strong>RF<strong>ID</strong></strong> based payment<br />

systems such as electronic tickets. System interfaces at the enterprise<br />

level include reporting functions <strong>and</strong> customer web portals.<br />

4.3.2 Communication layers<br />

Not all protocol stacks of communication systems that are applied in<br />

<strong>RF<strong>ID</strong></strong> systems are persistently st<strong>and</strong>ardized. However, the properties<br />

of proprietary interfaces must be transparent for the levels above.<br />

This is still simplest <strong>with</strong> the air interface between <strong>RF<strong>ID</strong></strong> reading devices<br />

<strong>and</strong> transponders in order to ensure interoperability <strong>with</strong> transponders<br />

from different manufacturers. The application layer can be<br />

extended by the manufacturer specifications to implement additional<br />

functions. This can usually be achieved by positioning the transponder<br />

protocol externally via the reader protocol in such a way that the<br />

Edgeware can generate any comm<strong>and</strong>s that the <strong>RF<strong>ID</strong></strong> reader then<br />

sends to the transponder unchanged.<br />

Proprietary application protocols are exchanged between the <strong>RF<strong>ID</strong></strong><br />

reading devices <strong>and</strong> Edge servers. Therefore, each device type must<br />

have its own protocol module (driver) in the Edgeware. Similarly, the<br />

application interfaces to other devices at the device level are nearly<br />

64


Application<br />

Presentation<br />

Session<br />

Transport<br />

Network<br />

Data link<br />

Physical layer<br />

Fig. 4.5 Example of communication layers (BL: Business logic)<br />

4.3 Integration<br />

always proprietary. RS232 or Ethernet but also USB <strong>and</strong> WLAN are increasingly<br />

used at the lower protocol levels.<br />

Interfaces based on web services count as “state-of-the-art” for communication<br />

between higher layers. St<strong>and</strong>ardized protocols of the application<br />

layer between the data <strong>and</strong> process levels would be, for example,<br />

the Application Level Events (ALE) acc. to EPCglobal.<br />

Fig. 4.5 shows the example of a section through the communication<br />

levels of an <strong>RF<strong>ID</strong></strong> system.<br />

4.3.3 Technologies<br />

Central BL Local BL<br />

e.g. SOAP<br />

Web service<br />

e.g. TCP / IP /<br />

Ethernet<br />

Enterprise<br />

systems<br />

e.g. UART / RS232<br />

Edge<br />

servers<br />

e.g. proprietary<br />

<strong>RF<strong>ID</strong></strong> reader<br />

protocol<br />

<strong>RF<strong>ID</strong></strong><br />

SLG<br />

e.g.<br />

ISO / IEC 15693<br />

Transponder<br />

Many technologies could be considered for the integration of components<br />

<strong>and</strong> the connection of external systems. If <strong>RF<strong>ID</strong></strong> reading devices<br />

are directly involved in an automation system, in which activation<br />

modules will be available that, as protocol converters, enable the connection<br />

of, for example, RS422 to Profibus. These modules also fulfill<br />

various Edgeware functions such as, for example, the system’s controlled<br />

startup. Edgeware such as Simatic RF Manager enables a connection<br />

not only to the automation but also to IT systems. OPC (Object<br />

Linking <strong>and</strong> Embedding for Process Control) is widespread as an application<br />

layer in automation technology.<br />

Mobile devices communicate whether in batch operation via docking<br />

stations or wireless via WLAN or Bluetooth. USB or RS232 is usually<br />

used for a cable connection.<br />

65


4 System architecture<br />

Proprietary XML messages directly via TCP, XML, or CSV files via FTP<br />

or also remote calls via CORBA are still used for the connection of existing<br />

systems. Otherwise, the connection of external systems either<br />

takes place via SQL, if these are databases, or via web services if these<br />

are applications. Java <strong>and</strong> .NET have asserted themselves for business<br />

logic programming purposes <strong>and</strong> distinguish themselves <strong>with</strong> their<br />

extensive platform independence.<br />

In most instances, modern web technologies allow the replacement of<br />

independent Thick Client Applications <strong>with</strong> web applications. This<br />

holds considerable maintenance advantages, as own software does<br />

not need to locally installed – it simply requires a web browser. Finally<br />

yet importantly, this significantly reduces the requirement of client<br />

resources <strong>and</strong> processing power.<br />

4.4 Data flow <strong>and</strong> data management<br />

Process control <strong>and</strong> subsequent evaluations require the maintenance<br />

of far more data in the <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> system than the actual transponder<br />

<strong>ID</strong>. This section describes exactly which data flow <strong>with</strong>in a<br />

system such as this <strong>and</strong> for what purpose, the origin of data, the point<br />

in time at which they are created, <strong>and</strong> which concepts are available to<br />

support the management of these data through the system architecture.<br />

4.4.1 <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> data<br />

The central identification characteristic is the unique identifier (U<strong>ID</strong>)<br />

that is, depending on the technology, either assigned by the manufacturer<br />

or independently generated from a reserved number range.<br />

This is uniquely linked to an object during the application of the transponder.<br />

Caution is required when using a transponder for several<br />

objects during its life cycle or if several transponders are linked to the<br />

same object: this contradicts the basic principle of unique object<br />

identification <strong>with</strong> considerable disadvantages for e.g. database access.<br />

Object description data contain information on the type of object, to<br />

what other objects it belongs or what other objects it entails <strong>and</strong> what<br />

properties it has. These data stem from the Enterprise system <strong>and</strong> are<br />

linked during U<strong>ID</strong> initialization <strong>and</strong>/or written to the transponder.<br />

66


4.4 Data flow <strong>and</strong> data management<br />

Tracking data include the time stamp <strong>and</strong> recording location. These<br />

stem from the system configuration or from a timer <strong>and</strong> are linked to<br />

the U<strong>ID</strong> during every recording. The triple combination of U<strong>ID</strong>, time,<br />

<strong>and</strong> location represent an elementary recording event to enable the<br />

tracking of an object along its way. These tracing data correspond to<br />

normal tracking data, the difference being that the information of a<br />

tracked object can be stored on the transponder itself.<br />

Ambient data such as temperature are either recorded by the transponder<br />

itself <strong>and</strong> read out during recording or measured <strong>with</strong> additional<br />

sensors <strong>and</strong> linked to an event via the Edgeware. The process<br />

data include all the information on the process step where the event<br />

occurred, i.e. why the object is recorded by whom <strong>and</strong> the status in<br />

which it currently is. These data are read from the system configuration<br />

or via clients.<br />

Further information can then be derived from these basic data such<br />

as stopping time, throughput time, direction recognition, <strong>and</strong> the<br />

number of objects in aggregations.<br />

4.4.2 Object identification<br />

In many <strong>RF<strong>ID</strong></strong> systems the transponders only serve for the identification<br />

of objects; all the information linked to the object are contained<br />

in a database. With this “minimalist” approach the <strong>RF<strong>ID</strong></strong> transponders<br />

purely serve as a barcode replacement [5]. The advantages of such<br />

systems are low transponder costs, rapid reading processes, <strong>and</strong> the<br />

elimination of writing processes (<strong>with</strong> the exception of initialization).<br />

The disadvantage is that even local business processes always require<br />

online connection to the backend system (data-on-network).<br />

Their area of application is logistics, for example, where it is a matter<br />

of automatic recording <strong>and</strong> especially bulk recording at gates <strong>and</strong><br />

conveyor belts requiring high reading speed. One example would be<br />

the determination of all articles in a carton or all cartons on a pallet.<br />

4.4.3 Distributed mobile databases<br />

The reverse paradigm is to store all the data required for local business<br />

processes in the transponder memory (data-on-tag). The transponder,<br />

therefore, turns into a mobile database itself – data are<br />

transferred at the object level via physical movement. The disadvantages<br />

here are the longer reading times <strong>and</strong> writing processes.<br />

67


4 System architecture<br />

This principle is predominantly applied in closed systems, for example<br />

in automation or in those systems where individual recording <strong>and</strong><br />

manual object manipulation prevail. An online connection is not required,<br />

thereby saving costs for a WLAN infrastructure or mobile radio<br />

transmission for mobile devices. The transmission of data to<br />

downstream systems is time delayed. One problem, however, is the<br />

transport of meta information, as all communicating devices need to<br />

know how the stored data must be interpreted.<br />

4.4.4 Hybrid approaches<br />

A compromise is to route data into the database not only as so-called<br />

virtual transponders but also to (partially) store them on the transponder<br />

[6]. Business processes can thus be executed online as well<br />

as offline. A problem is that special measures need to be taken to keep<br />

the data consistent, as these may possibly be modified by two places<br />

simultaneously.<br />

4.5 System management<br />

An <strong>RF<strong>ID</strong></strong> or <strong>Auto</strong> <strong>ID</strong> system often consists of hundreds of components<br />

who all need to be configured, monitored, maintained, <strong>and</strong> protected<br />

from unauthorized access. A system such as this must, therefore, provide<br />

functions that support the total operation.<br />

4.5.1 Device management<br />

The device level requires sophisticated management in order to enable<br />

the configuration of the device l<strong>and</strong>scape. For instance, <strong>RF<strong>ID</strong></strong><br />

reading devices require the setting of various communication parameters<br />

<strong>and</strong> a location, i.e. a logical device.<br />

The device status then has to be monitored during operation to allow<br />

the detection of a failure. This usually takes place via so-called heartbeat<br />

messages, which are either regularly sent to the system or queried<br />

by the system. During a failure, this allows switching over between<br />

redundant devices or to initiate the removal of defect by service<br />

staff. The exchange of components requires Plug’n’Play abilities<br />

to enable smooth replacement even during ongoing operation. The<br />

system must automatically re-incorporate <strong>and</strong> configure the new device<br />

into the system.<br />

68


4.5 System management<br />

Finally, updating the device’s firmware is of large significance. It is<br />

unimaginable to have to manually install a new firmware version in<br />

thous<strong>and</strong>s of devices from Paris to Tokyo! Coordination of implementing<br />

the updates is usually the task of the Edge server.<br />

4.5.2 Edge server management<br />

Edge servers are mainly used for remote device maintenance. However,<br />

software (Edgeware <strong>and</strong> local business logic) must also be distributed<br />

on the Edge servers themselves. The challenge <strong>with</strong> larger updates<br />

is to ensure that not all Edge servers start the update simultaneously,<br />

thereby overloading the central server. In order to also<br />

achieve sufficient error tolerance in Edge servers, it would be expedient<br />

to execute these in active-active operation. If one computer fails,<br />

the second computer can adopt the procedures of the first until the<br />

former – if possible – resumes operation.<br />

An important point is error diagnosis in <strong>RF<strong>ID</strong></strong> systems. Log files <strong>and</strong><br />

error h<strong>and</strong>ling for the devices are managed in the Edge server <strong>and</strong><br />

can be remotely evaluated. During the search for an error the process<br />

must be – sequentially <strong>and</strong> contextually – traceable to each individual<br />

reading process.<br />

Similar to <strong>RF<strong>ID</strong></strong> reading devices, Edge servers also require monitoring<br />

of the current status, whereby additional parameters such as CPU capacity,<br />

memory allocation, reading rates, <strong>and</strong> reliability of the maintained<br />

devices are also usually required to maintain the desired level<br />

of the “Quality of Service” (QoS).<br />

4.5.3 Security<br />

Security is an important requirement for systems, especially in the<br />

case of sensitive (business) data. Transmission between Edge servers<br />

<strong>and</strong> the Enterprise server, therefore, takes place via a Virtual Private<br />

Network (VPN) on the Internet. Communication <strong>with</strong> business partners<br />

usually also takes place along these lines. HTTPS (Secure Hyper<br />

Text Transfer Protocol) is used for web services.<br />

System-wide user administration is generally required, which not<br />

only conducts user authentication at the terminals but also accepts<br />

the system components reciprocally. Access control is, however, only<br />

poorly pronounced so far. Protection of IT systems at higher levels is<br />

network-technically solved <strong>with</strong> firewalls. Although access authoriza-<br />

69


4 System architecture<br />

tion is also required at the transponder level it is seldom applied. A<br />

new approach is represented by the implementation of strong cryptographic<br />

algorithms in passive transponders (see Chapter 20).<br />

4.5.4 Availability<br />

Availability <strong>and</strong> system stability are decisive for all automatic control,<br />

in which a system failure would lead to considerable costs (for example,<br />

in production systems).<br />

Apart from the redundancy of <strong>RF<strong>ID</strong></strong> devices <strong>and</strong> servers, securing<br />

communication connections is of large significance. The Edge server<br />

must be able to temporarily store the data transmitted to the central<br />

system as well as caching the data required by the central system to<br />

process the local business data to the greatest possible extent (offline<br />

ability). In case of non-availability of the central system, this would at<br />

least enable temporary local operation. These abilities are especially<br />

required for h<strong>and</strong>helds, which either only work offline or are only occasionally<br />

connected due to unavailability of the radio connection.<br />

These measures also relieve the central system by locally buffering<br />

larger data volumes that are not real-time relevant <strong>and</strong> transmit them<br />

to the central system <strong>with</strong> a time delay.<br />

Error tolerance is also an important aspect for the lowest level. Reading<br />

errors, for example, must be compensated for by an error-tolerant<br />

<strong>and</strong> correcting Edgeware, if possible.<br />

4.5.5 Extendibility <strong>and</strong> adaptability<br />

Adaptability, open interfaces, <strong>and</strong> plug’n’play ability are all important<br />

for the configuration <strong>and</strong> modification of an <strong>RF<strong>ID</strong></strong> or <strong>Auto</strong> <strong>ID</strong> system,<br />

as these often have to be adapted to the changeable requirements<br />

of a company. The software architecture must, therefore, be<br />

structured in such a way that even radical changes can be reacted to<br />

in a flexible way. It could emerge, during pilot operation for example,<br />

that the HF technology for the application is unsuitable <strong>and</strong> that UHF<br />

is needed instead. Such a change should not result in the new development<br />

of the software but should rather be solvable <strong>with</strong> a few<br />

changes to the configuration. A similar change applies for the application<br />

of transponder types from various manufacturers or in the<br />

case of different protocols, reading devices, communication interfaces,<br />

or data models.<br />

70


4.5.6 Invoicing functions<br />

4.6 The EPCglobal Network<br />

A new approach for the application of <strong>RF<strong>ID</strong></strong> or <strong>Auto</strong> <strong>ID</strong> system is to<br />

provide operation as a service for other companies (compare Chapter<br />

13). Utilization of the system is then invoiced via defined performance<br />

parameters such as the number of reading events. The systems<br />

must provide a function in this regard, enabling invoicing according<br />

to transactions, events, transponders, or processes.<br />

4.6 The EPCglobal Network<br />

The EPCglobal Network [7] is a st<strong>and</strong>ardization initiative for the development<br />

of industrial st<strong>and</strong>ards for a global network, helping trade<br />

partners to monitor all the products that are equipped <strong>with</strong> an <strong>RF<strong>ID</strong></strong><br />

based Electronic Product Code (EPC) <strong>and</strong> enabling the exchange of<br />

product-related information.<br />

4.6.1 Overview<br />

The component interfaces of the EPCglobal Network are defined by a<br />

series of interrelated st<strong>and</strong>ards. Fig. 4.6 shows a part of the components<br />

of the EPCglobal Network <strong>and</strong> their classification in the application<br />

levels of the reference model.<br />

Central BL<br />

Repository<br />

Local BL<br />

Edgeware<br />

Devices<br />

Transponder<br />

EPCIS Accessing Application ONS<br />

EPCIS Query IF<br />

EPCIS Repository<br />

EPCIS Capture IF<br />

EPCIS Capturing Application<br />

Application - Level Events IF<br />

Filtering & Collection<br />

EPC Tag Specification<br />

<strong>RF<strong>ID</strong></strong>-Transponder<br />

<strong>RF<strong>ID</strong></strong> Reader<br />

Reader Management<br />

Reader Protocol Reader Management IF<br />

Fig. 4.6 Components in the EPCglobal Network (compare)<br />

71


4 System architecture<br />

Basically, the EPCglobal Network is designed to be decentralized; each<br />

company operates its infrastructure <strong>and</strong> administrates its EPC data,<br />

i.e. there is no central data maintenance.<br />

4.6.2 EPCIS <strong>and</strong> ALE<br />

The EPC Information Service (EPCIS) serves the exchange of information<br />

on products <strong>and</strong> product movements. The Object Naming Service<br />

(ONS) enables an enquiry on who is responsible for which EPC. The<br />

EPC data can then be queried from the responsible EPCIS repository.<br />

It must, of course, be specified who may query which information via<br />

the Query interface. The typical information stored in an EPCIS repository<br />

are the EPC itself, production data such as batch number, production,<br />

<strong>and</strong> process data; transport data such as order <strong>and</strong> delivery<br />

notes; product status in process steps <strong>and</strong> during transport – everything<br />

in connection <strong>with</strong> venue, time, <strong>and</strong> ambient information.<br />

An important architectural element of the EPCglobal Network is the<br />

separation of data recording from the business logic through the Application<br />

Level Events Interface (ALE). This interface abstracts the<br />

functions that are used for detecting the <strong>RF<strong>ID</strong></strong> transponders, the collection<br />

of data over a certain period, data filtering <strong>and</strong> grouping <strong>and</strong><br />

counting of transponders. The concept of the logical devices enables<br />

the separation of the business logic from the actual hardware infrastructure.<br />

In a so-called Event Cycle Specification via the ALE interface,<br />

the application discloses how <strong>and</strong> which data must be recorded.<br />

This can be achieved by the single storage of specifications <strong>and</strong> polling<br />

or based on so-called subscriptions. The Event Cycle Specification<br />

defines the start <strong>and</strong> stop conditions of the recording (a specified duration<br />

of time, for example), the required stability of the number of<br />

transponders in the field, trigger conditions as well as the type <strong>and</strong><br />

scope of the returned reports (required filter operations, groupings,<br />

<strong>and</strong> counting).<br />

4.7 Summary<br />

<strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong> systems enable data to be linked to an individual<br />

object. These, usually mobile, objects run through an often globally<br />

networked infrastructure, thereby controlling the business processes<br />

<strong>with</strong> the help of a sophisticated software system.<br />

72


4.7 Summary<br />

The processes <strong>and</strong> requirements for <strong>Auto</strong> <strong>ID</strong> <strong>and</strong> <strong>RF<strong>ID</strong></strong> are basically<br />

identical: integration in processes, processing of large data volumes,<br />

high availability, security <strong>and</strong> management functions diagonally<br />

across all system levels, remote administration of the infrastructure<br />

<strong>and</strong> process logics as well as extendibility <strong>and</strong> plug’n’play abilities.<br />

However, due to higher reading rates <strong>and</strong> more complex interaction<br />

in <strong>RF<strong>ID</strong></strong> systems, the high requirements for such a system become all<br />

the more clear. This is what enables the utilization of the manifold<br />

options provided by the <strong>RF<strong>ID</strong></strong> transponders.<br />

A clearly structured system architecture <strong>with</strong> the specified properties<br />

is the prerequisite that <strong>RF<strong>ID</strong></strong> or <strong>Auto</strong> <strong>ID</strong> can actually fulfill their tasks<br />

in the business processes in order to achieve the expected process improvements<br />

<strong>and</strong> economic advantages during everyday operation.<br />

References<br />

[1] See EPCglobal Inc: The Application Level Events (ALE) Specification.<br />

Sept. 2005. Available at: http://www.epcglobalinc.org/st<strong>and</strong>ards/ale/<br />

ale_1_0-st<strong>and</strong>ard-20050915.pdf<br />

[2] See F. Thiesse: Architektur und Integration von <strong>RF<strong>ID</strong></strong>-Systemen. In: Das<br />

Internet der Dinge – Ubiquitous Computing und <strong>RF<strong>ID</strong></strong> in der Praxis.<br />

Springer, 2005.<br />

[3] See B. Prabhu, X. Su, H. Ramamurthy, C. Chu, R. Gadh: Win<strong>RF<strong>ID</strong></strong> –<br />

A Middleware for the enablement of Radio Frequency Identfication<br />

(<strong>RF<strong>ID</strong></strong>) based Applications. University of California, Los Angeles, Wireless<br />

Internet for the Mobile Enterprise Consortium, 2005. Available at:<br />

http://www.wireless.ucla.edu/rfid/winrfid/<br />

[4] See http://www.epcglobalinc.org/st<strong>and</strong>ards/ale/ale_1_0-st<strong>and</strong>ard-20050<br />

915.pdf<br />

[5] See S. Sarma, S. Weis <strong>and</strong> D. Engels: <strong>RF<strong>ID</strong></strong> Systems <strong>and</strong> Security <strong>and</strong> Privacy<br />

Implications. In Proceedings of the International Conference on<br />

Security in Pervasive Computing, Boppard, pages 454-469, Mar. 2003.<br />

[6] See C. Floerkemeier, M. Lampe: <strong>RF<strong>ID</strong></strong> middleware design – addressing<br />

application requirements <strong>and</strong> <strong>RF<strong>ID</strong></strong> constraints. In: Proceedings of the<br />

joint conference on Smart objects <strong>and</strong> ambient intelligence: innovative<br />

contextaware services: usages <strong>and</strong> technologies, Grenoble, pp. 219-224,<br />

2005.<br />

[7] See http://www.epcglobalinc.org/st<strong>and</strong>ards/architecture/architecture_1_2framework-20070910.pdf<br />

73


5 System selection criteria<br />

Peter Hager<br />

Whether in classical production controlling, consistent supply logistics,<br />

or tracking batches or products – the identification technologies<br />

Data Matrix Code (2D code) as well as <strong>RF<strong>ID</strong></strong> distinguish themselves<br />

from the Barcode (1D code) through their high data security as well as<br />

their use in rough industrial surroundings. On the one h<strong>and</strong>, solid<br />

basic knowledge of the technological differences between the Data<br />

Matrix Code <strong>and</strong> <strong>RF<strong>ID</strong></strong> (Table 5.1) is important for product selection.<br />

Table 5.1 Important features of the identification technologies<br />

Data Matrix Code <strong>and</strong> <strong>RF<strong>ID</strong></strong><br />

Criterion Data Matrix Code <strong>RF<strong>ID</strong></strong><br />

Principle Optical recognition Radio transmission<br />

Visual connection Required Not required<br />

Reach Low to medium Low to high<br />

Sensitive regarding In part, reflections In part water, metal<br />

Direct marking Possible Not possible<br />

Price for labels Very favorable Favorable<br />

Information density High Very high<br />

Change to the data Not possible Possible<br />

Grouped recording Not possible Possible<br />

On the other h<strong>and</strong>, the determination of the user requirements also<br />

requires the observation of the process <strong>and</strong> the process environment.<br />

Special attention must be given to the following for the selection of<br />

the most appropriate identification technology:<br />

• strengths <strong>and</strong> weakness of the respective technology<br />

• unique marking or repetitive writability<br />

• reuse of the data carrier in the process chain<br />

74


5.1 <strong>Auto</strong>matic identification <strong>with</strong> Data Matrix Code<br />

• material <strong>and</strong> properties of the markable products<br />

• available space for marking<br />

• ranges or recording distances<br />

• environmental influences such as light conditions, ambient<br />

temperatures, or dirt<br />

whereby in practice the user must include several criteria mirrored in<br />

the application as well as weighted selection criteria.<br />

5.1 <strong>Auto</strong>matic identification <strong>with</strong> Data Matrix Code<br />

Typical applications of using the Data Matrix Code are parts consisting<br />

of metal, ceramics, plastics, <strong>and</strong> glass applied in vehicle gear boxes,<br />

flat module groups, ink cartridges, or medical instruments.<br />

The Data Matrix Code can even be applied where there is limited<br />

space for marking on the product, i.e. electrical components or circuit<br />

boards. Apart from the identification number, the Code can also be<br />

used to permanently store production specifications <strong>and</strong> measurement<br />

data on the workpiece through all the processing steps, whereby<br />

even 25 % soiling or damage of the data field could enable the secure<br />

read-out.<br />

Important criteria for the application of the Data Matrix Code are:<br />

• small to medium sized data volumes<br />

• permanent marking directly on the object<br />

• interfering metal or water in the environment<br />

• high quantities<br />

• firm fixation of the recordable object<br />

• integration in automation <strong>and</strong> IT<br />

The Data Matrix Code can be attached in various ways – whether<br />

through inkjet or thermotransfer printing or via laser, matrix printing<br />

or press cut. With a memory capacity of more than 100 bytes, the<br />

Data Matrix Code allows the recording <strong>and</strong> evaluation of extensive<br />

product data, whereby the code must be positioned in the exact center<br />

of the reading device – usually a CCD or CMOS matrix camera. The<br />

respective selection of sensor, lens, <strong>and</strong> lighting achieves stable reading<br />

rates even in difficult lighting conditions or low contrast also near<br />

75


5 System selection criteria<br />

metal surfaces or metal objects. Ranges of several meters are even<br />

possible under strong lighting.<br />

If the Code is applied for production control, e.g. if the type of workpiece<br />

processing is stored directly, the connection to industrial bus<br />

systems such as Profibus or Industrial Ethernet or the connection to<br />

programmable logic controllers (PLCs) becomes imperative: respective<br />

SW components should be available for data communication <strong>with</strong><br />

the Code reading devices. The adjustment of Code data <strong>with</strong> the actual<br />

processing data – these are usually contained in a production planning<br />

system – requires direct communication <strong>with</strong> IT systems.<br />

The application of direct marking requires observation to the four<br />

process steps Mark, Verify, Read, <strong>and</strong> Communicate (MVRC®, Fig.<br />

5.1). First the marking process that is most suitable for the respective<br />

supporting material is selected. Then, the code is verified <strong>with</strong> an internal<br />

reading device <strong>and</strong> improved, if required, to ensure the code’s<br />

quality at the process start. Therefore, the secure reading of the code<br />

is also ensured under difficult processing conditions. The recorded<br />

data are then transferred to the superimposed IT system in the<br />

matching format via the respective communication interfaces.<br />

Direct<br />

marking<br />

<strong>with</strong> 2D code<br />

Fig. 5.1 Direct marking <strong>with</strong> Data Matrix Code – the MVRC principle<br />

ensures high code quality<br />

When applying <strong>RF<strong>ID</strong></strong>, we distinguish between two application principles<br />

– one-off use of the data carrier <strong>and</strong> the continuous reuse of the<br />

data carrier.<br />

76<br />

Production<br />

Verification<br />

of the<br />

2D code<br />

Reading <strong>and</strong><br />

transmission<br />

of the 2D code


5.2 “Open Loop” applications <strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

5.2 “Open Loop” applications <strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

<strong>RF<strong>ID</strong></strong> systems are increasingly used along the logistics supply chain as<br />

they provide new qualities regarding goods security, goods availability,<br />

or reduced logistics costs through fast <strong>and</strong> safe recording during<br />

goods receipt <strong>and</strong> shipping. The data carriers, mostly the so-called<br />

Smart Labels, are used once off <strong>and</strong> permanently remain on the object<br />

along the entire supply chain. The lowest possible label price is<br />

appropriately important (Fig. 5.2).<br />

Production Central warehouse Department store<br />

Important criteria for Open Loop applications are:<br />

• small data volumes,<br />

• st<strong>and</strong>ardized data filing,<br />

• bulk recording,<br />

• high quantities,<br />

• variable fixation of the recordable objects <strong>and</strong><br />

• integration in IT.<br />

Cartons or external<br />

packaging <strong>with</strong><br />

<strong>RF<strong>ID</strong></strong><br />

Fig. 5.2 “Open Loop” applications – the data carriers are used only once<br />

along the entire supply chain<br />

The Smart Labels have very reduced data capacity <strong>and</strong> usually provide<br />

only one identity number (<strong>ID</strong>). The <strong>RF<strong>ID</strong></strong> system reads these out<br />

<strong>and</strong> determines the actual information <strong>with</strong> the help of superimposed<br />

database systems, such as the nature of the product <strong>and</strong> its respective<br />

serial number or the destination venue for the goods. The<br />

electronic product code (EPC) has established itself as a st<strong>and</strong>ard, as<br />

77


5 System selection criteria<br />

its 96 Bit enable a globally unique number system. Therefore, external<br />

packaging or cartons, for example, can be provided <strong>with</strong> a unique<br />

identification.<br />

As the information is obtained via the network – the so-called “Dataon-Network”<br />

concept – the simple integration of the <strong>RF<strong>ID</strong></strong> systems in<br />

the IT world (e.g. ERP systems) is an important prerequisite. To<br />

achieve optimum performance, the synchronization of several readers<br />

as well as the filtering <strong>and</strong> preprocessing of the <strong>RF<strong>ID</strong></strong> data via <strong>RF<strong>ID</strong></strong><br />

middleware would be of advantage.<br />

The <strong>RF<strong>ID</strong></strong> systems require ranges of several meters to enable the thoroughfare<br />

of forklifts between the antennas during the shipping <strong>and</strong><br />

receiving of goods. Secure recording of the objects during varying<br />

transponder alignment must also be ensured. Many transponders<br />

have to be reliably recorded simultaneously (bulk recording), if for<br />

example one pallet has a large number of marked cartons.<br />

5.3 “Closed Loop” applications in <strong>RF<strong>ID</strong></strong><br />

This classic form of <strong>RF<strong>ID</strong></strong> application has been used in production <strong>and</strong><br />

material flow control for many years <strong>and</strong> enables the economical production<br />

of configurable serial products such as contactors, PCs,<br />

household goods, or automobiles. The data maintained locally on the<br />

transponder directly support the control of process <strong>and</strong> testing steps.<br />

The data are reused after the production cycle by being channeled<br />

back to the production line after having been provided <strong>with</strong> new data.<br />

The transponder price, therefore, plays a subordinate role.<br />

The important criteria for Close Loop applications are:<br />

• data changeability,<br />

• medium to large data volumes,<br />

• small to medium quantities,<br />

• robustness of the data carrier,<br />

• firm fixation of the recordable object <strong>and</strong><br />

• integration in automation <strong>and</strong> IT.<br />

<strong>RF<strong>ID</strong></strong> systems <strong>with</strong> a small range are applied in most track-guided<br />

conveyor systems, as only the tag that is routed immediately past the<br />

antenna is to be read. In this case, <strong>RF<strong>ID</strong></strong> not only ensures unique iden-<br />

78


5.3 “Closed Loop” applications in <strong>RF<strong>ID</strong></strong><br />

tification but the data locally maintained on the transponder also directly<br />

support the control of processing <strong>and</strong> testing steps. Apart from<br />

production instructions, the tags <strong>with</strong> up to 64 Kbyte memory also<br />

contain quality information that is updated after every processing<br />

step. This enables the development of remote automation structures,<br />

which clearly reduce the effort required for local data maintenance,<br />

as the required information is available in real-time at the processing<br />

stations <strong>with</strong>out requiring a connection to the IT system.<br />

The robustness of the <strong>RF<strong>ID</strong></strong> components to environmental influences<br />

is also of great significance for fault-free operation in industrial applications.<br />

Special protection against dust, liquids, or chemicals as<br />

well as heat resistant versions for temperatures above 200° C must be<br />

provided depending on the respective application.<br />

An important prerequisite is the simple integration in automation,<br />

for example via Bus systems such as Profibus or Industrial Ethernet,<br />

<strong>with</strong> programmable logic controllers (PLCs). If the respective SW<br />

components are available in PLCs for data communication <strong>with</strong> the<br />

<strong>RF<strong>ID</strong></strong> reading devices, programming is simplified significantly. The<br />

close interaction of the <strong>RF<strong>ID</strong></strong> system <strong>and</strong> the PLC also ensures the automatic<br />

restart of the entire system after a failure.<br />

In Intralogistics applications, pallets or circulatory containers such as<br />

pallet cages or EGB boxes are marked <strong>with</strong> <strong>RF<strong>ID</strong></strong> transponders instead<br />

of workpiece carriers (Fig. 5.3). These are provided <strong>with</strong> a unique<br />

identification <strong>and</strong> can be automatically registered <strong>and</strong> administrated<br />

in a superimposed IT system. This allows for the respective transparency<br />

in the goods <strong>and</strong> material flow <strong>and</strong> enables optimization ap-<br />

Production<br />

Workpiece<br />

carrier<br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

Intralogistics<br />

Pallets or<br />

pallet cages<br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

Fig. 5.3 “Closed Loop” applications – the data carriers are reused often,<br />

especially in production automation as well as the intralogistics between<br />

partners<br />

79


5 System selection criteria<br />

proaches for moveable investment goods. The respective design of<br />

the <strong>RF<strong>ID</strong></strong> tags also allows for secure recording on metal objects. It is<br />

here that wide <strong>RF<strong>ID</strong></strong> system ranges are also required, so that a forklift<br />

can comfortably fit between the antennas for the shipping <strong>and</strong> receiving<br />

of goods.<br />

5.4 Conclusion: both technologies complement<br />

each other<br />

If one looks at the entire production process, both technologies are<br />

already being applied today (Fig. 5.4). Therefore, semi-finished parts<br />

in pre-production, which are directly processed <strong>with</strong> a Data Matrix<br />

Code according to their coding, are drilled or milled for example <strong>and</strong><br />

then routed to final assembly.<br />

Fig. 5.4 Application of both technologies by using the respective<br />

advantages in the production process<br />

This assembly line is controlled <strong>with</strong> <strong>RF<strong>ID</strong></strong>. The transponder is attached,<br />

for example, to a workpiece carrier <strong>and</strong> contains all the production<br />

specifications or quality data. The <strong>RF<strong>ID</strong></strong> data are read out at<br />

every assembly station <strong>and</strong> updated after processing. The entire assembly<br />

cycle is thereby recorded on the data carrier.<br />

80<br />

Goods entry<br />

Pallets or<br />

pallet cages<br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

Prefabrication Final assembly Goods shipments<br />

Direct<br />

marking <strong>with</strong><br />

2D code<br />

Direct<br />

marking <strong>with</strong><br />

2D code<br />

Workpiece<br />

carrier<br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

Pallets or<br />

pallet cages<br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong>


5.4 Conclusion: both technologies complement each other<br />

At the end of the assembly line the finished product receives its individual<br />

identification via direct marking <strong>with</strong> a Data Matrix Code <strong>and</strong><br />

the <strong>RF<strong>ID</strong></strong> data are transferred to the Production Planning System. This<br />

also ensures unique product identification any time after delivery as<br />

well as its allocation to the production data.<br />

Apart from the technology selection, the selection of the right provider<br />

is also significant. The emphasis on an extensive technology <strong>and</strong><br />

automation competence should be especially coupled <strong>with</strong> objective<br />

advice. Further important criteria are an extensive product portfolio<br />

that contains both technologies <strong>and</strong> is able to be easily integrated at<br />

the automation <strong>and</strong> IT levels, as well as long-term <strong>and</strong> extensive experience<br />

in the realization of projects.<br />

81


6 St<strong>and</strong>ardization<br />

Gerd Elbinger<br />

St<strong>and</strong>ardization is regarded as an important aid for thinning out the<br />

jungle of the various <strong>RF<strong>ID</strong></strong> systems <strong>and</strong> identification processes. Although<br />

the technologies have been applied on a daily basis for years<br />

now, <strong>RF<strong>ID</strong></strong> in particular has been regarded as the domain for creative<br />

radio specialists developing individual solutions for a long time.<br />

6.1 Why is st<strong>and</strong>ardization important?<br />

The application of <strong>RF<strong>ID</strong></strong> has always required the observation of certain<br />

rules. In Germany, one referred to the postal regulation “NömL”<br />

(Nicht-öffentlicher mobiler L<strong>and</strong>funk = dedicated use of), as this enabled<br />

the formal legal utilization of <strong>RF<strong>ID</strong></strong> systems. The introduction of<br />

CE marking for industrial products in Europe required a binding declaration<br />

of conformity as confirmation for adherence to the relevant<br />

st<strong>and</strong>ards <strong>and</strong> regulations. This created clarity regarding the approval<br />

regulations: the specifications of the ETSI (European Telecommunications<br />

St<strong>and</strong>ards Institute) as applied for <strong>RF<strong>ID</strong></strong>. The first st<strong>and</strong>ards<br />

were created for <strong>RF<strong>ID</strong></strong> systems for identification in close-up ranges at<br />

13.56 MHz (ISO/IEC 14443).<br />

The benefit of cross-corporate st<strong>and</strong>ards was also soon recognized for<br />

goods logistics <strong>and</strong> material flow chains. Uniform <strong>and</strong> continuous<br />

processes bear considerable advantages for customers, operators,<br />

<strong>and</strong> suppliers:<br />

• improved customer acceptance<br />

• increased competition through comparability<br />

• “Second Source” purchasing is made possible <strong>and</strong> reduces<br />

dependence<br />

• investment security for customers <strong>and</strong> manufacturers<br />

• open systems enable global application<br />

82


• continuity along the entire supply chain<br />

• realistic prices due to a broader range<br />

• concentration on a few basic technologies<br />

6.2 St<strong>and</strong>ardization basics for <strong>RF<strong>ID</strong></strong><br />

• strengthening of your position towards the regulation authorities<br />

As long as the application of <strong>RF<strong>ID</strong></strong> systems is limited to one area, such<br />

as a production plant <strong>with</strong> closed transponder cycle, for instance,<br />

st<strong>and</strong>ardization can be neglected. This is a completely different matter<br />

when cross-corporate processes <strong>and</strong> objects or material movements<br />

have to be automated <strong>and</strong> monitored <strong>with</strong> <strong>RF<strong>ID</strong></strong> in open supply<br />

chains. In this case, reading devices <strong>and</strong> transponders from various<br />

manufacturers have to cooperate easily. The generally binding rules<br />

must be specified <strong>and</strong> maintained.<br />

6.2 St<strong>and</strong>ardization basics for <strong>RF<strong>ID</strong></strong><br />

Especially for <strong>RF<strong>ID</strong></strong>, the path to st<strong>and</strong>ardization was difficult. As technologies<br />

in various frequency b<strong>and</strong>s abounded, it was very important<br />

to integrate <strong>and</strong> unify the existing <strong>RF<strong>ID</strong></strong> processes into one rule. This<br />

gave rise to ISO/IEC 18000 as the definition of a st<strong>and</strong>ard for the air<br />

interface between the reading device <strong>and</strong> transponder for goods<br />

identification purposes, whereby already existing st<strong>and</strong>ards were<br />

considered <strong>and</strong> integrated.<br />

The basis for the specification of transmission frequencies is formed<br />

by the respective nationally valid <strong>and</strong> governmentally prescribed regulation<br />

provisions. Radio waves reach far <strong>and</strong> cross borders. Therefore,<br />

an international harmonization of transmission frequency utilization<br />

was inevitable. In Europe, this is achieved by the CEPT (European<br />

Conference of Postal <strong>and</strong> Telecommunications Administrations).<br />

The CEPT is the umbrella organization for the unification of<br />

postal <strong>and</strong> telecommunication procedures in cooperation <strong>with</strong> the<br />

regulating authorities of the individual member states. The use of<br />

frequency b<strong>and</strong>s <strong>and</strong> their conditions of use are developed <strong>and</strong> recommended<br />

by the CEPT: implementation is performed by the member<br />

states (Fig. 6.1).<br />

The actual detailed work is carried out by ETSI (European Telecommunications<br />

St<strong>and</strong>ards Institute). ETSI is a non-profit organization<br />

<strong>with</strong> the objective of creating, defining, <strong>and</strong> publishing uniform st<strong>and</strong>ards<br />

for telecommunication in Europe. To some extent, the organi-<br />

83


6 St<strong>and</strong>ardization<br />

zation is the executive institution for the superimposed CEPT. ETSI<br />

provides a detailed specification of which frequency may be used <strong>with</strong><br />

which parameters <strong>and</strong> limit values (e.g. capacity, b<strong>and</strong>width, modulation,<br />

<strong>and</strong> others). In the US, ETSI corresponds to the FCC (Federal<br />

Communications Commission).<br />

Field<br />

Strength<br />

dBμA/m<br />

Fig. 6.1 Frequency division by CEPT for Short Range Devices – this<br />

includes <strong>RF<strong>ID</strong></strong> – <strong>with</strong> schematically spread emission values. The ISO<br />

st<strong>and</strong>ards for the <strong>RF<strong>ID</strong></strong> air interfaces have been specified according to<br />

ISO 18000, which are suitable for the ISM frequencies.<br />

The assignment of frequencies is the responsibility of individual<br />

states who can sell or license usage rights (as was the case <strong>with</strong> the<br />

assignment of the UMTS frequencies in Germany in 2005), <strong>with</strong> the<br />

exception of only a very few, license free frequency b<strong>and</strong>s, which may<br />

be used free of charge for general industrial, scientific, or medical<br />

purposes (ISM frequency b<strong>and</strong>s: industrial, scientific, <strong>and</strong> medical).<br />

In order not to have to pay license fees for <strong>RF<strong>ID</strong></strong> use, we took the st<strong>and</strong>ardization<br />

of <strong>RF<strong>ID</strong></strong> frequency b<strong>and</strong>s on ISM frequencies as a st<strong>and</strong>ard.<br />

The UHF frequencies 865-868 MHz, to whom special significance is<br />

ascribed for the use of <strong>RF<strong>ID</strong></strong> in logistics chains, were only released for<br />

use <strong>with</strong> <strong>RF<strong>ID</strong></strong> systems in 2004.<br />

84<br />

Inductive near field coupling Electromagnetic shaft<br />

Permissible disturbance level<br />

5 1 2 5 1 2 5 1 2 5 1 2 5 1 2 5 10<br />

10 5 Hz<br />

100 kHz<br />

EN 301 489 – EMC for Short Range Devices<br />

EN 300 330 EN 300 220 EN 300 440<br />

ISO 18000-2 ISO 18000-3<br />

10 6 Hz<br />

1 MHz<br />

10 7 Hz 10 8 Hz 10 9 Hz<br />

1 GHz<br />

Permissible emission values according to CEPT<br />

Europe<br />

EN 302 208<br />

ISO 18000-7<br />

ISO 18000-6<br />

ISO 18000-4<br />

USA<br />

Frequency<br />

Power<br />

Emission<br />

mW EIRP


6.3 The central <strong>RF<strong>ID</strong></strong> st<strong>and</strong>ard ISO 18000<br />

6.3 The central <strong>RF<strong>ID</strong></strong> st<strong>and</strong>ard ISO 18000<br />

The attractive ISM frequency b<strong>and</strong>s were increasingly allocated <strong>with</strong><br />

<strong>RF<strong>ID</strong></strong> st<strong>and</strong>ards <strong>and</strong> defined in detail based on the ETSI approval regulations.<br />

This venture was largely implemented in 2004 <strong>and</strong> led to<br />

ISO/IEC 18000 Part 1 to 7 – Definition of the air interface for the identification<br />

of goods, which specified the important operation parameters<br />

such as transmission frequency, b<strong>and</strong>width, modulation, <strong>and</strong><br />

data coding.<br />

The following list shows an overview of the current status:<br />

• ISO/IEC 18000-1 General section <strong>with</strong> superimposed specifications<br />

• ISO/IEC 18000-2 Transmission frequencies below 135 kHz<br />

• ISO/IEC 18000-3 Transmission frequency 13.56 MHz<br />

• ISO/IEC 18000-4 Transmission frequency 2.45 GHz<br />

• ISO/IEC 18000-5 Transmission frequency 5.8 GHz (<strong>with</strong>drawn)<br />

• ISO/IEC 18000-6 Transmission frequency in the UHF range<br />

(860 to 960 MHz)<br />

• ISO/IEC 18000-7 Transmission frequency 433 MHz<br />

The fact that this not only created one st<strong>and</strong>ard but many is due to the<br />

strongly varying physical properties of the different frequency ranges.<br />

In addition, a natural selection process will take place in time, during<br />

which many presumable st<strong>and</strong>ards will prove to be unnecessary<br />

or obsolete. There is an evaluation of the various parts of the ISO/IEC<br />

18000, in which ISO st<strong>and</strong>ards are to take place at this stage for the air<br />

interface of <strong>RF<strong>ID</strong></strong> systems.<br />

Although ISO/IEC 18000-2 in the frequency range up to 135 kHz –<br />

generally called LF “low frequency” – may be old, it is by no means<br />

outdated. In machine construction, <strong>and</strong> especially in tool identification<br />

<strong>and</strong> identification of metal objects, this frequency provides important<br />

advantages. Ferrite cores or ferrite foils can be used to help<br />

control the disadvantageous influence of transmission properties<br />

through metal. The <strong>RF<strong>ID</strong></strong> systems in this frequency b<strong>and</strong> are, therefore,<br />

extremely robust. However, this is only achieved at the price of<br />

slow data transmission.<br />

The frequency b<strong>and</strong> 13.56 MHz – generally known as HF “high frequency”<br />

– is the selection compromise wherever small to medium<br />

85


6 St<strong>and</strong>ardization<br />

reading ranges are required. This frequency b<strong>and</strong> is globally available<br />

as a uniform ISM frequency. Efficient solutions can be realized<br />

for normal identification tasks in production <strong>and</strong> along the conveyor<br />

route. Communication is fast, secure, <strong>and</strong>, regarding field geometry,<br />

homogeneously <strong>and</strong> clearly delineated.<br />

The UHF b<strong>and</strong> acc. to ISO/IEC 18000-6 is currently the most important<br />

st<strong>and</strong>ard in the long range. Extremely cost efficient, passive transponders<br />

(Smart Labels) <strong>and</strong>, at the same time, extremely fast data<br />

transmission at distances over 5 meters <strong>and</strong> bulk recording ability of<br />

several hundred tags are the properties that have awoken great hope<br />

in this new st<strong>and</strong>ard. This is, however, gained <strong>with</strong> high transmission<br />

power, inhomogeneous fields, <strong>and</strong> overshooting that makes practical<br />

use more difficult.<br />

Not to forget the frequency b<strong>and</strong> at 2.45 GHz <strong>with</strong> a b<strong>and</strong>width of 82<br />

MHz. Very small tag antennas <strong>and</strong> extremely high transmission rates<br />

are both possible here. However, WLAN <strong>and</strong> Bluetooth installations<br />

are competitors to <strong>RF<strong>ID</strong></strong>.<br />

6.4 Further useful st<strong>and</strong>ards <strong>and</strong> guidelines<br />

The ISO st<strong>and</strong>ard 18000 describes the basic technical conditions <strong>and</strong><br />

operation parameters for <strong>RF<strong>ID</strong></strong> systems in the respective frequency<br />

b<strong>and</strong>s. To ensure that these are adhered to as well as to safely guarantee<br />

the interoperability of the components from different manufacturers,<br />

corresponding testing procedures were created <strong>and</strong> published<br />

in the form of “Technical Reports” (TR):<br />

• ISO TR 18046 Testing methods for the review of the performance<br />

characteristics of reading devices <strong>and</strong> transponders.<br />

• ISO TR 18047 Testing methods for the review of conformity <strong>with</strong><br />

air interface st<strong>and</strong>ards acc. to ISO 18000-2 to 7.<br />

The st<strong>and</strong>ard not only pays the required attention to the technical efficiency<br />

but also to the health of the people, whereby the basis is<br />

formed by ISO st<strong>and</strong>ards EN 50357 <strong>and</strong> EN 50364. It ensures that, despite<br />

all the requirements regarding performance, delivery rate, <strong>and</strong><br />

range, humankind is protected from any danger. Assurance requires<br />

the specification of measurement methods <strong>and</strong> limit values. The thermal<br />

effect of electromagnetic radiation on the human body is used as<br />

a basis. The limit values refer to the incorporated performance of the<br />

86


6.4 Further useful st<strong>and</strong>ards <strong>and</strong> guidelines<br />

respective body part, measured as an SAR unit (SAR: specific adaption<br />

rate in W/kg). Apart from performance <strong>and</strong> distance, the transmission<br />

frequency is also important for evaluation.<br />

Further supplementary st<strong>and</strong>ards must still be mentioned in this<br />

connection:<br />

• ISO/IEC 14443 Proximity Smart Cards 13.56 MHz; Electronic<br />

ticket, closed wallet, goods receipt slip, <strong>and</strong><br />

logistics<br />

• ISO/IEC 15693 Vicinity Cards <strong>and</strong> Smart Labels 13.56 MHz;<br />

incorporated in ISO 18000-3 Mode1<br />

• ISO/IEC 15961 Communication of identified goods data; display<br />

of data as objects, user interface (API), data protocol<br />

to reading device, <strong>and</strong> data exchange <strong>with</strong><br />

the host system<br />

• ISO/IEC 15962 Identification of goods <strong>with</strong> <strong>RF<strong>ID</strong></strong>; interpretation<br />

of transponder data, function <strong>and</strong> data coding;<br />

display of transponder data<br />

• ISO/IEC 15963 Unique identification; unique manufacturer<br />

identification for clear distinction of tags<br />

St<strong>and</strong>ards ISO/IEC 15961 <strong>and</strong> ISO/IEC 15962 specify data protocols<br />

<strong>and</strong> the structure of data <strong>and</strong> orders for the exchange of <strong>RF<strong>ID</strong></strong> data.<br />

They also describe the interface parameters <strong>and</strong> orders for application<br />

<strong>and</strong> the data management from the application down to data<br />

storage in the transponder. ISO/IEC 15963 supplements this by the<br />

uniform marking of ISO transponders.<br />

Although some st<strong>and</strong>ards refer to ISO/IEC 18000, they also define the<br />

appropriated application st<strong>and</strong>ards. It is here that it applies from the<br />

attachment to the data format <strong>and</strong> from the tag size to the technical<br />

implementation:<br />

• ISO/IEC 17358 Application requirements<br />

• ISO/IEC 17363 Freight containers<br />

• ISO/IEC 17364 Reusable transport unit<br />

• ISO/IEC 17365 Transport unit<br />

• ISO/IEC 17366 Product packaging<br />

• ISO/IEC 17367 Product tagging<br />

87


6 St<strong>and</strong>ardization<br />

There are many more <strong>RF<strong>ID</strong></strong> st<strong>and</strong>ards, such as animal identification,<br />

which is one of the oldest of all.<br />

6.5 St<strong>and</strong>ardization of visual codes<br />

Apart from RF identification, visual identification <strong>with</strong> the use of barcodes<br />

has already existed for a long time. While the one-dimensional<br />

1D barcode is often still designed for manual recording, the introduction<br />

of two-dimensional visual codes also enabled more efficient automatic<br />

recording (compare Chapter 3).<br />

As the use of barcodes was still fixed on open, cross-corporate goods<br />

distribution processes, st<strong>and</strong>ardization has always played a decisive<br />

role. Therefore, not only the symbol sets are st<strong>and</strong>ardized but also<br />

the coding via bar symbols, i.e. how a recognizable symbol is displayed.<br />

This includes the light/dark variations as well as the bar/gap<br />

ratio.<br />

For 1D barcodes, which are predominantly used for simple identification<br />

<strong>with</strong> reduced information contents, the following allocation can<br />

only be made in part according to Table 6.1. The two-dimensional<br />

barcode, especially the Data Matrix Code, distinguishes itself through<br />

higher data density, simpler <strong>and</strong> more secure readability, <strong>and</strong> higher<br />

recognition reliability. For code type ECC 200, there is st<strong>and</strong>ard ISO<br />

16022, which defines the basic structure, code structure, <strong>and</strong> display:<br />

• ISO/IEC 16022 International Symbology Specification DMC<br />

This st<strong>and</strong>ard is actually based on code creation in printing technology<br />

<strong>and</strong> builds upon quadratically arranged contrast information,<br />

Table 6.1 Overview of barcode st<strong>and</strong>ards<br />

St<strong>and</strong>ard Model Code extent Applications<br />

EN 797 EAN 8.13 10 digits Trade, cash systems<br />

EN 797 UPC A,E 10 digits Trade, cash systems<br />

EN 799 Code 128 128 symbols (ASCII) Industry, product identification<br />

EN 799 UCC/EAN 128 (extension<br />

of EN 799)<br />

35 symbols/characters Trade, Industry<br />

EN 800 Code 39 43 symbols<br />

(alphanumerical)<br />

Production, material flow<br />

EN 801 2/5 Interleaved 10 digits Pharmaceutical products,<br />

transport technology<br />

88


6.6 St<strong>and</strong>ardization through EPCglobal <strong>and</strong> GS1<br />

which is applied in lines <strong>and</strong> columns. The following st<strong>and</strong>ards are<br />

also available for more detailed specification:<br />

• ISO/IEC 15415 2D Print Quality<br />

• ISO/IEC 15418 Symbol Data Format Semantics<br />

• ISO/IEC 15434 Symbol Data Format Syntax<br />

In this case, ISO 15415 is of particular significance, describing the criteria<br />

for printing quality. It ensures that a code is reliably recognizable.<br />

A further characteristic of the Data Matrix Code ECC 200 is based on<br />

punctiform coding points, or so-called “dots”. This characteristic is<br />

used wherever the code is not applied <strong>with</strong> printing technology but<br />

rather <strong>with</strong> needle embossing, drilling, or laser engraving directly on<br />

the identifiable object (Direct Part Marking, DPM). Unfortunately ISO<br />

15415, designed for printed DMC, can only be used in a limited manner.<br />

AIM, therefore, defined an additional DPM quality guideline for<br />

round coding points, which also formulates the lighting requirements.<br />

Due to its high data volume, the Data Matrix Code is also suitable for<br />

goods’ identification <strong>with</strong> the Electronic Product Code (EPC). Therefore,<br />

an extremely cost efficient alternative to <strong>RF<strong>ID</strong></strong> technology is<br />

available for the EPCglobal data strategy.<br />

6.6 St<strong>and</strong>ardization through EPCglobal <strong>and</strong> GS1<br />

Not only is the physical recording of goods identification significant<br />

for the utilization of automatic identification in the global goods flow,<br />

but also the local assignment <strong>and</strong> interpretation of data contents. Organizations<br />

such as EAN (European Article Number) <strong>and</strong> UCC (Uniform<br />

Code Council) attempted to uniformly specify the data contents<br />

of barcodes <strong>and</strong> to maintain the number b<strong>and</strong>s. The commercial EAN<br />

codes are an excellent example, as they enable unique article <strong>and</strong><br />

manufacturer allocation <strong>with</strong> only a few bytes.<br />

The unification <strong>and</strong> continuous goods’ identification are, therefore, a<br />

fundamental requirement for the functional merch<strong>and</strong>ize management<br />

processes <strong>and</strong> steering of commodity flows. This task is currently<br />

internationally realized by the GS1 organization. It was created<br />

by the fusion of the European EAN International <strong>and</strong> American UCC,<br />

89


6 St<strong>and</strong>ardization<br />

whereby, not only the barcode was adopted for goods’ identification<br />

purposes, but also the <strong>RF<strong>ID</strong></strong> technology <strong>with</strong> the specifications from<br />

EPCglobal.<br />

The GS1 <strong>and</strong> its national associations regard themselves as a competence<br />

<strong>and</strong> service center for cross-corporate business processes. This<br />

is achieved by the uniformity of goods’ identification <strong>and</strong> the exchange<br />

of associated information. To ensure this service, the GS1 associations<br />

globally allocate <strong>and</strong> maintain number b<strong>and</strong>s for the<br />

unique identification of goods <strong>and</strong> packaging units. The important<br />

basic principle here is that only a superimposed definition, the allocation<br />

<strong>and</strong> maintenance of globally valid code structures, <strong>and</strong> code<br />

number b<strong>and</strong>s could ensure the goods’ supply chains <strong>and</strong> the tracking<br />

of goods. Because only the uniqueness of the identifying code enables<br />

the correct access to the product data in the global network of<br />

goods identification.<br />

Of course the activities of GS1 go h<strong>and</strong> in h<strong>and</strong> <strong>with</strong> st<strong>and</strong>ardization<br />

efforts. The important basic elements here are:<br />

• Barcode (EAN)<br />

• <strong>RF<strong>ID</strong></strong> (EPCglobal)<br />

• Electronic data exchange/E-Business (EDI).<br />

6.7 Conclusion <strong>and</strong> forecast<br />

St<strong>and</strong>ardization <strong>and</strong> specification ensure the openness of process<br />

<strong>and</strong> supply chains as well as the interoperability of tools. Telecommunication<br />

regulations are specifications to protect other frequency users,<br />

especially private <strong>and</strong> public services such as radio, TV, <strong>and</strong> mobile<br />

phones. The st<strong>and</strong>ardization of <strong>RF<strong>ID</strong></strong> ensures that transponders,<br />

reading devices, <strong>and</strong> IT components from different manufacturers in<br />

open distribution processes can be applied together.<br />

However, there is a discrepancy between diversification <strong>and</strong> st<strong>and</strong>ardization,<br />

<strong>and</strong> between innovation <strong>and</strong> regulation. Every manufacturer<br />

will attempt to develop competitive advantages through more<br />

performance or innovative technology. Diversification <strong>and</strong> innovation<br />

drive technology towards new efficiency, thereby increasing the<br />

respective efficiency of applications. To achieve this, one needs as<br />

much st<strong>and</strong>ardization as necessary <strong>and</strong> as much diversification as<br />

possible.<br />

90


6.7 Conclusion <strong>and</strong> forecast<br />

However, the st<strong>and</strong>ardization process also requires vigilance. Providers<br />

may be tempted to use a one-sided formulation of st<strong>and</strong>ards in<br />

order to protect their proprietary technology or to market patent licenses.<br />

This reverses the sense of st<strong>and</strong>ardization as this would promote<br />

distortion of the competition.<br />

Despite these qualms, the recording <strong>and</strong> control of increasingly enormous<br />

global commodity flows is only possible <strong>with</strong> st<strong>and</strong>ardization.<br />

As <strong>RF<strong>ID</strong></strong> is the technology that will achieve all of this in an economically<br />

justifiable form, it must generally recognize the valid specifications<br />

<strong>and</strong> st<strong>and</strong>ards.<br />

91


Part 2<br />

The Practical Application<br />

of <strong>RF<strong>ID</strong></strong> <strong>and</strong> <strong>Auto</strong> <strong>ID</strong>


7 Process design <strong>and</strong> profitability<br />

Peter Segeroth<br />

“<strong>RF<strong>ID</strong></strong>?! Is that still worth our while?” This, or a similar, question could<br />

summarize the reaction of many decision makers regarding the introduction<br />

of <strong>RF<strong>ID</strong></strong> technology into their operative processes. This<br />

statement is confirmed in survey results; the doubts in the economic<br />

success of <strong>RF<strong>ID</strong></strong> predominate. The decision-maker level, therefore,<br />

generally doubts the profitability of <strong>RF<strong>ID</strong></strong> applications. Apart from<br />

further factors, the high costs of <strong>RF<strong>ID</strong></strong> transponders are listed as a<br />

main argument. Although these are said to be on a steep descent – as<br />

can be read in publications on the topic – the application would only<br />

be worthwhile from 0.05 euros per transponder.<br />

7.1 The fear of bad investment<br />

The fate of spotlighting the introduction of new information technologies<br />

primarily as cost causers <strong>and</strong> less as beneficial technology does<br />

not only concern <strong>RF<strong>ID</strong></strong> technology. There is a relatively low acceptance<br />

for new technology due to the frequent lack of transparency of the<br />

qualitative <strong>and</strong> especially quantitative benefits . In short: the lack of a<br />

business case.<br />

An economic feasibility study (Business Case) serves the company for<br />

decision making <strong>and</strong> investment planning purposes. It concerns the<br />

answer to the question: “What’s left on the line for me <strong>and</strong> how do I<br />

avoid bad investment?” Before an investment, e.g. in <strong>RF<strong>ID</strong></strong> technology,<br />

the company has to first analyze its objectives <strong>and</strong> problems, conduct<br />

Fig. 7.1 The path to the <strong>RF<strong>ID</strong></strong> Business Case<br />

94<br />

Target<br />

analysis<br />

Problem<br />

analysis<br />

Looking for<br />

alternatives<br />

Investment<br />

appraisal


7.2 It all starts <strong>with</strong> visions <strong>and</strong> objectives<br />

the actual investment appraisal, <strong>and</strong> use the results to make its respective<br />

decision (Fig. 7.1).<br />

Keeping to these steps will provide the company <strong>with</strong> the required<br />

transparency before the introduction of <strong>RF<strong>ID</strong></strong>. Speculations on high<br />

prices for <strong>RF<strong>ID</strong></strong> transponders <strong>and</strong> on a reduced benefit are quantified<br />

<strong>and</strong> determined. The company receives a well-founded basis for its<br />

investment decision.<br />

7.2 It all starts <strong>with</strong> visions <strong>and</strong> objectives<br />

The basis for the successful implementation of <strong>RF<strong>ID</strong></strong> projects is the<br />

existence of corporate vision <strong>and</strong> objectives. Usually, these were already<br />

defined by the companies in a strategic planning process or can<br />

be defined <strong>with</strong> external help – before the introduction of <strong>RF<strong>ID</strong></strong> technology.<br />

The definition process depends on the company’s current situation.<br />

Regarding the introduction of <strong>RF<strong>ID</strong></strong> technology, which refers<br />

to a concrete application area, it would be advisable to develop the<br />

relevant <strong>and</strong> critical business fields <strong>and</strong> business processes <strong>with</strong>in<br />

the scope of the target analysis <strong>and</strong> to concentrate on these. In other<br />

words, the introduction of <strong>RF<strong>ID</strong></strong> could initially be limited to production,<br />

for example. In this case, further business fields or processes<br />

remain unconsidered.<br />

This first definition phase usually proceeds <strong>with</strong> the following steps:<br />

1. Creation of a profile of the current as-is situation<br />

2. Definition of the corporate vision<br />

3. Specification of performance objectives<br />

4. Specification of business process objectives<br />

5. Identification of the vision’s effects on the company<br />

6. Prioritization of business fields <strong>and</strong> business processes<br />

The following questions are answered during the creation of the profile<br />

on the current as-is situation <strong>and</strong> the definition of the corporate<br />

vision:<br />

• Is today’s business also tomorrow’s business?<br />

• Can changes in customer requirements be expected?<br />

• What do we have to do today in order to be successful tomorrow?<br />

95


7 Process design <strong>and</strong> profitability<br />

• How can today’s market position be extended <strong>and</strong> safeguarded?<br />

• Do we utilize our market position or are our profit reserves<br />

sitting idle?<br />

• Where does the company want to be in 5 years? (analysis <strong>and</strong><br />

reality check of long-term planning)<br />

The specification of business process <strong>and</strong> performance objectives<br />

entails topics such as:<br />

• Improvement of business process performance<br />

• Utilization of the economical <strong>and</strong>/or functional advantages of<br />

new technologies<br />

• Utilization of systems that are optimally aligned to their specific<br />

application purpose<br />

• Utilization of systems <strong>with</strong> high reliability.<br />

A final task during the prioritization of business fields (primary business<br />

processes) is the analysis <strong>and</strong> definition of those business fields<br />

(subdivisions) that are particularly predestined for the application of<br />

<strong>RF<strong>ID</strong></strong>.<br />

This top-down approach shows that the challenges for the company<br />

<strong>and</strong> the resulting measures are the basis of a company change. The<br />

application of the <strong>RF<strong>ID</strong></strong> technology is linked to the analysis results of<br />

the individual business fields.<br />

7.3 How does the company work?<br />

For <strong>RF<strong>ID</strong></strong> projects, we recommend a top-down (from rough to detail)<br />

approach to the Actual Process Analysis. During a first work meeting,<br />

which is to be moderated by decision makers <strong>and</strong> practitioners from<br />

the various business fields, the business processes are developed in a<br />

clear form – e.g. per business field. The result (Fig. 7.2) provides the<br />

participants an overview of the input, output, <strong>and</strong> process participants<br />

<strong>and</strong> enables the initial planning of the <strong>RF<strong>ID</strong></strong> scenario <strong>with</strong>in the<br />

analyzed business process.<br />

The next step includes the detailing of business processes <strong>with</strong> a process<br />

sequence performance model (Table 7.1). This is created in consideration<br />

of the time, costs, quality, <strong>and</strong> other measured quantities<br />

(e.g. capital employed, the number of required employees). There-<br />

96


Organi -<br />

zation<br />

Functions<br />

Input<br />

Output<br />

Appli -<br />

cation<br />

Management V<br />

Foreman<br />

7.3 How does the company work?<br />

Fig. 7.2 Exemplary actual display of the business process “parts production”<br />

fore, the current objectives <strong>and</strong> those for future business process performance<br />

(target concept) are compared.<br />

Future business process performance can either:<br />

• contain values stemming from the best practical experience (Best<br />

Practice of, for example, competitors or business partners) or<br />

• contain values based on the improvement of business processes<br />

through the use of <strong>RF<strong>ID</strong></strong> technology.<br />

The input from the business process Actual Analysis <strong>and</strong> the business<br />

process performance model represent the basis for the draft of an improved<br />

business process, in which <strong>RF<strong>ID</strong></strong> technology has already been<br />

taken into consideration.<br />

Table 7.1 Exemplary display of process sequence performance models<br />

Event Result Process<br />

Thread<br />

Customer<br />

order<br />

merch<strong>and</strong>ise<br />

Customer<br />

returns<br />

merch<strong>and</strong>ise<br />

Ship ticket<br />

released to<br />

warehouse<br />

Worker<br />

Primary<br />

product<br />

<strong>RF<strong>ID</strong></strong><br />

SAP<br />

Database<br />

Appl . A<br />

App. B<br />

D<br />

M<br />

Equipping<br />

� Unfinished<br />

primary<br />

product<br />

� Machine<br />

equipped<br />

Ship ticket<br />

released to<br />

warehouse<br />

Refund<br />

Authorization<br />

sent to billing<br />

Merch<strong>and</strong>ise<br />

shipped to<br />

customer<br />

Process analysis production<br />

V<br />

D<br />

M<br />

Preparation Attachment<br />

of part A<br />

� Production<br />

data<br />

� Production<br />

start<br />

Process<br />

customer<br />

order<br />

Process<br />

customer<br />

return<br />

Ship<br />

customer<br />

order<br />

V<br />

D<br />

M<br />

� Part A<br />

� Operating<br />

materials<br />

Time Cost Quality Capital<br />

now future now future current future current future<br />

4<br />

days<br />

10<br />

days<br />

2<br />

days<br />

� Part A<br />

� Part B<br />

.25<br />

days<br />

$15/<br />

order<br />

.5 day $50/<br />

order<br />

.25<br />

days<br />

V<br />

D<br />

M<br />

Attachment<br />

of part B<br />

� Part B<br />

$10/<br />

order<br />

Intermediate<br />

control<br />

$15/<br />

order<br />

$5/<br />

order<br />

$5/<br />

order<br />

V<br />

D<br />

M<br />

� Control<br />

process<br />

� Part C<br />

� Quality<br />

tested part<br />

5 %<br />

returns<br />

.1 %<br />

error<br />

5 %<br />

returns<br />

V<br />

D<br />

M<br />

Completion<br />

� Pre-fab<br />

part<br />

.01 %<br />

returns<br />

.1 %<br />

error<br />

Quality<br />

control<br />

$1500/<br />

clerk<br />

50 days of<br />

.01 %<br />

inventory<br />

returns<br />

($50M)<br />

V<br />

D<br />

M<br />

� Pre-fab part<br />

� Control<br />

process<br />

� Control<br />

results<br />

Pre-fab part<br />

$4000/<br />

clerk<br />

– –<br />

30 days of<br />

inventory<br />

($30M)<br />

97


7 Process design <strong>and</strong> profitability<br />

7.4 The business case for <strong>RF<strong>ID</strong></strong><br />

7.4.1 The concept of the calculation of profitability<br />

Investments in new technologies are the prerequisite for the technical<br />

progress of one’s own products as well as for increased productivity<br />

<strong>and</strong> the ability to compete. However, they tie up capital in the longterm.<br />

The decision to introduce <strong>RF<strong>ID</strong></strong> in the operational process of a<br />

company is, therefore, dependent on the level of resulting capital returns<br />

to be expected as a result of the investment. The benefits of an<br />

investment must, therefore, outweigh its costs. However, reasons also<br />

exist that speak for the investment even if it does not have a reasonable<br />

chance (costs > benefit) (for example, the necessity as a supplier<br />

to deliver goods <strong>with</strong> <strong>RF<strong>ID</strong></strong> transponders).<br />

The profitability of an investment is calculated in a business case, that<br />

is to say, an assessment of the figures associated <strong>with</strong> business measures<br />

as defined in strategic planning. The additional success affected<br />

by the investment (as opposed to business success <strong>with</strong>out this investment)<br />

is assessed here. The result of this business case is a primary<br />

factor for management’s decision-making.<br />

The most important merits of a business case are:<br />

• Increased decision reliability<br />

• Creation of the scope for decision-making: the business case<br />

also shows alternatives.<br />

• Creation of an overview <strong>and</strong> transparency: all relevant information<br />

is provided.<br />

• Creation of commitment, clarity, underst<strong>and</strong>ing, <strong>and</strong> comparability:<br />

performance figures whose derivation <strong>and</strong> comparison<br />

becomes apparent.<br />

• Creation of a basis for the later assessment of the success of the<br />

project <strong>and</strong> support of project controlling.<br />

A business case is always based on assumptions: costs <strong>and</strong> benefits<br />

are estimated, <strong>and</strong> the future development of the company, type, <strong>and</strong><br />

scope of use of the investment are anticipated. A residual risk of impreciseness<br />

also remains, even after preparing a detailed, conservatively<br />

calculated business case. Nonetheless, it provides the best, <strong>and</strong><br />

indispensable, decision basis for an investment.<br />

98


7.4.2 Procedure for <strong>RF<strong>ID</strong></strong> projects<br />

7.4 The business case for <strong>RF<strong>ID</strong></strong><br />

The results of the target <strong>and</strong> problem analysis provide a basis for answering<br />

the question as to what contribution the introduction of <strong>RF<strong>ID</strong></strong><br />

technology will provide to the achievement of the company’s strategic<br />

objectives.<br />

The preparation of a business case is divided into three major phases:<br />

derivation of costs, derivation of benefits, <strong>and</strong> implementation of the<br />

calculation of profitability. The determination of the values (costs <strong>and</strong><br />

benefits) is always “risky” as it uses plan values as a total of assumptions.<br />

Nonetheless, the derived values are decisive for the calculation<br />

of profitability. Therefore, it is necessary to provide robust, reasoned<br />

figures; all the values <strong>and</strong> their derivation must be documented in<br />

writing.<br />

Derivation of the costs<br />

The costs of <strong>RF<strong>ID</strong></strong> projects are often limited to the <strong>RF<strong>ID</strong></strong> transponders.<br />

The transponder price is relevant for projects <strong>with</strong> an open cycle. This<br />

is different for projects where the transponders are re-used: the costs<br />

for transponders here are far less significant due to the frequent circulation.<br />

In addition to the transponder costs, all further costs must<br />

naturally be fully derived. For this purpose, it is useful to systematically<br />

record the costs in the categories provided (Table 7.2). We recommend<br />

documenting all the derived costs in a table. Depending on<br />

the scope of the project, it may make sense to go into further detail<br />

<strong>with</strong> sub-categories.<br />

Table 7.2 Categories for deriving the costs<br />

External costs<br />

(for external partners)<br />

• Software costs<br />

• Hardware costs<br />

• Services costs<br />

Internal costs<br />

(<strong>with</strong>in the company)<br />

Investment costs<br />

(project phase)<br />

• <strong>RF<strong>ID</strong></strong> middleware<br />

• <strong>RF<strong>ID</strong></strong> transponders<br />

• <strong>RF<strong>ID</strong></strong> readers <strong>and</strong> antennas<br />

• Server <strong>and</strong> PC<br />

• Consultancy <strong>and</strong> project costs<br />

• Implementation<br />

• Miscellaneous<br />

• Project employee costs<br />

• Travel costs<br />

• Occupancy costs<br />

• Hardware <strong>and</strong> software<br />

• Miscellaneous<br />

Operational costs<br />

(operation phase)<br />

• Software, updates<br />

• Replacement investments<br />

(<strong>RF<strong>ID</strong></strong> hardware, IT)<br />

• Service<br />

• Maintenance<br />

• Miscellaneous<br />

• Training<br />

• Application support<br />

• Miscellaneous<br />

99


7 Process design <strong>and</strong> profitability<br />

The result that was worked out serves primarily as input for the profitability<br />

calculation <strong>and</strong> is also used for project planning <strong>and</strong> budgeting.<br />

Derivation of the benefit<br />

The major benefit of using <strong>RF<strong>ID</strong></strong> is to increase productivity as well as<br />

cost reduction by process cost reduction via process optimization <strong>and</strong><br />

rationalization effects. In order to simplify recording <strong>and</strong> quantification<br />

of the full benefit of an investment, benefit categories were created<br />

<strong>and</strong> specified in a second step (Fig. 7.3). Especially the recording<br />

of the benefits by increased productivity takes place based on analyzed<br />

business processes. Therefore, it is necessary to analyze every<br />

business process as a process sequence performance model <strong>and</strong> to<br />

determine <strong>and</strong> document the potentials. The result of the benefit observation<br />

flows into the profitability calculation, in turn also providing<br />

an initial estimate regarding the benefit potentials of the investment.<br />

Benefit categories<br />

Benefit<br />

Fig. 7.3 Derivation of benefit<br />

Profitability calculation<br />

The profitability calculation compares the results of the derivation of<br />

the costs <strong>and</strong> benefits <strong>and</strong> determines the profitability by using calculation<br />

processes. In practice, static or dynamic processes are applied;<br />

selection is made depending on the framework conditions of the profitability<br />

calculation. The static processes relate to time-independent<br />

100<br />

Higher<br />

turnover<br />

Increased<br />

productivity<br />

Lower<br />

operating<br />

costs<br />

Lower<br />

current<br />

assets<br />

Increased existing<br />

turnover sources<br />

New turnover sources<br />

Uniform processes<br />

Higher degree<br />

of automation<br />

Cost savings<br />

Cost avoidance<br />

Reduction of<br />

warehouses<br />

Reduction of claims<br />

Quantifiability of benefits<br />

Quantifiable<br />

(tangible)<br />

Direct<br />

Indirect<br />

Non-quantifiable<br />

(intangible)


7.5 The <strong>RF<strong>ID</strong></strong> business case in practice<br />

individual values <strong>and</strong> are, therefore, relatively easy <strong>and</strong> quick to use.<br />

However, they are less precise than the dynamic process. The dynamic<br />

processes are of advantage when regarding the profitability of an<br />

investment over a longer period (for example five years) <strong>and</strong> more<br />

precise due to the consideration of the reserve discounting of the<br />

stream of incoming <strong>and</strong> outgoing payments.<br />

7.5 The <strong>RF<strong>ID</strong></strong> business case in practice<br />

At Amberg Equipment Plant, which is owned by Siemens AG, <strong>RF<strong>ID</strong></strong><br />

systems are used for the production of switching devices. A business<br />

case was prepared to prove the profitability of the use of <strong>RF<strong>ID</strong></strong> in manufacturing<br />

at this works <strong>and</strong> provides the following example for the<br />

practical implementation of a profitability calculation.<br />

By newly developing a production line, Siemens AG followed the objective<br />

of guaranteeing the manufacturing of a wide array of product<br />

variants while maintaining high production quality. Production is<br />

planned to be more flexible, of a higher quality <strong>and</strong> at lower costs<br />

(Chapter 9).<br />

After the production processes were analyzed, <strong>RF<strong>ID</strong></strong> <strong>and</strong> barcodes<br />

were tested as potential technologies to define basic conditions <strong>and</strong><br />

assumptions for the business case. Analysis <strong>and</strong> comparison of the<br />

benefits of both technologies provided positive results for <strong>RF<strong>ID</strong></strong> technology,<br />

in which the qualitative benefits of <strong>RF<strong>ID</strong></strong> outweighed the use<br />

of barcodes. The qualitative benefit of <strong>RF<strong>ID</strong></strong> in detail:<br />

• Increased quality<br />

– Manufacturing dates constantly updated on the <strong>RF<strong>ID</strong></strong><br />

transponder<br />

– The <strong>RF<strong>ID</strong></strong> transponders are written <strong>with</strong> information from<br />

current QA results<br />

– Faulty components are automatically sorted out <strong>and</strong> the error<br />

directly eliminated<br />

– Components are returned to the assembly process following<br />

correction<br />

• Increased speed<br />

– Increased throughput speed – due to “Data on tag” no data<br />

access (“Data on network”) is necessary <strong>and</strong>, therefore, fast data<br />

transfer<br />

101


7 Process design <strong>and</strong> profitability<br />

102<br />

– Reduction of set-up time – due to “Data on tag” (writing production<br />

data on the transponders), the production control system is<br />

triggered directly<br />

• Reduction of the use of IT:<br />

– Managing <strong>with</strong>out implementing a database by using “Data on<br />

tag”<br />

– Focusing the employees on high system availability, timely error<br />

correction, <strong>and</strong> concluding quality assurance<br />

The following cost estimate was implemented to quantify the benefit.<br />

In the business case, they were compared to the cost estimation results.<br />

The result of the cost comparison: the costs for <strong>RF<strong>ID</strong></strong> technology<br />

of €155,000 were some €35,000 higher than for barcode technology<br />

(Table 7.3).<br />

Table 7.3 Barcode <strong>and</strong> <strong>RF<strong>ID</strong></strong> costs at Amberg Factory<br />

Item Barcode solution <strong>RF<strong>ID</strong></strong> solution<br />

Reading devices EUR 50,000 EUR 60,000<br />

Transponder – EUR 40,000<br />

Software (including integration) EUR 5,000 EUR 15,000<br />

Extra IT expenses, output devices EUR 25,000 –<br />

Proportional project costs EUR 40,000 EUR 40,000<br />

Total costs EUR 120,000 EUR 155,000<br />

Due to the higher quantitative benefit provided by <strong>RF<strong>ID</strong></strong> as opposed to<br />

barcode technology – in particular, due to the increased system production<br />

capacity – it was possible to overcompensate the approximately<br />

€35,000 higher investment in <strong>RF<strong>ID</strong></strong> through the consequent<br />

resulting additional profits.<br />

As a final step, a business case was calculated for the application of<br />

<strong>RF<strong>ID</strong></strong> technology, whereby the results of cost assessment <strong>and</strong> quantified<br />

benefits were included in a simple (statistic) Return-on-Investment<br />

period rule for a period of 5 years as a calculation basis (Fig.<br />

7.4). The result: the investment in <strong>RF<strong>ID</strong></strong> technology had already amortized<br />

in the second year of operation.


in EUROS<br />

150,000<br />

100,000<br />

50,000<br />

0<br />

-50,000<br />

-100,000<br />

-150,000<br />

-200,000<br />

-155,000<br />

-70,000<br />

7.6 Technology can inspire – but it must “fit”<br />

12,000<br />

95,000<br />

Year<br />

1 2 3<br />

Cumulative cash flow<br />

Fig. 7.4 The investment in <strong>RF<strong>ID</strong></strong> had already amortized in the second<br />

year of operation<br />

7.6 Technology can inspire – but it must “fit”<br />

Before investing in <strong>RF<strong>ID</strong></strong> technology we recommend conducting a<br />

Business Case. Determine all the cost <strong>and</strong> benefit categories – <strong>RF<strong>ID</strong></strong><br />

transponders are not the “be all, end all” in the determination of the<br />

total investment amount. The relevance of the costs for <strong>RF<strong>ID</strong></strong> transponders<br />

depends on the character of the application (key word: open<br />

or closed cycle).<br />

Technology inspires <strong>and</strong> because of that one thing may not be forgotten:<br />

the <strong>RF<strong>ID</strong></strong> technology must be suitable for the company. This<br />

means: the knowledge of the visions, strategies, <strong>and</strong> individual challenges<br />

of the company is the basis for successful <strong>RF<strong>ID</strong></strong> application.<br />

103


8 Introduction to the practical<br />

application of <strong>RF<strong>ID</strong></strong><br />

Michael Schuldes<br />

The technology is available, the application scenarios are formulated,<br />

the economical benefit is assessed – how can a vision now become<br />

reality?<br />

A systematic procedure has proven its worth throughout many<br />

projects, as shown in Fig. 8.1. This model works irrespective of concrete<br />

application <strong>and</strong> sector. The first steps – the process analysis, formulation<br />

of the target concept, <strong>and</strong> economic feasibility study – were<br />

already discussed in Chapter 7. Now, it is a matter of turning the analytical<br />

results into reality.<br />

<strong>RF<strong>ID</strong></strong><br />

quick scan<br />

Fig. 8.1 The procedure for <strong>RF<strong>ID</strong></strong> introduction<br />

The implementation of a target concept under real conditions can involve<br />

a few surprises: during the concept, did anyone remember that<br />

the gate for receiving goods consists of metal or that the reinforced<br />

concrete in the ground may affect the reading result or that reading<br />

results can be distorted by reflections, e.g. caused by transport vehicles<br />

or containers in the vicinity? However, st<strong>and</strong>ard solution ele-<br />

104<br />

<strong>RF<strong>ID</strong></strong><br />

assessment<br />

Profitability<br />

analysis<br />

Feasibility<br />

test<br />

Solution<br />

design<br />

Cost-benefit analysis, ROI<br />

Process identification <strong>with</strong> <strong>RF<strong>ID</strong></strong> benefit potential<br />

Roll-out<br />

Realization, pilot operation<br />

Verification of <strong>RF<strong>ID</strong></strong> technology in a realistic environment<br />

Process analysis (ACTUAL/TARGET) <strong>and</strong> <strong>RF<strong>ID</strong></strong> solution concept<br />

Preparation of wide<br />

scale application


8.1 Feasibility test / Field test<br />

ments have meanwhile been developed <strong>and</strong> tested by the manufacturers<br />

of <strong>RF<strong>ID</strong></strong> systems. Here, the possible combinations of <strong>RF<strong>ID</strong></strong> transponders<br />

<strong>and</strong> reading devices for certain applications are first measured,<br />

tested, <strong>and</strong> tried in practical applications under laboratory<br />

conditions. However, in special cases, for example under critical physical<br />

circumstances, the wealth of experience is not sufficient. An “outof-the-box”<br />

<strong>RF<strong>ID</strong></strong> solution does not always exist. That is why the findings<br />

that were obtained during the course of the project must be incorporated<br />

into the subsequent steps of the project.<br />

8.1 Feasibility test / Field test<br />

The risk of the introduction of <strong>RF<strong>ID</strong></strong> technology can be controlled by<br />

specifically limiting its application to selected products, certain marking<br />

levels, <strong>and</strong> predetermined processes. A feasibility test or field test<br />

can also be regarded as a simulation in the broadest sense. In order to<br />

prevent negative surprises at a very early stage, a field or feasibility<br />

test, based on the target concept, should be the next step in the successful<br />

implementation of an <strong>RF<strong>ID</strong></strong> project. The <strong>RF<strong>ID</strong></strong> feasibility test/<br />

field test serves to check <strong>and</strong> adjust the technical feasibility of a previously<br />

created <strong>RF<strong>ID</strong></strong> concept in the customer’s real environment.<br />

8.1.1 Objectives of a feasibility test/field test<br />

If the target concept did not include a specification of the technology<br />

or the usable hardware based on technical <strong>and</strong>/or economic aspects,<br />

the respective decisions will be made no later than during the feasibility<br />

test. To ensure reliable statements regarding the application of<br />

the selected technology, <strong>RF<strong>ID</strong></strong> testing <strong>with</strong> own commodities <strong>and</strong> in<br />

own environments cannot be foregone. The test results are incorporated<br />

into the usable technology <strong>and</strong> <strong>RF<strong>ID</strong></strong> components <strong>and</strong> form the<br />

basis of the later design of the solution.<br />

A feasibility test can be performed before a profitability calculation,<br />

as otherwise the creation of a Return-on-Invest (ROI) may not make<br />

sense for a solution that is technically unrealizable at a later stage.<br />

While a feasibility test only checks whether the <strong>RF<strong>ID</strong></strong> technology can<br />

be generally applied in the planned environment, the field test also<br />

checks the permanent environmental effect on the planned technology.<br />

105


8 Introduction to the practical application of <strong>RF<strong>ID</strong></strong><br />

8.1.2 Performing the tests<br />

A test concept accurately specifies the scope, period, objectives, <strong>and</strong><br />

expected results. When creating this concept together <strong>with</strong> the customer,<br />

observe the definition of assessable test objectives. As existing<br />

IT systems should not be interfered <strong>with</strong> at this stage, the respective<br />

software is provided based on which test can be evaluated.<br />

Fig. 8.2 Extensive tests show whether the metal barrels that are loaded on a<br />

pallet influence the readability of the pallet transponder, for example.<br />

Depending on the <strong>RF<strong>ID</strong></strong> system used, environmental influences can<br />

have the most varied effects. The result of the tests is the optimum<br />

attachment <strong>and</strong> alignment of the transponders to the objects as well<br />

as the optimum installation of the antennas. The optimum attachment<br />

point (sweet spot) is found by attaching various transponders to<br />

different parts of the respective object (Fig. 8.2). Various attachment<br />

options (screwing, gluing, welding, etc.), the size of the transponder,<br />

<strong>and</strong> suitable installation points are included in the evaluation of the<br />

test to the same extent as the applicability by employees <strong>and</strong> the influences<br />

on the existing processes.<br />

Some of the most important aspects in creating a feasibility or field<br />

test are:<br />

• Each <strong>RF<strong>ID</strong></strong> location planned in the target concept must be tested<br />

individually. If required, alternative locations may have to be considered.<br />

106


8.1 Feasibility test / Field test<br />

• Legal <strong>and</strong> internal security regulations must be complied <strong>with</strong>.<br />

• When reviewing the locations, for example, ensure that all the<br />

already existing machinery that may emit electromagnetic interferences<br />

are switched on.<br />

• The determination of the exact tag position on the identifiable<br />

objects is a trial <strong>and</strong> error exercise. Every transponder position on<br />

the object <strong>and</strong> every possible angle between the transponder <strong>and</strong><br />

reading device must be tested.<br />

• Every possible packaging material must be tested, just as every<br />

object (product) that may be inside the packaging. The contained<br />

products may have an influence on the reading quality, e.g. coffee<br />

packaging consisting of aluminum or cell phones <strong>with</strong> metal casing.<br />

• Transponders are often too large to be attached to small objects, or<br />

the objects do not feature a suitable attachment point. Then, check<br />

whether alternative attachment options are available <strong>and</strong> practical<br />

(e.g. a tag <strong>with</strong> a transponder).<br />

Verification of reading speed at production belts is easy to determine<br />

by increasing or decreasing the belt speed. Testing when transport<br />

passes by reading devices at varying speeds (e.g. forklift in shipping<br />

<strong>and</strong> receiving goods) at varying distances is more difficult. We recommend<br />

a testing series over longer periods of time.<br />

8.1.3 Results of the feasibility/field test<br />

Probably the most important result of a feasibility or field test is the<br />

answer to the question of whether the application of the technology<br />

in the customer specific environment is executable as planned from a<br />

technical <strong>and</strong> economic point of view. The test report provides information<br />

on problems such as:<br />

• Which <strong>RF<strong>ID</strong></strong> technology <strong>and</strong> which hardware components are best<br />

suited to comply <strong>with</strong> the customer requirements contained in the<br />

target concept?<br />

• Where are the measurement points <strong>and</strong> what data flows can be<br />

expected?<br />

• What is the optimum attachment <strong>and</strong> alignment of the transponders<br />

to the objects as well as the optimum installation of<br />

the readers?<br />

107


8 Introduction to the practical application of <strong>RF<strong>ID</strong></strong><br />

• Which writing/reading distances can be reached?<br />

• Does recording take place automatically or via mobile h<strong>and</strong>held<br />

devices?<br />

• What are the effects of <strong>RF<strong>ID</strong></strong> technology on the existing processes<br />

<strong>and</strong> habits?<br />

As the problems of the business processes are also analyzed in the<br />

<strong>RF<strong>ID</strong></strong> field trials, mutually active cooperation between the customer<br />

<strong>and</strong> <strong>RF<strong>ID</strong></strong> service provider is indispensable.<br />

8.2 Solution design <strong>and</strong> pilot operation<br />

The solution design phase deals <strong>with</strong> the concept <strong>and</strong> development of<br />

an extensive solution for the customer. In other words, it concerns the<br />

answer to the question of how the requirements as specified by the<br />

customer can be put into practice. Unlike the feasibility or field test,<br />

which basically concentrates on the selection of suitable hardware<br />

<strong>and</strong> its locations or the attachment on the objects, the solution design<br />

particularly involves the design of software integration. During this<br />

phase it is essential to integrate the process rules into the <strong>RF<strong>ID</strong></strong> middleware,<br />

to filter <strong>and</strong> select the data according to the workflow, <strong>and</strong> to<br />

transfer them in a targeted manner.<br />

Depending on the tasks, extensive pilot operation may also be expedient<br />

in order to review the feasibility of the <strong>RF<strong>ID</strong></strong> concept by incorporating<br />

the knowledge from the feasibility/field test into the customer’s<br />

real environment during continuous application. This pilot implementation<br />

requires the installation of the complete system into<br />

the real working environment. Unlike the final roll-out, operation<br />

<strong>and</strong> utilization of the system are reduced to manageable parts, <strong>and</strong> –<br />

for security reasons – no complete integration into the existing IT systems<br />

will take place (parallel operation). This will also provide the<br />

first conclusions on the load behavior <strong>and</strong> the integration of the new<br />

mass data as well as the effects on process control <strong>with</strong>out unduly interrupting<br />

the operational process. The testable systems are more<br />

manageable during occurring problems, in which the detection of errors<br />

is simplified.<br />

The introduction of <strong>RF<strong>ID</strong></strong> technology requires the solving of a multitude<br />

of necessary migrations. Important prerequisites are, among<br />

others:<br />

108


• The technology must be robust <strong>and</strong> available.<br />

8.2 Solution design <strong>and</strong> pilot operation<br />

• The allocation of costs <strong>and</strong> benefits must be clear.<br />

• System integration <strong>and</strong> data synchronization must have been<br />

fully completed.<br />

A 100 % reading rate is difficult to achieve in some applications <strong>with</strong><br />

the current state-of-the-art. If the recording accuracy in, for example,<br />

the clothing industry is very high, the reading quality in other logistics<br />

departments will strongly depend on the environment <strong>and</strong> the<br />

identifiable object. This has to do <strong>with</strong> the fundamental laws of physics,<br />

if a transponder is completely shielded by metal, for example. The<br />

design of an <strong>RF<strong>ID</strong></strong> application requires the development of reliable solutions<br />

or reversion to the provider’s wealth of experience. As a complete<br />

<strong>RF<strong>ID</strong></strong> solution often consists of components from different partners<br />

(software, hardware, installation, <strong>and</strong> support), the functioning<br />

project <strong>and</strong> partner management from this project phase onwards is<br />

also of great significance.<br />

The expense of conducting possible pilot operation strongly depends<br />

on the complexity <strong>and</strong> number of the respective processes. Simpler<br />

applications often no longer require a pilot phase due to the use of<br />

ready made components. In the environment of, for example, a complex<br />

spare part management process <strong>with</strong> many edge processes (warranty<br />

processes, repair cycles, scrapping, etc.), pilot operation could<br />

take several weeks or even months.<br />

8.2.1 Objectives of pilot operation<br />

During the pilot phase, the achievement of the required accuracy,<br />

data flow, <strong>and</strong> performance in the real environment are tested <strong>and</strong><br />

recorded over a longer period of time. Evaluation of the results then<br />

provides a useful troubleshooting tool <strong>and</strong> serves the employees as a<br />

document for knowledge exchange purposes. A well prepared pilot<br />

phase provides the option of assessing the subsequent system behavior<br />

during occurring errors as well as defining <strong>and</strong> taking suitable<br />

subsequent measures.<br />

Concepts for suitable software can already be developed <strong>with</strong>in the<br />

assessment, but application only takes place during pilot operation. It<br />

is here that the interfaces to the superimposed IT systems can also be<br />

tested. The recorded data are checked <strong>and</strong> evaluated <strong>with</strong> simple aids,<br />

e.g. Excel, ASCII files). Then, further suppliers/customers or products<br />

109


8 Introduction to the practical application of <strong>RF<strong>ID</strong></strong><br />

are incorporated in increments. This makes it easy to determine any<br />

errors that occur for which products, customers, or suppliers. Close<br />

cooperation between the involved associations can significantly expedite<br />

the solution to a problem. The load tests uncover any deficiency<br />

in the business processes <strong>and</strong> further system anomalies. This can<br />

help determine the volume of data up to which the system functions<br />

soundly. Cooperation <strong>with</strong> the involved partners must be ensured for<br />

compatibility reasons.<br />

To ensure the secure <strong>and</strong> uninterrupted process of daily work during<br />

subsequent roll-out, create emergency plans in case of error, prepare<br />

work arounds, <strong>and</strong> define the alarm events.<br />

8.2.2 Results of pilot operation<br />

The solution design’s task is not only the technical solution concept of<br />

the <strong>RF<strong>ID</strong></strong> system but also the consideration to the respective system<br />

software’s performance requirements. What is the use of the recording<br />

systems providing the data in real-time if the software is overburdened<br />

<strong>with</strong> processing? The weak points could be data complexity, financial<br />

influences, or a different underst<strong>and</strong>ing of how data exchange<br />

<strong>with</strong> business partners should take place. A complete test considers<br />

the examination of the correct transponder attachment, the<br />

communication between the transponder reader <strong>and</strong> the connected<br />

system, the data collection in the <strong>RF<strong>ID</strong></strong> system, <strong>and</strong> the data check.<br />

The exchanged data going back <strong>and</strong> forth between the participating<br />

systems, data exchange <strong>with</strong> auxiliary systems, <strong>and</strong> <strong>with</strong> trading partners<br />

must also be reviewed. Furthermore, the work flows between<br />

these systems should follow the entire process, from the start onwards<br />

to the consumption of the data or product. The interfaces must<br />

permit seamless integration between all the systems. The data flow<br />

must follow all the processes, <strong>and</strong> the corresponding data must correspond<br />

in every phase.<br />

8.3 Roll-out<br />

If the transparency regarding the economic benefit <strong>and</strong> effects on the<br />

processes are established, the tests are successfully completed <strong>and</strong> if<br />

a decision on the application of an area-wide <strong>RF<strong>ID</strong></strong> solution has been<br />

made, then the final step takes the form of the roll-out. The following<br />

partial steps must be taken <strong>with</strong> all the partners involved:<br />

110


• System integration for the existing IT <strong>and</strong> customer process<br />

l<strong>and</strong>scape<br />

• Process Reengineering<br />

8.3 Roll-out<br />

• If required, involvement of further public entities or production/<br />

logistics units (global roll-out)<br />

• Development of a maintenance concept <strong>and</strong> support<br />

• Employee training<br />

A key element in every implementation is the integration of existing<br />

systems as well as existing ERP or WMS installations. Let us not forget<br />

that a further level is added to the system administration <strong>with</strong> regard<br />

to data management, hardware allocation, utilization of the <strong>RF<strong>ID</strong></strong><br />

middleware, <strong>and</strong> the infrastructure behind the new level (e.g. new<br />

servers, which need to be connected to the domain). Integration requires<br />

new interfaces that have to cooperate <strong>with</strong> all the systems. At<br />

this point it becomes clear whether all the marginal conditions in the<br />

planning, design, <strong>and</strong> selection have been thoroughly checked <strong>and</strong><br />

considered.<br />

As from a certain capacity, especially during the observation of the<br />

entire supply chain, a final consideration should be given to whether<br />

the operation of the complete <strong>RF<strong>ID</strong></strong> system can also be outsourced to<br />

a service provider.<br />

What also has to be considered<br />

A final word on a topic that is often forgotten during the introduction<br />

of a new technology or new processes: the employees. The employees<br />

need to be promptly, plausibly, <strong>and</strong> positively informed about required<br />

organizational changes due to adjusted or new processes. The<br />

clarification of benefits <strong>and</strong> possible hazards should be conducted<br />

openly. The installed processes must be lived according to the specified<br />

marginal conditions, as the expected ROI may otherwise not be<br />

realized. An important part of the introduction strategy is the creation<br />

of a data protection guideline between all involved partners.<br />

Experience shows that the installation of an <strong>RF<strong>ID</strong></strong> system also requires<br />

extensive adjustment work <strong>and</strong> often a substantial amount of explanatory<br />

support. Larger investments are required in most cases, whether<br />

for technology or the required infrastructure (software, hardware,<br />

<strong>and</strong> others). <strong>RF<strong>ID</strong></strong> will not become a product that the end customer<br />

111


8 Introduction to the practical application of <strong>RF<strong>ID</strong></strong><br />

can buy over the counter, <strong>and</strong> not even in the near future. <strong>RF<strong>ID</strong></strong> introduction<br />

is too costly for that <strong>and</strong> also too dem<strong>and</strong>ing due to the “contact”<br />

<strong>with</strong> critical business processes.<br />

112


Part 3<br />

Current Applications –<br />

from the Factory<br />

to the Hospital


9 Manufacturing control<br />

Markus Weinlaender<br />

“You can have it in any color as long as it’s black”: this quotation, ascribed<br />

to the US entrepreneur Henry Ford on his famous “Model T”,<br />

marks an important element of industrial production. The highest<br />

possible quantity of preferably similar parts was thought to be the<br />

key to cost optimization <strong>and</strong> the achievement of degression effects. At<br />

Ford, the unification of production was able to accelerate manufacture:<br />

additional paint lines or changeover times were not required<br />

<strong>and</strong> the color black dried the fastest.<br />

9.1 The dilemma of modern competition<br />

But times have changed. Customers of valuable products are no longer<br />

satisfied <strong>with</strong> a “one size fits all” version. In fact, there are a variety<br />

of versions from various manufacturers on the market. Providers<br />

must bring various versions of a product to the market themselves to<br />

address all the different customer groups. Car salespeople, for example,<br />

can select from a multitude of models; even a change in manufacturer<br />

is easily possible <strong>with</strong> the comparable technical maturity of the<br />

products. Market behavior has changed altogether: from a seller’s<br />

market – where the supplier dominated the market action <strong>and</strong> asserted<br />

their interests – to a buyer’s market, where the consumer is at the<br />

center of all the effort.<br />

At the same time, international competition has become dramatically<br />

more intense. Due to modern communication media such as the Internet,<br />

the market’s transparency has increased significantly: customers<br />

can gather extensive information on the services <strong>and</strong> prices of<br />

suppliers. The disappearance of trade barriers has promoted the export<br />

of goods. Finally, the Asian <strong>and</strong> Eastern European states have<br />

also caught up technologically: where only simple goods could once<br />

be purchased in these areas, today’s products are on par <strong>with</strong> those<br />

from Western industrial nations or even superior in some cases. The<br />

114


9.1 The dilemma of modern competition<br />

triumphal procession of the Japanese electronics industry is only one<br />

example that is also currently being repeated in China. This creates a<br />

dual challenge for Western companies: having to react quickly <strong>and</strong><br />

flexibly to ever stronger differentiating customer dem<strong>and</strong>s while<br />

maintaining or increasing competitiveness <strong>with</strong> regard to their own<br />

production costs.<br />

A possible solution approach is individualized serial products (mass<br />

customization). This entails products that on the one h<strong>and</strong> can be<br />

economically manufactured in industrial production (i.e. are not<br />

manufactory products) but which, on the other h<strong>and</strong>, provide sufficient<br />

variety options for the fulfillment of customer dem<strong>and</strong>s. If consistently<br />

pursued, a supply such as this changes a company’s entire<br />

value chain, from development to production to sales <strong>and</strong> marketing<br />

(Fig. 9.1). Therefore, the conception of new products requires the<br />

provision of sufficient configuration options involving basic modules<br />

or exchangeable production steps. Sales <strong>and</strong> Marketing must also be<br />

provided <strong>with</strong> the respective catalog <strong>and</strong> ordering systems. This concept<br />

denotes a special challenge for production in particular, as the<br />

classic “pre”-fabrication of serial <strong>and</strong> mass goods before the actual<br />

order is hardly imaginable for individual products.<br />

Offers such as these can be found in many sectors. The automotive<br />

industry plays a precursory role: there is hardly a supplier who does<br />

not provide their customers <strong>with</strong> a “configurator” on the Internet for<br />

individual adjustment to one’s dream car. It is not profitable for manufacturers<br />

to produce all the possible versions in advance – rather the<br />

vehicles are only produced after the receipt of the order (made-to-or-<br />

Development Sales Production Logistics<br />

� Modularization<br />

� Configuration<br />

options<br />

� Customized<br />

product structures<br />

� Communication<br />

of the configuration<br />

options<br />

� Configurators,<br />

interactive catalogs<br />

� Relationship<br />

management<br />

� Adaptive manufacturing<br />

processes<br />

� A high degree of<br />

flexibility<br />

� Comm<strong>and</strong> of the<br />

complexity<br />

� Flexible secondary<br />

processes, e.g.<br />

materials flow,<br />

purchasing<br />

� Individual delivery<br />

planning <strong>and</strong><br />

implementation<br />

� Information systems<br />

for transparent<br />

logistics chains<br />

Fig. 9.1<br />

Special requirements for the value chain for configurable serial products<br />

115


9 Manufacturing control<br />

der). The highlight: some manufacturers provide their customers<br />

<strong>with</strong> the option of changing fitting details just before the respective<br />

production step. This is made possible by efficient IT systems.<br />

The situation is similar <strong>with</strong> renowned computer manufacturers. On<br />

the one h<strong>and</strong>, they start a st<strong>and</strong>ard series that covers the mass requirements<br />

<strong>and</strong>, on the other h<strong>and</strong>, there are sufficient users who<br />

want to tailor their device to their own individual requirements themselves.<br />

This is another case where preproduction is not profitable due<br />

to the extensive version options <strong>and</strong> enormous capital commitment.<br />

For the IT sector, this denotes a further risk: if rarely dem<strong>and</strong>ed variations<br />

were stocked, this could cause price pressure on unsold devices<br />

due to rapid technical progress to where these would only be sellable<br />

at a loss.<br />

Other respective examples are rare in other sectors, such as the food<br />

industry. A few variations in taste <strong>and</strong> packaging size are typical for<br />

this industry’s range. However, individualized serial products are<br />

also on the rise. A prominent example is the young company<br />

“mymuesli.com”, located in Passau, Germany (Fig. 9.2). Customers<br />

can order their personal muesli mix on the startup’s website: according<br />

to the manufacturer’s information, more than 70 selectable ingredients<br />

in any r<strong>and</strong>om mixture lead to more than 566 quadrillion<br />

product variations. Customers can reorder <strong>and</strong> exchange their recipes<br />

among each other <strong>with</strong> the use of “Mix-<strong>ID</strong>”, a unique identifica-<br />

Fig. 9.2 MyMuesli.com produces around 566 quadrillion product variations<br />

116


9.2 The production of individualized serial products<br />

tion for every mixture. In comparison: a typical supermarket will<br />

barely stock 20 different muesli varieties.<br />

9.2 The production of individualized serial products<br />

If a company dares to move from st<strong>and</strong>ardized to individualized serial<br />

products, it is faced <strong>with</strong> an extensive transformation process,<br />

which entails all the departments of the company. The individualization<br />

of the range will increase the complexity of all the processes considerably;<br />

at the same time, the cost position <strong>and</strong> delivery options<br />

(time, location) must remain competitive.<br />

This transformation process concerns, in particular, development<br />

<strong>and</strong> production. The development division, which is hitherto aligned<br />

<strong>with</strong> as cost efficient producibility as possible while adhering to dem<strong>and</strong>ed<br />

target prices <strong>and</strong> quality, must now also achieve the objective<br />

of individuality. For cost <strong>and</strong> time reasons, the option of the complete<br />

development of all orderable variations can be discarded. Development<br />

must rather revert to st<strong>and</strong>ardized modules, which enable<br />

adaption through parameterization or a different combination of<br />

modules. Certain adaptation steps are then only performed in production,<br />

that is, after an order receipt.<br />

There are many measures in production that enable the cost efficient<br />

manufacture of individualized serial products. Suitable manufacturing<br />

technologies <strong>and</strong> machinery can be applied, which enable adaptation<br />

to every single workpiece. One example are CNC supported processing<br />

machines, which enable the fully automatic processing of individual<br />

pieces if accordingly integrated into the IT control systems<br />

<strong>and</strong> interlinked in the production flow.<br />

A second option is provided by the order related assembly of individual<br />

products. The assembly process, for example of a customer specifically<br />

manufactured computer, is basically similar to all other computers.<br />

However, the installation of various components creates very<br />

special products, depending on the order (e.g. varying memory expansion,<br />

graphics cards, or preinstalled software packages). Order related<br />

material flow control is also required here, which takes the individually<br />

required product to the assembly section at the right time.<br />

However, the reliable operation of such a factory, an assembly <strong>with</strong> a<br />

reduced susceptibility to failure, requires new control concepts. Such<br />

an operation no longer involves rigid machinery but rather a living<br />

117


9 Manufacturing control<br />

organism. Meanwhile, the realization is that the decentralization of<br />

planning <strong>and</strong> control in turn shows that a significant strategy is taking<br />

hold. Decentralization means that decisions are made on as low<br />

an automation hierarchy level as possible, i.e. “on site”. Ideally the<br />

workpiece will bring all the information along to its processing <strong>with</strong>out<br />

requiring central units for individual control purposes. Finally,<br />

this concept leads to autonomous manufacturing cells, which can<br />

perform a certain production step independent from other units <strong>and</strong><br />

optimize themselves <strong>with</strong> their ability to learn.<br />

9.3 <strong>Auto</strong>nomous production systems <strong>with</strong> <strong>Auto</strong> <strong>ID</strong><br />

The use of flexible manufacturing stations undeniably requires the<br />

unique identification of the respective workpiece: after all, the machine<br />

must perform a program that is individualized for every workpiece.<br />

The theoretical possibility of using a computer to predict each<br />

good’s movement is hardly practically realizable: the risk of possible<br />

deviations is too high, <strong>and</strong> the data technical effort too complex.<br />

Various identification systems are being applied in practice. In the<br />

simplest of cases, the product is given a process slip to take along,<br />

which contains a record of the manufacturing program. The employees<br />

will then set the machinery to the respective product. Obviously<br />

this method is not particularly mature. Apart from time consuming<br />

processing, a further problem is the high error risk. Incorrect input<br />

or wrong machine settings can lead to considerable costs <strong>and</strong> delays.<br />

<strong>Auto</strong>matic identification systems should, therefore, be preferred. Although<br />

a process slip can also be used in this case, the product will<br />

only be identified via the barcode. The relevant data are called up<br />

from a database based on the read identification number. The advantage<br />

is in the prevention of input errors. A production order is created<br />

in the database at the production start. The identification number is<br />

printed on the process slip, which takes the product through production.<br />

The identification number is read out at every station <strong>and</strong> the<br />

machine set according to the specifications in the IT systems. However,<br />

this organization is also not efficient as the process slips are recorded<br />

manually, although this does seem completely sufficient for<br />

some goods that still require a large number of manual process steps,<br />

for example the assembly of personal computers, which cannot be<br />

fully automated.<br />

118


9.3 <strong>Auto</strong>nomous production systems <strong>with</strong> <strong>Auto</strong> <strong>ID</strong><br />

If the automated processing of the product is feasible, its identification<br />

should also take place automatically. 2D codes <strong>and</strong> the respective<br />

camera systems should be selected. In contrast to barcodes, the 2D<br />

codes can also be attached to the workpiece itself, for example <strong>with</strong> a<br />

laser (Chapter 3). This not only permits identification in production<br />

but also during the entire life cycle – an important element for product<br />

tracking (Chapter 12). This is realized by connecting the code<br />

readers directly to the programmable logic controllers, which monitor<br />

the production flow (compare Fig. 9.3). If a workpiece is routed via<br />

suitable transport technology, the reader will initially recognize the<br />

coding <strong>and</strong> provides the PLC <strong>with</strong> the read number. This in turn sends<br />

the number of the IT system in the background <strong>and</strong> receives the information<br />

on the manufacturing program of this workpiece. Then, it<br />

sends a response to the database to note the changed workpiece status.<br />

Manual processing of the workpiece is also possible, for example<br />

<strong>with</strong> a r<strong>and</strong>om detailed inspection. In this case a h<strong>and</strong>held reading<br />

device can be used to record the 2D code at the testing station <strong>and</strong> to<br />

call up a test program.<br />

Production control<br />

(MES)<br />

<strong>Auto</strong>mation<br />

(Simatic S7)<br />

Sensor level<br />

(code reader)<br />

Physical<br />

processing<br />

Cell A Cell B<br />

Workpieces <strong>with</strong> 2D coding<br />

Production<br />

flow<br />

Fig. 9.3 Order control <strong>with</strong> 2D code identification. Every workpiece is<br />

identified <strong>with</strong> a 2D code; the processing program is queried at every line<br />

at the production control level.<br />

119


9 Manufacturing control<br />

Fig. 9.4 Under rough environmental conditions (e.g. car painting),<br />

<strong>RF<strong>ID</strong></strong> provides considerable advantages to visual systems (Photo: Duerr AG)<br />

<strong>RF<strong>ID</strong></strong> systems could replace 2D codes as an alternative. The radio technology<br />

is insensitive to dirt of any kind. This makes it interesting for<br />

applications for which rough environmental conditions are unavoidable.<br />

One example would be paint robots <strong>and</strong> dips as they are applied<br />

in automobile manufacture (Fig. 9.4). If the chassis is treated <strong>with</strong> atomized<br />

spray or color dipped, visual codes can no longer be recognized.<br />

An <strong>RF<strong>ID</strong></strong> transponder on the other h<strong>and</strong> will also function if<br />

they are covered in paint. The respective casing can provide heat resistant<br />

packaging for the transponders, which also allows their use in<br />

baking ovens after painting. In this way the transponder can accompany<br />

the chassis nearly through the entire production process.<br />

Observation of the required IT architecture, however, displays a problem<br />

in this concept. Every query of the identity number requires access<br />

to the central database system. This requires a high degree of<br />

availability <strong>with</strong> respective complexity. Finally, a large number of accesses<br />

per second must be performed at maximum speed. The time<br />

period required for the provision of data passes unused for the actual<br />

production step. The logical development, therefore, is in decentralizing<br />

the data in order to achieve autonomous stations from a data<br />

technical point of view.<br />

120


9.4 Decentralizing production data <strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

9.4 Decentralizing production data <strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

Apart from insensitivity to environmental influence, a second advantage<br />

of <strong>RF<strong>ID</strong></strong> as opposed to visual codes is the possibility of rewriting<br />

the data carriers: once printed, a 2D code cannot be changed. Together<br />

<strong>with</strong> the high memory capacity of <strong>RF<strong>ID</strong></strong> transponders (up to 32<br />

Kbytes), remote automation architectures can be realized, which<br />

clearly reduce the effort for local data maintenance.<br />

The concept (Fig. 9.5): An <strong>RF<strong>ID</strong></strong> transponder <strong>with</strong> a large memory is<br />

attached to each workpiece (or at the workpiece carrier) <strong>and</strong> stores all<br />

the required production data such as material list, production instructions,<br />

testing specifications, etc. These data are queried from the<br />

production control system at the start of a production line <strong>and</strong> programmed<br />

on the transponder. PLC controllers at the individual manufacturing<br />

stations read these data directly from <strong>RF<strong>ID</strong></strong> readers <strong>and</strong><br />

use them to control the production step. Ideally the background systems<br />

need not be queried. After the production step is completed, the<br />

PLC can store the status <strong>and</strong> quality data on the <strong>RF<strong>ID</strong></strong> transponder before<br />

it is transported to the next station <strong>with</strong> the workpiece.<br />

Such a concept provides considerable advantages: the individual stations<br />

can perform their manufacturing step autonomously. Central<br />

Production control<br />

(MES)<br />

<strong>Auto</strong>mation<br />

(Simatic S7)<br />

Sensor level<br />

(<strong>RF<strong>ID</strong></strong> reader)<br />

Physical<br />

processing<br />

Initiali-<br />

zation<br />

Fig. 9.5 Remote production control <strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

Cell A Cell B<br />

Workpieces <strong>with</strong> an <strong>RF<strong>ID</strong></strong> transponder<br />

Production<br />

flow<br />

121


9 Manufacturing control<br />

planning <strong>and</strong> control is only required at the start of the manufacturing<br />

line, when the transponders are initialized. The complexity in the<br />

automation systems <strong>and</strong> in the engineering of such factors, therefore,<br />

decreases. Reducing complexity is equivalent to decreasing the<br />

susceptibility to failure for the entire plant. Small production modules<br />

are created instead of a monolithically organized block, <strong>and</strong> can<br />

be easily operated, maintained, optimized, or exchanged.<br />

9.5 Technical requirements<br />

Special requirements must be fulfilled when selecting <strong>RF<strong>ID</strong></strong> systems<br />

for remote production control: Separation of reading events, range<br />

limitation, high memory capacity, <strong>and</strong> special integration into the automation<br />

l<strong>and</strong>scape.<br />

One of the main differences between systems for production control<br />

<strong>and</strong> those for logistics applications is the imperative necessity of separation.<br />

While a gate application requires the simultaneous recording<br />

of many transponders, e.g. during goods receipt, <strong>and</strong> thereby providing<br />

an advantage over other technologies, in production it is more a<br />

matter of really only recording a single transponder – namely the one<br />

currently attached to the workpiece in the machine. Overshooting<br />

<strong>and</strong> reflections are poison for these applications.<br />

Finally yet importantly, the rule “as far as necessary but as close as<br />

possible” also applies to this requirement for the system range (maximum<br />

distance from the antennas to the <strong>RF<strong>ID</strong></strong> transponders). For example,<br />

it is possible to apply <strong>RF<strong>ID</strong></strong> systems <strong>with</strong> a range of only a few<br />

centimeters for track-guided conveyor routes. This excludes the possibility<br />

of reading the next workpiece on the belt. If it is impossible to<br />

move the antennas so close to the transponders (e.g. during final automobile<br />

assembly), the <strong>RF<strong>ID</strong></strong> systems have to feature certain constructive<br />

characteristics for active range limitation – a simple reduction<br />

of transmission efficiency is insufficient due to the possible reflections.<br />

In order to read the transponder only <strong>and</strong> immediately in<br />

front of the reader antenna despite overshooting <strong>and</strong> reflection, the<br />

industrial system Moby U by Siemens has realized elaborate signal<br />

run-time measurement (RSSI) (Chapter 2).<br />

A further difference between Production <strong>and</strong> Logistics is displayed in<br />

the required memory capacity of <strong>RF<strong>ID</strong></strong> transponders. As a complete<br />

production program is to be stored on the transponder in Production,<br />

122


9.6 Is <strong>RF<strong>ID</strong></strong> worthwhile in Production?<br />

chips <strong>with</strong> 2 to 32 Kbytes have to be used here. Users in Logistics –<br />

especially in the EPCglobal environment – are content <strong>with</strong> a mere 96<br />

bit. As high a reading speed as possible is required at the same time.<br />

Fast reading of the information remains a critical parameter, even if<br />

access is accelerated by expedient memory management on the chip<br />

(for example, if only fixed defined parts are read at a station instead<br />

of the entire memory).<br />

Finally, the <strong>RF<strong>ID</strong></strong> systems in Production are integrated in completely<br />

different ways. While the logistics applications could commence<br />

from an IT environment, the memory programmed controls such as<br />

Simatic S7 dominate the field in the production environment. The<br />

<strong>RF<strong>ID</strong></strong> reading devices have to be integrated into these controls so<br />

seamlessly that the S7 programmer can easily access the <strong>RF<strong>ID</strong></strong> data<br />

via completed components.<br />

9.6 Is <strong>RF<strong>ID</strong></strong> worthwhile in Production?<br />

The use of automatic identification in Manufacturing is an integral<br />

part of a comprehensive production concept. It is, therefore, difficult<br />

to measure the actual <strong>RF<strong>ID</strong></strong>/<strong>Auto</strong> <strong>ID</strong> ratio at such a solution in commercial<br />

key figures.<br />

However, if the decision has been made in favor of architecture <strong>with</strong><br />

autonomous elements, there is still a decision between <strong>RF<strong>ID</strong></strong> <strong>and</strong> visual<br />

codes. There is a difference in the various costs for the infrastructure<br />

(especially reading devices). Furthermore, the transponder costs<br />

are significant: although the visual code also has to be purchased,<br />

this expense is negligible when compared to the costs for the <strong>RF<strong>ID</strong></strong><br />

transponders. On the other h<strong>and</strong>, higher failure rates due to dirt may<br />

have to be calculated for visual systems. An example – based on Sirius<br />

production at the Amberg electronics production plant of Siemens AG<br />

– clarifies when an <strong>RF<strong>ID</strong></strong> application is worthwhile (ref. method compare<br />

Chapter 7).<br />

Siemens produces switching devices of the “Sirius” family at its plant<br />

in Amberg, Germany. Numerous parameters result in a large number<br />

of possible combinations: alone the smallest switch size “S00” is<br />

available in 1,500 possible versions. Siemens further provides a 24hour<br />

delivery guarantee for these devices. The designers of the Amberg<br />

production line have, therefore, realized a “Just-in-Time” production,<br />

in which the switching devices are produced in the exactly<br />

123


9 Manufacturing control<br />

required quantities after order receipt. Even so, the plant is fully automated,<br />

<strong>and</strong> thereby provides consistently high quality at comparatively<br />

low costs. In this case, the key is <strong>RF<strong>ID</strong></strong> technology.<br />

The production line is divided into 60 processing stations, each of<br />

which can perform one production step for the various versions: e.g.<br />

assembly of the coil bodies or attachment of the lid plate. The devices<br />

are assembled on a plastic workpiece carrier, which the transport<br />

system routes through the entire production. <strong>RF<strong>ID</strong></strong> “tells” the processing<br />

stations what to do: the workpiece carrier contains an integrated<br />

<strong>RF<strong>ID</strong></strong> chip that bears all the manufacturing instructions <strong>and</strong><br />

complete parts list. This knowledge is programmed to every transponder<br />

at the start of production. Every station has an <strong>RF<strong>ID</strong></strong> reader<br />

that reads the data from the transponder <strong>and</strong> makes them directly<br />

available for the Simatic control technology (Fig. 9.6). As an <strong>RF<strong>ID</strong></strong> system,<br />

Moby I by Siemens is applied <strong>with</strong> a memory capacity of 8 Kbyte<br />

per transponder. The result is a highly flexible production line that<br />

could even theoretically produce individual pieces.<br />

The application of visual identification systems <strong>and</strong> a respective database<br />

in the background were considered as an alternative. A solution<br />

such as this would have been less expensive for a first investment.<br />

However, the running costs make <strong>RF<strong>ID</strong></strong> more economical. For one, the<br />

system specific disadvantages of visual codes lead to a higher failure<br />

Fig. 9.6 <strong>RF<strong>ID</strong></strong> supported production of Sirius switching devices at the Siemens<br />

plant in Amberg<br />

124


9.6 Is <strong>RF<strong>ID</strong></strong> worthwhile in Production?<br />

probability, e.g. caused by dirt on camera lenses or the codes themselves.<br />

This reduces the line’s maximum utilization limit, while the IT<br />

systems cost more not only in their acquisition but also in their operation.<br />

As each production station initially queries the processing step<br />

to be performed, the IT systems must provide the required information<br />

in real-time <strong>and</strong> <strong>with</strong> the highest degree of availability, which<br />

also involves solving problems such as the versioning of a type in an<br />

ongoing operation. Although this is possible, it is more expensive<br />

than the use of <strong>RF<strong>ID</strong></strong> in the long run. Production experts at Siemens<br />

have established that an investment into <strong>RF<strong>ID</strong></strong> pays off in less than<br />

two years.<br />

125


10 Production logistics<br />

Heinz-Peter Peters<br />

Having the right material at the right time at the right location is the<br />

fundamental task of logistics <strong>and</strong> is an important prerequisite for the<br />

economic success of industrial companies.<br />

10.1 Logistics <strong>and</strong> corporate success<br />

But what is logistics? The definition of the Bundesvereinigung Logistik<br />

(BVL) [Confederation of German Employers] is: “Logistics entail<br />

the holistic planning, control, coordination, implementation, <strong>and</strong><br />

monitoring of all the intra-corporate <strong>and</strong> cross-corporate flows of information<br />

<strong>and</strong> goods from companies <strong>and</strong> supply chains <strong>with</strong> decisive<br />

influence on corporate success”. Referring to intra-corporate logistics<br />

in manufacturing companies, this leads to the subdivision of<br />

production logistics. Their task is the planning, controlling, <strong>and</strong><br />

monitoring of the material flow from the receipt of goods across the<br />

Fig. 10.1 Material <strong>and</strong> information flow in Logistics<br />

126<br />

Procurement<br />

market<br />

Requirements<br />

planning<br />

Logistics<br />

Production<br />

planning<br />

Packaging Storage<br />

H<strong>and</strong>ling<br />

Picking<br />

Materials flow<br />

Information flow<br />

Sales<br />

planning<br />

Transporting<br />

Sales market<br />

Procurement<br />

Production<br />

Distribution<br />

Suppliers logistics<br />

logistics<br />

logistics<br />

Customer


10.2 <strong>Processes</strong> in production logistics<br />

entire production process to shipping as well as – at a superimposed<br />

level – the creation of a logistics compatible optimal material flow<br />

control.<br />

Therefore, the physical transport of materials <strong>and</strong> goods, i.e. concrete<br />

packaging, storage, picking, <strong>and</strong> transporting is assigned to logistics.<br />

Production logistics also includes the application of modern information<br />

<strong>and</strong> communication technologies for the support of work processes,<br />

e.g. electronic tracking of material on its way from goods receipt<br />

to processing to shipping (Fig. 10.1). The challenge is to directly<br />

interlink the material flow <strong>with</strong> the information flow, <strong>and</strong> thereby<br />

supplying the transported material <strong>with</strong> the information. The following<br />

sections describe a solution for this task through the application<br />

of <strong>RF<strong>ID</strong></strong> technology.<br />

10.2 <strong>Processes</strong> in production logistics<br />

The identical requirements for companies are low stocks of raw material,<br />

semi-finished <strong>and</strong> finished products, short throughput times,<br />

<strong>and</strong> flexible production processes while maintaining high quality. At<br />

the same time, the customers dem<strong>and</strong> individualized products, i.e.<br />

the ability to provide batch size (small quantities) is dem<strong>and</strong>ed in<br />

production (see Chapter 9). Rapid processing of orders equals the<br />

means for rapid production processes <strong>and</strong> these require an efficient<br />

material flow between incoming <strong>and</strong> outgoing goods. In the division<br />

of production logistics, this affects the production itself as well as<br />

production associated logistics processes incoming <strong>and</strong> outgoing<br />

goods, transport, h<strong>and</strong>ling, picking, <strong>and</strong> storage (Fig. 10.2).<br />

Goods<br />

entry<br />

Transport<br />

Warehousing<br />

H<strong>and</strong>ling Production<br />

Conveyor /<br />

Ware-<br />

Machine Ware- Carton for<br />

Trucks Forklift<br />

crane or<br />

Trucks<br />

house<br />

assembly house packaging<br />

similar<br />

Fig. 10.2 Production associated logistics processes<br />

Warehousing<br />

Consignment<br />

sales<br />

Goods<br />

shipments<br />

These days, production logistics is often marked by manual processes<br />

such as manual input <strong>and</strong> information <strong>and</strong> communication systems<br />

<strong>with</strong> local data maintenance. The delivered goods are manually recorded<br />

at goods receipt <strong>and</strong> transported to a storage facility or a pro-<br />

127


10 Production logistics<br />

cessing station by warehouse staff. Processing is started manually<br />

<strong>and</strong> the results are documented by h<strong>and</strong>. These processes are work<br />

<strong>and</strong> time intense, in which errors occur frequently, <strong>and</strong> last but not<br />

least they cause high costs due to work effort <strong>and</strong> error removal. Although<br />

the use of barcodes for data recording greatly reduces the<br />

number of errors, the work effort remains the same, as identification<br />

still has to be performed manually. Furthermore, central data maintenance<br />

requires complex networks, which are heavily burdened by<br />

permanent communication. The failure of the process computer or<br />

the network leads to a complete production st<strong>and</strong>still.<br />

An improvement of the situation is only possible through organizational<br />

measures created by logistics compatible strategies <strong>and</strong> structures.<br />

We differentiate between dem<strong>and</strong>-controlled logistics strategies,<br />

e.g. Just-in-sequence/Just-in-time (material is accurately provided<br />

according to sequence) or consumption-controlled logistics strategies,<br />

e.g. Kanban (a dem<strong>and</strong> impulse is linked to a container <strong>and</strong><br />

triggers provision). The implementation of these solutions leads to<br />

process improvements <strong>and</strong> has already ensured a reduction in the<br />

throughput times <strong>and</strong> stocks. Large potential, however, is left for sustainable<br />

material flow optimization through <strong>RF<strong>ID</strong></strong>-based solutions.<br />

10.3 <strong>RF<strong>ID</strong></strong> in production logistics<br />

The physical material flow of raw materials, components, partial systems,<br />

or finished products in production logistics is always offset by a<br />

respective information flow. The current information on the order, as<br />

well as the condition <strong>and</strong> quality of the individual object must be as<br />

promptly available as much as possible. Efficient material flow control,<br />

therefore, requires the extensive transparency of the working<br />

process in the production related logistics of material <strong>and</strong> data. <strong>RF<strong>ID</strong></strong><br />

technology enables moved objects to be supplied <strong>with</strong> information<br />

<strong>and</strong> to link the material flow directly to the information flow.<br />

The use of <strong>RF<strong>ID</strong></strong> transponders on transport aids such as boxes, pallets,<br />

<strong>and</strong> pallet cages or on the material itself enables the real-time recording<br />

of information during transport, whereby the <strong>RF<strong>ID</strong></strong> transponders<br />

assume the identification of the objects as well as the remote <strong>and</strong> mobile<br />

data storage of further information such as order data, process,<br />

<strong>and</strong> quality data. The expected area-wide application of <strong>RF<strong>ID</strong></strong> in the<br />

cross-corporate information <strong>and</strong> material flows <strong>and</strong> supply chains<br />

will also lead to optimum <strong>and</strong> efficient production logistics. The <strong>RF<strong>ID</strong></strong><br />

128


10.3 <strong>RF<strong>ID</strong></strong> in production logistics<br />

supported logistics processes would go beyond the internal production<br />

plant <strong>and</strong> involve suppliers <strong>and</strong> customers. Together <strong>with</strong> the<br />

transport, the goods equipped <strong>with</strong> <strong>RF<strong>ID</strong></strong> transponders are automatically<br />

recorded during unloading from the truck. The information is<br />

reconciled <strong>with</strong> the orders <strong>and</strong> the supplier’s delivery note. Erroneous<br />

or incomplete deliveries are recognized immediately. The internal<br />

transport information is then stored in the <strong>RF<strong>ID</strong></strong> transponders.<br />

The inward stock movement is automatically read at the storage<br />

points. The parts are rerecorded at stock removal <strong>and</strong> specified <strong>with</strong><br />

transport information. The associated booking of goods takes place<br />

automatically.<br />

In the simplest of cases, the current delivery data are automatically<br />

recorded at the good’s dispatch during the loading of the truck <strong>and</strong><br />

transferred to the customer in the form of delivery notes. Booking in<br />

the merch<strong>and</strong>ise management system also takes place simultaneously.<br />

The typical tasks in shipment processing for the consolidation of<br />

customer orders or the distribution of bulk orders are further optimized<br />

by <strong>RF<strong>ID</strong></strong>.<br />

The remote data maintenance poses fewer requirements on the information.<br />

The communication <strong>and</strong> networks are relieves of these requirements.<br />

This is achieved through local storage of target <strong>and</strong> routing<br />

information on the <strong>RF<strong>ID</strong></strong> transponders attached to the commodity<br />

or transporting aids. The goods can, therefore, communicate <strong>with</strong> the<br />

transport technology <strong>and</strong> navigate through systems by themselves.<br />

All of the route decisions are made directly at control level based on<br />

the locally available data: not the control system but rather the transport<br />

means decide on the route in cooperation <strong>with</strong> the goods <strong>and</strong><br />

transporting aids.<br />

The situation can also be further improved in the already mentioned<br />

logistics strategies. The just-in-time strategy (JIT) requires close coordination<br />

between the supplier <strong>and</strong> manufacturer. The material order<br />

is determined by the production sequence, but the associated material<br />

request follows at very short notice <strong>with</strong>in the hour. Wrong deliveries<br />

would lead to a production st<strong>and</strong>still. <strong>RF<strong>ID</strong></strong> enables the largest possible<br />

information technical integration of all those involved. Decisions<br />

can be made quickly <strong>and</strong> immediately on-site. For the realization,<br />

<strong>RF<strong>ID</strong></strong> transponders are attached to a transporting aid <strong>and</strong> are<br />

written <strong>with</strong> the transport, production, <strong>and</strong> quality data. The respectively<br />

relevant data are read out during transport along the decision<br />

points. Interception into the material flow is possible to the end.<br />

129


10 Production logistics<br />

Fig. 10.3 Example of a Kanban monitoring board: the board’s equipment<br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong> (left) provides a fully automated display in the automation<br />

<strong>and</strong> IT systems (right), <strong>with</strong>out the established work process having<br />

to be changed.<br />

During Kanban-oriented provision, the customer or consumer always<br />

decides what is to be produced (Push or Pull Principle). Basic Kanban<br />

elements are: only the material actually consumed is produced <strong>and</strong><br />

only to the consumed volume; delivery is firmly defined <strong>and</strong> the<br />

goods are always in fault-free condition. In this case a wrong delivery<br />

would also lead to production st<strong>and</strong>still. For more recent Kanban solutions,<br />

the containers or the Kanban cards are provided <strong>with</strong> an <strong>RF<strong>ID</strong></strong><br />

transponder. The transponders or cards uniquely identify the container’s<br />

contents. Once a container is empty, its card is inserted into a<br />

monitoring board <strong>with</strong> an integrated <strong>RF<strong>ID</strong></strong> antenna (Fig. 10.3). The<br />

data are automatically read <strong>and</strong> transferred to production logistics<br />

control. Then, operator-independent <strong>and</strong> expeditious replenishment<br />

control takes place.<br />

10.4 Application examples<br />

As <strong>RF<strong>ID</strong></strong> has already been applied in production control for more than<br />

20 years (Chapter 9), the most obvious step was to extend its use to<br />

production related logistics. A few realized projects from various sectors<br />

<strong>and</strong> applications are described below.<br />

10.4.1 <strong>Auto</strong>matic order consolidation increases efficiency<br />

Even if this example stems from distributions logistics, it displays the<br />

benefit of remote data maintenance very clearly. At the mail order<br />

130


10.4 Application examples<br />

company Quelle in Leipzig, all logistical tasks, from goods receipt<br />

<strong>and</strong> storage to picking, packing <strong>and</strong> dispatch are processed at one distribution<br />

center. The high number of customer orders, daily peaks of<br />

180,000 from a range of 160,000 articles, requires flexible, fast, <strong>and</strong><br />

reliably functioning logistics systems. The answer is the remote control<br />

of complex material flows from picking to a multi-level sorting<br />

system to dispatch <strong>with</strong> the help of <strong>RF<strong>ID</strong></strong> technology. Every picking<br />

container has an <strong>RF<strong>ID</strong></strong> transponder <strong>with</strong> the container identification,<br />

customer order, <strong>and</strong> additional routing information stored on it. This<br />

information is used on-site directly in the programmable logic controllers<br />

(PLCs) for route decision purposes. It is here that the <strong>RF<strong>ID</strong></strong><br />

system has led to an efficient <strong>and</strong> flexible solution.<br />

10.4.2 <strong>RF<strong>ID</strong></strong> optimizes picking for assembly provision<br />

This example describes the batch size in production. At the hardware<br />

manufacturer Maxdata, PC systems are produced according to customer<br />

orders; the completed systems are not stored. The production<br />

processes must, therefore, take place particularly quickly <strong>and</strong> reliably.<br />

For this reason, the components <strong>and</strong> partial systems are picked<br />

in a production warehouse acc. to orders <strong>and</strong> the completed systems<br />

are assembled, tested, <strong>and</strong> shipped in assembly. The picking containers<br />

were already equipped <strong>with</strong> <strong>RF<strong>ID</strong></strong> transponders, which are also<br />

used for material flow control in picking. The serial number is stored<br />

in the <strong>RF<strong>ID</strong></strong> transponder <strong>and</strong> therefore the picking container is linked<br />

to the order. Goods are moved out <strong>and</strong> also past so-called “stations”,<br />

which are set up for the picking areas. This means that containers can<br />

overtake each other to avoid congestion. The transponder is read at<br />

every out-station <strong>and</strong> an on-site control decides whether the goods<br />

are to be moved in or out.<br />

10.4.3 Transparent processes in reusable transport trusses<br />

<strong>RF<strong>ID</strong></strong> also works reliably under extreme environmental conditions.<br />

The Tnuva association in Israel wanted a reliable identification solution<br />

for goods tracking in the food industry. For hygienic reasons,<br />

plastic pallets <strong>with</strong> integrated <strong>RF<strong>ID</strong></strong> transponders were used as reusable<br />

transport trusses. The finished goods (e.g. yogurt) went through<br />

various process steps such as heat storage, cooling tunnels, quality<br />

control, <strong>and</strong> storage in a cooling warehouse <strong>with</strong> 4° C. The transponders<br />

are read in dispatch for the administration of the reusable pallets.<br />

On the one h<strong>and</strong>, the <strong>RF<strong>ID</strong></strong> system supports the material flow in<br />

131


10 Production logistics<br />

production <strong>and</strong> storage. On the other h<strong>and</strong>, this permits the easy realization<br />

of product tracking to the end customer.<br />

10.4.4 Replenishment is ensured<br />

This example displays cross-corporate cooperation to ensure the production<br />

supply of raw materials. Here, <strong>RF<strong>ID</strong></strong> enables a consumer-oriented<br />

logistics strategy in the sense of Vendor Managed Inventory<br />

(VMI).<br />

Finsa, Spain’s largest manufacturer of chipboard <strong>and</strong> fiberboard<br />

needed a solution for the Trans-European material supply of its<br />

twelve production plants. Together <strong>with</strong> DSM, the supplier of the raw<br />

material melamine, Orbit Logistics Europe GmbH denoted a specialist<br />

for global storage logistics <strong>and</strong> VMI. The realized solution is based on<br />

<strong>RF<strong>ID</strong></strong> technology for marking big bags as individual trusses. Unique<br />

identification via a specific number in the Electronic Product Code<br />

(EPC) allows for tracking back to the production batch. The commodity<br />

flows are automated through dynamic storage <strong>and</strong> monitoring<br />

<strong>and</strong> ensure reliable material supply. The on-site goods management<br />

system regularly reconciles inventory data <strong>with</strong> the Orbit logistics<br />

computer. The data are processed, the required orders are initiated,<br />

<strong>and</strong> the commodity flows are tracked in the Orbit computer center.<br />

This <strong>RF<strong>ID</strong></strong> application has led to significantly improved storage. Errors<br />

were reduced <strong>and</strong> costs were lowered.<br />

10.4.5 The matching seat for the right car<br />

The following example once more describes the close cooperation between<br />

the supplier <strong>and</strong> customer, <strong>and</strong> in this case the automotive industry.<br />

It is also an example of the requirement-oriented just-in-time<br />

logistics strategy (JIT).<br />

At Johnson Controls, a manufacturer of vehicle seat components <strong>and</strong><br />

systems, <strong>RF<strong>ID</strong></strong> technology has already been successfully applied at the<br />

plant in Bochum for many years (Fig. 10.4). Ideally there are two combined<br />

application options: automatic recording of internal processing<br />

data <strong>and</strong> the provision of delivery data at the customer’s goods<br />

receipt. As a solution, a specific transporting aid has been equipped<br />

<strong>with</strong> a transponder. The individual work stations have installed <strong>RF<strong>ID</strong></strong><br />

reading devices, which store all the production <strong>and</strong> quality data on<br />

the transponder. Once ordered by the customer, the seats in goods<br />

shipment are sorted in the right sequence for direct delivery to the<br />

132


10.5 Summary <strong>and</strong> forecast<br />

Fig. 10.4 Johnson Control uses <strong>RF<strong>ID</strong></strong> to control vehicle seat logistics.<br />

The <strong>RF<strong>ID</strong></strong> reader is directly integrated in the transport system (circle)<br />

(Photo: W. Geyer)<br />

assembly station at the automobile manufacturer. The delivery data<br />

are written on the tag <strong>and</strong> automatically adopted in the customer’s<br />

goods receipt. There are often only three hours between the order of<br />

a customer-specific seat <strong>and</strong> its installation in the car. Due to the application<br />

of <strong>RF<strong>ID</strong></strong>, the efficiency in production was able to be significantly<br />

optimized <strong>and</strong> the partnership <strong>with</strong> the customer was cemented.<br />

10.5 Summary <strong>and</strong> forecast<br />

The advantages <strong>and</strong> optimization potential due to the application of<br />

<strong>RF<strong>ID</strong></strong> in production logistics are obvious. A current survey by industrial<br />

analysts from the Aberdeen Group has revealed that due to the<br />

introduction of <strong>RF<strong>ID</strong></strong> technology, the best companies were able to reduce<br />

throughput times in production by 34 % <strong>and</strong> improve their delivery<br />

punctuality by 6 %. Furthermore, safety stocks were reduced by<br />

four days <strong>and</strong> changeover times by 8 % [1].<br />

A world in which all logistical objects are equipped <strong>with</strong> <strong>RF<strong>ID</strong></strong> transponders<br />

creates the basis for the “internet of things”. The next step<br />

is the modularization of mechanics in the material flow <strong>and</strong> the respective<br />

programming of the IT systems in the information flow. Con-<br />

133


10 Production logistics<br />

sistent decentralization has enabled decisions for new optimized<br />

routes of the respective material on-site. The self-organization of production-related<br />

logistics is accompanied by this: the material controls<br />

the system. However, this solution can only work based on the respective<br />

information carried on the <strong>RF<strong>ID</strong></strong> tags.<br />

The next consistent step on this basis would then be the area-wide<br />

introduction of <strong>RF<strong>ID</strong></strong> technology. This provides the opportunity for<br />

cross-corporate supply networks.<br />

References<br />

[1] Refer to various reports <strong>and</strong> market analysis by the Aberdeen Group,<br />

www.aberdeen.com, 2007<br />

134


11 Container <strong>and</strong> Asset Management<br />

Jens Dolenek<br />

Not only product quality <strong>and</strong> performance are decisive for corporate<br />

success in today’s global competitive environment but also the manner<br />

in which the products reach their destination. Highly detailed <strong>and</strong><br />

automated process <strong>and</strong> supply chains are required, thanks to which<br />

the products quickly, efficiently, <strong>and</strong> specifically reach the desired<br />

destination.<br />

Reusable transport units for the material flow are used in many business<br />

relations. These “Returnable Transport Items” (RTI) can therefore<br />

be used several times for the exchange of goods <strong>and</strong> commodities<br />

<strong>with</strong>in a logistical network. RTI <strong>and</strong> transported goods form a<br />

conclusive unit together <strong>with</strong> the assigned information. From the<br />

point of origin to their final destination, the transport units can pass<br />

through multi-tiered further processing <strong>and</strong> a complex supplier network<br />

that is created on this basis. In order to provide consistent data<br />

for the suppliers, sub-contractors, logistics service providers, <strong>and</strong><br />

end customers in such a network, it is necessary for each of these<br />

units to be uniquely identifiable. Multisite <strong>and</strong> cross-corporate st<strong>and</strong>ardization<br />

of data structures <strong>and</strong> the respective interfaces is required<br />

to enable the interpretation <strong>and</strong> further processing of the information<br />

of the RTI <strong>and</strong> the transported goods by all those concerned.<br />

This approach provides RTI transparency along the entire<br />

supply chain.<br />

11.1 Requirements for Container Management<br />

In the context of container management, the previously described<br />

RTIs are generally called “containers”. The reusable transport units<br />

can feature the following characteristics: pallets, glass bottles, barrels,<br />

individual workpiece carriers, wagons, containers, trolleys, boxes,<br />

folding boxes, <strong>and</strong> others (Fig. 11.1). The term “asset” expresses<br />

the commercial significance of the RTI while simultaneously exp<strong>and</strong>ing<br />

the view of assets such as tools or system parts.<br />

135


11 Container <strong>and</strong> Asset Management<br />

Fig. 11.1 Various forms of reusable transport items (RTI)<br />

11.1.1 Motivation<br />

The main objective of an asset management system is to use transport<br />

units or other assets as efficiently <strong>and</strong> economically as possible<br />

<strong>and</strong> – in case of specialization such as Container Management – to<br />

apply them in the specified transport <strong>and</strong> storage processes. This requires<br />

an accurate statement on the status of each individual transport<br />

unit. Targeted actions, which are required for the functioning of<br />

the complete process chain, can be derived from the overall observation.<br />

If, for example, the existing stock of load carriers is insufficient<br />

to h<strong>and</strong>le increased transport requirements, additional load carriers<br />

will have to be included in the process.<br />

Continuous availability of information allows for the control <strong>and</strong> optimization<br />

of a process chain under the aspects of cycle time, quality,<br />

quantity, <strong>and</strong> finally, the associated costs <strong>and</strong> investments. The connection<br />

of information flow <strong>and</strong> physical material flow also helps in<br />

136


11.1 Requirements for Container Management<br />

achieving increased process transparency, which can be used for performance<br />

increases <strong>and</strong> cost reduction purposes.<br />

11.1.2 Objectives<br />

This motivation for Container Management enables the derivation of<br />

objectives, which could be achieved <strong>with</strong> the application of the suitable<br />

technologies.<br />

The control of processes required extensive transparency. The required<br />

status information on every container in this respect can be<br />

summarized into the following categories:<br />

• container condition <strong>and</strong> application<br />

• movement data <strong>and</strong> times<br />

• general management <strong>and</strong> administration.<br />

Missing information on the container’s area of application, its current<br />

condition (“damaged”, “requires repair”, etc.) or the exact duration<br />

in which a container is in circulation, can lead to an information<br />

deficit <strong>with</strong>in the entire system. The completeness of the status information<br />

of every individual RTI <strong>and</strong> their immediate availability can<br />

thereby counteract such an information deficit.<br />

A further objective is the storage of important data directly at the<br />

physical unit (e.g. quality data on the container) in order to have this<br />

available in the process directly. The combination of distributed <strong>and</strong><br />

local data forms the basis for a data structure <strong>with</strong> immediate connection<br />

to the actual process. Due to the flexible programmability of tags<br />

in <strong>RF<strong>ID</strong></strong> technology <strong>and</strong> their consistency in rough environments, the<br />

requirement of data to be distributed directly on the object can be<br />

safely fulfilled.<br />

In contrast, conventional identity technologies such as barcodes <strong>and</strong><br />

Data Matrix Code do not provide any options for storing variable information<br />

directly on the physical unit.<br />

11.1.3 St<strong>and</strong>ardizing<br />

St<strong>and</strong>ards <strong>and</strong> common specifications are necessary to implement a<br />

reliable <strong>and</strong> steady flow of goods across sites <strong>and</strong> companies <strong>with</strong> a<br />

number of participants. If, for instance, one looks at the different<br />

types of packaging <strong>and</strong> transport of goods in a supply chain, it could<br />

137


11 Container <strong>and</strong> Asset Management<br />

be seen as a simplified form of architecture (Fig. 11.2), which can be<br />

sub-divided into different, defined layers.<br />

Layer 5<br />

Layer 4<br />

ISO 17363<br />

Freight Containers<br />

Layer 3<br />

ISO 17364<br />

RTI - Returnable<br />

Transport Items<br />

Layer 2<br />

ISO 17365<br />

Transport Units<br />

Layer 1<br />

ISO 17366<br />

Product Packaging<br />

Layer 0<br />

ISO 17367<br />

Product Tagging<br />

Fig. 11.2 Extract from the specifications <strong>with</strong> ISO-relevance in<br />

the supply chain (Source: ISO 17364; International Organization<br />

for St<strong>and</strong>ardization)<br />

Different requirements exist regarding materials h<strong>and</strong>ling <strong>and</strong> the<br />

data associated <strong>with</strong> that on each of the individual layers. For instance,<br />

on the item layer only product-specific data such as part numbers<br />

or serial references are of importance. On the other h<strong>and</strong>, on the<br />

transport unit layer super-imposed information such as package<br />

quantities <strong>and</strong> weight of the transport unit are of relevance.<br />

The supply chain layers are shown graphically in Fig. 11.2. Furthermore,<br />

this figure shows the ISO specifications in which the st<strong>and</strong>ards<br />

for the <strong>RF<strong>ID</strong></strong> technologies in the different layers are specified (ISO<br />

1736x). Layers 0 to 4 cover the applications of <strong>RF<strong>ID</strong></strong> technology <strong>with</strong>in<br />

the supply chain. The ISO specification 17364 – Supply Chain Applications<br />

of <strong>RF<strong>ID</strong></strong> – Returnable Transport Items (Layer 3) must be emphasized<br />

specifically in the context of re-usable transport units. As the<br />

figure shows, not all the layers need to be filled, depending on specific<br />

products <strong>and</strong> the processes associated <strong>with</strong> them. For instance,<br />

transport packaging (Layer 2) <strong>with</strong>out a re-usable transport palette<br />

(Layer 3) can be transported in a freight container (Layer 4).<br />

138<br />

Means of transport<br />

(e.g. truck, aircraft, ship)<br />

Container<br />

(e.g. overseas container)<br />

Transport<br />

unit<br />

Truss unit<br />

(e.g. pallet)<br />

Pkg Pkg Pkg<br />

Transport<br />

unit<br />

Item Item Item Item Item Item


11.1.4 Technical Specifications<br />

11.1 Requirements for Container Management<br />

The use of different <strong>RF<strong>ID</strong></strong> technologies in different layers is not defined<br />

uniquely in the specifications in most cases. Therefore, the use<br />

of a specific <strong>RF<strong>ID</strong></strong> frequency depending on the specific processes <strong>and</strong><br />

existing environmental conditions is not specified in ISO 17364. However,<br />

in various segment-specific <strong>and</strong> cross-industry recommendations<br />

the use of specific frequency b<strong>and</strong>s is recommended. For instance,<br />

in the VDA Recommendation 5501 (<strong>RF<strong>ID</strong></strong> in the container management<br />

of the supply chain/Association of the German <strong>Auto</strong>motive<br />

Industry) the use of UHF is recommended because the performance<br />

of this technology can best cope <strong>with</strong> the dem<strong>and</strong>s of the relevant logistic<br />

processes of the automotive industry.<br />

However, trading partners can conclude bilateral agreements. It is in<br />

this way that implementation specifications can be defined explicitly<br />

in the relevant Trading Partner Agreements (TPA). For a complex <strong>with</strong><br />

universally applicable RTIs this approach does, however, represent<br />

high administrative overheads <strong>and</strong> is inflexible for expansion.<br />

11.1.5 Data structures<br />

As a prerequisite for a container management system it must be ensured<br />

that every container can be identified <strong>and</strong> that every container<br />

has only one instance in the database of the entire system. In order to<br />

achieve such uniqueness, universal <strong>and</strong> binding data structures for<br />

the generation of container identifiers must be defined. The minimum<br />

requirements for such a data structure are an enterprise identifier<br />

or company identification number <strong>and</strong> a serial reference, which is<br />

unique <strong>with</strong>in the company identification number. These minimum<br />

requirements are applied in the following two implementations.<br />

International Unique Identification of RTIs (ISO 15459-5)<br />

In order to ensure the uniqueness of the company identification<br />

number, various issuing agencies issue numbers to companies,<br />

which may only be used by these companies. Issuing agencies are, for<br />

instance: Odette (OD), Dun <strong>and</strong> Bradstreet (UN) or DHL Freight GmbH<br />

(ND) (Source: ISO – International Organization for St<strong>and</strong>ardization).<br />

Fig. 11.3 shows the structure of the data <strong>with</strong> the saved Issuing Agency<br />

Code (IAC) <strong>and</strong> the issued Company Identification Number, CIN. In<br />

this way, a container is assigned to one defined owner. Every contain-<br />

139


11 Container <strong>and</strong> Asset Management<br />

N 1 N 2 N 3 N 4 N 5 N 6 N 7 N 8 N 9 N 10 N 11 N 12 N 13 N 14 N 15 N 16 … N 32<br />

Fig. 11.3 Data structure of a unique container identification (extract) –<br />

ISO 154595 (Source: ISO 17364)<br />

er in the company is individually identified via a serial reference. It is<br />

in this way that holistic database uniqueness is created for each transport<br />

unit.<br />

Global Returnable Asset Identifier (GRAI)<br />

Similar to the previous concept, the GRAI data structure is used to assign<br />

the company identification number by GS1 to the company (Fig.<br />

11.4). GS1 is a service provider <strong>and</strong> competence center for business<br />

processes across consumer product companies <strong>and</strong> its adjoining economic<br />

sectors. A type for the “Asset” transport unit can be assigned as<br />

a supplement <strong>with</strong>in the identification by the managing company.<br />

This offers the opportunity of classifying the assets, directly on the<br />

object layer, in order to be able to control material flows depending<br />

on the type of packaging.<br />

Fig. 11.4 Format of GRAI identification (extract) (Source: ISO 17364)<br />

In summary, the described data structures exclusively serve the purpose<br />

of an identification key for a reusable transport unit. However,<br />

actions <strong>and</strong> information can be reported to the linked IT structures<br />

via this key. For instance, properties, contents, <strong>and</strong> movements of<br />

the objects can be saved in <strong>and</strong> retrieved from a central database.<br />

Furthermore, it makes sense to be able to save supplementary information<br />

directly on the <strong>RF<strong>ID</strong></strong> transponder <strong>and</strong> thereby directly on the<br />

object.<br />

140<br />

IAC<br />

Company Identification<br />

Number (CIN)<br />

Global Returnable Asset Identifier<br />

GS1 Company<br />

Prefix<br />

Asset Type<br />

Check Digit<br />

0N 1 N 2 N 3 N 4 N 5 N 6 N 7 N 8 N 9 N 10 N 11 N 12 N 13<br />

Serial<br />

Reference<br />

Serial<br />

Number<br />

X 1 variabel X 16


11.1.6 Additional peripheral processes<br />

11.2 Economic viability<br />

In addition to the identification data on the container, ideally container<br />

<strong>and</strong> material data are either beforeh<strong>and</strong> or simultaneously sent to<br />

the customer <strong>and</strong> the supplier of logistic service provider per EDI<br />

(Electronic Data Interchange). This specifically serves the purpose of<br />

simplifying the business processes <strong>and</strong> of verifying the feasibility of<br />

planned material flows against real material flows. When capturing<br />

the container identifier, the receiver of the goods can thereby check<br />

whether they have received all or even the correct containers. In case<br />

of deviations, discrepancies can be identified <strong>with</strong> corresponding error<br />

messages <strong>and</strong> can be reported.<br />

11.2 Economic viability<br />

When is the use of <strong>RF<strong>ID</strong></strong> economically feasible in container management?<br />

In order to be able to provide a well-founded answer to this<br />

question an exact observation of the process in the relevant field of<br />

application is required.<br />

The investment for <strong>RF<strong>ID</strong></strong>-supported container management, which<br />

comprises individual <strong>RF<strong>ID</strong></strong> tags on the objects, stationary <strong>and</strong> mobile<br />

installation <strong>and</strong> the IT integration, must be analyzed in a focused<br />

fashion against process optimization as a cost saving potential. These<br />

could, for instance, be lower process margins of error <strong>and</strong> reduce<br />

staff costs as a result of automatic identification.<br />

If stationary installations <strong>and</strong> the IT structure are taken as once-off<br />

costs <strong>and</strong> if investment in <strong>RF<strong>ID</strong></strong> tags on the RTIs is projected onto their<br />

average cycle times, the investment can be shown for a defined period<br />

of time.<br />

Example:<br />

A transponder on the container <strong>with</strong> a price of € 2 is read three<br />

times per cycle. The container has a cycle time of one day.<br />

If the life cycle of a container is taken to be 7 years (at 260 utilization<br />

days per year), this results in a cost of € 0.11 per cycle or<br />

€ 0.037 per reading over the entire period of time.<br />

As this example shows, the costs of the transponder cannot be taken<br />

to be critical. The necessary installations <strong>and</strong> IT implementation are<br />

141


11 Container <strong>and</strong> Asset Management<br />

the real cost drivers. By taking into consideration the once-off costs<br />

(installation <strong>and</strong> IT), the use of <strong>RF<strong>ID</strong></strong> in container management is<br />

promising, provided that the following boundary conditions are<br />

given:<br />

1. Closed loop operation, where the data carriers can be re-used<br />

during the process (see example above).<br />

2. Highly automated processes, where the automated identification<br />

of objects is possible (e.g. materials h<strong>and</strong>ling installation).<br />

3. High number of measurement <strong>and</strong> reading positions, thereby<br />

reducing the cost per reading (see example above).<br />

Furthermore, the following properties of reusable transport units<br />

serve as general decision basis for the introduction of the management<br />

system:<br />

1. High investment costs for special container/load carriers, which<br />

are kept as high quality assets.<br />

2. High loss or damage rates, which can be analyzed <strong>and</strong> eliminated<br />

by means of creating transparency.<br />

3. Maintenance-intensive RTI, which must be identified uniquely<br />

during their service life, in order to be able to perform maintenance<br />

or inspections.<br />

11.3 Container <strong>and</strong> Asset Management in Practice<br />

Different implementation scenarios for the identification of reusable<br />

transport units in container management are described in the following<br />

sections. Different targets can be pursued here, depending on the<br />

process requirements <strong>and</strong> application.<br />

Container inventory <strong>and</strong> Container tracking<br />

<strong>Auto</strong>matic or manual identification of containers serves for the simplification<br />

of stocktaking processes. If the process chain is structured<br />

consistently, so that all the movements of the container can be captured,<br />

continuous stocktaking can be performed. This means that a<br />

current image <strong>with</strong> all the information about the containers can be<br />

retrieved <strong>with</strong>in the process chain.<br />

In addition, the task of continuous tracking can be accomplished. If<br />

the requirement of continuous <strong>and</strong> complete capturing of material<br />

142


11.3 Container <strong>and</strong> Asset Management in Practice<br />

flows has been complied <strong>with</strong>, it can be established exactly at which<br />

point in time which container has passed a specific point or is situated<br />

at which location. For instance, the identification at the shipping <strong>and</strong><br />

receiving of goods can be used to book containers that were moved to<br />

a higher level system for goods flows.<br />

Container controlling<br />

The re-writable property of the <strong>RF<strong>ID</strong></strong> transponder is used in active<br />

container controlling to save the target address <strong>and</strong> other cycle-specific<br />

data on a per container basis. Quick <strong>and</strong> effective control of material<br />

flows can be achieved <strong>with</strong> the data directly on the container.<br />

For instance, in the automotive industry highly specialized cable harnesses<br />

are transported from the supplier to the automobile manufacturer<br />

in reusable containers. During the manufacturing of the cable<br />

harness, production is already performed according to the specified<br />

sequence (Just In Sequence, JIS) of the end customer. The challenge is<br />

to control the harnesses exactly according to sequence to the installation<br />

site, even if the sequence or the status of automobiles changes at<br />

short notice <strong>and</strong> a different assembly sequence is required. Such<br />

highly flexible process requirements can be implemented <strong>with</strong> an active<br />

container controlling, where logistic fine control can be implemented<br />

<strong>with</strong>out a higher level material flow system.<br />

On the other h<strong>and</strong>, the quality data from the intermediate work steps<br />

of the product can be saved to the data carrier of the load carrier/container.<br />

Content management<br />

It is not only necessary to know the contents for the sequence-exact<br />

supply of containers. Moreover, there are applications where more<br />

detailed information regarding the load must be available at any<br />

time. For instance, in the foodstuff industry, information regarding<br />

expiration dates or production batches can be saved directly on the<br />

container. Here too – based on information regarding the product –<br />

focused steps <strong>and</strong> measures for further processing are initiated (e.g.<br />

application of the FIFO principle for products <strong>with</strong> a limited shelf<br />

life). Further central databases can be used via cross references in order<br />

to provide a comprehensive data record for the container or<br />

product.<br />

143


11 Container <strong>and</strong> Asset Management<br />

Container condition<br />

The container management system promises high benefit especially<br />

in case of maintenance-intensive RTIs. For instance, it must be possible<br />

for all participants <strong>with</strong>in the supply chain to have an overview of<br />

whether the relevant container is available for further utilization, or<br />

whether it must be repaired. Peripheral processes that specify the release<br />

or re-use can then be accomplished at defined locations, e.g. at<br />

the owner of the reusable transport units.<br />

Distributed validity <strong>and</strong> availability of container condition information<br />

enables the perfect planning <strong>and</strong> controlling of service-related<br />

actions. Depending on the specific requirements of a container management<br />

system, the previously mentioned application scenarios can<br />

be combined. Transparent processes are created <strong>with</strong> the functional<br />

linking of scenarios, thereby avoiding time consuming investigations<br />

to obtain information regarding individual containers <strong>and</strong> products.<br />

Additional solution blocks, which contribute to the further improvement<br />

of performance, can be implemented.<br />

Example: Asset Management at Siemens Berlin<br />

An application example of asset management being applied in conjunction<br />

<strong>with</strong> a tool management system in a production environment<br />

is shown below. Parallels to the storage <strong>and</strong> transport processes<br />

<strong>and</strong> cost- <strong>and</strong> maintenance-intensive tools as well as reusable transport<br />

units can be created. Knowledge regarding the current application<br />

or storage location is needed, as well as the necessity for saving<br />

process-related data directly on the object.<br />

Fig. 11.5 Tool management for precision devices at Siemens PG Berlin<br />

(Photo: W. Geyer)<br />

144


11.4 Business models<br />

At Siemens Power Generation in Berlin (gas turbine manufacturer),<br />

<strong>RF<strong>ID</strong></strong> technology is used to optimize tool management. The system<br />

manages the use <strong>and</strong> storage of precision devices, which are required<br />

for the manufacturing of various components for turbines. A higher<br />

degree of transparency of tools <strong>and</strong> the effective utilization thereof is<br />

achieved in this way. In order to achieve such an improvement in<br />

quality, each of the approximately 3,500 maintenance intensive devices<br />

of the production site were fitted <strong>with</strong> an industrial <strong>RF<strong>ID</strong></strong> transponder<br />

(Fig. 11.5, left). Besides a unique identification number <strong>and</strong><br />

a plain text description, supplementary data regarding the device<br />

quality <strong>and</strong> latest maintenance is also saved in this data carrier.<br />

By ensuring that the production devices can only be moved at defined<br />

entry <strong>and</strong> exit locations between various manufacturing sectors<br />

(Fig. 11.5, right), improved inventory information is thereby<br />

achieved. Based on this information, manufacturing planning can<br />

plan the tools more efficiently <strong>and</strong> in a more controlled fashion. All<br />

the tools <strong>and</strong> movement data are managed centrally in order to be<br />

able to derive further analysis <strong>and</strong> process optimization from it.<br />

11.4 Business models<br />

New opportunities regarding cost accounting between the involved<br />

partners also result from the individual identification of assets <strong>and</strong><br />

containers. A bilateral supply relationship between a supplier <strong>and</strong> an<br />

end customer is assumed for the simplified explanation below.<br />

11.4.1 Rental<br />

In this model, the owner – in most cases the end customer or a pool<br />

operator – makes their reusable transport units available to be used<br />

by the supplier (filling <strong>with</strong> material). The owner is responsible for<br />

sufficient stock <strong>with</strong>in the process chain. After goods receipt of the<br />

empties at the supplier, a rental fee is charged after an agreed processing<br />

time. If the container was already returned to the end customer<br />

in the meantime, the rental feel does not become due. Settlement<br />

of the account, therefore, takes place after the period of time at the<br />

supplier or after a number of cycles.<br />

This business model maintains the circulation of containers because<br />

the supplier will want to avoid unnecessary costs due to excessively<br />

long storage of the reusable transport units. Loss or shrinkage can<br />

145


11 Container <strong>and</strong> Asset Management<br />

be retraced based on inventory <strong>and</strong> movement accounts of the containers.<br />

“Resting” transport units at the supplier or the end customer are accounted<br />

for via inventory accounts. All the objects having left the<br />

goods dispatch of a company <strong>and</strong> not yet arrived at goods receiving<br />

of the target are booked in the movement or transit accounts (i.e.<br />

those objects that are currently transported by the logistics service<br />

provider). Based on a reporting system, inventory, retention times,<br />

<strong>and</strong> h<strong>and</strong>ling times of containers can be shown transparently.<br />

11.4.2 Sale <strong>and</strong> repurchase model<br />

In the sale <strong>and</strong> repurchase model there is no permanent owner of<br />

containers. The containers are rather “sold” at the time of dispatch.<br />

Transfer of ownership to the supplier thus automatically happens at<br />

the goods dispatch of the end customer. If the transport unit is sent<br />

back to the end customer after having been filled by the supplier,<br />

then the transfer of ownership to the end customer again takes place<br />

<strong>with</strong> the return – similar to the supply of empties. A company (pool<br />

operator) is responsible for the entire inventory, <strong>with</strong>out becoming a<br />

permanent owner of the containers.<br />

The purchasing <strong>and</strong> sales processes <strong>with</strong> associated transfer of ownership<br />

represent the business processes in this model. For the company<br />

that is responsible for the logistical activities, the agreed repurchase<br />

value of the containers will be different from the sales value.<br />

This difference in value is used to cover the logistics costs. If the supplier<br />

is responsible for the logistics activities, for instance, their container<br />

purchase value will be lower than the sales value. Accounting<br />

is, therefore, done concurrently <strong>with</strong> the cycle. Sales <strong>and</strong> repurchase<br />

values are agreed contractually <strong>and</strong> can involve additional participating<br />

companies. Container shrinkage <strong>and</strong> loss cannot be passed on in<br />

this model <strong>and</strong> is directly for the account of the company being the<br />

owner of the container at the time of the loss.<br />

11.5 Perspective<br />

If the use of an <strong>RF<strong>ID</strong></strong>-supported container management system only<br />

represents relatively low savings potential for individual process<br />

steps per identification point <strong>and</strong> transport process, savings are accumulated<br />

over the service life of a reusable transport unit. Based on<br />

146


11.5 Perspective<br />

partial use of transport units across the respective industry, e.g.<br />

small load carriers (“KLT”) in the automotive industry, a long-term<br />

<strong>and</strong> consistent conversion to <strong>RF<strong>ID</strong></strong> technology for transport units is<br />

only possible based on the st<strong>and</strong>ards that are provided for this purpose.<br />

It is a prerequisite for widespread acceptance of <strong>RF<strong>ID</strong></strong> technology in<br />

container management that all the companies involved in the processes<br />

must see an advantage for their company in the introduction<br />

thereof. Company-specific measures can then be derived from these<br />

potentials, which will lead to increased performance or cost savings,<br />

which in turn will amortize the investments.<br />

147


12 Tracking <strong>and</strong> Tracing<br />

Harald Lange<br />

Tracking <strong>and</strong> Tracing describes the request of manufacturers <strong>and</strong><br />

consumers to record the history of products. The real changes of state<br />

<strong>and</strong> location create a digital trace. This can be tracked back to the origin<br />

of the product via each individual station: “Where is the product?”,<br />

“Which stations have the product passed?”, <strong>and</strong> “In which condition<br />

is the product?” In order to be able to answer these questions<br />

for finished products, data for semi-finished products or ingredients<br />

must also be on h<strong>and</strong>. This targeted data collection opens up new opportunities<br />

to guarantee <strong>and</strong> prove the properties of an individual<br />

product.<br />

Besides for the question of Quality Assurance, capturing of actual<br />

data offers the option of having a direct influence on production decisions.<br />

For the costly manufacture of complex products, the question<br />

regarding location <strong>and</strong> time is also connected to questions such as:<br />

“Which other goods were at the same location at the same time?”<br />

These evaluations, for instance, allow the unintended coincidence of<br />

different chemicals in one room to be avoided.<br />

Some prerequisites must, however, be complied <strong>with</strong> in order to be<br />

able to completely answer the seemingly simple questions regarding<br />

location, time, <strong>and</strong> status.<br />

• It must be possible to uniquely identify every product at any<br />

point in time.<br />

• Every location where a product can be must be known.<br />

• It must be possible to capture every status <strong>with</strong> the required<br />

parameters; this also includes fault statuses.<br />

• This information must be aggregated <strong>and</strong> saved, so that it is<br />

available for evaluations <strong>and</strong> decisions.<br />

Monitoring <strong>and</strong> documentation of the manufacturing process as well<br />

as its traceability is performed manually in many instances <strong>and</strong> is cor-<br />

148


12.1 Application areas<br />

respondingly expensive. Systems for the automatic identification<br />

must be used for recording this data in order to ensure competitiveness.<br />

Another motivation for Tracking <strong>and</strong> Tracing is the compliance <strong>with</strong><br />

existing legal regulations. The compliance <strong>with</strong> different national<br />

<strong>and</strong> international specifications is an absolute prerequisite in order<br />

to be able to offer products in the marketplace. Of course, the measures<br />

for compliance <strong>with</strong> relevant specifications result in substantial<br />

financial costs for producers. This gives rise to a mutual desire of consumers<br />

<strong>and</strong> manufacturers to make the quality of products visible<br />

<strong>and</strong> thereby to protect themselves against imitations. Especially in areas<br />

<strong>with</strong> high security requirements such as the aviation industry or<br />

plants for the obligatory monitoring of other sectors, Tracking <strong>and</strong><br />

Tracing systems have an established position.<br />

12.1 Application areas<br />

12.1.1 Discrete manufacturing<br />

Discrete manufacturing is characterized by a line structure, where<br />

each part that must be manufactured successively in turn passes different<br />

work stations. The sequence of work stations is normally specified<br />

in a work plan. Depending on the complexity of the product, the<br />

level of detail of the work plan also increases.<br />

At any point in time that is of interest during the manufacturing process<br />

of a product, the exact location of the part is important. It can, for<br />

instance, be in a machine or in front of a measuring station. If the<br />

product is now named, it is quite easy to prepare a location <strong>and</strong> time<br />

recording. This information can even be used in real-time at different<br />

locations of the process control system. Of course, it is important to<br />

assign the name of product that must be manufactured as early as<br />

possible – normally before the first processing step.<br />

It makes sense to define an end point as well as a start point in order<br />

to obtain a better overview. In a well synchronized manufacturing<br />

process, where every work step is exactly according to the work plan,<br />

<strong>and</strong> where there are no malfunctions, this type of tracking can easily<br />

be omitted. The only parameter of importance here is time. Since every<br />

product is completed after a processing time from the start of production,<br />

a back calculation for every location can be made.<br />

149


12 Tracking <strong>and</strong> Tracing<br />

In practice, limitation of so-called “time windows” of a production<br />

process only allows a rather coarse observation of the product during<br />

the manufacturing phase. Possible malfunctions as well ever<br />

more complex <strong>and</strong> flexible manufacturing processes do not allow for<br />

a sufficiently exact local analysis via a time-based observation. This<br />

necessitates the use of event-driven <strong>Auto</strong>-<strong>ID</strong> systems. <strong>Auto</strong>-<strong>ID</strong> systems<br />

primarily have the task of assigning <strong>and</strong> detecting unique<br />

names. In practice, <strong>RF<strong>ID</strong></strong> systems as well as Data-Matrix-Codes are<br />

used (Fig. 12.1).<br />

Fig. 12.1 Identification in discrete manufacturing: left <strong>RF<strong>ID</strong></strong> for a gearbox<br />

assembly, right DMC at different workpieces (Photo left: W. Geyer)<br />

With the aid of these two technologies it is possible to assign data to<br />

individual products during the course of the manufacturing process.<br />

This assignment of data is an absolute prerequisite for recording, the<br />

individual stations in the life cycle of goods. The following sequence<br />

results from the example of an automotive assembly line <strong>with</strong> approximately<br />

400 cycles: The chassis of an automobile is assigned an<br />

identification number before the first processing cycle. This number<br />

is written to a <strong>RF<strong>ID</strong></strong> transponder, which is attached to the chassis. With<br />

the assignment of this number the chassis is firmly linked to the virtually<br />

existing vehicle in the manufacturing control system. Each<br />

subsequent processing step <strong>and</strong> every part that is mounted on the<br />

chassis can now be assigned exactly, up to the point when the vehicle<br />

is complete.<br />

All of the necessary data for the processing stations such as for instance<br />

type <strong>and</strong> furnishing, as well as all the generated data such as<br />

for instance the numbers of fitted parts <strong>and</strong> times can easily be assigned<br />

<strong>and</strong> saved. As a result, the question “Where are you?” can be<br />

answered at any time at the relevant locations. At the end of the as-<br />

150


12.1 Application areas<br />

sembly process, a finished vehicle results from the manufacturing order.<br />

A data record has been allocated to the vehicle via the identification<br />

number, which was assigned at the start of the assembly process.<br />

The question “Where have you been?” can be answered <strong>with</strong> the aid of<br />

this data record.<br />

12.1.2 Process industry<br />

In most cases it is not possible to see or touch products in the process<br />

industry. The reason for this is that the manufacturing process quite<br />

often is closed, i.e. production takes place in pipelines, units, or containers.<br />

The properties of the products are influenced <strong>and</strong> changed by<br />

heating, cooling, or mixing. These processes can either be continuous<br />

or batch processes. Typical sectors are, for instance, chemical,<br />

pharmaceutical, or food <strong>and</strong> beverages.<br />

In order to be able to assign data at specific intermediate steps of the<br />

production process, the exact location <strong>and</strong> time are required. As a result<br />

of the aggregate condition, a direct description of the product is<br />

not possible in many production steps. In order to achieve the highest<br />

possible relevance of data (normally measuring data) to the product,<br />

the data is virtually assigned in a supervisory or control system to the<br />

relevant batch. For fixed installation systems, this can be accomplished<br />

via valve positions or time windows. This enables questions<br />

to arise about the location of the product to be subsequently answered<br />

sufficiently <strong>and</strong> exactly.<br />

In numerous process oriented manufacturing processes no fixed installation<br />

of possible routes has been provided. Products are put into<br />

containers for intermediate storage <strong>and</strong> are transported from process<br />

step to process step. A quick <strong>and</strong> secure assignment of the product to<br />

the container is possible <strong>with</strong> the aid of <strong>Auto</strong> <strong>ID</strong> systems. If the location<br />

of the relevant products is known, then the allocation of additional<br />

product-related data is also possible. This is of particular importance<br />

for the manufacture of pharmaceutical products or foodstuffs,<br />

because a number of samples <strong>and</strong> tests are performed during<br />

the manufacturing process. Insights gained can quickly be made<br />

available to the relevant production station. Especially dividing <strong>and</strong><br />

mixing of different charges as well as the further processing of partial<br />

quantities can quickly result in a complex database in centralized systems.<br />

The process of determined locations <strong>and</strong> the allocation thereof<br />

to the product results in a comprehensive product history. For the introduction<br />

of an E-Pedigree solution, which is planned in many coun-<br />

151


MV camera<br />

code control<br />

package insert<br />

MV camera<br />

blister pack<br />

closure control<br />

12 Tracking <strong>and</strong> Tracing<br />

Fig. 12.2 Hybrid identification in a drug packing line<br />

tries throughout the pharmaceutical industry, this represents important<br />

prerequisites.<br />

In practice, the 2D code is also used besides for <strong>RF<strong>ID</strong></strong>. Hybrid solutions<br />

are being discussed, especially in the pharmaceutical industry. In this<br />

way, the 2D code could be used for the identification of individual<br />

blisters, while <strong>RF<strong>ID</strong></strong> transponders would identify comprehensive<br />

packaging units (Fig. 12.2). The high speed of packaging plants poses<br />

a special challenge. In order to guarantee the necessary performance,<br />

the immediate processing of visual <strong>and</strong> radio codes in a programmable<br />

logic controller (“PLC”) of the plant is required.<br />

12.1.3 Tracking <strong>and</strong> Tracing in logistics<br />

“Just in Time” or “Just in Sequence” are terms referring to complex<br />

logistical processes. It is the aim of these strategies to get the right<br />

products to the right location at the right time (compare Chapter 10).<br />

With the aid of <strong>Auto</strong>-<strong>ID</strong> systems goods shipments can quickly <strong>and</strong> efficiently<br />

be distributed worldwide. It is a matter of course for all leading<br />

logistics companies to provide their customers <strong>with</strong> information<br />

regarding location <strong>and</strong> status of shipments in real-time. The transparency<br />

resulting from Tracking <strong>and</strong> Tracing enables the recipient to<br />

perform exact planning, which in turn makes it possible to reduce<br />

stock <strong>and</strong> thereby the costs at all the levels of the manufacturing <strong>and</strong><br />

logistics chain.<br />

152<br />

ERP<br />

Process visualization WinCC<br />

Machine control Simotion<br />

- Reporting system<br />

- Operating mode management<br />

- Shift register<br />

Printer data<br />

matrix code<br />

(variable data)<br />

MV camera verifier<br />

(expiry date, lot<br />

code etc.) <strong>and</strong><br />

data matrix code<br />

control<br />

Cartoning machine<br />

<strong>RF<strong>ID</strong></strong><br />

<strong>RF<strong>ID</strong></strong> verifier<br />

MV camera applicator reader device<br />

MV camera closure writing utensil<br />

emission control carton<br />

control<br />

Labeling machine<br />

MV camera<br />

quality<br />

control (e.g.<br />

security tag)<br />

Profinet<br />

MV camera<br />

emission<br />

control<br />

Simatic machine<br />

vision system / camera<br />

Simatic RF <strong>RF<strong>ID</strong></strong> system<br />

write / read device


12.2 Drivers for Tracking <strong>and</strong> Tracing<br />

12.2.1 Corporate advantages<br />

12.2 Drivers for Tracking <strong>and</strong> Tracing<br />

Continuous optimization of the manufacturing processes of different<br />

products has resulted in highly efficient manufacturing. Transparency<br />

<strong>with</strong>in manufacturing is an important factor for the development<br />

of further potentials for improving the cost situation. This transparency<br />

makes it possible to react very flexibly to malfunctions or order<br />

fluctuations, which oppose optimal manufacturing. Another advantage<br />

is the complete capturing of all the important manufacturing<br />

data <strong>and</strong> the utilization of this data to directly influence production in<br />

real-time. In addition, the provision of exact status information in the<br />

Internet, e.g. manufacturing status of ordered goods, improves planning<br />

accuracy on the customer’s side. Products that have been assigned<br />

a unique identity offer this advantage across the entire logistical<br />

chain <strong>and</strong> the entire life cycle of a product. In this way, recall actions<br />

or logistics can utilize the identifications that already are on the<br />

product, all <strong>with</strong>out additional costs.<br />

12.2.2 Legal regulations <strong>and</strong> st<strong>and</strong>ards<br />

For an international exchange of goods <strong>and</strong> worldwide manufacturing,<br />

the use of st<strong>and</strong>ards, e.g. for terms <strong>and</strong> numbering systems is<br />

required. Already when generating Tracking <strong>and</strong> Tracing data, compliance<br />

<strong>with</strong> these st<strong>and</strong>ards such as for the EPC scheme should be<br />

observed. The EPCglobal initiative is supported by experiences<br />

gained by the GS1 organization based on the assignment <strong>and</strong> management<br />

of number systems. Manufacturers <strong>and</strong> users of <strong>RF<strong>ID</strong></strong> systems<br />

are members. It is the objective of this initiative to create st<strong>and</strong>ards<br />

for the worldwide uniform utilization of <strong>RF<strong>ID</strong></strong>.<br />

12.2.3 Consumer protection<br />

In the USA, the FDA (Food <strong>and</strong> Drug Administration) is the responsible<br />

authority for the protection of public health. All the manufacturers<br />

of drugs that are licensed in the USA must manufacture them in<br />

plants that have been certified by the FDA. This specifically means<br />

compliance <strong>with</strong> <strong>and</strong> application of validation specifications. Tracking<br />

<strong>and</strong> Tracing information constitute an important prerequisite for<br />

153


12 Tracking <strong>and</strong> Tracing<br />

the validation capability across the entire manufacturing <strong>and</strong> distribution<br />

process of drugs, for instance.<br />

12.2.4 Transparency for end users<br />

The desire for healthy nourishment has resulted in an increase of the<br />

dem<strong>and</strong> for foodstuff produced in an ecologically compatible way. As<br />

for other products, the consumer wants to be sure that the indicated<br />

product properties are genuine. Especially-automated Tracking <strong>and</strong><br />

Tracing systems offer a high degree of reliability here. Relevant evaluation<br />

programs can offer the customer the option to easily retrace<br />

the product development process via the Internet.<br />

12.3 Advantages of Tracking <strong>and</strong> Tracing<br />

Quick <strong>and</strong> automatic capturing <strong>and</strong> processing of information is a<br />

prerequisite for the direct capture <strong>and</strong> evaluation of detailed information<br />

regarding manufacturing processes. Data quality has been<br />

particularly improved by the automatic capturing of production data.<br />

It is one of the primary objectives of these activities to optimally utilize<br />

existing manufacturing capacities. The introduction of quality assurance<br />

measures is intended to prevent errors, because besides the<br />

potential hazard for the user, any type of error also bears the risk of<br />

having to repeat individual production steps (re-work) or of the product<br />

being useless (scrap).<br />

Initially, it was attempted to detect quality deviations in due time <strong>with</strong><br />

the aid of suitable intermediate tests <strong>and</strong> the capturing thereof (e.g.<br />

Job Cards). With increasing automation <strong>and</strong> the associated continued<br />

increase of production speeds, the manual capturing of manufacturing<br />

processes was no longer feasible in many sectors. Only the introduction<br />

of operating data capturing systems allowed the most important<br />

manufacturing events to be captured almost in real-time. This<br />

made the more exact analysis of actual manufacturing procedures<br />

possible. Allocation of the operational data directly to a product was<br />

only possible at a reasonable cost <strong>with</strong> the aid of <strong>Auto</strong>-<strong>ID</strong> systems.<br />

Now, quality data can also be retrieved from operational data. This is<br />

important because current manufacturing plants quite often do not<br />

allow direct quality control during production. By tracking products<br />

<strong>and</strong> tracing manufacturing events, new Quality Assurance strategies<br />

are available.<br />

154


12.3.1 Reactive Quality management<br />

12.4 Tracking <strong>and</strong> Tracing in practice<br />

By measuring <strong>and</strong> evaluating quality parameters after a production<br />

run or during the product life cycle, the actual properties of products<br />

can be established. If deviations from the set point occur, the reasons<br />

for the deviations must be investigated. The evaluation of existing<br />

product-related data (e.g. locations, times, or events) provides very<br />

comfortable options of influencing the respective manufacturing parameters<br />

in a focused way during the running of production <strong>and</strong> to<br />

avoid a repeated occurrence of deviations.<br />

12.3.2 Proactive Quality Assurance<br />

An important advantage of <strong>Auto</strong>-<strong>ID</strong> solutions is that individual information<br />

regarding products, equipment, <strong>and</strong> auxiliary systems can be<br />

made available directly on-site – for <strong>RF<strong>ID</strong></strong>-based systems directly on<br />

the part, <strong>and</strong> for barcode systems via a unique part <strong>ID</strong> as reference to<br />

information in a data source or database. In this way, for instance, an<br />

incorrect cleaning status or the violation of a time restriction can be<br />

detected even before the relevant aggregate is used. Errors are prevented<br />

proactively.<br />

12.4 Tracking <strong>and</strong> Tracing in practice<br />

Capturing of product history <strong>and</strong> status in the foodstuff processing<br />

industry is of primary importance, especially from the point of view<br />

of Quality Assurance <strong>and</strong> consumer protection. The following example<br />

shows how a largely staff-independent Tracking <strong>and</strong> Tracing solution<br />

can be structured for an egg production system.<br />

An egg processing factory of the Grupo Leche Pascual in Spain is supplied<br />

<strong>with</strong> eggs from a number of chicken farms. The eggs are stacked<br />

in reusable transport containers (racks) in the chicken farm. Each of<br />

these transport containers is furnished <strong>with</strong> an <strong>RF<strong>ID</strong></strong> tag on top. The<br />

data of all the eggs on the rack, such as the laying time, quality, <strong>and</strong><br />

weight, are transferred to this <strong>RF<strong>ID</strong></strong> transponder. The egg racks are<br />

collected from a number of different chicken farms <strong>with</strong> a truck of the<br />

egg processor. When the racks are loaded onto the truck, the data is<br />

transferred from the rack to an <strong>RF<strong>ID</strong></strong> reader that is installed on the<br />

truck. The position of the vehicle is known via a GPS, so that the supplier<br />

of every egg charge can be uniquely established <strong>and</strong> saved automatically<br />

through the combination of <strong>RF<strong>ID</strong></strong> <strong>and</strong> GPS data.<br />

155


12 Tracking <strong>and</strong> Tracing<br />

Fig. 12.3 Complete <strong>RF<strong>ID</strong></strong> tracing of egg products (Photo: Peters)<br />

When the loaded truck returns to the factory upon completion of the<br />

tour, the data of the cargo on the truck is transferred to the IT system<br />

directly at the entrance to the factory premises. The consignment is<br />

checked by weighing the racks after offloading the truck. Identification<br />

of the consignment also allows automatic accounting <strong>with</strong>out<br />

any manual input. The necessary laboratory samples are taken from<br />

the consignment at the same time. The consignment is now placed in<br />

intermediate storage in an allocation area. The laboratory releases<br />

the charge for further processing after evaluation of the samples. Verification<br />

of the release is performed automatically before the processing<br />

step. The eggs are automatically cracked <strong>and</strong> processed here.<br />

Status data is captured automatically in the entire supply chain from<br />

the chicken farm via the transport up to the processing operation,<br />

<strong>with</strong>out employees having to perform any identification tasks. If status<br />

data deviate from the set point value, e.g. weight timeout or missing<br />

laboratory release, the operator is informed accordingly. A degree<br />

of production security is achieved <strong>with</strong> the system, which is installed<br />

here, that is not dependent on the qualification of employees. All the<br />

required data of the supply chain are saved in the Quality Assurance<br />

system of the egg processor <strong>and</strong> can be allocated to finished products,<br />

if required. This allows for retracing from the finished product nearly<br />

to the individual chicken.<br />

156


12.5 Perspective<br />

12.5 Perspective<br />

Further development of the indent technologies will enable quick<br />

<strong>and</strong> low cost identification of the product <strong>and</strong> all the components involved<br />

in the production process in the future. Further improvement<br />

of functions such as bulk readability for <strong>RF<strong>ID</strong></strong> as well as improved capturing<br />

of information via visual systems will gain in importance. The<br />

permanent integration of automatically readable coding in products<br />

will significantly simplify the option of acquiring information in industrial<br />

manufacturing.<br />

As a result of the expected improvements of data quality throughout<br />

all the sectors of the production life cycle, the aspects of counterfeiting<br />

of products <strong>and</strong> protection of manufacturing information will become<br />

increasingly important. The h<strong>and</strong>ling of enormous volumes of<br />

arising data also requires reconsideration. A seamless transition<br />

from the virtual world to the real world will play an even more important<br />

role. If, for instance, a planned automobile is assembled as a real<br />

automobile in an automobile factory from chassis, engine <strong>and</strong><br />

wheels, then a virtual image of the automobile is created at the same<br />

time, consisting of events, types, <strong>and</strong> serial references. Whether the<br />

virtual image accompanies the real automobile on a storage medium<br />

or whether it remains in the database of the automobile factory will<br />

not lastly depend on how successful selective data access can be organized<br />

<strong>and</strong> authorized.<br />

157


13 Optimization of Supply Networks<br />

Volker Klaas<br />

Whoever buys a suit, a hard disk recorder, or an automobile today expects<br />

a well-sorted offer of diverse options at market related, acceptable<br />

prices to be provided by a good specialized dealer. It must be<br />

possible to select a product for the relevant budget from different colors,<br />

sizes of furnishings, <strong>and</strong> technical configurations, which must be<br />

available for delivery <strong>with</strong>in a short period of time or immediately. If<br />

one looks at the parameters option diversity price <strong>and</strong> time more<br />

closely, a number of conclusions can be arrived at.<br />

13.1 Increasing variety<br />

In the course of increasing individualization of offers in highly developed<br />

markets, the diversity of product options is subject to constant<br />

growth. Because a respectively differentiated dem<strong>and</strong> is on h<strong>and</strong>, a<br />

high degree of diversity of characteristics of a product offers a welcome<br />

opportunity to the vendor to differentiate themselves from the<br />

competition. The textile industry <strong>with</strong> its increasing specialization for<br />

different target groups can be taken as an example. This applies even<br />

more specifically to pricing. If comparable products can be offered at<br />

a more attractive price than the competition, this presents a clear<br />

market positioning advantage. This development can be observed almost<br />

daily in the advertising in the electronic consumer goods industry.<br />

The availability of the goods at the scheduled time at the scheduled<br />

location is a prerequisite for the efficiency of the diversity of price<br />

<strong>and</strong> supply to be a differentiating market characteristic. These days<br />

nobody is prepared to wait for an electronic device – when the purchase<br />

decision has been made, customers want take their new acquisition<br />

home immediately. For textiles, the availability of st<strong>and</strong>ard <strong>and</strong><br />

seasonal articles in all colors <strong>and</strong> sizes is taken for granted. Long<br />

158


13.2 Change of the dem<strong>and</strong>s on business processes<br />

waiting times have a negative influence even on complex technical<br />

equipment such as automobiles.<br />

These briefly sketched dem<strong>and</strong>s of consumers towards the vendors of<br />

products have an immediate effect on the value-added process <strong>and</strong><br />

involved partners – wholesale <strong>and</strong> retail, distributors, logistics operators,<br />

<strong>and</strong> not least the manufacturers themselves. The cooperation<br />

of these partners in the supply chain is at the center of the observation<br />

– in view of increasing complexity <strong>and</strong> meshing of individual<br />

supply chains – in one supply network.<br />

13.2 Change of the dem<strong>and</strong>s on business<br />

processes<br />

However, the complexity of supply networks increases continuously.<br />

More <strong>and</strong> more production steps are transferred to countries offering<br />

the preconditions for a favorable cost structure through low wage levels,<br />

in order to be able to keep up <strong>with</strong> the constant price pressure.<br />

This process is accompanied by increasing specialization, which leads<br />

to further cost advantages. Both of these lead to a more emphasized<br />

global distribution of production, <strong>with</strong> the result that the supply<br />

chain is hardly in just one h<strong>and</strong> any more.<br />

At the same time, services in the value-added process are outsourced<br />

to foreign providers. For example, individual parts for automobile<br />

doors are assembled into functional units by the logistics service provider<br />

<strong>and</strong> instruction manuals <strong>and</strong> packaging are also assembled into<br />

the end product (e.g. mobile telephone) as a sales unit by the logistics<br />

service provider. In the textile sector, wholesalers or distributors frequently<br />

take over the preparation of goods, i.e. ironing <strong>and</strong> folding<br />

ready for sale.<br />

These examples show a trend that will increasingly establish itself in<br />

the coming years: On the one h<strong>and</strong>, because competition dem<strong>and</strong>s<br />

become more stringent, <strong>and</strong> on the other h<strong>and</strong> because more <strong>and</strong><br />

more markets such as India or China are developing to higher levels<br />

of complexity. The result is an ever closer meshing of manufacturing,<br />

refinement, <strong>and</strong> distribution of goods. At the same time, the interdependence<br />

of all involved parties increases. When a supply chain does<br />

not function properly, i.e. supplying wrong goods at the wrong time<br />

or not at all, the success of the remaining partners is threatened seriously.<br />

159


13 Optimization of Supply Networks<br />

Interaction between supply chain partners thereby becomes more intensive<br />

(Fig. 13.1). Raw materials, semi-finished products, <strong>and</strong> finished<br />

products must be exchanged between individual companies<br />

<strong>and</strong> must be processed further in due time. This is only possible if the<br />

associated information <strong>and</strong> requirements are available “just in time”<br />

<strong>and</strong> are transferred to the right partner at the right time. Not only the<br />

goods flows themselves, but also the associated planning, supervision,<br />

<strong>and</strong> control information thereby become ever more complex<br />

<strong>and</strong> time critical.<br />

Supplier<br />

company<br />

Fig. 13.1<br />

Sample of a complex supply network in the automobile supply industry<br />

In the electronics industry, short-term dem<strong>and</strong> fluctuations must be<br />

taken into account immediately in production, logistics, <strong>and</strong> refinement.<br />

The rate of shrinkage must be reduced <strong>with</strong>out a delay of the<br />

logistics processes <strong>and</strong> service <strong>and</strong> return actions must be made<br />

more effective <strong>and</strong> customer-friendly. In textile logistics, item-related<br />

“real-time” control instruments are required in order to avoid dreaded<br />

“out of stock” situations despite the variety <strong>and</strong> extremely complex<br />

sales structures. Comprehensive documentation of individual stations<br />

is of paramount importance in the automotive <strong>and</strong> pharmaceutical<br />

industries, not least because of legal requirements (see Chapter<br />

12).<br />

160<br />

Supplier / Customer relationship management<br />

Integrated product development<br />

Integrated logistics<br />

Sales <strong>and</strong> Purchasing<br />

Knowledge base<br />

Market places <strong>and</strong> platforms on the Internet<br />

<strong>Auto</strong>mobile<br />

manufacturers


13.3 New business processes require new technologies<br />

13.3 New business processes require<br />

new technologies<br />

In production <strong>and</strong> internal production logistics, a high degree of automation<br />

is a matter of course for many years already. As soon as new<br />

technologies of supervisory <strong>and</strong> control systems of production processes<br />

became available, they were employed in many instances.<br />

Competitive pressure from innovative companies gaining market<br />

share <strong>with</strong> the adaptation of new technologies leads to other vendors<br />

in the sector to also utilize the technical developments after a slight<br />

time delay. For instance, <strong>Auto</strong>-<strong>ID</strong>/<strong>RF<strong>ID</strong></strong> technologies have been a matter<br />

of course in the production environment for a number of years<br />

(see Chapter 9). Manual control <strong>and</strong> test activities have been superseded<br />

by automated goods <strong>and</strong> information flows in due time.<br />

In the case of supply networks across companies, this is currently<br />

hardly applicable. Shipping <strong>and</strong> receiving of goods are only automated<br />

at the level of packing units by means of barcodes, if at all, but not<br />

at the item level. Generally, costly manual sorting <strong>and</strong> picking activities<br />

are required: Collection <strong>and</strong> further picking of a st<strong>and</strong>ard transport<br />

container <strong>with</strong> textiles can currently take up to two weeks. The<br />

logistics route is all but transparent in this case. For instance, a number<br />

of weeks can pass while goods are on their way from the manufacturer<br />

in Asia to a logistics center in Europe, <strong>with</strong>out current status<br />

information being available. If unforeseen delays occur, neither the<br />

sales processes (e.g. for textiles or entertainment electronics) nor the<br />

production processes (automobile manufacturing) can be adapted in<br />

time. The same applies to the status of deliveries being processed by<br />

a number of supplier or processing levels. In this case too, the principal<br />

does not have the information regarding the current status of<br />

their order.<br />

A lack of transparency also applies to large parts of shop management<br />

processes, i.e. to the tracking of the goods’ movements on the<br />

sales floor. Items that were placed in the wrong areas can only be<br />

traced again by means of costly manual re-work or time-intensive inventory<br />

operations.<br />

How should a technology be structured, which allows similar quantum<br />

leaps in productivity in the presented logistic processes, as was<br />

accomplished in the production environment?<br />

Initially, the most important requirements are investment <strong>and</strong> operating<br />

costs. If tracking of individual items or production components<br />

161


13 Optimization of Supply Networks<br />

is required as described above, such a technical solution must be relatively<br />

inexpensive in order to gain acceptance. Furthermore, capturing<br />

ranges of a few meters must be possible, in order to allow for the<br />

simultaneous, automatic capturing of individual items <strong>with</strong>in a dispatch<br />

unit, e.g. palette, during a st<strong>and</strong>ard logistics process such as<br />

goods receiving, goods dispatch, or picking.<br />

Such options have been available for some time via <strong>RF<strong>ID</strong></strong> technology<br />

based on UHF <strong>and</strong> EPC-Gen2 st<strong>and</strong>ards. Technical reliability <strong>and</strong> the<br />

field of application of such <strong>RF<strong>ID</strong></strong> labels has increased at the same rate<br />

as their prices have decreased. If this enables the item-precise tracking<br />

of goods flows in a supply network, this means that individual<br />

events (changes of location or status of goods) can be captured electronically<br />

at the time of the occurrence <strong>and</strong> that the information can<br />

be made available to involved parties in real-time. It is, therefore, also<br />

possible to establish a connection between the real world of global<br />

goods movement to the global structure of information technology<br />

for logistics processes, allowing in turn a new quality of processes<br />

<strong>and</strong> information.<br />

13.4 Advantages of <strong>RF<strong>ID</strong></strong> employment<br />

across the board<br />

In <strong>RF<strong>ID</strong></strong>-supported supply networks, information regarding businessrelated<br />

events is available for the involved parties at the time of the<br />

respective occurrence. Costly manual preparation <strong>and</strong> evaluation of<br />

historic information is not required any more. St<strong>and</strong>ard processes<br />

can thus be automated <strong>and</strong> process times <strong>and</strong> costs can be reduced<br />

drastically. In addition the error rate, which is relatively high in manual<br />

processes, can be reduced significantly. The overall quality of logistics<br />

processes is increased significantly, which improves market<br />

positioning of involved companies <strong>and</strong> increases customer satisfaction.<br />

Companies disposing of exact information regarding the receipt, dispatch,<br />

<strong>and</strong> processing statuses of their supplies at the individual stations<br />

of the value-added chain, are in a position to act in time in case<br />

of exceptional situations. If such information is only available <strong>with</strong> a<br />

significant time delay, as in the past, only subsequent reaction is possible,<br />

which in most cases is nothing more than containment of damages.<br />

Information provided on time enables the proactive creation of<br />

goods buffers, which balance the delivery delays on the one h<strong>and</strong><br />

162


13.4 Advantages of <strong>RF<strong>ID</strong></strong> employment across the board<br />

<strong>and</strong>, on the other h<strong>and</strong>, limit resource binding to the absolutely necessary<br />

volume. In case of short-term regional dem<strong>and</strong> fluctuations,<br />

for instance weather-dependent additional dem<strong>and</strong> for textiles in certain<br />

regions, the relevant control information can be entered into the<br />

logistics process in due time <strong>and</strong> distribution can be adapted to the<br />

new situation.<br />

Another aspect relates to the control of goods flows. If it is discernable<br />

at any point in time where own goods should be <strong>and</strong> where they<br />

actually are, then it is possible to immediately react to deviations.<br />

Such deviations could be weak points in the process, which are exposed<br />

by <strong>RF<strong>ID</strong></strong> <strong>and</strong> can then be rectified. It could, however, also be<br />

criminally based shrinkage, which can be uncovered immediately<br />

due to the real-time information on h<strong>and</strong>, <strong>and</strong> can be curtailed as<br />

soon as possible. Product imitations or the covert use of low quality<br />

components are further criminal options in complex supply chains. If<br />

the retracing of products or product parts down to the item level is<br />

guaranteed due to <strong>RF<strong>ID</strong></strong> technology, such activities no longer have a<br />

chance of success.<br />

However, if individual items can be tracked in innovative supply networks<br />

by means of <strong>RF<strong>ID</strong></strong>, then existing <strong>RF<strong>ID</strong></strong> item identification should<br />

also be used in subsequent sales processes <strong>and</strong> shop management, as<br />

mentioned above. By correspondingly furnishing sales areas, for instance<br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong> shelves for on the shelf goods, <strong>RF<strong>ID</strong></strong> hangers for<br />

hanging goods or mobile capturing devices for sales staff, in-store<br />

processes can achieve a degree of transparency that was not possible<br />

up to now. All the movements of goods can be captured <strong>and</strong> thereby<br />

can be controlled. Even novel processes such as <strong>RF<strong>ID</strong></strong>-based information<br />

systems are feasible: The customer automatically receives comprehensive<br />

information regarding the product, tips on combination<br />

options <strong>with</strong> other products, <strong>and</strong> much more (Fig. 13.2).<br />

Quite often, subsequent service or a customer care process follow the<br />

sales process, e.g. in the trade of electronic consumer goods. In case<br />

of guarantee claims, processing via identification of the product <strong>with</strong><br />

an attached <strong>RF<strong>ID</strong></strong> transponder is expedited. <strong>RF<strong>ID</strong></strong>-supported product<br />

history simplifies the decision for or against further repair in case of<br />

older products. For some business processes, there also is a unique<br />

link between the device <strong>and</strong> the user, for instance for pay-TV receivers<br />

or for loaned-equipment such as DSL routers or set-top boxes for digital<br />

cable reception. Quite often such devices are found in short-term<br />

rental business <strong>and</strong> are returned by the customer <strong>and</strong> put into circulation<br />

again. <strong>RF<strong>ID</strong></strong>-supported assignment to the user <strong>and</strong> the link to<br />

163


13 Optimization of Supply Networks<br />

Fig. 13.2 If individual items are furnished <strong>with</strong> transponders, in-store<br />

processes can also be improved: such as shown here <strong>with</strong> an <strong>RF<strong>ID</strong></strong>-based<br />

customer information system (Photo: METRO AG).<br />

the past utilization history of the device simplify the processing of<br />

payment activities <strong>and</strong> required preparation. In this way, real-time information<br />

enables optimal customer care <strong>and</strong> increases customer loyalty<br />

to the company.<br />

It applies to all the presented application fields of <strong>RF<strong>ID</strong></strong> technology,<br />

that time- <strong>and</strong> item-precise capturing of actual goods movement obviously<br />

enables significantly higher planning quality than was previously<br />

possible <strong>with</strong> historic data. If processing times <strong>and</strong> changes in<br />

the supply chain are known exactly per station, future processes can<br />

be planned optimally, based on this information. Transparency <strong>and</strong><br />

real-time information breeds trust – both in the partner <strong>and</strong> in own<br />

capabilities.<br />

13.5 Further development options<br />

Even if the advantages of <strong>RF<strong>ID</strong></strong>-supported supply networks are obvious,<br />

they are up to now only implemented at a few companies, who<br />

are particularly innovation-minded. The reasons for this are that the<br />

required UHF/Gen2 technology has only been available in businessproven<br />

form since 2006. Also, costs for this technology are quite often<br />

regarded as too high. Finally, many companies tied up in totally dif-<br />

164


13.5 Further development options<br />

ferent value-added chains. An automobile supplier, for instance, does<br />

not service only one customer, but a whole range of manufacturers.<br />

Most textile producers or producers of electronic equipment supply<br />

different retail chains. Therefore, it is customary that the requirements<br />

regarding information to be exchanged are structured differently<br />

in different supply chains. If a company were to implement<br />

these different requirements, it would result in significant additional<br />

costs <strong>and</strong> required resources.<br />

If, however, the <strong>RF<strong>ID</strong></strong> technology is to be used across the board, then<br />

it must be considered how these barriers to introduction can be removed.<br />

One option would be for companies <strong>with</strong> high dem<strong>and</strong> power<br />

to motivate their suppliers <strong>with</strong> more or less explicitly formulated financial<br />

sanctions to participate in <strong>RF<strong>ID</strong></strong>-supported logistics processes.<br />

This would have the advantage of achieving a quick implementation.<br />

However, a disadvantage is the absence of an independent motivation<br />

for the utilization of <strong>RF<strong>ID</strong></strong>: The suppliers will furnish their<br />

goods <strong>with</strong> <strong>RF<strong>ID</strong></strong> transponders, but will not enjoy any profit themselves<br />

from the technology.<br />

Another option of enhancing the introduction of the new technology<br />

is an operating model for <strong>RF<strong>ID</strong></strong> infrastructure, made available by neutral<br />

providers, i.e. providers who are not participating in the respective<br />

supply chain. Similar to IT outsourcing, the operator of the installation<br />

offers a complete operation of the <strong>RF<strong>ID</strong></strong> infrastructure, from installation<br />

through maintenance to a communication platform for the<br />

exchange of relevant information in the required formats. Such operating<br />

models create the optimal conditions for the employment of<br />

<strong>RF<strong>ID</strong></strong> in complex structures. An easy introduction to the technology is<br />

offered to individual partners, irrespective of their IT knowledge or<br />

existing IT resources, because the operator provides implementation<br />

<strong>and</strong> maintenance, including 24-hour service (Fig. 13.3).<br />

Supplier<br />

(Asia)<br />

Manufacturer<br />

(Europe)<br />

<strong>Auto</strong><strong>ID</strong> backbone ®<br />

Logistics<br />

service<br />

providers<br />

Distributor /<br />

trade<br />

Identification <strong>and</strong> status information regarding the goods flow<br />

Fig. 13.3 Presentation of an <strong>Auto</strong>-<strong>ID</strong>/<strong>RF<strong>ID</strong></strong> operating model<br />

After-sales<br />

service<br />

165


13 Optimization of Supply Networks<br />

This also means that the new partner, possibly changing production<br />

sites or new suppliers, can be incorporated flexibly <strong>and</strong> on short notice.<br />

Dem<strong>and</strong> fluctuations or cost increases at individual production<br />

sites can be taken into account immediately. Business-related information<br />

is prepared via the communication platform in such a way<br />

that individual companies can process it in real-time in their IT systems.<br />

Participants in such an <strong>RF<strong>ID</strong></strong> operating model only have one<br />

partner for the exchange <strong>and</strong> preparation of information, even if customers<br />

or suppliers change, so that no additional dependencies arise.<br />

Not least, the high investment barrier can be reduced significantly by<br />

such an operating model. Instead of high initial investment costs, the<br />

users of the operating model pay for services on a transaction- or<br />

item-basis. This makes the investment risk clear <strong>and</strong> the arising costs<br />

are directly linked to the utilization of the <strong>RF<strong>ID</strong></strong> infrastructure.<br />

166


14 Vehicle logistics<br />

Marcus Bliesze, Hans-Juergen Buchard<br />

<strong>RF<strong>ID</strong></strong> applications for the optimization of vehicle logistics are mostly<br />

distributed over very large areas. In this case, persons as well as objects<br />

that are furnished <strong>with</strong> data carriers need to cover great distances.<br />

The processes in the automobile logistics are quite often complex<br />

<strong>and</strong> contain many degrees of freedom in many instances. The spatial<br />

<strong>and</strong> time dynamics to which processes in vehicle logistics are exposed,<br />

require a high degree of real-time transparency. If, for instance,<br />

the positions of all the vehicles waiting for offloading of goods<br />

at a warehouse in the Dock <strong>and</strong> Yard Management are known at any<br />

point in time, the allocation of free docks can be arranged in such a<br />

way that trucks can easily shunt <strong>and</strong> thus start <strong>with</strong> offloading as<br />

soon as possible. Transparency is also required in fixed processes, in<br />

order to be able to identify possible optimization potentials through<br />

statistical evaluations of vehicle movements.<br />

14.1 Special requirements<br />

In vehicle logistics there are markedly modified technical requirements<br />

for <strong>RF<strong>ID</strong></strong> systems compared to other applications. The objects<br />

are moving on open spaces <strong>and</strong> in indoor environments. Furnishing<br />

open parking spaces <strong>with</strong> cabled <strong>RF<strong>ID</strong></strong> write <strong>and</strong> read devices is either<br />

too expensive or is not possible at all in many instances because of<br />

non-existent installation possibilities at parking bays. Capturing the<br />

parking bay position of vehicles in such instances can only be accomplished<br />

by real-time locating systems (RTLS), of which the infrastructure<br />

is constructed around the open space.<br />

In the past, technical solutions <strong>with</strong> which vehicles could be tracked<br />

<strong>with</strong>in production <strong>with</strong>out human intervention were lacking. Initially,<br />

manual bookings on paper <strong>with</strong> subsequent transfer to IT parking<br />

spot management systems were performed for the relocation of vehicles,<br />

which had left the production line <strong>and</strong> were identical on first<br />

167


14 Vehicle logistics<br />

sight. These procedures were time consuming <strong>and</strong> were error-ridden<br />

due to manual inputs. The up-to-dateness of the information was always<br />

subject to a time delay. A faulty booking invariably led to escalation<br />

by follow-on errors, which could only be cleared by costly inventory<br />

measures. Due to the resulting inaccuracy of the manually captured<br />

information <strong>and</strong> lack of up-to-dateness of the captured information,<br />

acceptance of the system was very low. This resulted in long<br />

search times for production, for vehicles that had left the normal production<br />

line. Long search times mean extended delivery times, unsatisfactory<br />

date reliability, <strong>and</strong> invariably lead to higher costs.<br />

14.2 Technical basis<br />

Locating systems (RTLS) belong to the family of active <strong>RF<strong>ID</strong></strong> systems.<br />

They determine the position of objects in an area at regular intervals.<br />

RTLS data carriers send signals <strong>with</strong> a settable blink rate to so-called<br />

RTLS access points, which form the fixed RTLS infrastructure (Fig.<br />

14.1). The signals of the RTLS data carriers enable the RTLS-Access-<br />

Points to generate runtime information (“LI”). It is transferred to a<br />

central computing unit, where the runtime information of different<br />

Movement<br />

(time)<br />

System<br />

Output<br />

Fig. 14.1 Functional concept of RTLS<br />

168<br />

A<br />

Pos5<br />

Pos4<br />

Trigger information (<strong>ID</strong>1)<br />

A<br />

Run time information (LI)<br />

T<br />

<strong>ID</strong>1<br />

Movement<br />

Pos3<br />

Run time information (LI)<br />

Trigger-<br />

Event<br />

Pos2<br />

LI LI <strong>ID</strong>1<br />

T<br />

Area to be covered<br />

LI<br />

Run time information (LI)<br />

Run time information (LI)<br />

Blink Blink Blink Blink Blink<br />

Pos5 Pos4 Gate1<br />

LI<br />

Pos3 Pos2<br />

A<br />

A<br />

LI<br />

Pos1<br />

A RTLS Access Point<br />

<strong>ID</strong>..<br />

Magnetic trigger<br />

field (1-6 m)<br />

T<br />

RTLS Tag


14.3 Application scenarios<br />

access points is used to establish the position of the RTLS data carrier<br />

in the area on h<strong>and</strong> (Pos1 ... Pos5).<br />

Contrary to conventional <strong>RF<strong>ID</strong></strong> gates, where the capturing of objects<br />

only takes place at defined positions, RTLS systems work over large<br />

areas. The position of objects can be determined at any point of the<br />

covered area. Despite this, there are applications where it is necessary<br />

to additionally work according to the conventional <strong>RF<strong>ID</strong></strong> gate principle.<br />

For this purpose, RTLS data carriers are capable of detecting a<br />

magnetic field that is emitted from so-called triggers. This field can<br />

be parameterized for a range of 1 - 6 m. The magnetic field transmits<br />

a trigger identification number in order to be able to distinguish between<br />

the different triggering fields. If a RTLS data carrier detects the<br />

magnetic field of a trigger, the transponder reads the trigger identification<br />

number <strong>and</strong> immediately transfers it to the RTLS access points<br />

together <strong>with</strong> its own identification number. In Fig. 14.1 the RTLS<br />

data carrier enters a trigger field between positions three <strong>and</strong> four,<br />

<strong>and</strong> immediately generates a message <strong>with</strong> the trigger <strong>ID</strong> to the system.<br />

The trigger principle is used at central access control points, for instance.<br />

Here, a boom must be opened when an authorized vehicle approaches.<br />

Immediate reaction of the access control system is required<br />

in order not to force the vehicle to stop.<br />

The two functions of locating <strong>and</strong> determining the trigger location<br />

enable the blink rate of the RTLS data carrier to be reduced to a minimum<br />

in order to conserve battery life, while real-time reaction in certain<br />

instances is still possible. The selection of the blink rate essentially<br />

depends on the dynamics of the possible movement of objects<br />

to be located.<br />

Once the RTLS infrastructure is established <strong>and</strong> the data carrier is<br />

fixed to the object, many utilization options are available <strong>with</strong>out any<br />

additional cost. Continuous data transmission presents a current<br />

view of the production process <strong>and</strong> a transparent process. Any conspicuousness<br />

during the process is detected <strong>and</strong> can be rectified.<br />

14.3 Application scenarios<br />

Optimal logistics processes require current information. Real-time<br />

locating does not only offer information, but it does link information<br />

<strong>with</strong> the current location of the object. Process transparency is in-<br />

169


14 Vehicle logistics<br />

creased significantly by knowing the location of the goods at the current<br />

time.<br />

14.3.1 Utilization at automobile groups<br />

The Sicalis RTL system is used in all of the factories of an automobile<br />

manufacturer for tracking vehicles in the final assembly sector. It reliably<br />

tracks vehicles that have left the fixed sequence of the assembly<br />

line in order to get to dispatch via various test <strong>and</strong> finishing stations<br />

(electrical test, roller test bed, <strong>and</strong> adjustment stations). Sicalis RTL<br />

allows for the capturing <strong>and</strong> visualizing of all the vehicle movements<br />

in the indicated areas, halls, <strong>and</strong> open spaces as well as in factory<br />

stores. The high degree of precision of the RTLS components of the<br />

Moby R system makes it possible to pinpoint the parking position <strong>and</strong><br />

to transmit it to the further processing systems of the operator.<br />

Fig. 14.2 RTLS transponder on the interior rear view mirror for locating<br />

the vehicle<br />

Vehicles that have left the assembly line, but need to be returned to<br />

the production hall at a later stage for final completion, are furnished<br />

<strong>with</strong> a mobile data carrier (RTLS transponder). This transponder is<br />

fixed to the interior rear view mirror of the vehicle <strong>with</strong> a clamp (Fig.<br />

14.2). Depending on the logical sequence, the vehicle is parked in one<br />

of the parking lots close to production. If a vehicle is now recalled by<br />

170


14.3 Application scenarios<br />

the assembly finishing system, the location of the vehicle can be retrieved<br />

or can be displayed via a web browser on the Intranet.<br />

The use of RTLS saves on time consuming searches when trying to<br />

find the vehicle. The finishing employee can directly access the vehicle<br />

<strong>and</strong> bring it to finishing. Before the introduction of the RTLSbased<br />

system a number of finishing employees were engaged in the<br />

search of the vehicle. Especially during the run-up of a new vehicle<br />

type there is a high dem<strong>and</strong> for the postponed finishing of individual<br />

vehicles because the finishing processes are not yet fully harmonized.<br />

Because many thous<strong>and</strong>s of vehicles are being pre-produced<br />

for “Day X”, a substantial savings potential arises only for this instance.<br />

By introducing a new transporter model, a utility vehicle manufacturer<br />

also relies on RTLS technology in order to increase production<br />

transparency, to shorten processing times, <strong>and</strong> to improve the reliability<br />

of delivery. The radio infrastructure in the factory consists of<br />

18 Moby-R antennas, 19 triggers, <strong>and</strong> 500 RTLS transponders.<br />

The data carriers are parameterized in such a way that they transmit<br />

a signal (blink) every four minutes. These blinks are received by at<br />

least three time-synchronized <strong>and</strong> LAN-capable Moby-R antennas<br />

Fig. 14.3 Sicalis RTL graphically shows the vehicle position on a map<br />

171


14 Vehicle logistics<br />

over a distance of up to 300 meters, <strong>and</strong> are transmitted via the existing<br />

network to the processing software. A central server establishes<br />

the current position of the data carrier, based on the lapsed time differences<br />

of the signal between antennas (<strong>and</strong> thereby the position of<br />

the vehicle), <strong>and</strong> saves the information in the database. The mini<br />

transporters that are furnished <strong>with</strong> transponders at the end of the<br />

finishing line can be located in the external parking lots in real-time<br />

<strong>with</strong> a precision of about three meters.<br />

The production employee uses the Sicalis RTL map application on<br />

their PC in order to quickly locate a vehicle (Fig. 14.3). In this way the<br />

employee obtains an overview of all the parked vehicles <strong>and</strong> can<br />

search for a particular transporter. This information enables the employee<br />

to collect the vehicle <strong>and</strong> bring it to the finishing process.<br />

Since all of the vehicle movements are captured by Sicalis RTL in realtime,<br />

the transparency of the finishing process is improved significantly.<br />

In this way production bottlenecks <strong>and</strong> individual “long st<strong>and</strong>ing<br />

time vehicles” are quickly detected. It is possible to react immediately<br />

to the insights that were gained. The introduction of the locating<br />

system leads to significant time savings on the processes <strong>and</strong> thereby<br />

leads to substantial cost savings due to the absence of all the vehicle<br />

search times.<br />

14.3.2 Fleet management for public local transport<br />

In public local transport, reliable compliance <strong>with</strong> schedules is an essential<br />

factor for customer satisfaction. A well organized fleet is the<br />

basis for date reliability <strong>and</strong> besides that it is a prerequisite for the<br />

cost efficiency of a fleet. The central element of fleet management is<br />

the management of schedules (Fig. 14.4). This is where the allocation<br />

of drivers to their routes <strong>and</strong> vehicles takes place. In maintenance<br />

management, the vehicles are prepared <strong>and</strong> maintained for the next<br />

trip. It provides vehicle data such as the exact location, mileage, tank<br />

Fig. 14.4 Planning components for schedule management<br />

172<br />

Maintenance<br />

management<br />

- Parking spaces<br />

for buses<br />

- Servicing plans<br />

- Mileage<br />

- Fuel fill level<br />

- Repair times<br />

Schedule<br />

management<br />

Allocation of driver<br />

to line, vehicle <strong>and</strong><br />

parking space<br />

Schedule<br />

- Routes<br />

- Departure times


14.3 Application scenarios<br />

fill, <strong>and</strong> maintenance cycles as a valuable contribution to the schedule<br />

management system. Maintenance tasks are only necessary if the<br />

maintenance interval does not allow allocation to the shortest route<br />

of the schedule. Allocation of vehicles to routes can now be executed<br />

in a focused fashion.<br />

The use of a RTLS system can supplement the automatically created<br />

documentation <strong>with</strong> permanently available location information of<br />

the vehicles on-site. It is, for instance, possible to make statements in<br />

due time about when vehicles leave maintenance <strong>and</strong> can be scheduled<br />

again. Statistical service life figures established from long-term<br />

studies at individual work stations serve as a prediction of the processing<br />

times of the maintenance process. Possible bottlenecks of the<br />

process or the unfavorable arrangement of workstations are identified.<br />

Finally, time savings on the maintenance process is achieved because<br />

the automatic detection of parking spots allows for the quicker<br />

location of parked vehicles. Idling times of work stations can also be<br />

eliminated in this way.<br />

It is possible to achieve the overall maximum flexibility of the allocation<br />

of drivers <strong>and</strong> fleet up to shortly before departure by using RTLS.<br />

This yields significant advantages:<br />

• Minimized risk of failure of the allocated vehicle<br />

• Quick reaction to failures<br />

• Increased schedule adherence through planned collection<br />

times of vehicles<br />

• Increased economic viability through more even utilization<br />

<strong>and</strong> a possible reduction of the fleet<br />

• Targeted, dem<strong>and</strong>-controlled tank filling (instead of daily filling)<br />

through the allocation of vehicles <strong>with</strong> partially filled tanks to<br />

short routes<br />

• Reduction of maintenance work due to the utilization of the full<br />

maintenance interval<br />

• <strong>Auto</strong>matic documentation of work steps.<br />

Concrete implementation<br />

Fig. 14.5 shows the site of a bus company. Vehicles arrive at <strong>and</strong> leave<br />

the site via an entrance <strong>and</strong> exit furnished <strong>with</strong> an access control system,<br />

based on RTLS. Every bus is driven into a wash bay as the first<br />

step of the maintenance process.<br />

173


14 Vehicle logistics<br />

Fig. 14.5 Operating site of a bus company<br />

Subsequently, the buses are able to head for individual service stations<br />

<strong>and</strong> the filling station, depending on what is required. The requirement<br />

for maintenance is established by consulting the maintenance<br />

documentation <strong>and</strong> fleet management planning system. The<br />

parking of finished busses is preferably done in parking halls in order<br />

to be able to immediately provide ready for use vehicles, even in winter.<br />

Vehicles waiting for a service station are parked outside. Shortly<br />

before the departure of a bus, the driver gets a printout in the office<br />

<strong>with</strong> the route, bus, <strong>and</strong> location of the bus, <strong>and</strong> can thus commence<br />

their trip in the shortest possible time.<br />

Moby-R is again used as a locating system. Antennas were installed at<br />

the filling station, parking halls, <strong>and</strong> parking spots <strong>and</strong> outside. Magnetic<br />

field triggers are used at the access control system at the entrance<br />

<strong>and</strong> exit to the site, at the washing bay, <strong>and</strong> service stations.<br />

14.3.3 Dock <strong>and</strong> yard management<br />

The dock <strong>and</strong> yard management system can also be optimized by<br />

RTLS technology. This includes the optimization of traffic flow on a<br />

factory site, access control, <strong>and</strong> allocation of loading positions. For an<br />

Austrian automobile manufacturer, loading <strong>and</strong> offloading up to<br />

174<br />

Parking spaces<br />

5<br />

Parking spaces<br />

5<br />

3 Service stations<br />

(gas station, wear<br />

<strong>and</strong> tear, servicing,<br />

damages)<br />

2 Washer system<br />

Garage for<br />

maintenance work<br />

Gas station<br />

(outdoors)<br />

Parking spaces<br />

4<br />

Office buildings<br />

Parking facilities<br />

5<br />

Entrance / exit<br />

1<br />

Parking spaces<br />

5


14.3 Application scenarios<br />

1,800 vehicles per day must be accomplished – a logistical <strong>and</strong> organizational<br />

challenge, not only for goods receiving, but also for factory<br />

security, who must monitor <strong>and</strong> document every entry <strong>and</strong> exit.<br />

Through a RTL-based vehicle control system logistics planning <strong>and</strong><br />

security are supported in their tasks. The clue: Instead of masses of<br />

paper <strong>and</strong> subsequent manual input of data, RTL offers “electronic<br />

access authorization” by a transponder.<br />

The logistics process is shown in Fig. 14.6: Trucks first drive to a waiting<br />

area outside of the factory in order to report to goods receiving.<br />

The drivers receive a Moby-R transponder, which is assigned to the<br />

truck from there on. From this point in time the loaded goods are visible<br />

for the planner in the factory <strong>and</strong> can be accessed by a mouse<br />

click. As soon as the planner calls for the truck, its vehicle registration<br />

number, <strong>and</strong> the docking station appear on a large display screen. At<br />

the same time, the truck is authorized to enter the factory. When the<br />

truck arrives at the gate, a trigger identifies the transponder, checks<br />

the access authorization, <strong>and</strong> opens the boom.<br />

External<br />

goods traffic<br />

Container<br />

traffic<br />

Registration: allocation of<br />

data carrier <strong>and</strong> waiting position<br />

Data carrier h<strong>and</strong>over,<br />

release for exit<br />

Unloading / loading<br />

Delivery process<br />

Internal<br />

goods traffic<br />

Works entrance<br />

Works exit<br />

Fig. 14.6 <strong>Processes</strong> in operational logistics<br />

Finished<br />

vehicle shuttle<br />

With a fixed allocated data carrier<br />

Permanent<br />

access approval<br />

When the truck leaves the factory, the system ensures that the transponder<br />

is h<strong>and</strong>ed back again. For trucks loaded <strong>with</strong> vehicles to be<br />

delivered, the system automatically displays the list of vehicles contained<br />

in this delivery order together <strong>with</strong> detail information on the<br />

security screen (Fig. 14.7). The security employee at the gate can eas-<br />

175


14 Vehicle logistics<br />

Fig. 14.7<br />

Two RTLS triggers (circled) serve the monitoring of the factory exit<br />

ily check the actually loaded vehicles regarding quantity, model, <strong>and</strong><br />

furnishing in this way. Shuttle trucks, official vehicles, or visitor vehicles<br />

<strong>with</strong> permanent access authorization receive a personal data carrier<br />

<strong>and</strong> can access the factory directly.<br />

The employed Sicalis RTL system enables targeted <strong>and</strong> prioritized<br />

control of the supply flow: Lines at the gate such as before the introduction<br />

of the system are something of the past. Material arrives at<br />

the offloading point “just in time”. The number of trucks on-site is<br />

reduced. All the vehicle movements are transparently saved in the database<br />

by Sicalis RTL. In case of damages, claims for alleged waiting<br />

times at goods receiving, the archived transaction data can be used to<br />

check the actual waiting times.<br />

176


15 <strong>RF<strong>ID</strong></strong> at the airport<br />

Regina Schnathmann<br />

For operative <strong>and</strong> economical considerations in the aviation industry,<br />

the optimization of processes is the priority concerning top reliability<br />

<strong>and</strong> security <strong>with</strong> simultaneous, consistent cost optimization as its<br />

focus.<br />

15.1 <strong>Processes</strong> in airport logistics<br />

Increasing international competition <strong>with</strong> new participants (especially<br />

low-budget airlines) <strong>and</strong> more stringent security regulations<br />

alongside parallel growth in the number of passengers <strong>and</strong> airfreight<br />

quantities have considerably influenced the framework market<br />

conditions throughout the past few years. Innovative technologies<br />

also provide an answer to the changed framework conditions <strong>and</strong><br />

future requirements that create lasting benefits both in the area of<br />

processes <strong>and</strong> <strong>with</strong> regard to the costs. Solutions based on <strong>RF<strong>ID</strong></strong> technology<br />

that are also being used more <strong>and</strong> more frequently at airports<br />

are providing an important contribution.<br />

Above all, <strong>RF<strong>ID</strong></strong> applies its strength in places where there are large<br />

numbers of objects (Fig. 15.1). Where there are millions of passengers<br />

<strong>with</strong> corresponding large amounts of baggage <strong>and</strong> air-freight<br />

volume, which is always on the increase, <strong>RF<strong>ID</strong></strong> provides several advantages<br />

for use in airports <strong>and</strong> for airlines for passenger, baggage, <strong>and</strong><br />

cargo logistics. The highest optimization expectations <strong>with</strong>in passenger<br />

h<strong>and</strong>ling are in the area of passenger tracking.<br />

The latest figures speak of a volume of transported pieces of baggage<br />

of approximately 2.25 billion items per year [1] <strong>with</strong> an upward trend.<br />

The requirements resulting from this trend will not be manageable<br />

using the technology that has been used to date. New technologies<br />

<strong>and</strong> systems are called for that enable comprehensive, integrated<br />

baggage management worldwide, marking the baggage clearly <strong>and</strong><br />

securely, guiding, tracking, following <strong>and</strong> delivering <strong>and</strong>, if neces-<br />

177


15 <strong>RF<strong>ID</strong></strong> at the airport<br />

Access <strong>and</strong> driven<br />

access control<br />

Inventory localization<br />

Fig. 15.1 <strong>RF<strong>ID</strong></strong> technology in the airport area<br />

sary, tracing it quickly – all of this for the entire course of a passenger’s<br />

journey.<br />

By tracking passenger flows, airport operators hope to increase security<br />

<strong>and</strong> improve the predictability of their processes. This would be<br />

accompanied <strong>with</strong> the minimization of the resources used. The use of<br />

<strong>RF<strong>ID</strong></strong>-based tickets <strong>and</strong> corresponding display systems provides the<br />

air passenger more <strong>and</strong> current information, for example for finding<br />

the correct departure gate or individual flight timetable changes as<br />

well as on other data relevant to travel. Customer retention <strong>and</strong> also<br />

customer satisfaction can be increased considerably. However, the<br />

passengers have some reservations <strong>with</strong> regard to data protection.<br />

In addition, in the check-in area the persons responsible for the introduction<br />

of <strong>RF<strong>ID</strong></strong> expect automation of the sub-processes: registration,<br />

baggage check-in, <strong>and</strong> receipt of the boarding pass to a large extent.<br />

Ticketless flying is on the rise, especially among business travelers.<br />

The possibility also to do <strong>with</strong>out the typical boarding pass as a paper<br />

document in the passenger process makes the use of the new technology<br />

attractive. The data required for the current flight could be input<br />

to the airline’s individual bonus card in the future.<br />

178<br />

Employee<br />

identity cards<br />

Baggage h<strong>and</strong>ling<br />

Ticketless<br />

flying<br />

Check-in registration<br />

Inventory identification<br />

(apron vehicles, catering trolleys, pallets)<br />

Passenger<br />

tracking<br />

ULD tagging<br />

Baggage sorting<br />

Baggage<br />

h<strong>and</strong>ling<br />

system<br />

VIP smart cards<br />

Cargo h<strong>and</strong>ling


15.1 <strong>Processes</strong> in airport logistics<br />

The other large area of use for <strong>RF<strong>ID</strong></strong> systems is baggage transport <strong>and</strong><br />

its several sub-processes. Especially large-scale airports such as<br />

Frankfurt, Dubai, <strong>and</strong> Peking transport the baggage items on kilometer-long<br />

track systems in individual containers. Sorting systems ensure<br />

that the baggage items are correctly discharged at the right<br />

place. An <strong>RF<strong>ID</strong></strong> system here consists of the combination of a mobile or<br />

stationary read-write device <strong>and</strong> the transponders on the transport<br />

containers. When integrated in baggage management, the system can<br />

automatically determine where the case or container is <strong>and</strong> its status<br />

in all the transport sections. This makes goods flow transparent <strong>and</strong><br />

enables the complete documentation of all the baggage flows.<br />

In particular, for baggage h<strong>and</strong>ling <strong>and</strong> sorting, the desire to replace<br />

traditional barcode marking attached to baggage at check-in exists.<br />

Although the initial costs are lower if barcodes are used, the follow-up<br />

costs entail higher expenditure. As when you wear glasses, the barcode<br />

scanner must be cleaned regularly at short intervals. If this is<br />

not performed, the read rate worsens <strong>and</strong> the costs increase. According<br />

to the latest figures, misdirection or baggage loss costs the industry<br />

almost 24.4 billion euros per year. Cost advantages arise here<br />

through speeding up h<strong>and</strong>ling <strong>and</strong> comparatively low servicing<br />

costs. Often inefficient <strong>and</strong> expensive tracking of the baggage items<br />

becomes redundant through the automatic <strong>and</strong> complete monitoring<br />

of the goods flow. This, therefore, increases the entire throughput in<br />

the logistics chain.<br />

A further positive effect results <strong>with</strong> regard to customer benefits: the<br />

passenger can be provided <strong>with</strong> detailed information regarding the<br />

location of their baggage at all times. Tracking jobs when searching<br />

for baggage becomes simpler because it is easier to reconstruct<br />

where the baggage has been transported to. This should mean that<br />

waiting for a mistakenly incorrectly checked-in baggage item at the<br />

destination airport will soon be outdated. Due to the increased security<br />

measures, it is conceivable that <strong>RF<strong>ID</strong></strong> solutions will be used as<br />

transponders on cases upon entering airport grounds. Unattended<br />

baggage could be removed quickly <strong>and</strong> efficiently using <strong>RF<strong>ID</strong></strong> or allocated<br />

back to the passenger.<br />

Currently, <strong>RF<strong>ID</strong></strong> systems are most frequently introduced for internal<br />

company applications. Contactless employee identification cards are<br />

used at several airports <strong>with</strong>in the scope of access <strong>and</strong> entrance controls.<br />

At the same time, <strong>RF<strong>ID</strong></strong> transponders are used to localize <strong>and</strong><br />

identify inventory. Examples of this include locating trolleys <strong>with</strong>in<br />

the airport building <strong>and</strong> tracking apron vehicles.<br />

179


15 <strong>RF<strong>ID</strong></strong> at the airport<br />

As for all other <strong>RF<strong>ID</strong></strong> projects, the profitability through savings in the<br />

process flows must initially be proven for airport applications. However,<br />

in addition to this, security aspects play an important role when<br />

investment decisions are made. As the business processes in airport<br />

logistics are very clear for the specific area of airport logistics, they<br />

can quickly be examined in detail. The major emphasis is placed on<br />

the optimization potential by the long-term use of new technologies<br />

<strong>and</strong> their introduction in several phases, ensuring the smooth continuation<br />

of operations, <strong>and</strong> designing an unproblematic system<br />

transition.<br />

15.2 Areas of use for <strong>RF<strong>ID</strong></strong> in airport logistics<br />

15.2.1 Process optimization on the airside <strong>and</strong> l<strong>and</strong>side<br />

<strong>Processes</strong> take place in different areas at airports: a distinction is<br />

made between the airside <strong>and</strong> l<strong>and</strong>side. The airside area includes all<br />

the processes that take place after security checks <strong>and</strong> on the movement<br />

areas for the aircraft. Access authorization there is highly restricted.<br />

The l<strong>and</strong>side processes take place where these restrictions<br />

do not exist, e.g. where the terminal is, all the public roads, shops,<br />

<strong>and</strong> hotels. Now, <strong>RF<strong>ID</strong></strong> technology is already used in several application<br />

areas: for example, <strong>with</strong>in the airport itself it is used to manage<br />

catering trolleys. But <strong>RF<strong>ID</strong></strong> is also drawn on more <strong>and</strong> more for freight<br />

transport. Various goods <strong>and</strong> machines must be tracked in the socalled<br />

airside area. And ultimately, <strong>RF<strong>ID</strong></strong> systems are also used for servicing<br />

valuable components <strong>with</strong>in the transport systems. The transponders<br />

that are used must be certified <strong>and</strong> approved by the Federal<br />

Aviation Administration (FAA) or the German Luftfahrt-Bundesamt.<br />

Along <strong>with</strong> baggage h<strong>and</strong>ling <strong>and</strong> baggage sorting, the important areas<br />

of baggage-passenger reconciliation <strong>and</strong> the limitation of baggage<br />

loss can be implemented using <strong>RF<strong>ID</strong></strong> systems.<br />

Some examples of systems <strong>and</strong> applications that have been realized<br />

at international airports or for international airlines:<br />

• Cincinnati International Airport – Real-time flight information is<br />

used to improve ground support functions.<br />

• Newark International Airport – Airside vehicles are “tracked” in<br />

order to hinder access by non-authorized persons in the protected<br />

areas.<br />

180


15.2 Areas of use for <strong>RF<strong>ID</strong></strong> in airport logistics<br />

• The airline Air Canada – The catering equipment is tracked in realtime<br />

in order to avoid loss <strong>and</strong> theft <strong>and</strong> to improve utilization.<br />

• Hong Kong International Airport – The loading devices in the<br />

freight area are equipped <strong>with</strong> transponders at Hong Kong International<br />

Airport.<br />

• Zaventem Brussels <strong>and</strong> Arl<strong>and</strong> Stockholm – Baggage is transported<br />

here in “old” <strong>and</strong> re-useable boxes that are automatically guided to<br />

the correct loading points.<br />

• Toronto <strong>and</strong> Vancouver Airports – Suppliers <strong>and</strong> staff can only<br />

enter areas of restricted access through Smart Card entry controls.<br />

• Swissair/Sabena – Zurich Airport – in order to make check-in <strong>and</strong><br />

access to the VIP lounge easier, approx. 70,000 “frequent fliers”<br />

own Zürich Airport Smart Cards. Emirates Airlines offers its frequent<br />

flier customers the possibility to use the e-gates at Dubai Airport<br />

<strong>with</strong> their frequent flier card when leaving or entering the<br />

country.<br />

The major application area for <strong>RF<strong>ID</strong></strong> systems is on the l<strong>and</strong>side that is<br />

mostly observed below.<br />

15.2.2 <strong>RF<strong>ID</strong></strong> on container transport container<br />

transport systems<br />

The current common equipping of logistics systems <strong>with</strong> <strong>RF<strong>ID</strong></strong> takes<br />

place directly on the transport system containers. Instead of barcode<br />

recognition, <strong>RF<strong>ID</strong></strong> technology is installed. Small modules <strong>with</strong> the<br />

transponder are installed on the trays. The reader, antenna, <strong>and</strong> interface<br />

module are located on the track system. The transponder contains<br />

the data <strong>with</strong> the description, starting point, <strong>and</strong> target point.<br />

<strong>RF<strong>ID</strong></strong> should in no way be seen as a mere “modern barcode” – <strong>RF<strong>ID</strong></strong><br />

achieves considerably more: compared to conventional technology<br />

where the information where the container should be driven to is<br />

provided to the system by the higher-ranking control level, this information<br />

is already directly available on each individual container.<br />

Therefore, the container can move faster <strong>and</strong> more securely <strong>with</strong>in<br />

the system. However, an <strong>RF<strong>ID</strong></strong> transponder is also superior in case of<br />

short-term changes such as a gate changes as it is rewriteable (Fig.<br />

15.2). <strong>RF<strong>ID</strong></strong> provides improved efficiency in baggage management.<br />

Moreover, the installation of scanner gates becomes superfluous. Finally,<br />

the read rate is far higher than for traditional barcode systems.<br />

181


15 <strong>RF<strong>ID</strong></strong> at the airport<br />

Fig. 15.2 <strong>RF<strong>ID</strong></strong> technology in a container transport system (Photo: W. Geyer)<br />

This reduces the total amount of misrouted baggage, in turn reducing<br />

the baggage h<strong>and</strong>ling costs. <strong>RF<strong>ID</strong></strong> readers are easier to install, reliable,<br />

resistant to errors, <strong>and</strong> more robust in “rough” surroundings.<br />

15.2.3 <strong>RF<strong>ID</strong></strong> BagTag<br />

The latest developments concern the identification of the baggage<br />

items directly on the cases. The basis for this is the belt conveyor system<br />

where the baggage items are placed loosely <strong>and</strong> are each<br />

equipped <strong>with</strong> a so-called “BagTag”. With it, all the important <strong>and</strong> relevant<br />

information is attached directly to the baggage. The system<br />

components used for this purpose are based on the IATA (International<br />

Air Transport Association) RP1740c recommendations. The<br />

baggage items are equipped <strong>with</strong> UHF transponders here. The data is<br />

read in real-time, processed, <strong>and</strong> provided to the superior baggage<br />

management system.<br />

With their Simatic RBS, Siemens has developed a reader station for<br />

the new kind of baggage marking (Fig. 15.3). The new system was<br />

tested using exhaustive long-term tests under realistic conditions in<br />

the Siemens Airport Center in Germany in order to ensure functional<br />

security <strong>and</strong> throughput for its practical application. One of its first<br />

applications is at Wuhan Airport in China. The technology used is<br />

easy to integrate in existing baggage transport technology. This simplifies<br />

installation <strong>and</strong> commissioning, enables the precise planning<br />

182


15.2 Areas of use for <strong>RF<strong>ID</strong></strong> in airport logistics<br />

of the time required for such <strong>and</strong> ensures system reliability from the<br />

onset.<br />

The system, which is tailored for baggage h<strong>and</strong>ling requirements at<br />

airports, increases baggage management efficiency <strong>and</strong> is easy to integrate.<br />

The read rate is considerably higher than for traditional barcode<br />

systems: it is over 99 % under realistic conditions.<br />

Fig. 15.3 <strong>RF<strong>ID</strong></strong> BagTag: on the left-h<strong>and</strong> side the <strong>RF<strong>ID</strong></strong> transponder in the<br />

baggage trailer, on the right-h<strong>and</strong> side the Simatic RBS reader station<br />

(Left photo: W. Geyer)<br />

If we progress further <strong>with</strong> technological developments here, the reusability<br />

of the transponders could also be an acceptable solution. In<br />

this case, the <strong>RF<strong>ID</strong></strong> transponders would not be torn off <strong>and</strong> destroyed<br />

after use as executed at present. Instead they would be reused several<br />

times. A further solution would be to fully integrate the transponder<br />

in the case. If the transponder already contained security-relevant information,<br />

the second screening could be saved as the contents of the<br />

case are already known. However, data protection plays an important<br />

role here. We propose deleting all the data when leaving the airport<br />

area. This could hinder access to the information stored.<br />

15.2.4 <strong>RF<strong>ID</strong></strong>-supported servicing<br />

For the service <strong>and</strong> maintenance areas of use, <strong>RF<strong>ID</strong></strong> systems are also<br />

used to store the service history in the respective objects’ transponder.<br />

Such marking is also worthwhile for high-value individual components<br />

in a baggage transport system. In other words, the security<br />

183


15 <strong>RF<strong>ID</strong></strong> at the airport<br />

for high-value products also justifies the use of <strong>RF<strong>ID</strong></strong> technology. The<br />

important areas of use still include: maintenance <strong>and</strong> inventory<br />

management systems <strong>and</strong> locating objects belonging to companies<br />

such as fire protection valves, baggage trolleys, spare parts, <strong>and</strong> vehicles.<br />

For example, at Frankfurt Airport, the fire protection valves have<br />

been serviced via <strong>RF<strong>ID</strong></strong> for several years already. The legislators have<br />

assigned long-term duty of proof of maintenance. The preparation of<br />

job sheets in this connection was a challenge <strong>with</strong> regard to archiving<br />

<strong>and</strong> also retrieving when fulfilling the obligation to provide proof.<br />

Due to media breakage, there was also a high error quota: the order<br />

data had to be entered in the data systems later <strong>and</strong> manually. Moreover,<br />

no information <strong>with</strong> regard to services carried out could be<br />

stored or attached to the fire protection valves. Therefore, it was difficult<br />

to prove whether servicing had been carried out in an orderly<br />

manner. With the <strong>RF<strong>ID</strong></strong> system, the service employee’s identification<br />

card can now be directly recorded on location when servicing takes<br />

place. The order data are provided to the employee via a h<strong>and</strong>held<br />

device, which is connected to logging <strong>and</strong> mobile reporting back.<br />

<strong>RF<strong>ID</strong></strong> is also used for identity card allocation <strong>and</strong> invoicing. It is, therefore,<br />

possible to file orders directly <strong>with</strong> no media breakage <strong>and</strong> no<br />

data loss as the data is entered once. Servicing can only be entered<br />

after the transponder has been read into the system: therefore, proof<br />

of the actual implementation of the work is provided.<br />

15.2.5 Improvement in the catering area<br />

The h<strong>and</strong>ling of the trolleys for passenger catering is a further area<br />

where <strong>RF<strong>ID</strong></strong> technology is used. As established by IATA in an examination,<br />

the total savings potential in this area amounts to nearly $470<br />

million USD per year. What are the relevant indicators of these applications?<br />

The area includes trolley tracking, vehicle servicing, <strong>and</strong> inventory<br />

management – data gathering of the contents of the trolley tables.<br />

Trolley tracking means that it is known where the trolley table is currently<br />

located, either always or at key positions <strong>with</strong>in the overall process.<br />

On top of the information as to what is in the trolley, inventory<br />

management of the trolleys includes data on the transponders, when<br />

a trolley must be sent to a flight, when it must be returned to the supplier,<br />

to the caterer or to the airline store. Here, it is important to have<br />

a fast control of the food <strong>and</strong> drinks that have been delivered. It must<br />

184


15.2 Areas of use for <strong>RF<strong>ID</strong></strong> in airport logistics<br />

be assured, at least for the traditional carriers who normally have a<br />

contract <strong>with</strong> the caterers, that they are always served <strong>and</strong> that all the<br />

flights are adequately equipped. A sophisticated selection of food <strong>and</strong><br />

drinks calls for good stocks of the most varied of items. Traditional<br />

carriers do not earn any “additional money” by selling food. Quite the<br />

opposite is true for the discount airlines: the contents <strong>and</strong> trolley<br />

tracking are weighted differently by business partners.<br />

For example, necessary repair work on the trolley is recorded on the<br />

transponders. Moreover, the anticipatory servicing that is controlled<br />

by the frequency of use, can be noted by the transponders. Airlines<br />

<strong>and</strong> caterers see their greatest advantage in improved tracking here.<br />

Content tracking is in the foreground of the thoughts made by authorities<br />

<strong>and</strong> aircraft operators. Therefore, short-term advantages<br />

due to <strong>RF<strong>ID</strong></strong>-controlled trolley servicing <strong>and</strong> content tracking are<br />

achieved in all three process areas. For example, sample projects have<br />

been carried-out at KLM <strong>and</strong> Lufthansa. IATA itself has made precise<br />

process analyses in the catering area.<br />

15.2.6 <strong>RF<strong>ID</strong></strong> in Cargo Logistics<br />

The current air-freight figures from the Working Group for German<br />

Airports [Arbeitsgemeinschaft Deutscher Verkehrsflughäfen (ADV)]<br />

are increasing healthily. Similar to passenger developments, the cargo<br />

volume is also rising steeply. In Germany alone, for example, the<br />

air-freight volume by July 2007 rose by 4.3 % to nearly two million<br />

tons. This trend also reflects the world market. In order to determine<br />

precisely where the goods are, it makes sense to use <strong>RF<strong>ID</strong></strong> systems in<br />

the cargo area. Transponders are attached to Unit Load Devices (ULD).<br />

However, the application of <strong>RF<strong>ID</strong></strong> in all areas of logistics <strong>and</strong> warehousing<br />

reaches beyond the aviation industry as external participants<br />

(for example, logistics service providers) are also involved in<br />

the process chain.<br />

In case of goods production where the products are sent from the<br />

production facility by overl<strong>and</strong> shipment, then by air-freight <strong>and</strong><br />

again by overl<strong>and</strong> shipment to the user’s works <strong>and</strong> where a continuous<br />

information chain exists, it makes sense to use continuous <strong>RF<strong>ID</strong></strong><br />

<strong>with</strong> st<strong>and</strong>ardized logs <strong>and</strong> formats. Inventory management, maintenance,<br />

<strong>and</strong> h<strong>and</strong>ling provide good application options for this technology<br />

in the cargo area. Air-freight companies, therefore, frequently<br />

have several thous<strong>and</strong> consignments per transport. In such cases, it<br />

is an important advantage to know what goods are where.<br />

185


15 <strong>RF<strong>ID</strong></strong> at the airport<br />

15.2.7 Advantages due to <strong>RF<strong>ID</strong></strong><br />

Although the barcode reading gates are cheaper to purchase than<br />

<strong>RF<strong>ID</strong></strong> readers, they incur higher servicing costs due to their mechanical<br />

complexity. Moreover, they have a lower reading speed than <strong>RF<strong>ID</strong></strong><br />

systems. Experts, therefore, see considerable cost advantages for<br />

<strong>RF<strong>ID</strong></strong> systems in the area of baggage management when viewing processes<br />

holistically.<br />

What advantages do these systems offer customers? A baggage system<br />

using <strong>RF<strong>ID</strong></strong> can be more secure for the passenger as cases are<br />

thereby not lost. Especially <strong>with</strong> a view to the new large aircraft such<br />

as the Airbus A380, fast passenger <strong>and</strong> freight processing are gaining<br />

importance. While passport control processes passengers <strong>with</strong> epassports<br />

faster, thus making check-in faster, baggage items <strong>with</strong><br />

<strong>RF<strong>ID</strong></strong> labels are loaded faster <strong>and</strong> more securely. The Emirates Airline<br />

provides a concrete example of the increased comfort they offer their<br />

passengers by using these systems. Owners of the frequent flier card<br />

“Skywards Gold” can use a fast E-gate access at Dubai Airport.<br />

The airport operators also profit from the introduction of <strong>RF<strong>ID</strong></strong>. The<br />

automatic monitoring of the baggage flow decisively increases<br />

throughput in the logistics chain, in turn lowering expenses for manual<br />

tracking. Using <strong>RF<strong>ID</strong></strong>, the whereabouts of the baggage item could<br />

become more transparent for the passenger. Finally yet importantly,<br />

such a system also results in customer loyalty due to its higher transparency.<br />

The increasing integration of the markets supports the use of <strong>RF<strong>ID</strong></strong><br />

systems. At the same time, the heart of the matter is to exploit the<br />

competitive advantages by systematic recording <strong>and</strong> controlling complex<br />

logistical interrelationships in the value-adding network. From a<br />

purely economic viewpoint, the intensified cost <strong>and</strong> competitive pressure<br />

on international markets supports more widespread use of <strong>RF<strong>ID</strong></strong><br />

systems. Above all, in applications <strong>and</strong> sectors, opportunities can be<br />

discovered where productivity progress should be achieved through<br />

improved automation. In total, the use of <strong>RF<strong>ID</strong></strong> will increase the transparency<br />

of the supply chain <strong>and</strong> the transaction costs for the companies<br />

will be reduced.<br />

15.3 Perspectives<br />

When developing <strong>RF<strong>ID</strong></strong> for air traffic, the focus is placed on measurable<br />

benefits. The IATA develops special analyses, st<strong>and</strong>ards, <strong>and</strong><br />

186


15.3 Perspectives<br />

business cases for many promising applications. The analyses are<br />

backed-up by application examples. If we look at the different airport<br />

sizes, it becomes apparent that the greatest need to act is at the large<br />

hubs. One focus of attention here is baggage processing <strong>and</strong> sorting<br />

because the volume of baggage <strong>and</strong> freight incurred is rising by approx.<br />

5-6 % per year. In order to cope <strong>with</strong> this volume, the reduction<br />

of misdirecting <strong>and</strong> even loss of baggage is highly significant. A further<br />

advantage: flight delays are reduced drastically by faster baggage<br />

identification if a passenger does not show up.<br />

<strong>RF<strong>ID</strong></strong> will also play an important role in passenger tracking. Baggage<br />

<strong>and</strong> freight tracking und the fastest possible processing can only be<br />

used efficiently if the passenger list is also complete <strong>and</strong> baggage <strong>and</strong><br />

passenger reconciliation has been successful. An electronic boarding<br />

pass <strong>with</strong> an <strong>RF<strong>ID</strong></strong> transponder may prove to support this process.<br />

<strong>RF<strong>ID</strong></strong> is more than just a technology for improving sorting performance<br />

<strong>and</strong> accuracy. On the contrary, the full potential of the technology<br />

is released if both the core processes <strong>and</strong> the supporting applications<br />

are observed throughout the entire added-value chain <strong>and</strong> the<br />

performance range of a system. Therefore, <strong>RF<strong>ID</strong></strong> is the key to creative<br />

design of new applications <strong>and</strong> efficient processes.<br />

References<br />

[1] See SITA: 4th Annual Baggage Report, 2008<br />

187


16 Postal automation<br />

Dr. Norbert Bartneck<br />

Postal services are one of the largest logistics services worldwide,<br />

considering the number of goods, letters <strong>and</strong> packages transported<br />

as well as collected, sorted, transported between the sorting centers<br />

<strong>and</strong> delivered (Fig. 16.1). These processes must take place at high<br />

speed, <strong>with</strong> high quality at a favorable price <strong>and</strong>, therefore, require<br />

optimized automation technology. Beside the mail-items as central<br />

goods, the containers are further objects for postal logistics, <strong>and</strong> their<br />

automatic identification is of central importance for process improvements.<br />

Until a few years ago, primarily automation was concentrated on the<br />

operative processes. Recently, monitoring <strong>and</strong> planning functions are<br />

playing a more important role to increase transparency <strong>and</strong> efficiency<br />

can further be increased. Examples of this include the administration<br />

of stocks of transport containers, checking consignments for completeness,<br />

checking consignments dispatched for the correct addressees,<br />

<strong>and</strong> monitoring of the trucks on the company’s premises. <strong>RF<strong>ID</strong></strong><br />

offers new opportunities to record the information required regarding<br />

the objects efficiently.<br />

Letter mailbox<br />

post<br />

Counter<br />

Preparation<br />

of business post<br />

<strong>and</strong> packages<br />

Fig. 16.1 Operative processes for postal logistics<br />

188<br />

Collection<br />

Abholung<br />

Large<br />

deliverers<br />

Sorting<br />

outgoing post<br />

Ausgangs-<br />

Sortierung<br />

Sorting<br />

incoming post<br />

EIngangs-<br />

Sortierung<br />

International International<br />

Delivery<br />

office<br />

Zustellamt<br />

PO<br />

boxes<br />

Mass receiver


16.1 <strong>Auto</strong> <strong>ID</strong> in postal logistics<br />

16.1 <strong>Auto</strong> <strong>ID</strong> in postal logistics<br />

The marking <strong>and</strong> identification (<strong>Auto</strong> <strong>ID</strong>) of the objects to be processed<br />

is a central topic for the automation of logistics. <strong>Auto</strong>matic<br />

identification is used to decide what particular object is being processed<br />

or what object category <strong>and</strong> how it must be processed, for example<br />

the direction. Such identification can have two different forms:<br />

as information readable by humans (for example, a written address)<br />

or as a machine-readable code (for example a barcode). <strong>Auto</strong>matic<br />

recognition takes place via optical systems or radio systems (RF readable).<br />

However, for processes requiring manual work steps the information<br />

should also be readable by humans.<br />

Two forms must be distinguished in the contents of the <strong>Auto</strong> <strong>ID</strong>: on<br />

the one h<strong>and</strong>, identification using a unique number <strong>and</strong>, on the other<br />

h<strong>and</strong>, storage of relevant data (for example, the address of a letter).<br />

Various <strong>Auto</strong> <strong>ID</strong> variants are used for postal logistics (Fig. 16.2):<br />

• Text information such as the address as logistical information for<br />

controlling mail processing or additionally attached notes such as<br />

the sender or advance provisions. The text information can be read<br />

automatically by using optical recognition systems.<br />

• Linear barcode <strong>with</strong> the address as coded logistical information<br />

(AdressCode) or <strong>with</strong> a item <strong>ID</strong>, recorded using optical reading systems.<br />

Forwarding address<br />

Target address<br />

Business reply mail<br />

Securing payment<br />

Fig. 16.2 Various <strong>Auto</strong> <strong>ID</strong> processes at the consignment level<br />

189


16 Postal automation<br />

• 2D barcode, being able to store a larger data quantity due to its twodimensional<br />

structure (for example stamps).<br />

• Fingerprint, an innovative method that uses the characteristic<br />

visual features of a mail-item for its identification (for example, the<br />

location <strong>and</strong> content of the address field <strong>and</strong> stamps).<br />

• <strong>RF<strong>ID</strong></strong> transponder <strong>with</strong> passive or active technology.<br />

All of these technologies have their specific strengths. For example,<br />

only text information can also be read <strong>and</strong> written by humans <strong>with</strong>out<br />

additional technical devices <strong>and</strong> also attached (written). On the<br />

other h<strong>and</strong>, barcodes are more easily machine readable <strong>and</strong> very<br />

cheap to attach. Address codes enable processing <strong>with</strong>out access to<br />

central servers <strong>and</strong> <strong>ID</strong> codes enable multiple-stage determination of<br />

an address (for example, first the destination location, then the road,<br />

<strong>and</strong> then the house number). On the other h<strong>and</strong>, the fingerprint can<br />

be applied <strong>with</strong>out any additionally attached codes, meaning a considerable<br />

advantage for business mail <strong>and</strong> print products. Last but<br />

not least, <strong>RF<strong>ID</strong></strong> offers specific advantages such as group recording,<br />

writability, <strong>and</strong> reading <strong>with</strong>out visual line-of-sight. In general all<br />

<strong>Auto</strong> <strong>ID</strong> technologies are used in different applications.<br />

Mail items<br />

Whereas letters <strong>and</strong> flats from private senders or small companies<br />

contain their information mostly as printed text or h<strong>and</strong>written addresses,<br />

mail from large suppliers <strong>and</strong> packets often include additional<br />

barcode information (linear <strong>and</strong> 2D codes). The attached address<br />

in plain text is decoded for sorting <strong>and</strong> transferred to the sorting<br />

machine. As all postal consignments must be sorted at least twice,<br />

an extra code is added for simplification purposes. The fingerprint<br />

can be used for applications where the later attachment of a barcode<br />

is technically awkward or disturbs (the entire letter is photographed).<br />

This is of special advantage for flats to which it is expensive to attach<br />

a barcode later due to the wide variety of envelope design.<br />

Containers<br />

Today’s solutions note the information required (direction, mail type)<br />

on labels that are attached to the containers. This information is attached<br />

extra as a barcode for automated solutions where the containers<br />

are transported to the processing stations using automated transport<br />

systems. Innovative approaches to automatic container manage-<br />

190


16.2 <strong>RF<strong>ID</strong></strong> – the innovative <strong>Auto</strong> <strong>ID</strong> technology<br />

ment use <strong>RF<strong>ID</strong></strong> technology as its strengths (group reading, no visual<br />

contact required) can be used well here <strong>and</strong> the cost disadvantages as<br />

opposed to a barcode are less relevant as the transponders are reused.<br />

Trucks<br />

Solutions used to date identify trucks <strong>and</strong> loading devices either by<br />

using their number plate, which is the official vehicle’s number plate,<br />

or a transport number. Similarly to container management, innovative<br />

approaches to automatic depot <strong>and</strong> transport management use<br />

more <strong>and</strong> more <strong>RF<strong>ID</strong></strong> technology as the high range of <strong>RF<strong>ID</strong></strong> enables<br />

considerable process improvement.<br />

16.2 <strong>RF<strong>ID</strong></strong> – the innovative <strong>Auto</strong> <strong>ID</strong> technology<br />

Whereas postal logistics has successfully used barcodes for several<br />

years, the importance of <strong>RF<strong>ID</strong></strong> technology has only been gaining<br />

ground during the past few years. Due to the cost of the transponders,<br />

the <strong>RF<strong>ID</strong></strong> applications’ focus is on containers <strong>and</strong> transport vehicles.<br />

As the <strong>RF<strong>ID</strong></strong> transponders are used several times for these applications,<br />

the question of costs plays a lesser role here than for mail<br />

items where the transponders can only be used once. UHF technology<br />

<strong>with</strong> passive transponders, read ranges of up to ten meters <strong>and</strong> robust<br />

read rates has been applied for postal automation. The simplest<br />

transponder form, the so-called Smart Labels, cost less than 0.20 euros<br />

<strong>and</strong> is well-suited for the identification of the typical plastic containers.<br />

On a metallic surface as can be frequently found on containers<br />

enable sufficiently good readability. Active transponders are used<br />

for applications that require a longer range. In this case, tags can be<br />

used in the 2.45 or 7 GHz range, achieving ranges of 50 meters or<br />

more.<br />

To capture the <strong>RF<strong>ID</strong></strong> transponder information in postal applications,<br />

various different system configurations are required, depending on<br />

the specific requirements <strong>and</strong> the existing environment.<br />

Capturing individual mail items in sorting systems<br />

Sorting systems can be divided in sorting machines designed for high<br />

throughput for large letters <strong>and</strong> flats <strong>and</strong> in material h<strong>and</strong>ling systems<br />

for packets <strong>and</strong> containers. For cost reasons, <strong>RF<strong>ID</strong></strong> does not play<br />

191


16 Postal automation<br />

a practical role for letters <strong>and</strong> flats today. Special scan gates are used<br />

for capturing the information along the conveyor systems or <strong>RF<strong>ID</strong></strong><br />

tunnels that read or program the <strong>RF<strong>ID</strong></strong> transponders. They are installed<br />

over the transport route <strong>and</strong> are capable of separating sequential<br />

objects <strong>with</strong> a high degree of reliability.<br />

<strong>RF<strong>ID</strong></strong> gates<br />

As opposed to small containers that are transported over automatic<br />

conveyor routes, the large transport containers (roll containers, pallets)<br />

are transported manually or by using ground conveyor vehicles.<br />

Stationary installations (<strong>RF<strong>ID</strong></strong> gates), which record the <strong>RF<strong>ID</strong></strong> transponders<br />

as they pass through (Fig. 16.3), are suitable for applications<br />

where the containers are transported through defined gates. The antennas<br />

are either integrated directly in the dock doors on the sorting<br />

center’s ramps or realized <strong>with</strong> specific constructions. In order to determine<br />

the actual direction of transport, these gates are equipped<br />

<strong>with</strong> additional sensors. These are often simple photoelectric barriers<br />

that are able to determine the direction of an object moving through<br />

a gate. <strong>RF<strong>ID</strong></strong> gates enable the simultaneous capturing of a large transport<br />

container <strong>and</strong> the included letter boxes.<br />

Fig. 16.3 A typical gate construction<br />

192


<strong>RF<strong>ID</strong></strong> localization<br />

16.2 <strong>RF<strong>ID</strong></strong> – the innovative <strong>Auto</strong> <strong>ID</strong> technology<br />

Applications that enable permanent determination of the position of<br />

containers in a room or a plot of l<strong>and</strong> require active localization<br />

(RTLS). For simple solutions, it suffices to know that the object<br />

searched for is in the capturing range of a reader unit. Higher-performance<br />

systems enable the precise localization of the object by using<br />

several receiver devices. These locating systems achieve nowadays<br />

ranges of 50-100 m indoors <strong>and</strong> 100-200 m outdoors, <strong>with</strong> an accuracy<br />

of one meter.<br />

Recording using mobile readers<br />

Capturing data by mobile readers is a common recording method in<br />

the logistics area. The information regarding the object (packet or<br />

container) is read by employees using an <strong>RF<strong>ID</strong></strong> h<strong>and</strong>held reader <strong>and</strong><br />

transmitted to the corresponding system together <strong>with</strong> further information<br />

(for example, the measurement position, workplace, <strong>and</strong><br />

time).<br />

16.2.1 <strong>RF<strong>ID</strong></strong>-based application systems<br />

<strong>RF<strong>ID</strong></strong> technology is constantly gaining ground at the container <strong>and</strong><br />

load carrier levels for postal applications of which the most important<br />

are described below.<br />

Asset management (Asset tracking <strong>and</strong> management system)<br />

Crucial assets are pallets <strong>and</strong> roll containers for transporting the mail<br />

items in the postal sphere as well as Unit Load Devices (ULD) <strong>and</strong> pallets<br />

for air cargo. The large quantity of these assets represents a considerable<br />

value for the companies. Without systematic control, the<br />

containers are subject to continuous loss <strong>and</strong> substantial consequential<br />

costs. Prompt <strong>and</strong> locally suitable availability of the containers is<br />

decisive for efficient implementation of the transport processes.<br />

Asset management provides functions for tracking, compensation,<br />

<strong>and</strong> maintenance of these assets, including comprehensive reporting<br />

<strong>and</strong> high-performance event management. The basis of these functions<br />

is the continuous recording of asset movements <strong>and</strong> the constant<br />

inventory enabled by such, based on <strong>RF<strong>ID</strong></strong>. Normally, the containers<br />

are moved by defined routes from the sender to the receiving<br />

customer. The most important points on these routes are the en-<br />

193


16 Postal automation<br />

trance <strong>and</strong> exit gates in the sorting centers or the depots where automatic<br />

capturing of the outgoing <strong>and</strong> incoming assets can be made using<br />

<strong>RF<strong>ID</strong></strong> gates. For this purpose, the assets are equipped <strong>with</strong> passive<br />

UHF transponders. If the applications additionally require recording<br />

asset movements <strong>with</strong>in large halls or open-air areas, then active localization<br />

solutions are needed.<br />

Dock <strong>and</strong> yard management<br />

The transport of the consignments to <strong>and</strong> between the sorting centers<br />

is carried out by trucks, consisting of tractors <strong>and</strong> various load<br />

carriers (trailers). Correct <strong>and</strong> efficient coordination <strong>and</strong> monitoring<br />

of these load carriers to <strong>and</strong> in the depots requires comprehensive<br />

systematics – using <strong>RF<strong>ID</strong></strong> as the information carrier. This includes<br />

checking entrance approval, allocation of ramp occupancy, allocation<br />

of the waiting <strong>and</strong> parking positions, as well as the provision of empty<br />

trailers. <strong>RF<strong>ID</strong></strong> plays a central role in the automation of these processes.<br />

A comprehensive dock <strong>and</strong> yard system requires the recognition<br />

of the transport units at defined positions (for example, the entrance<br />

to the depot or the loading <strong>and</strong> unloading ramps) as well as localization<br />

on the entire yard. To realize this, the loading devices are<br />

equipped <strong>with</strong> passive UHF transponders that are recorded by readers<br />

at the access gate <strong>and</strong> the ramps. For localizing the trailers that<br />

are on the depot premises, the loading devices are additionally<br />

equipped <strong>with</strong> active transponders for locating purposes.<br />

Arrival <strong>and</strong> dispatch management<br />

A further application field where <strong>RF<strong>ID</strong></strong> technology asserts its advantages<br />

is the delivery <strong>and</strong> distribution process in the sorting centers.<br />

While checking the correct compilation of the delivery is interesting<br />

upon arrival, incorrect transport destinations should be avoided<br />

when distributing. Upon delivery, the frequently prepared list of the<br />

letter containers as notified in advance <strong>with</strong> the consignment quantity<br />

is used <strong>and</strong> reconciled <strong>with</strong> the information recorded by <strong>RF<strong>ID</strong></strong> at the<br />

sorting center entrance. It can then be established whether a delivery<br />

is complete <strong>and</strong> correct.<br />

When the consignments are delivered, there is a risk potential of<br />

sending them to an incorrect destination (misrouting). Misrouting<br />

causes direct costs due to the then necessary extra transport as well<br />

as indirect costs resulting from customer dissatisfaction. The information<br />

provided regarding the intended direction of a transport, is<br />

194


16.2 <strong>RF<strong>ID</strong></strong> – the innovative <strong>Auto</strong> <strong>ID</strong> technology<br />

compared <strong>with</strong> the direction allocated to the containers, thus avoiding<br />

misrouting. The transport containers that are currently mostly<br />

plastic have to be equipped <strong>with</strong> UHF labels or metal-compatible transponders<br />

for an <strong>RF<strong>ID</strong></strong>-supported solution. <strong>RF<strong>ID</strong></strong> gates installed at the<br />

entrance <strong>and</strong> exit gates are used to capture the container data of when<br />

to transfer, which are read in bulk when passing the gate <strong>and</strong> transferred<br />

via middleware <strong>and</strong> the integration platform of the application<br />

software.<br />

Mail-item tracking<br />

Although <strong>RF<strong>ID</strong></strong> technology at mail-item level generally does not yet<br />

play a role due to the costs involved, it is already highly significant at<br />

quality control level. In order to ensure that quality of the processes<br />

<strong>and</strong> to identify possible weaknesses, the run-times of the items on the<br />

individual routes between the sender <strong>and</strong> recipient must be monitored.<br />

Two solution concepts are used for this task: on the one h<strong>and</strong>,<br />

a sensor-based measurement system that stores acceleration data on<br />

an electronic test letter <strong>and</strong> enables conclusions regarding the duration<br />

of different steps (for example, letter box, mail collector) when<br />

these data are analyzed at the end of the transport (for example, letter<br />

mailbox, post collector). This system works <strong>with</strong>out a network-wide<br />

infrastructure but it requires technically more complex test letters. A<br />

future extension of the test letter will include a navigation component<br />

to enable a time measurement as well as precise geographical tracking.<br />

The second concept uses <strong>RF<strong>ID</strong></strong>-based test letters, which are recorded<br />

at defined measurement points. A system such as this, for historic<br />

reasons is fundamentally based on relatively expensive semi-passive<br />

HF technology <strong>and</strong> is used by the international post organization<br />

(IPC) to determine the transportation time between the national postage<br />

companies. The on-going development <strong>and</strong> st<strong>and</strong>ardization of<br />

UHF technology makes it possible in the meantime to execute network-wide<br />

tracking using test letters, which are equipped <strong>with</strong> simple<br />

UHF Smart labels.<br />

195


16 Postal automation<br />

16.3 Outlook<br />

From the innovations that are under development, three topics<br />

should be mentioned <strong>with</strong> which we expect to achieve high additional<br />

application potential for postal automation.<br />

16.3.1 Printable transponders <strong>with</strong> polymer technology<br />

One hurdle when introducing <strong>RF<strong>ID</strong></strong> technology at the consignment<br />

level is the transponder price. We expect great progress here <strong>with</strong><br />

polymer technology <strong>with</strong> which we will succeed in manufacturing<br />

<strong>RF<strong>ID</strong></strong> chips using a mass-printing process <strong>and</strong>, therefore, combining<br />

the functional strengths of <strong>RF<strong>ID</strong></strong> technology <strong>with</strong> the price advantages<br />

of the barcode. Chapter 18 describes the details of this technology.<br />

16.3.2 <strong>RF<strong>ID</strong></strong> transponders <strong>with</strong> visual, readable information<br />

As humans play an important role in the post logistics process chain,<br />

they must be able to access the relevant control information <strong>with</strong>out<br />

needing additional technical devices. If a barcode is the information<br />

carrier, this is achieved by printing the plain text information on the<br />

labels next to the barcode. If the <strong>RF<strong>ID</strong></strong> transponders are written contactless,<br />

alternative technologies are required to achieve visual readability.<br />

Various projects are working on technologies to make the relevant<br />

control information from the information carrier visible.<br />

16.3.3 “Internet of things”<br />

Chapter 21 presents a future vision of logistics, whereby <strong>RF<strong>ID</strong></strong> plays a<br />

central role as an information carrier. Analogous to internet data, the<br />

objective is to control goods flows as flexibly as possible using local<br />

intelligence from the starting point to the target point. This means<br />

that the transport systems no longer depend on a central control system<br />

<strong>and</strong> a networked information system as the objects save the information<br />

locally. The transport process can adapt independently <strong>and</strong><br />

flexibly to changing situations. The local control concepts, software<br />

architecture, <strong>and</strong> <strong>RF<strong>ID</strong></strong> technology are worked on in large research<br />

projects managed by the Fraunhofer Institute for Materials Flow <strong>and</strong><br />

Logistics (IML) <strong>and</strong> <strong>with</strong> participating industrial partners such as Siemens.<br />

196


16.3.4 <strong>RF<strong>ID</strong></strong> in future postal logistics<br />

16.3 Outlook<br />

Liberalization <strong>and</strong> decentralization of postal services will further increase<br />

the requirements of postal logistics regarding productivity,<br />

quality, <strong>and</strong> flexibility. Postal service providers offer new services<br />

(3PL: Third Party Logistics, external logistics service providers) <strong>and</strong><br />

the processing of the post consignments is increasingly implemented<br />

by a network of service providers. All of this requires a high degree of<br />

transparency <strong>and</strong> controllability of the processes. Clear-cut interfaces<br />

must be created <strong>with</strong> regard to responsibility <strong>and</strong> costs. This offers<br />

opportunities for high-performance <strong>RF<strong>ID</strong></strong> solutions that will make a<br />

considerable contribution to master the challenges to future postal<br />

logistics.<br />

197


17 <strong>RF<strong>ID</strong></strong> in hospitals<br />

Thomas Jell<br />

Headlines such as “Scissors left in patient” or “Babies swapped after<br />

birth” keep appearing in the media. It is, therefore, not surprising<br />

that doctors <strong>and</strong> hospitals are increasingly confronted <strong>with</strong> the dem<strong>and</strong><br />

for more security for patients. On top of this, there are increasing<br />

dem<strong>and</strong>s by patients regarding their care, which additionally<br />

challenge the healthcare sector in times of tight budgets. Whether it<br />

is for the identification of patients, dosage of drugs, or tracking theater<br />

instruments <strong>and</strong> staff – <strong>with</strong> modern IT <strong>and</strong> Radio Frequency<br />

Identification (<strong>RF<strong>ID</strong></strong>) clearly improved security <strong>and</strong> care of patients is<br />

possible. Another aspect in favor of radio technology: Cost savings as<br />

well as faster, simpler, <strong>and</strong> yet secure management of patient data.<br />

17.1 Potential of <strong>RF<strong>ID</strong></strong> in the health sector<br />

Many decision makers can hardly imagine that data exchange via radio<br />

suffices to sufficiently <strong>and</strong> correctly care for patients. They do,<br />

however, become increasingly aware that the use of modern IT in hospitals<br />

can increase patient security or can even save lives. Results of<br />

<strong>RF<strong>ID</strong></strong> pilot projects in the USA <strong>and</strong> Germany already show a huge potential<br />

for the small chips in the health sector.<br />

An example of this is the location of foreign objects, so-called “alien<br />

objects”, which are left behind in the bodies of patients during operations<br />

<strong>with</strong> an average probability of 1:3,000 to 1:5,000 despite rigorous<br />

manual checks. In addition, this frequency rises <strong>with</strong> often unforeseen<br />

procedures. Objects are more frequently left behind in unusual<br />

operations <strong>and</strong> in emergency situations the risk is nine times<br />

higher. Consistent tracking of theater equipment <strong>with</strong> the aid of <strong>RF<strong>ID</strong></strong><br />

transponders, as is currently being tested in the “Klinikum rechts der<br />

Isar” in Munich, can significantly reduce this risk.<br />

The results of a study by the action group for patient security in 2007<br />

also call for increased use of <strong>RF<strong>ID</strong></strong> in hospitals: Because one in every<br />

198


17.2 Reference projects<br />

thous<strong>and</strong> of the approximately 17,000 fatalities in German hospitals<br />

could have been prevented. In the USA 44,000 to 98,000 patients die<br />

annually due to incorrect treatment or imprecise work. Solutions<br />

such as the <strong>RF<strong>ID</strong></strong> wrist straps that are being used in the “Klinikum<br />

Saarbruecken” or the patient card <strong>with</strong> <strong>RF<strong>ID</strong></strong> chip used by the MedicAlert<br />

organization in the USA, enable doctors to uniquely identify patients<br />

<strong>and</strong> provide important information about the case history or<br />

allergies. Mix-up of data or even people as well as drug errors can be<br />

prevented efficiently in this manner. Hospitals can at least partially<br />

protect themselves against economic damages <strong>and</strong> threatening loss<br />

of their good image due to mistakes <strong>with</strong> far reaching consequences<br />

or medical errors <strong>with</strong> the aid of <strong>RF<strong>ID</strong></strong>.<br />

17.2 Reference projects<br />

17.2.1 Jacobi Medical Center <strong>and</strong> Klinikum Saarbruecken<br />

At the Jacobi Medical Center in New York, a <strong>RF<strong>ID</strong></strong> pilot project for the<br />

identification of patients was started for the first time in 2004. Due to<br />

the radio chips, doctors <strong>and</strong> health care staff can identify patients<br />

quicker <strong>and</strong> easier <strong>and</strong> can access patient data easier <strong>and</strong> more securely.<br />

The Klinikum Saarbruecken is currently successfully testing<br />

the same solution, for which the US hospital was awarded the prize<br />

for the best medical innovation by the Health Care Research <strong>and</strong> Innovations<br />

Congress (HCRIC) in 2005.<br />

In Saarbruecken, selected patients of the station for internal medicine<br />

are participating in the project. They wear wrist straps <strong>with</strong> integrated<br />

<strong>RF<strong>ID</strong></strong> chips on which a number is saved, which is comparable to a barcode.<br />

Doctors <strong>and</strong> health care staff read this number <strong>with</strong>in seconds<br />

<strong>with</strong> a mobile unit, for instance a <strong>RF<strong>ID</strong></strong>-capable PDA, tablet PC, or mobile<br />

scanner, <strong>and</strong> immediately obtain important information for drug<br />

security such as age, weight, <strong>and</strong> size of the patient as well as their<br />

case history <strong>and</strong> measurement <strong>and</strong> laboratory values (Fig. 17.1). Hospital<br />

staff can then update this data during the course of treatment.<br />

This allows a more precise <strong>and</strong> faster input <strong>and</strong> transmission of the<br />

diagnosis, reduces error sources, saves error-prone paperwork, <strong>and</strong><br />

creates more time for attention to individual cases. Modern encryption<br />

technology guarantees protection against unauthorized access.<br />

A database <strong>with</strong> evaluation software, the electronic prescription system<br />

by RpDoc Solutions, verifies the correct allocation of drugs,<br />

199


17 <strong>RF<strong>ID</strong></strong> in hospitals<br />

Fig. 17.1 Reading patient data <strong>with</strong> a <strong>RF<strong>ID</strong></strong>-capable PDA <strong>with</strong>in seconds.<br />

based on the saved information. This ensures that the right patient is<br />

administered the right dosage of the drug at the right time in the<br />

right way. In case of an error, the system switches to red <strong>and</strong> explains<br />

the reason. This intelligent helper can save lives – for instance, in cases<br />

of illnesses such as kidney insufficiency, where even small wrong<br />

dosages can be fatal. Besides for increased security, the expert program<br />

offers another advantage: It knows the exact composition of the<br />

prescription <strong>and</strong> calculates the exact price of the drug per patient per<br />

day. If possible, the system then recommends cheaper equivalent generic<br />

drugs in order to save costs.<br />

Another advantage for patients is that they can make enquiries themselves.<br />

They can, for instance, enquire their state of health via an information<br />

terminal. This includes blood pressure, weight, treatment,<br />

<strong>and</strong> discharge dates. Furthermore, they have the option of informing<br />

themselves regarding the diagnosed illness <strong>and</strong> common types of<br />

therapy in many different languages.<br />

17.2.2 MedicAlert<br />

Siemens IT Solutions <strong>and</strong> Services together <strong>with</strong> MedicAlert in the<br />

USA are testing the use of <strong>RF<strong>ID</strong></strong>, in order to improve the emergency<br />

treatment of patients. The non-profit organization is a reliable part-<br />

200


17.2 Reference projects<br />

ner for the secure management of patient files <strong>and</strong> allows the exchange<br />

of medical information between patients <strong>and</strong> service providers.<br />

Up to now the approximately four million members were wearing<br />

a necklace <strong>with</strong> a medal onto which the identity of the bearer was engraved.<br />

Emergency staff then had access to the most important medical<br />

data via a 0800 telephone number.<br />

Since the end of 2006, some 3,500 MedicAlert members have been<br />

furnished <strong>with</strong> a plastic card <strong>with</strong> an integrated <strong>RF<strong>ID</strong></strong> chip. This allows<br />

smoother access to important information such as one’s general medical<br />

condition, case history, or allergies. This is of cardinal importance<br />

for emergency treatment of patients. Information about the patient’s<br />

doctor <strong>and</strong> closest relatives can also be lodged online <strong>with</strong> MedicAlert.<br />

Emergency staff can identify the person <strong>with</strong>in seconds via a PDA<br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong> reader, even through one’s clothing or the wallet. Therefore,<br />

from an information technology point of view, nothing is in the<br />

way of optimal <strong>and</strong> safe treatment at the site of an accident.<br />

When admitted to the California State University Hospital, the patient<br />

passes two <strong>RF<strong>ID</strong></strong> readers installed at the entrance to the emergency<br />

ward. After the <strong>RF<strong>ID</strong></strong> card has been read, they automatically establish<br />

a secure connection to the comprehensive MedicAlert database. Hospital<br />

staff members thereby immediately have comprehensive information<br />

at their disposal to treat the patient. From a technical point of<br />

view the patient card of MedicAlert is comparable to the German<br />

health card, whereby its implementation in the USA was many times<br />

faster. While advantages <strong>and</strong> disadvantages as well as data privacy<br />

legislation is still debated in Germany, the value of the <strong>RF<strong>ID</strong></strong> chip card<br />

has already convinced many Americans: Uncomplicated access to patient<br />

data expedites the diagnosis, avoids test repetitions for already<br />

diagnosed illnesses, improves the chances of detecting hidden illnesses,<br />

<strong>and</strong> improves the quality of care <strong>and</strong> security st<strong>and</strong>ards. Concerns<br />

regarding data privacy were solved quite simply: Patients enter<br />

the data for their files themselves via a web portal <strong>and</strong> the card reliably<br />

takes over the identification. If necessary, a doctor is available for<br />

assistance.<br />

17.2.3 “Klinikum rechts der Isar”<br />

The “Klinikum rechts der Isar” (University hospital on the right h<strong>and</strong><br />

side of the river Isar) of the Technical University of Munich is currently<br />

investigating the potential of <strong>RF<strong>ID</strong></strong> technology together <strong>with</strong> Siemens<br />

at different levels – from tracking of abdominal covers to over-<br />

201


17 <strong>RF<strong>ID</strong></strong> in hospitals<br />

all theater management, also involving suppliers. The objectives are<br />

multi-layered: Besides for a higher level of security for patients, the<br />

hospital aims for more exact planning of resources <strong>and</strong> operation<br />

procedures as well as optimized logistics. The workgroup “Minimalinvasive<br />

Interdisciplinary Therapeutic Intervention” (MITI) officially<br />

started a <strong>RF<strong>ID</strong></strong> project in March 2007 after two years of preparatory<br />

work, which is intended to run until 2010 for this purpose.<br />

Two aspects are in the foreground in the theater of the future: To minimize<br />

patient suffering as much as possible as well as to improve <strong>and</strong><br />

expedite all the work procedures (Fig. 17.2).<br />

Fig. 17.2 <strong>RF<strong>ID</strong></strong> could soon reduce the risk of errors during operations<br />

In the first step, MITI managers <strong>and</strong> the superintendent Prof. Hubertus<br />

Feußner along <strong>with</strong> his colleagues will investigate how abdominal<br />

covers can be tracked during an operation. Each abdominal cover is<br />

fitted <strong>with</strong> a transponder consisting of a micro chip <strong>with</strong> a copper or<br />

aluminum antenna. The readers required for reading the chips are<br />

situated directly underneath the instrument side board, underneath<br />

the operating table <strong>and</strong> in the container for used abdominal covers.<br />

Abdominal covers can be identified uniquely via the chip code.<br />

202


17.2 Reference projects<br />

The “Klinikum rechts der Isar” profits in a number of ways through<br />

the use of radio chips: On the one h<strong>and</strong>, each of the abdominal covers,<br />

which can be reused up to 20 times, can automatically be sorted <strong>and</strong><br />

replaced after the specified maximum number of cleaning <strong>and</strong> disinfection<br />

processes. This life cycle management will be the task of the<br />

laundry <strong>and</strong> is to be implemented for operation in 2008. On the other<br />

h<strong>and</strong>, it can be verified automatically how many used abdominal covers<br />

are in the container <strong>and</strong> how many are on the side board.<br />

If this number deviates from the initial count, the system triggers an<br />

alarm on a theater monitor. Normally, two employees always manually<br />

count <strong>and</strong> verify all the operating utensils before <strong>and</strong> after an operation.<br />

<strong>RF<strong>ID</strong></strong> can in the future present another security factor <strong>and</strong> reduce<br />

the risk of error.<br />

In a second phase of the project, MITI will furnish theater staff <strong>with</strong><br />

transponders in order to exactly track their movements at the workplace.<br />

This will allow a workflow prediction, which will lead to the<br />

highest degree of efficiency <strong>and</strong> security. The <strong>RF<strong>ID</strong></strong> system could for<br />

instance recognize when an operation nears its end <strong>and</strong> then automatically<br />

trigger processes: Theater staff <strong>and</strong> the anesthetist are informed<br />

that the next patient must be prepared for the operation. This<br />

system could in the same way detect unforeseen procedures <strong>and</strong> call<br />

for support. Scenarios such as these serve both the security of patients<br />

<strong>and</strong> an optimal utilization of resources <strong>and</strong> have a positive effect<br />

on the cost structure of the hospital.<br />

Doctors <strong>and</strong> theater staff attach an identification card <strong>with</strong> a <strong>RF<strong>ID</strong></strong><br />

transponder in the frequency range of 868 MHz for purposes of tracking<br />

presence <strong>and</strong> roles. No personal data is stored on the card, only<br />

role-related information such as “operating doctor” or “anesthetist”<br />

is entered. Thereby, potential criticism regarding data privacy is already<br />

curtailed. Antennas in the room register the movement of theater<br />

staff <strong>and</strong> transmit this data to the reader. After completion of the<br />

operation, each team member returns their card. Capturing of each of<br />

the actors when entering or leaving the theater provides valuable information<br />

regarding the phases of the operation.<br />

In order to further increase the security of the patient during operations<br />

<strong>and</strong> to prevent unnecessary suffering, the MITI team has further<br />

visions for the future: Fitting of theater instruments such as needles,<br />

scissors, <strong>and</strong> clamps <strong>with</strong> tags. Here, one would have to wait until<br />

suitable chips (acceptable size, temperature resistance, etc.) are available<br />

on the market. From a financial point of view the use of <strong>RF<strong>ID</strong></strong> is<br />

203


17 <strong>RF<strong>ID</strong></strong> in hospitals<br />

viable for the hospital: On average, costs of USD 90,000 arise for an<br />

abdominal cover that was left behind, if patients submit claims.<br />

17.3 The economical value of <strong>RF<strong>ID</strong></strong><br />

Regarding the use of <strong>RF<strong>ID</strong></strong> in the environment of patient processes,<br />

there will always be potential for technical improvement. Despite<br />

that, the current state of development is such that it allows worldwide<br />

marketing of <strong>RF<strong>ID</strong></strong> solutions in the health sector. The challenge is in<br />

convincing the responsible persons in hospitals of the economical<br />

value of radio technology <strong>and</strong> of achievable return on investment<br />

(ROI). Experts assume that hospitals can expect savings of single figure<br />

millions just by the reduction of drug errors <strong>with</strong> <strong>RF<strong>ID</strong></strong>. Besides<br />

for increased patient security, tracking <strong>and</strong> tracing of abdominal covers<br />

<strong>and</strong> theater staff can improve the economic viability of hospitals<br />

<strong>and</strong> relieve employees. In view of all these aspects, the substantial<br />

<strong>RF<strong>ID</strong></strong> investment could be amortized <strong>with</strong>in a foreseeable period.<br />

Hospitals <strong>with</strong> maternity wards will in the future not be able to avoid<br />

the introduction of <strong>RF<strong>ID</strong></strong> technology for the sure identification of<br />

newly born babies because of economic reasons. In order to gain parents-to-be<br />

as customers, they must be convinced of the quality of care<br />

for their offspring in the hospital. This includes keeping the risk of a<br />

baby mix-up as low as possible – <strong>and</strong> <strong>RF<strong>ID</strong></strong> makes this possible.<br />

17.4 <strong>RF<strong>ID</strong></strong> in the future<br />

Not only the abovementioned <strong>RF<strong>ID</strong></strong> projects in the health sector<br />

sound promising in view of improved patient processes. For the<br />

planned introduction of a full <strong>RF<strong>ID</strong></strong> identification system, also for the<br />

tracking of persons, for instance in the Imaging Science Institute (ISI)<br />

in Erlangen, Siemens, together <strong>with</strong> its partners, is developing new<br />

solutions for the improvement of patient security in 2008. In addition,<br />

all the involved parties continuously improve successfully implemented<br />

solutions.<br />

Radio range<br />

For instance, the company successively improves radio range. Currently,<br />

the read-out of the st<strong>and</strong>ard radio chips at a frequency of<br />

204


17.4 <strong>RF<strong>ID</strong></strong> in the future<br />

13.6 MHz, <strong>and</strong> mobile readers up to a range of 15 cm, functions very<br />

well. However, radio radii of up to one meter are requested by users.<br />

Only then can <strong>RF<strong>ID</strong></strong> chips of highly contagious patients be written<br />

<strong>and</strong> read <strong>with</strong>out a problem <strong>and</strong> <strong>with</strong>out the risk of infection.<br />

Dosage of drugs<br />

The Munich researchers also focus on innovation in order to improve<br />

drugs <strong>and</strong> <strong>with</strong> that patient security. An automatic dosage unit could<br />

be coupled to the expert system in order to reduce error sources in<br />

the dosage of drugs. It would fill the exact ration of drugs into a<br />

pouch fitted <strong>with</strong> <strong>RF<strong>ID</strong></strong> for every patient. When the drug is administered<br />

to the patient, the data on the package is compared <strong>with</strong> that of<br />

the recipient for the last time. In this way it is ensured that every patient<br />

is taken care of properly. Because of the relatively high transponder<br />

prices for this application, the efficient use of this solution is<br />

currently not yet possible. The use of cheaper polymer chips (see<br />

Chapter 18) could be a breakthrough.<br />

Monitoring of blood preserves<br />

Various Siemens sectors as well as a consortium of scientists <strong>and</strong><br />

technologists are profiting from the development of a new solution<br />

for blood bags, which is based on <strong>RF<strong>ID</strong></strong> chips. Here, blood preserves<br />

were fitted <strong>with</strong> <strong>RF<strong>ID</strong></strong> tags. The system monitors the blood along the<br />

entire transfusion chain, “from artery to artery” – i.e. from the donor<br />

through processing, distribution, storage, to transfusion. Fitted <strong>with</strong><br />

active transponders, the radio technology can trace the route of a<br />

blood product <strong>and</strong> a mix-up is virtually impossible.<br />

In addition, <strong>RF<strong>ID</strong></strong> has a temperature sensor that monitors the cold<br />

chain continuously <strong>and</strong> completely. Medical staff can immediately<br />

transmit product-specific defects to the reporting system, the “Hämovigilanz-Register”<br />

register via a web-based application. The register<br />

documents all the reported incidents <strong>with</strong> collected <strong>and</strong> processed<br />

blood products.<br />

Temperature monitoring is very complex, because differing temperature<br />

profiles must be maintained <strong>with</strong>in the transfusion chain. The<br />

<strong>RF<strong>ID</strong></strong> technology used here must resist different production processes<br />

such as pasteurizing or centrifuging. At the “University Clinic for<br />

Blood Group Serology <strong>and</strong> Transfusion Medicine at the Medical University<br />

of Graz” [“Universitätsklinik für Blutgruppenserologie und<br />

Transfusionsmedizin der Medizinischen Universität Graz”], passive<br />

205


17 <strong>RF<strong>ID</strong></strong> in hospitals<br />

Fig. 17.3 Blood bag <strong>with</strong> <strong>RF<strong>ID</strong></strong> chips<br />

<strong>RF<strong>ID</strong></strong> labels were subjected to an endurance test for the first time. The<br />

chips, which were fixed to blood bags, had to survive a sterilization<br />

<strong>and</strong> pasteurization process as well as centrifuging at up to Mach<br />

5,000. The blood bags were then supplied to the blood bank <strong>and</strong> were<br />

used there in a routine processing <strong>and</strong> hospital environment.<br />

Among others, proven <strong>and</strong> reliable chip, sensor <strong>and</strong> battery technologies<br />

are required for the use of <strong>RF<strong>ID</strong></strong> transponders <strong>with</strong> temperature<br />

sensors, which were developed <strong>and</strong> tested by “Schweizer Electronic<br />

AG” in Schramberg. The active <strong>RF<strong>ID</strong></strong> labels resulting from the test<br />

phases are currently being checked by the blood bag manufacturer<br />

MacoPharma according to specific criteria, which are decisive for the<br />

blood bank. After completion of the project in the blood bank of the<br />

University of Graz, which is planned for the end of 2008, registration<br />

<strong>with</strong> national <strong>and</strong> international authorities will be examined.<br />

<strong>RF<strong>ID</strong></strong> monitoring of risk patients<br />

Siemens plans to improve the quality of life of risk patients, such as<br />

dementia sufferers, in the future <strong>with</strong> <strong>RF<strong>ID</strong></strong> wrist straps. As an alternative<br />

to closed stations <strong>and</strong> institutions, the special wrist straps can<br />

be used, which will trigger an alarm when a specific area is exited.<br />

Patients can then move around freely, but institution staff is informed<br />

in due time if an “escapee” must be taken back to the room.<br />

206


17.5 Conclusion<br />

17.5 Conclusion<br />

In view of the already implemented <strong>RF<strong>ID</strong></strong> projects for patient security,<br />

it can be stated that the quality of treatment of patients <strong>and</strong> their security<br />

enjoy a very high priority, from a technical point of view. However,<br />

since the development of <strong>RF<strong>ID</strong></strong> technology for the health sector<br />

is still in its infancy, the sector can expect numerous novelties in the<br />

next few years.<br />

207


Part 4<br />

How to proceed?


18 <strong>RF<strong>ID</strong></strong> – printed on a roll<br />

Wolfgang Mildner<br />

In a joint venture of Siemens AG <strong>and</strong> the Leonhard Kurz Stiftung <strong>and</strong><br />

Co. KG, called PolylC, <strong>RF<strong>ID</strong></strong> will in the future be manufactured according<br />

to a new principle: By means of a roll-to-roll procedure, polymer<br />

printed electronics are to be produced quickly <strong>and</strong> efficiently. The<br />

electronics are thin <strong>and</strong> flexible <strong>and</strong> can easily be integrated into<br />

products (Fig. 18.1). The new manufacturing process promises significantly<br />

lower costs for <strong>RF<strong>ID</strong></strong> transponders. The basic technology of<br />

printed electronics, <strong>with</strong> the application of new materials <strong>and</strong> new<br />

manufacturing procedures, allows for the use of electronics (especially<br />

of <strong>RF<strong>ID</strong></strong>) in areas where this seemed to be impossible up to now<br />

for reasons of cost or space.<br />

Fig. 18.1 Poly<strong>ID</strong>®, a printed <strong>RF<strong>ID</strong></strong> transponder (Photo: PolyIC)<br />

210


18.1 Protection of trade marks <strong>with</strong> printed electronics <strong>and</strong> <strong>RF<strong>ID</strong></strong><br />

18.1 Protection of trade marks <strong>with</strong> printed<br />

electronics <strong>and</strong> <strong>RF<strong>ID</strong></strong><br />

Printed electronics creates new solutions for one of the burning problems<br />

in the consumer market: The ever increasing number of imitation<br />

products can be combated better <strong>with</strong> electronic <strong>and</strong> optical<br />

identification <strong>and</strong> authentication. In principle, everything seems to<br />

be quite easy: Manufacturers <strong>and</strong> distributors of quality products of<br />

any kind want to optimize internal processes, minimize costs, <strong>and</strong> establish<br />

their reputation <strong>and</strong> market position by means of flawless<br />

goods. End users expect flawless <strong>and</strong> authentic products for their<br />

money, which they can trust in every respect <strong>with</strong>out reservation.<br />

Unfortunately, reality is somewhat different at times. Almost not a<br />

single day goes by <strong>with</strong>out the media reporting about product imitations<br />

or risks through spoiled foodstuff <strong>and</strong> drugs. The one aspect<br />

causes economical damage that can hardly be expressed in figures<br />

any more, while the other on top of that threatens the health if not<br />

even the lives of those involved. The example of the pharmaceutical<br />

<strong>and</strong> foodstuff industry will subsequently show which dem<strong>and</strong>s are<br />

made by the economy for an optimal production <strong>and</strong> distribution<br />

chain.<br />

18.1.1 Trade mark protection for flawless mixtures<br />

Medical progress is not least noticeable in the multitude of drugs,<br />

<strong>with</strong> which illnesses can be successfully combated, which a few decades<br />

ago inevitably led to the death of the patient. The more specialized<br />

the drug is <strong>and</strong> the higher the development cost was, the higher<br />

the price of the drug must be in the end. Unfortunately, expensive<br />

pharmaceutical products do not only have an influence on the health<br />

of patients, but also on the greed of those dealers trying to penetrate<br />

the lucrative market <strong>with</strong> cheap imitations.<br />

With dangerous results in many ways: Preparations <strong>with</strong>out an active<br />

ingredient are ineffective <strong>and</strong> can have the same fatal results such as<br />

over doses. The risk is, if the patient or the treating doctor does not<br />

recognize a drug, which on face value looks flawless, to be an imitation.<br />

The manufacturer of the real product suffers turnover losses<br />

<strong>and</strong> is at peril of being made responsible for the damages caused by<br />

the imitation drugs. For them, it is essentially important to exclude<br />

all manipulation possibilities as far as possible on the long road from<br />

211


18 <strong>RF<strong>ID</strong></strong> – printed on a roll<br />

the production line to the end user. Costly packaging <strong>and</strong> optical<br />

“seals of genuineness” alone do not suffice any more.<br />

18.1.2 Dine <strong>with</strong>out disgust<br />

Complete traceability of the distribution chain to a high degree is also<br />

desirable in the food sector – whether to fully <strong>with</strong>draw contaminated<br />

batches from circulation or to stop sellers from selling bad food.<br />

Moreover, it is important that quality controls for perishable goods<br />

find the root cause of any faults incurred <strong>with</strong>out delay <strong>and</strong> to dispel<br />

them where they occur. All investments that contribute effectively to<br />

the localization of hitherto unknown problematic areas here will payoff<br />

<strong>with</strong>in the shortest of periods.<br />

18.1.3 Identifiability creates clarity in the supply chain<br />

If it makes sense for delicatessens, it can also be of great use to other<br />

branches. From the clothing industry to automobile manufacturing,<br />

all the producers have vital interest in protecting their quality br<strong>and</strong>s<br />

when it boils down to it (br<strong>and</strong> protection) <strong>and</strong> to protect themselves<br />

against freeloaders (anti-counterfeit). Nobody can or wishes to manage<br />

<strong>with</strong>out doubt-free identifiability of produce <strong>and</strong> complete quality<br />

control these days! Moreover, effective optimization methods are<br />

looked for everywhere in cost-intense logistics in order to be able to<br />

continue to survive against competitors (Supply Chain <strong>Auto</strong>mation).<br />

These equally high <strong>and</strong> legitimate requirements can only be met<br />

through a so-called “intelligent” seal of approval, which on the one<br />

h<strong>and</strong> is cheap <strong>and</strong>, on the other h<strong>and</strong>, could only be copied at unattractively<br />

high expense. If namely an individual pill box <strong>and</strong> the individual<br />

packaging for the fillet of salmon can be unambiguously identified<br />

as originals, manipulation possibilities can be prevented to a<br />

large extent <strong>and</strong> any possible quality gaps revealed.<br />

Technical evolution is still in progress here: however, at the end of<br />

this development chain that will finally be advantageous to the end<br />

consumer, only individual numbering at the single item level can result,<br />

otherwise known as “Item Level Tagging”, <strong>with</strong> a unique Electronic<br />

Product Code (EPC). In cases where virtually one hundred percent<br />

authentication proof is provided or even transparent traceability<br />

in the production chain is to be guaranteed, proven processes such as<br />

barcodes <strong>and</strong> holograms reach their principle-causes limits: new<br />

technologies must now pave the way to a secure future (Fig. 18.2).<br />

212


18.2 Technological basics<br />

Fig. 18.2 Wine bottles <strong>with</strong> an integrated Poly<strong>ID</strong>® tag (Photo: PolyIC)<br />

18.2 Technological basics<br />

The options described for printed electronics <strong>and</strong>, therefore, printed<br />

<strong>RF<strong>ID</strong></strong> come into being by using new types of plastic, so-called organic<br />

semiconductors (one example of this is P3HT – Poly-3-hexylthiophene).<br />

These semiconductors are soluble <strong>and</strong> hence suitable for<br />

use in printing machinery. Further fitting materials are required for<br />

conductive <strong>and</strong> insulating structures in order to build up transistors<br />

<strong>and</strong> other st<strong>and</strong>ard components in a respective layer composition <strong>and</strong><br />

to build up further st<strong>and</strong>ard components such as diodes, capacitors<br />

etc. The new semiconductors are actually easy to use compared to<br />

common silicon but their performance capability is considerably restricted<br />

(a factor of approx. 1,000 times lower). Therefore, the integrated<br />

circuits cannot be as high performance or complex as conventional<br />

electronics. Therefore, simpler electronics are produced that<br />

for this reason are cheaper <strong>and</strong> available as a mass product (Fig.<br />

18.3).<br />

Integrated circuits are established to implement the <strong>RF<strong>ID</strong></strong> function by<br />

using these basic elements. Here, PolyIC demonstrated the first working<br />

integrated circuits using this basis <strong>and</strong> can also produce them in<br />

a roll-to-roll process in the meantime.<br />

213


18 <strong>RF<strong>ID</strong></strong> – printed on a roll<br />

Fig. 18.3 Laboratory printing machine for printed semiconductors<br />

(Photo: PolyIC)<br />

The production process used for this consists of a combination of several<br />

different processes, each of which realizes the respective layer<br />

specifications required (layer thicknesses, resolution of the structures,<br />

registration precision, etc.). The first generation of a production<br />

process will be further simplified <strong>and</strong> optimized in the future.<br />

However, it already meets the minimum speeds of 20 meters per<br />

minute, as an effective production method.<br />

The technology is also called polymer electronics or organic electronics<br />

as polymers or organic materials are used. At the same time, <strong>RF<strong>ID</strong></strong><br />

is only one of the many options that can be realized using printed integrated<br />

circuits. Other circuits for connecting sensors or displays<br />

provide interesting future applications for intelligent packaging <strong>with</strong><br />

a self-monitoring function which can also display the test results.<br />

Thus, for example, intelligent milk cartons that monitor their own<br />

shelf life or their whereabouts in the cold chain will result in greater<br />

consumer security in the future.<br />

214


18.3 Possible solutions using printed <strong>RF<strong>ID</strong></strong><br />

18.3 Possible solutions using printed <strong>RF<strong>ID</strong></strong><br />

The solution to the problems <strong>and</strong> requirements as explained here is<br />

<strong>RF<strong>ID</strong></strong>. Where up until now we have had to hold optical reading devices<br />

to record each individual product, <strong>RF<strong>ID</strong></strong> systems can read out a far<br />

wider scope of data (or simply the message “I am genuine”) from a<br />

greater distance <strong>and</strong>, if required also through the product itself from<br />

the applied “tags” in the future (Fig. 18.4). This is executed considerably<br />

faster, <strong>with</strong> far fewer errors <strong>and</strong> is more manipulation-proof than<br />

it has ever been so far!<br />

Fig. 18.4 Example of a printed entrance ticket <strong>with</strong> a printed advert –<br />

a so-called “Smart object” (Photo: PolyIC)<br />

Here, we must emphasize that printed <strong>RF<strong>ID</strong></strong>s <strong>and</strong> Smart Objects that<br />

are manufactured based on printed polymer electronics by no means<br />

compete in any way at all <strong>with</strong> proven silicon technology. On the contrary,<br />

the production-specific properties make printed <strong>RF<strong>ID</strong></strong>s <strong>and</strong> related<br />

products an ideal supplement to the “hard” chips:<br />

• Flexible <strong>and</strong> malleable <strong>and</strong> also very thin integrated circuits also<br />

make attachment to soft items, to date not able to be labeled, possible.<br />

• <strong>Auto</strong>matic provision in manufacturing lines can be retrofitted.<br />

215


18 <strong>RF<strong>ID</strong></strong> – printed on a roll<br />

• Negligible piece costs enable the exploitation of new markets, for<br />

example also <strong>and</strong> especially for low-vale mass products.<br />

• High universality, customer-specific adaptation to each area of<br />

application (also for cheap giveaways <strong>and</strong> single-use test devices).<br />

Using modern print systems, it is now possible to produce active <strong>and</strong><br />

“intelligent” integrated circuits <strong>and</strong> that virtually free. Johannes<br />

Gutenberg would not have dared dream that five-<strong>and</strong>-a-half centuries<br />

after his groundbreaking invention of book printing <strong>with</strong> movable<br />

letters that a new print revolution is in the process of “conquering”<br />

the world <strong>and</strong> improving everybody’s lives.<br />

216


19 <strong>RF<strong>ID</strong></strong> <strong>and</strong> sensors<br />

Georg Schwondra<br />

When observing <strong>RF<strong>ID</strong></strong> applications that track the movement of an object,<br />

for example <strong>with</strong>in its supply chain (see Chapter 12), the requirement<br />

to record <strong>and</strong> save additional ambient parameters arises frequently.<br />

This, for example, enables the adherence to temperature<br />

limits to be clearly depicted on the time bar. The link <strong>with</strong> logistics<br />

data enables the tracing of the person responsible in the supply<br />

chain.<br />

19.1 Motivation<br />

The ambient parameters or influences that can be recorded together<br />

<strong>with</strong> <strong>RF<strong>ID</strong></strong> include temperature, relative humidity, <strong>and</strong> pressure. If<br />

you want to monitor air humidity, this only makes sense combined<br />

<strong>with</strong> the temperature as air humidity is temperature-dependent. Isolated<br />

events that can cause damages to industrial goods are detected<br />

by monitoring the parameters of acceleration <strong>and</strong> vibration. In any<br />

case, you must define the areas <strong>and</strong> accuracy <strong>with</strong> which the parameters<br />

are to be tracked in advance. The sensors are then selected according<br />

to these requirements.<br />

Due to structural complexity, “<strong>RF<strong>ID</strong></strong> sensors” are more expensive than<br />

simple, passive <strong>RF<strong>ID</strong></strong> chips. The application is always attractive if reuse<br />

is possible as the then higher transponder price can be written off<br />

over the amount of re-use. In order to ensure the return of the transponders,<br />

an incentive system (such as a deposit system) must be created<br />

for everybody involved along the supply chain.<br />

The definition of the identification point where the <strong>RF<strong>ID</strong></strong> sensors are<br />

attached <strong>and</strong> later detached from the monitored product is especially<br />

significant. At the same time, process design should pay special attention<br />

to these process steps creating as few additional costs as possible.<br />

217


19 <strong>RF<strong>ID</strong></strong> <strong>and</strong> sensors<br />

The implementation of solutions <strong>with</strong> <strong>RF<strong>ID</strong></strong> sensors enables the design<br />

of new business models. For example, this enables the clear allocation<br />

of an accident to the person who actually caused it. In turn, this<br />

means that insurance payments can be saved (leads to a long-term<br />

reduction of insurance premiums) or the person responsible can be<br />

held liable.<br />

19.2 Technical basis<br />

Basically, we can define two groups of <strong>RF<strong>ID</strong></strong> sensors:<br />

• Sensor transponders <strong>with</strong> an internal memory for the decentral<br />

storage of the ambient data.<br />

• Sensor transponders <strong>with</strong>out an internal memory are centralized<br />

storage of the ambient data.<br />

19.2.1 Schematic structure of <strong>RF<strong>ID</strong></strong> sensors<br />

<strong>RF<strong>ID</strong></strong> sensors are realized using a discrete structure as a microcontroller,<br />

field programmable gate array (FPGA), or ASIC implementation.<br />

In all cases, the sensors require an energy supply for operation (a battery<br />

or a storage battery). Fig. 19.1 shows the schematic structure.<br />

Fig. 19.1 Schematic depiction of an <strong>RF<strong>ID</strong></strong> sensor<br />

Communication <strong>with</strong> the <strong>RF<strong>ID</strong></strong> reader via the air interface is realized<br />

via the analogue <strong>and</strong> digital front end. The microcontroller governs<br />

the EEPROM memory, controls the sensor, <strong>and</strong> analyzes the sensor<br />

data according to parameterization. Should a precise time base be required<br />

by the system over long periods of time, a quartz element is<br />

218<br />

Sensor<br />

EEPROM<br />

Quartz<br />

Microcontroller<br />

Battery<br />

Digital<br />

Frontend<br />

Analog<br />

Frontend<br />

A<br />

n<br />

t<br />

e<br />

n<br />

n<br />

a


19.2 Technical basis<br />

necessary. The battery provides electrical power for the microcontroller<br />

<strong>and</strong> sensors. Normally, the front end works when the battery is<br />

drained. Preferably st<strong>and</strong>ard devices are used as <strong>RF<strong>ID</strong></strong>-readers in order<br />

to utilize any existing infrastructures. The <strong>RF<strong>ID</strong></strong> sensors are addressed<br />

by the reading device via so-called custom comm<strong>and</strong>s, i.e.<br />

pre-defined protocol extensions of the respective <strong>RF<strong>ID</strong></strong> st<strong>and</strong>ard.<br />

These custom comm<strong>and</strong>s currently still differ from sensor to sensor.<br />

19.2.2 Decentralized sensor data storage<br />

This category of <strong>RF<strong>ID</strong></strong> sensors has an EEPROM memory in which the<br />

measured ambient parameters are filed <strong>with</strong> a time stamp. The <strong>RF<strong>ID</strong></strong><br />

sensor can be initialized via the radio interface as follows:<br />

• If cyclically re-used, the memory is deleted.<br />

• The logging mode is defined (you can normally select between<br />

recording a full curve, an out-of-range curve, or a surface integral).<br />

• The logging interval is defined.<br />

• The user-specific starting data is saved <strong>and</strong> logging started.<br />

Following this step, the <strong>RF<strong>ID</strong></strong> sensor begins <strong>with</strong> periodic measurement<br />

<strong>and</strong>, as necessary, recording the ambient parameters (depending<br />

on the logging mode selected <strong>and</strong> ambient data measured). These<br />

data can then be read out at the identification points <strong>and</strong> reconciled<br />

<strong>with</strong> data from the central system. It is also possible to adapt the logging<br />

parameters.<br />

19.2.3 Systems available<br />

Three products from different suppliers are introduced below as examples<br />

of the approaches available today.<br />

SEAGsens<br />

The SEAGsens, a product from Schweizer Electronic AG (http://www.<br />

schweizerelectronic.ag), was developed in its original form for temperature<br />

monitoring blood bags “from vein to vein” (Fig. 19.2).<br />

The discretely structured sensor system was developed by Schweizer<br />

Electronic AG together <strong>with</strong> Siemens as a platform, in order to account<br />

for short-term product diversification <strong>with</strong> regard to other sen-<br />

219


19 <strong>RF<strong>ID</strong></strong> <strong>and</strong> sensors<br />

Fig. 19.2 SEAGsens-transponder (Photo: SEAG)<br />

sors <strong>and</strong> different product geometries. The electronics <strong>and</strong> integrated<br />

circuit design was developed by the Institute for Applied research at<br />

the University of Offenburg [Institut für Angew<strong>and</strong>te Forschung der<br />

Hochschule Offenburg]. Table 19.1 shows the most important performance<br />

data.<br />

Table 19.1 Platform specification for the SEAGsens<br />

Properties SEAGsens<br />

<strong>RF<strong>ID</strong></strong> technology 13.56 MHz, ISO 15693 compatible<br />

Multiple re-usability Yes, > 5 years<br />

Power supply Round cell battery CR 2430, 270 mAh,<br />

Dimensions 69 × 58 × 6.3 mm<br />

Measurement range –30° C to +60° C<br />

Recordable parameters Temperature, relative humidity, pressure, acceleration,<br />

<strong>and</strong> vibration<br />

Analysis modes Full curve, overlap curve, <strong>and</strong> surface integral beneath<br />

the overlap curve<br />

Memory capacity 64 Kbytes = > 15,000 measurement values<br />

Measurement intervals Freely selectable: 5 seconds to 4 hours<br />

Measurement accuracy Temperature: tolerance ±0.5°C<br />

(between 0°C <strong>and</strong> +70°C)<br />

Rel. air humidity: tolerance ±2 %<br />

(between 10 % <strong>and</strong> 90 %)<br />

220


VarioSens<br />

19.2 Technical basis<br />

The KSW-VarioSens®, a product from KSW Microtec AG (http://www.<br />

ksw-microtec.de), is an ASIC implementation of a sensor transponder<br />

(Fig. 19.3). The product is available as a flexible label <strong>with</strong> an integrated<br />

temperature sensor in credit card format. The power supply is<br />

a wafer-thin environmentally friendly battery for insertion. The KSW-<br />

VarioSens® can store up to 720 temperature values <strong>and</strong> has an extra<br />

memory area for user data. As quartz was not used due to ASIC implementation,<br />

its timer precision is approx. 5 %.<br />

Fig. 19.3 KSW-VarioSens (Photo: KSW)<br />

Jilg parquet sensor<br />

The “Jilg parquet sensor” was developed by the companies Jilg <strong>and</strong><br />

Tricon <strong>and</strong> is currently available as a prototype. Jilg produces <strong>and</strong> lays<br />

parquet flooring <strong>and</strong> seeks to manage its customers’ warranty claims<br />

by analyzing the environmental data. For example, the flow temperature<br />

of the heating must be limited for parquet floors <strong>with</strong> underfloor<br />

heating, otherwise the parquet floor will “distort”. When the parquet<br />

floor is laid, a sensor is also installed <strong>and</strong> analyzed as required (customer<br />

claims).<br />

By installing this sensor in the parquet flooring, Jilg can reconstruct<br />

whether the damages have were caused by exceeding the permissible<br />

heating temperature or a material fault in case of warranty claims.<br />

Moreover, the installation of this sensor makes it possible to determine<br />

whether a wooden floor damaged by humidity has been damaged<br />

by air humidity being too high (structural damp) from above or<br />

by rising damp (diffusion) from below.<br />

221


19 <strong>RF<strong>ID</strong></strong> <strong>and</strong> sensors<br />

19.2.4 Central sensor data storage<br />

Systems in this category distinguish themselves because the EEPROM<br />

memory is missing on the sensor transponder. The data are transmitted<br />

to the central system via the radio interface at the point in time of<br />

measurement. This assumes that the <strong>RF<strong>ID</strong></strong> sensor is always in the reception<br />

field of a reading device. Therefore, this category of transponder<br />

is normally cheaper to realize as the requirements of the microcontroller<br />

required are considerably lower.<br />

ZOMOFI, an active 2.45 GHz system, is one example of this. By using<br />

ZOMOFI, reaches of up to 160 m outdoors <strong>and</strong> up to 80 m in closed<br />

rooms can be achieved (Table 19.2). Transponders <strong>with</strong> temperature<br />

or acceleration sensors are conceivable, for example as sensors (Fig.<br />

19.4).<br />

Table 19.2 Excerpt from the ZOMOFI specifications<br />

Properties ZOMOFI<br />

<strong>RF<strong>ID</strong></strong> technology 2,400 GHz ~ 2,483 GHz<br />

Memory capacity 112 bytes<br />

Battery life Typically 20,000 write cycles or 1 year<br />

(maximum life cycle dependent on the concrete<br />

application conditions)<br />

Working temperature range IEC 60068-2-14 (Na)<br />

– Operation: –10°C to +55°C<br />

– Storage: –20°C to +70°C<br />

Transponder dimensions Credit card: 54 × 85.5 × 4 mm<br />

Domino: 31 × 90 × 10.5 mm<br />

Fig. 19.4<br />

Transponder <strong>with</strong> a removed temperature sensor (laboratory sample)<br />

222


19.3 Initial applications<br />

19.3.1 Temperature monitoring for blood preserves<br />

19.3 Initial applications<br />

Blood preservations (erythrocyte concentrate) are becoming an even<br />

scarcer resource <strong>with</strong> limited storability due to decreasing readiness<br />

to donate <strong>and</strong> increasing exclusion criteria (the age pyramid, improved<br />

diagnostics, etc.). Once donated, the blood preserves must be<br />

stored in controlled temperature ranges (Fig. 19.5).<br />

Fig. 19.5 Temperature profile to be maintained for blood preserves in Austria<br />

If there are variances in these requirements, the blood preservations<br />

must be thrown away. In Austria alone, blood preservations to the<br />

value of one million euros per year are thrown away due to incorrect<br />

h<strong>and</strong>ling or the non-monitoring of the cold chain whereby the price<br />

of a single blood preserve is 120 euros in Western Europe. On top of<br />

this, there is the ethical aspect that a product that may save lives,<br />

which is regularly called for through donation appeals, has to be discarded.<br />

Today, the products are monitored at refrigerator or box levels using<br />

temperature loggers until they are delivered <strong>and</strong> stored in the blood<br />

bank (storage in hospital). As of the point in time when the product is<br />

h<strong>and</strong>ed over to the ward or the operating theatre, monitoring no<br />

longer takes place <strong>and</strong> the products can also no longer be returned,<br />

even if not used.<br />

223


19 <strong>RF<strong>ID</strong></strong> <strong>and</strong> sensors<br />

In order to find a solution, the companies Schweizer Electronic AG,<br />

MacoPharma International GmbH, <strong>and</strong> Siemens AG established a consortium<br />

together <strong>with</strong> the University Clinic for Blood Group Serology<br />

<strong>and</strong> Transfusion Medicine [Universitätsklinik für Blutgruppenserologie<br />

und Transfusionsmedizin] in Graz <strong>and</strong> developed a temperature<br />

monitoring transponder <strong>and</strong> a clinical application. It meets the following<br />

requirements:<br />

• The course of the temperature of the blood preserve must be completely<br />

monitored from the donor’s vein to the recipient’s vein.<br />

• The electronics must survive the centrifugation process<br />

(up to the 5,000-fold multiple of gravity) that is required<br />

for blood production.<br />

• The operating costs per use must be very low.<br />

This solution has been undergoing clinical testing since the start of<br />

2008. Following this, the respective approvals are planned, meaning<br />

that the system can still be introduced commercially in 2008.<br />

19.3.2 Quality assurance for worldwide container transports<br />

A petroleum processing company is currently evaluating the use of<br />

<strong>RF<strong>ID</strong></strong> sensors <strong>with</strong> temperature <strong>and</strong> relative air humidity monitoring<br />

in order to secure the quality of air humidity-sensitive plastic granulate<br />

on worldwide container shipping transport. On the one h<strong>and</strong>, the<br />

analysis is intended to provide a data basis for the required quantity<br />

of absorber material, depending on the destination <strong>and</strong> season <strong>and</strong>,<br />

on the other h<strong>and</strong>, it makes possible the identification of the causer in<br />

case of claims.<br />

19.4 Possible future applications<br />

19.4.1 Temperature<br />

Further potential applications for <strong>RF<strong>ID</strong></strong> <strong>and</strong> temperature logging are<br />

apparent in logistics for meat <strong>and</strong> deep-frozen products. Here, the<br />

general public is exerting increasing pressure on the provision of<br />

transparency <strong>and</strong> traceability in the logistics chain. Today’s identity<br />

systems <strong>with</strong>in the meat processing industry enable a clear inference<br />

from the purchased product back to the producing company. Today, it<br />

224


19.4 Possible future applications<br />

is not possible to make a statement as to whether temperature regulations<br />

have been observed <strong>with</strong>in the scope of producing <strong>and</strong> distribution<br />

logistics.<br />

For expensive wine, temperature monitoring is as an important topic<br />

as for worldwide distribution logistics for the temperature-sensitive<br />

pharmaceutical products such as vaccinations. In the latter case, exceeding<br />

or a shortfall of the storage temperature may lead to the vaccination<br />

loosing its effect.<br />

Beer barrels are often given to event organizers by the breweries as<br />

goods on sale or return. If a barrel is not used <strong>and</strong> left in the sun, it is<br />

theoretically possible that the beer will spoil. Sometimes the brewery<br />

takes the beer back <strong>and</strong> delivers it to another customer who correctly<br />

complains. Temperature monitoring at barrel level enables exceeding<br />

the temperature to be determined in good time, to avoid “recirculating”<br />

it <strong>and</strong> charging the causer the damages.<br />

19.4.2 Temperature <strong>and</strong> relative air humidity<br />

Especially for fruit <strong>and</strong> vegetables logistics <strong>and</strong> flower imports, the<br />

monitoring of environmental conditions is an interesting topic. The<br />

durability of the goods here is basically dependent upon the temperature<br />

<strong>and</strong> air humidity profile.<br />

A further application that is noteworthy is lending works of art. In<br />

particular, old art treasures such as papyrus rolls <strong>and</strong> paintings are<br />

highly sensitive to the ambient conditions during transport <strong>and</strong> exhibition.<br />

Museums have already had initial thoughts to equip such<br />

works of art for exhibitions <strong>with</strong> corresponding sensors in order to<br />

monitor the contractually guaranteed storage conditions <strong>and</strong>, as necessary,<br />

to carry out restoration work directly after the works of art are<br />

returned.<br />

19.4.3 Acceleration<br />

The use of acceleration sensors is conceivable, for example for transport<br />

logistics for large transformers. These transformers have a six or<br />

seven figure value in euros <strong>and</strong> are highly sensitive to acceleration<br />

(being dropped) due to their ceramics insulation. Today, transport<br />

damages can often only be established after the installation of the<br />

transformer in the system as mostly breakages in the ceramics insu-<br />

225


19 <strong>RF<strong>ID</strong></strong> <strong>and</strong> sensors<br />

lation are not visible. The same applies to those components that are<br />

sensitive to being dropped in the automobile <strong>and</strong> machine manufacturing<br />

industry.<br />

A further potential application is in the area of load securing for<br />

trucks. The packaging is normally dimensioned for a specific nominal<br />

load <strong>and</strong> acceleration according to specifications. If emergency<br />

braking takes place, it is possible that these specified values are exceeded<br />

<strong>and</strong> consequently the packaging <strong>and</strong> contents are damaged.<br />

In case of damages, it is important for the person responsible for<br />

packaging to be able to prove that the permissible acceleration values<br />

were exceeded in order to clarify the question of liability.<br />

226


20 <strong>RF<strong>ID</strong></strong> security<br />

Dr. Stephan Lechner<br />

The widespread use of <strong>RF<strong>ID</strong></strong> has also resulted in radio labels advancing<br />

to security-relevant areas of application in the meantime. Not<br />

only is the new technology used by libraries <strong>and</strong> supermarkets, it is<br />

also used as access control for buildings, for identifying livestock, for<br />

container tracking, as well as in many other areas <strong>and</strong> has established<br />

itself against the barcode <strong>and</strong> other methods. These applications raise<br />

security questions that can be split into two categories: data protection<br />

<strong>and</strong> information security. Whereas personal data <strong>and</strong> the question<br />

of tracking <strong>and</strong> profile formation by the unauthorized capturing<br />

of <strong>RF<strong>ID</strong></strong> transponders are predominant in the area of data protection,<br />

information security deals <strong>with</strong> comprehensive protection against<br />

manipulation <strong>and</strong> unauthorized access to saved or transmitted data.<br />

20.1 Data protection<br />

Data protection reservations against the use of <strong>RF<strong>ID</strong></strong> are basically<br />

against unnoticed <strong>and</strong> unwanted capturing of the transponders. Due<br />

to its technical functioning principle, a passive <strong>RF<strong>ID</strong></strong> transponder<br />

starts working as soon as its antenna induces the required operating<br />

power. Activation that takes place in this manner may happen unnoticed<br />

as opposed to the comparatively conspicuous readout of a barcode<br />

as no direct visual contact must exist between antenna <strong>and</strong><br />

transponder. In this way, data can be collected that provides information<br />

regarding the owner’s personal matters <strong>and</strong> is, therefore, subject<br />

to the pertinent data protection regulations.<br />

However, basically we must observe that the function principle <strong>and</strong><br />

areas of application for <strong>RF<strong>ID</strong></strong> include an uncomplicated readout as a<br />

key performance feature <strong>and</strong> that <strong>with</strong>out this property the use of<br />

<strong>RF<strong>ID</strong></strong> would often neither make sense nor be economical. The dem<strong>and</strong><br />

to provide a control option by the user is, therefore, difficult to realize.<br />

In particular the collection of data from several <strong>RF<strong>ID</strong></strong> transpon-<br />

227


20 <strong>RF<strong>ID</strong></strong> security<br />

ders to prepare a personal profile is significant for a further analysis<br />

of the problems.<br />

20.1.1 Personal profiles<br />

A readout of <strong>RF<strong>ID</strong></strong>s at the point of sales always includes the option of<br />

profile formation: for example, the combination of goods in a shopping<br />

cart could be analyzed at a supermarket checkout, in which this<br />

can also provide information referring to the purchaser’s personal<br />

matters. The customer could be identified via a customer card or an<br />

<strong>RF<strong>ID</strong></strong>-based identity card. The information saved in the transponder<br />

can also be read out after payment <strong>and</strong> this could contribute to profiling<br />

<strong>and</strong> identifying the respective owner.<br />

However, these observations are basically also valid for barcodebased<br />

scanner cash registers <strong>and</strong> electronic means of payment. If the<br />

customer or discount cards are used, the user even explicitly agrees<br />

to this connection.<br />

Nonetheless, this difficulty has made voices grow louder <strong>and</strong> louder<br />

in the past, calling for the deactivation or destruction of <strong>RF<strong>ID</strong></strong> transponders<br />

after selling the respective goods. Technical methods for<br />

implementing such measures <strong>with</strong>in the scope of predetermined mechanic<br />

or electronic deactivation are definitely available. However,<br />

market introduction has not yet taken place. The data protection debate<br />

on <strong>RF<strong>ID</strong></strong> has only been able to slow down the triumph of the technology<br />

but unable to stop it. The further development of the <strong>RF<strong>ID</strong></strong><br />

market will nonetheless be determined to a large extent by the way<br />

the much discussed security problems are addressed.<br />

20.1.2 External attacks<br />

Unauthorized reading of <strong>RF<strong>ID</strong></strong> transponders has repeatedly been<br />

evaluated critically by the press <strong>and</strong> technical publications. For instance,<br />

it is being discussed to what extent <strong>RF<strong>ID</strong></strong> could be abused in<br />

passport control in order to positively identify a potential assault victim<br />

<strong>and</strong> then to attack it. However, the German passport <strong>with</strong> <strong>RF<strong>ID</strong></strong><br />

was conceptualized in such a way that the document must be opened<br />

before reading the <strong>RF<strong>ID</strong></strong> is possible. (Fig. 20.1). On the other h<strong>and</strong>, a<br />

diversity of organizational measures ensures that manipulation can<br />

be excluded to a large extent. This has significantly improved the security<br />

of this <strong>RF<strong>ID</strong></strong> application.<br />

228


Chip in the<br />

passport cover<br />

Symbol for<br />

an electronic<br />

passport book<br />

20.1 Data protection<br />

Fig. 20.1 A security-critical application: The electronic passport <strong>with</strong><br />

an <strong>RF<strong>ID</strong></strong> chip (Photo: German Federal Ministry of Internal Affairs)<br />

Regarding technology, different st<strong>and</strong>ards <strong>and</strong> radio frequencies<br />

have been defined for <strong>RF<strong>ID</strong></strong>, which, among others, have an influence<br />

on reading distance. Both the limitation of the reading distance<br />

through targeted interference (“Denial of service” attack) <strong>and</strong> the increasing<br />

of reading distances for unauthorized reading are of importance<br />

from a security point of view. The capabilities of an <strong>RF<strong>ID</strong></strong> transponder<br />

cannot be significantly influenced by read attempts <strong>with</strong> manipulated<br />

readers <strong>with</strong> increased power or sensitivity. Consequently,<br />

the use of a sensitive reader does not automatically achieve longer<br />

communication distances. Even for a very sensitive receiver of the<br />

reader, it must be considered that the information sent by the <strong>RF<strong>ID</strong></strong><br />

quickly becomes unusable due to interference.<br />

The German Federal Office for IT Security launched a study in 2006<br />

[2] to investigate at what distances <strong>RF<strong>ID</strong></strong>s could be read under laboratory<br />

conditions, <strong>and</strong> arrived at surprising results. Reading distances<br />

of up to two meters (for HF transponders) could easily be achieved<br />

<strong>with</strong> minor signal quality constraints that led to the speculation that<br />

longer distances could be reached in the future. When taking a closer<br />

look, however, it must be stated that boundary conditions for such<br />

measurements also play an important role. In the test, the antennas<br />

of readers <strong>and</strong> <strong>RF<strong>ID</strong></strong> were exactly aligned, which would be very difficult<br />

to achieve under real conditions. Mutual misalignment leads to<br />

severe deterioration of the results.<br />

229


20 <strong>RF<strong>ID</strong></strong> security<br />

20.2 Information security<br />

Not only undetected reading is a problem when using <strong>RF<strong>ID</strong></strong>s, but also<br />

possible manipulation of stored data. Therefore, some <strong>RF<strong>ID</strong></strong>s are already<br />

furnished <strong>with</strong> additional characteristics for the application in<br />

security environments.<br />

20.2.1 Protection of saved data<br />

The data that is saved on an <strong>RF<strong>ID</strong></strong> is protected against direct access by<br />

a number of security systems. Besides for storing the data in the protected<br />

EPROM or EEPROM areas (Electrically Erasable Programmable<br />

Read Only Memory) of the chip, the data can also be deleted in case of<br />

unauthorized physical manipulation. To bypass such protection measures<br />

requires a lot of effort, good knowledge of electronics <strong>and</strong> semiconductor<br />

manufacturing, as well as elaborate measuring equipment<br />

<strong>and</strong> analyzing tools. Hardware-based protection measures will, therefore,<br />

not be dealt <strong>with</strong> any further here. Further information on the<br />

topic can for instance be found in the relevant report of the German<br />

Federal Office for IT Security [3].<br />

Besides for physical protection of data against unauthorized capturing,<br />

there is the possibility of data encryption in order to limit unauthorized<br />

access. In case of encrypted data, no conclusions can be<br />

made regarding its contents, even if an attacker managed to access<br />

the data. Since the principles of cryptography apply to both saved<br />

data <strong>and</strong> data transmission, the relevant technologies will be briefly<br />

addressed in the following section.<br />

20.2.2 Protection of data transmission<br />

For special security environments there is the option for the encryption<br />

of data during radio transmission, whereby only authorized<br />

readers can retrieve the contents of transponders. A differentiation<br />

must be made between a purely mathematical-cryptographic encryption<br />

<strong>and</strong> “masking” or “scrambling” of data, which in comparison<br />

<strong>with</strong> strong encryption do not offer sufficient protection against a targeted<br />

attack. Data scrambling is nothing more than a rearrangement<br />

of the data <strong>and</strong> can normally be reversed <strong>with</strong>out much effort by<br />

means of mathematical software packages.<br />

230


20.3 Classic protection measures<br />

20.3.1 Symmetrical encryption<br />

20.3 Classic protection measures<br />

Effective securing of stored or transmitted data is possible by means<br />

of symmetric cryptographic encryption. The central element of this<br />

encryption is a secret key, which is shared between the sender <strong>and</strong> the<br />

recipient as a mutual secret. Typically, this key corresponds to a bit<br />

sequence, which serves as an input to a mathematical encryption procedure.<br />

Since the sender <strong>and</strong> recipient of a message use the same key,<br />

it is called symmetric cryptography.<br />

<strong>RF<strong>ID</strong></strong> systems <strong>with</strong> symmetrical encryption procedures are available<br />

on the market for security-critical applications. The following must be<br />

taken into consideration: The secret key, which is only known to the<br />

sender (<strong>RF<strong>ID</strong></strong>) <strong>and</strong> the recipient (reader), must be protected against<br />

unauthorized access. If the secret key were to be compromised (i.e.<br />

disclosed), an attacker could pretend to be an authorized user.<br />

Depending on the applied cryptographic procedure <strong>and</strong> the required<br />

level of security, key lengths of 128 to 2,048 bits are regarded to be<br />

sufficient. The length of the cryptographic key must be sufficient to<br />

protect the system against computer-supported testing of all the possible<br />

keys (brute force attack). The basic principle is that longer cryptographic<br />

keys offer significantly higher security. Since mathematic<br />

<strong>and</strong> cryptographic methods are being developed over time by scientific<br />

specialists, it is advisable to choose a longer rather than shorter<br />

key in case of doubt.<br />

Not only the key, but also the stability of the employed algorithm (i.e.<br />

of the cryptographic procedure) is of vital importance for the security<br />

of encrypted data. Cryptographic procedures can be publicly known<br />

in detail <strong>with</strong>out the security of the system being at risk, because the<br />

security is based entirely on the secrecy of the key in case of stable<br />

algorithms. Only if a procedure has been cracked by so-called cryptoanalysis,<br />

it should no longer be used. For instance, the Data Encryption<br />

St<strong>and</strong>ard (DES), which was developed in 1977 by IBM, is regarded<br />

as unsecured, but still used in many systems in its secure triple version<br />

3DES (“Triple-DES”). The successor algorithm AES, “Advanced<br />

Encryption St<strong>and</strong>ard”, which emerged as the winner in October 2000<br />

in a competition of the technology association <strong>and</strong> is based on the<br />

Rijdael procedure, is the essential, generally acknowledged procedure<br />

for symmetrical encryption.<br />

231


20 <strong>RF<strong>ID</strong></strong> security<br />

Many products do, however, contain proprietary procedures, which<br />

are not disclosed due to security reasons. This principle of “security<br />

by obscurity” is often rated as less than reliable because the stability<br />

of the cryptographic procedure must be rated higher if the technology<br />

association does not succeed in cracking the procedure, even after<br />

a long time. In military environments, on the other h<strong>and</strong>, nearly only<br />

secret algorithms are used. Despite this, it can be assumed that the<br />

construction of such “new” procedures is quite often achieved by<br />

means of focused variations of known <strong>and</strong> published algorithms, in<br />

order to utilize an acknowledged stable mathematical construction. A<br />

basic new construction of cryptographic procedures <strong>with</strong>out the involvement<br />

of the cryptographic expert community requires very extensive<br />

mathematical knowledge <strong>and</strong> years of practical experience,<br />

but always contains a high risk of undiscovered weak points.<br />

20.3.2 Problems in the use of symmetrical encryption<br />

Security-critical application fields of <strong>RF<strong>ID</strong></strong>s have for years been addressed<br />

by special solutions <strong>and</strong> products based on symmetrical encryption.<br />

The secret key is saved in the secure storage area of the<br />

<strong>RF<strong>ID</strong></strong>. Applied algorithms are parameterized in such a way that a special<br />

reader is required to recognize the encrypted communication of<br />

the <strong>RF<strong>ID</strong></strong>.<br />

Saving the secret key in the reader has the disadvantage that in this<br />

case the device must know the keys of all the <strong>RF<strong>ID</strong></strong> transponders <strong>with</strong><br />

which it will have contact during the course of its activity. Since the<br />

secret keys of the <strong>RF<strong>ID</strong></strong> transponders represent sensitive data, the<br />

reader must additionally be protected against unauthorized access –<br />

especially against physical dismantling – <strong>with</strong> a lot of effort.<br />

Therefore, readers are often furnished <strong>with</strong> an online data link to a<br />

central database, where the secret keys of the <strong>RF<strong>ID</strong></strong> transponders are<br />

saved. The verification of a transponder can now be accomplished via<br />

secure transmission procedures, supported by a database, <strong>with</strong>out<br />

the reader getting into contact <strong>with</strong> sensitive data. The necessity of<br />

physical protection no longer exists in this constellation. However,<br />

this advantage is diminished by the requirement of an online link.<br />

232


20.4 Protection against complex threats<br />

20.4 Protection against complex threats<br />

While IT security is normally characterized by the three terms confidentiality,<br />

integrity, <strong>and</strong> availability, its application towards <strong>RF<strong>ID</strong></strong> scenarios<br />

is quite complex.<br />

The confidentiality of data can be compromised by unauthorized access<br />

during saving on the <strong>RF<strong>ID</strong></strong> tag or in the reader or on the transmission<br />

route, where encryption procedures are normally employed<br />

as a counter measure.<br />

The integrity (intactness) is threatened by undetected manipulation<br />

of the data on the <strong>RF<strong>ID</strong></strong> tag, on the radio route or in the reader, where<br />

digital signatures or encryption mechanisms <strong>and</strong> authentication <strong>and</strong><br />

access control are employed as a counter measure.<br />

The availability of data can be threatened by a multitude of attacks,<br />

for instance the physical manipulation of <strong>RF<strong>ID</strong></strong> antennas, interference<br />

signals by radio transmitters, deliberately created requests to the<br />

readers or by interruption of the online link of readers. In case of artificially<br />

created overload, the regular service is no longer provided,<br />

causing corresponding attacks on the availability to be summarized<br />

under the term of “Denial of Service” attack.<br />

Before security measures for complex systems are decided upon, it is<br />

therefore necessary to carry out a comprehensive threats analysis,<br />

followed by the risk analysis of the <strong>RF<strong>ID</strong></strong> application area concerned.<br />

In its simplest case it may result that no security measures are required,<br />

because existing risks are low <strong>and</strong> would not justify the cost<br />

of additional protection measures. Without claiming to be exhaustive<br />

the following section is intended to provide a short representation of<br />

a real threat scenario for <strong>RF<strong>ID</strong></strong> systems.<br />

20.4.1 Creation of <strong>RF<strong>ID</strong></strong> clones<br />

The identity of a <strong>RF<strong>ID</strong></strong> transponder is determined by the data saved on<br />

the transponder, which contain a world-wide unambiguous representation<br />

of, among others, the manufacturer, item number, <strong>and</strong> serial<br />

number, based on the globally st<strong>and</strong>ardized structure of the EPC<br />

(electronic product code). In many application fields it is not required<br />

to protect these data, resulting in the communicated data being readable<br />

as plain text on the transmission route. This does, however, also<br />

mean that unauthorized eavesdropping on data by third parties is<br />

possible (even if it is only possible at short distances during the read<br />

233


20 <strong>RF<strong>ID</strong></strong> security<br />

process) <strong>and</strong> especially that data can actively be retrieved by third<br />

parties (<strong>with</strong> an own reader).<br />

After successful eavesdropping or retrieving of the identity data of a<br />

<strong>RF<strong>ID</strong></strong> transponder, these data can be saved in the attacker’s reader <strong>and</strong><br />

can later be transferred to another <strong>RF<strong>ID</strong></strong>, by which a clone (duplicate)<br />

of the original transponder is created in the logical sense. As soon as<br />

the data has been disclosed, an arbitrary number of clones can be created<br />

at any point in time. In some application fields this is not critical:<br />

The technical effort of cloning is not justifiable for the attacker if only<br />

the label of a can on the shelf of a Supermarket can be duplicated.<br />

However, in other cases the effort could be worthwhile: Drugs of<br />

which the genuineness is proven by <strong>RF<strong>ID</strong></strong>, expensive clothing that is<br />

protected against product piracy by <strong>RF<strong>ID</strong></strong>, or simply company access<br />

cards or access cards to official buildings, pose a high risk of abuse.<br />

The best protection against cloning of <strong>RF<strong>ID</strong></strong> chips is offered by encryption<br />

procedures that prevent attackers from eavesdropping on the<br />

transmission route. This requires readers <strong>and</strong> transponders to be capable<br />

of h<strong>and</strong>ling the special encryption technologies. The oftenpraised<br />

protection by a check of the serial number (U<strong>ID</strong>) of an <strong>RF<strong>ID</strong></strong><br />

transponder, however, is questionable. In the meantime, imitations<br />

are being produced so professionally in product piracy that existing<br />

<strong>and</strong> legitimate product codes get into circulation by means of the<br />

abovementioned cloning processes. They can often not be identified<br />

as initiations by means of cross-checking against a manufacturer database.<br />

20.4.2 Protection measures by means of certificate-based<br />

solutions<br />

In security-related environments, similar dem<strong>and</strong>s are made on <strong>RF<strong>ID</strong></strong><br />

systems as on ISO chip cards (so-called Smart Cards), which have<br />

been widely established as identification method. The <strong>RF<strong>ID</strong></strong>s, which<br />

feature lower in storage <strong>and</strong> processor performance, have the advantage<br />

of flexibility, lower space requirement, <strong>and</strong> significantly lower<br />

cost, which qualifies them for some application fields that remain inaccessible<br />

for chip cards. High security requirements result in the<br />

field identification of documents <strong>and</strong> individual objects (item tagging)<br />

as well as in the field of identification cards <strong>and</strong> passports.<br />

Such requirements can be solved by means of certificate-based procedures<br />

(Public Key Infrastructure, PKI) for ISO chip cards, which are<br />

based on asymmetrical cryptographic procedures.<br />

234


20.4.3 Asymmetric cryptography <strong>and</strong> PKI<br />

20.4 Protection against complex threats<br />

Contrary to symmetric cryptography, where the sender <strong>and</strong> recipient<br />

of messages must use the same key, asymmetric cryptography has<br />

also established itself in products since the 1980s, whereby each of<br />

the participants disposes of two different keys, which operate mutually<br />

inverse. The RSA procedure is one of the most well known algorithms<br />

of this type, <strong>with</strong> a decided advantage above the symmetrical<br />

procedures: The private key of every participant is supplemented by<br />

an associated public key, which is not security-critical <strong>and</strong> through<br />

which no conclusions about the private key can be made.<br />

Therefore, the procedure is very elegant: Before sending a message,<br />

the sender encrypts the data <strong>with</strong> the public key of the recipient in<br />

such a way that only the recipient can decrypt the message <strong>with</strong> his<br />

associated private key. The principle can, however, also be employed<br />

reciprocally, whereby the sender (additionally) encrypts the message<br />

<strong>with</strong> his own private key, thereby proving that only they can be the<br />

originator of the message. This origin is verified by the recipient via<br />

the freely accessible public key of the sender. This proof of authenticity<br />

is referred to as a digital signature.<br />

In order to protect public keys against forgery, they are again digitally<br />

countersigned by higher level authorities (Certification Authorities,<br />

CAs). However, the public keys of CAs must also be protected, which<br />

subsequently leads to a tree-like hierarchical CA structure, at the root<br />

of which the so-called root-CA is situated, whose public keys must be<br />

protected by physical measures e.g. transmission by trusted messengers<br />

to lower level CAs). The structure of CAs, associated RAs (Registration<br />

Authorities), <strong>and</strong> public <strong>and</strong> private keys is referred to as Public<br />

Key Infrastructure (PKI).<br />

Digitally signed data of a special format – similar to manually signed<br />

documents – are also referred to as certificates. The internationally<br />

acknowledged X.509 certificate st<strong>and</strong>ard contains fields for validity<br />

dates <strong>and</strong> the issuer of the certificate, besides of the identity of the<br />

signatory. In order to control the time – wise but compromised validity<br />

of certificates in a PKI (e.g. after the discharge of a user), a recall<br />

mechanism is normally used via Certificate Revocation Lists (CRL).<br />

20.4.4 <strong>RF<strong>ID</strong></strong> <strong>and</strong> PKI<br />

The rather complex structure of a PKI based on chip cards is quite<br />

common <strong>and</strong> provides a high degree of security, combined <strong>with</strong> the<br />

235


20 <strong>RF<strong>ID</strong></strong> security<br />

elegant option of reviewing certificates everywhere <strong>and</strong> at any time.<br />

In contrast to symmetrical encryption procedures, a reading device<br />

that only uses public keys requires neither online connection to the<br />

central database nor any particular protection against manipulation.<br />

Unfortunately, the passive <strong>RF<strong>ID</strong></strong> transponders currently available on<br />

the market have neither sufficient computer power nor memory capacity<br />

for the implementation of a st<strong>and</strong>ardized PKI. However, the<br />

first results are available from industrial research that successfully<br />

simulated asymmetric cryptography on passive <strong>RF<strong>ID</strong></strong>s beyond the<br />

X.509 st<strong>and</strong>ards, whereby the design of mathematical-cryptographic<br />

security is no weaker than the st<strong>and</strong>ard, but global compatibility on<br />

the use of the classic X.509 certificate currently remains reserved for<br />

the chip cards <strong>and</strong> the PC based solutions.<br />

However, the future allows us to expect that the PKI procedures <strong>and</strong><br />

certificates currently known in browsers <strong>and</strong> chip cards also permit<br />

the st<strong>and</strong>ardized transfer to <strong>RF<strong>ID</strong></strong>s.<br />

20.5 Security in <strong>RF<strong>ID</strong></strong> st<strong>and</strong>ardization<br />

In contrast to the st<strong>and</strong>ardization of <strong>RF<strong>ID</strong></strong> communication, the st<strong>and</strong>ardization<br />

of <strong>RF<strong>ID</strong></strong> security has not proceeded far in 2008. Various<br />

working groups in ISO or EPCglobal (compare Chapter 6), which supports<br />

the electronic <strong>RF<strong>ID</strong></strong> product code EPC, have only just started to<br />

address the security issue.<br />

Proprietary solutions are currently dominating the market, predominantly<br />

determined by <strong>RF<strong>ID</strong></strong> systems, which work based on st<strong>and</strong>ardized<br />

communication protocols <strong>with</strong>out any noteworthy security characteristics.<br />

Especially the globally st<strong>and</strong>ardized ability to communicate,<br />

which is a decisive factor for the rapid spread of <strong>RF<strong>ID</strong></strong>, also represents<br />

a security risk: unprotected <strong>RF<strong>ID</strong></strong> communication can easily<br />

be intercepted <strong>and</strong> unprotected <strong>RF<strong>ID</strong></strong> transponders <strong>and</strong> be recorded<br />

<strong>and</strong> read from any reading device working <strong>with</strong>in the specified parameters.<br />

From today’s point of view, it is very questionable whether the security<br />

aspects will become a default feature for <strong>RF<strong>ID</strong></strong> solutions. On the one<br />

h<strong>and</strong>, the principle of integrated security has predominantly asserted<br />

itself on the information <strong>and</strong> communication market, on the other<br />

h<strong>and</strong> there are still many legacy information technologies still existing<br />

today, whose security concepts do not comply <strong>with</strong> today’s state-<br />

236


20.5 Security in <strong>RF<strong>ID</strong></strong> st<strong>and</strong>ardization<br />

of-the-art. Similar is expected for <strong>RF<strong>ID</strong></strong> trends. Ever more efficient<br />

platforms will enable more complex security measures. However, the<br />

decision on how much security is required by <strong>RF<strong>ID</strong></strong> is finally made by<br />

the market. Considering the slow progress of st<strong>and</strong>ardization, the<br />

high cost pressure for semiconductor manufacturers <strong>and</strong> a multitude<br />

of application areas <strong>with</strong> little or very little security requirements,<br />

area-wide facilitation of <strong>RF<strong>ID</strong></strong> applications <strong>with</strong> compatible security<br />

characteristics cannot be expected even after completion of the relevant<br />

st<strong>and</strong>ardization work. The long, successful history of the barcode,<br />

which in comparison to <strong>RF<strong>ID</strong></strong> hardly contains opportunities for<br />

a secure concept, also supports this assessment.<br />

Due to its cost advantages <strong>and</strong> due to the more flexible physical design,<br />

<strong>RF<strong>ID</strong></strong> could develop into serious competition for chip cards <strong>and</strong><br />

the resulting PKI in special security environments, even if the previous<br />

results on the application of PKI on <strong>RF<strong>ID</strong></strong>s exist only in the research<br />

field <strong>and</strong> are not yet available on the market as a product.<br />

References<br />

[1] e.g. Germany's Bundesdatenschutzgesetz, http://www.gesetze-im-inter<br />

net.de/bdsg_1990<br />

[2] Thomas Finke, Harald Kelter: Bundesamt für Sicherheit in der Informationstechnik<br />

(BSI); Radio Frequency Identification – Abhörmöglichkeiten<br />

der Kommunikation zwischen Lesegerät und Transponder am Beispiel<br />

eines ISO14443-Systems, http://www.bsi.de/fachthem/rfid/Abh_<strong>RF<strong>ID</strong></strong>.pdf<br />

[3] See Bundesamt für Sicherheit in der Informationstechnik, Risiken und<br />

Chancen des Einsatzes von <strong>RF<strong>ID</strong></strong>-Systemen, SecuMedia Verlagsgesellschaft<br />

237


21 Epilogue: En route to the<br />

“internet of things”<br />

Dr. Stefan Key<br />

Logistics – a central component of the supply chain<br />

Logistics actually has a simple task: commodity transport from A to B<br />

<strong>with</strong> the optimum use of all the required resources. This often requires<br />

a sophisticated concept, for example when books have to be<br />

delivered <strong>with</strong>in 24 hours. The coordination of the most varied commodity<br />

flows, the picking of new dispatches, or interim storage are all<br />

logistics components. The important objectives of logistics entail the<br />

timely arrival at the customer <strong>and</strong> the optimum, cost-efficient coordination<br />

of all processes <strong>with</strong> minimum expenditure (according to the<br />

Just-in-Time principle). This prevents, e.g. highly sensitive goods<br />

such as drugs or technical devices from being exposed to unnecessary<br />

transport routes. Environmental protection also plays an increasing<br />

role.<br />

Even if logistics in the supply chain is only visible at the end, during<br />

the dispatch of the produced goods to the customer, it would be<br />

wrong to believe that respective considerations on logistics only need<br />

to be made at this point in time. Real Supply Chain Management<br />

means the coordination of all the value-added steps <strong>with</strong> the required<br />

logistics. Siemens already started this many years ago <strong>with</strong> its own<br />

processes, in which the supply is observed in reverse. This changes<br />

logistics from a Push to a Pull system. An excellent example for this<br />

Push concept is the Siemens plant for medicinal computer tomographs<br />

in Forchheim. Here, the suppliers can monitor their own parts<br />

stock <strong>and</strong> replenish them promptly as required.<br />

However, if logistical aspects are ignored, this would cause significant<br />

difficulties. Optimized logistics should, therefore, already be included<br />

at the start of a new product family or during the development of<br />

a new market segment in order to create an optimized total process.<br />

For Siemens’ new Open Mail H<strong>and</strong>ling System (OMS) – a real postal<br />

factory for sortation of flats, magazines <strong>and</strong> catalogues – logistics re-<br />

238


21 Epilogue: En route to the “internet of things”<br />

quirements were taken into account already at the time of system design.<br />

This system is so complex that it can no longer be built at our<br />

plants <strong>and</strong> subsequently be delivered to the customers in the usual<br />

manner. Therefore new logistics concepts had to be developed early<br />

on. An efficient logistics could otherwise only be realized <strong>with</strong> enormous<br />

costs <strong>and</strong> high costs.<br />

The companies – shipping services <strong>and</strong> manufacturers – are very well<br />

aware of the decisive role played by logistics. Globalization gives rise<br />

to ever more receiving <strong>and</strong> delivery networks. However, there is still<br />

large potential for logistics optimization. The use of information<br />

technology is the most important lever. The whole logistics chain together<br />

<strong>with</strong> it’s data can be integrated by a common IT backbone:<br />

Suppliers, services <strong>and</strong> customers will be integrated. This IT integration<br />

serves to prevent errors that would otherwise lead to considerable<br />

costs <strong>and</strong> a lack of quality. At the same time, logistics processes<br />

are subjected to considerable dynamics. Destinations change as do<br />

supplier <strong>and</strong> supply routes. Alternatively, delivery difficulties <strong>and</strong><br />

stops occur for the most varied reasons. Here, IT systems can also<br />

help to manage the changes.<br />

Meanwhile, globalization <strong>with</strong> global procurement, highly transparent<br />

sales channels in the Internet <strong>and</strong> the increased consumer dem<strong>and</strong>s<br />

for individual products make it nearly impossible to statically<br />

describe the optimum route or the optimum network. For example,<br />

the PCs required for our systems may be supplied by IBM the one day<br />

or by HP on another day – depending on the range, availability, <strong>and</strong><br />

requirements. Proceeding globalization thus leads to better quality at<br />

constant prices or the same quality at lower prices. Globalization also<br />

contributes to further progress in the productivity of the economy.<br />

A further shift is caused by the Internet platform. Let us revert to the<br />

example of books: books used to be sent from the wholesaler to the<br />

dealers <strong>and</strong> predominantly collected by the end customer themselves<br />

(a) (b) (c)<br />

Fig. 21.1 Changes in logistical networks<br />

239


21 Epilogue: En route to the “internet of things”<br />

(Fig. 21.1a). Today, online portals such as Amazon.com have to send<br />

individual books to the customer, which signified a considerable increase<br />

in the number of shipments (Fig. 21.1b). The development of<br />

these online dealers to sales platforms has even resulted in r<strong>and</strong>om<br />

networks, because anyone can buy <strong>and</strong> sell (Fig. 21.1c). Now, Amazon.com<br />

is merely the center of a virtual network, functioning as<br />

sales opportunity, sales room, <strong>and</strong> payment system.<br />

The data model architecture as a critical system parameter<br />

These business models require a highly developed IT infrastructure.<br />

The intelligence contained in the IT systems is the key to comm<strong>and</strong><br />

the resulting dynamics <strong>and</strong> variety. With regard to the control of logistics<br />

processes, the performance capability of the architecture,<br />

however, is significantly determined by the selected data model: must<br />

the logistics objects only be identified <strong>and</strong> all relevant data be maintained<br />

in a database (centralized data storage) or must they be stored<br />

on the dispatch objects themselves <strong>with</strong> suitable <strong>Auto</strong> <strong>ID</strong> technologies<br />

(decentralized data storage)?<br />

The advantage of decentralized data storage directly on the logistics<br />

objects is that real-time networks are no longer required. Let us look<br />

at an assignment system for letter post: here the barcode not only<br />

contains a reference that has to be initiated via a database but also the<br />

complete recipient address. The destination has to be determined<br />

<strong>with</strong>in just five seconds during sorting. If the network is overloaded,<br />

something that can never be excluded from the Internet, the letters<br />

then get diverted into the reject container for subsequent manual<br />

processing – the sorter goes into a st<strong>and</strong>still <strong>with</strong>in minutes <strong>and</strong> the<br />

entire postal process is confused. Purely central approaches are also<br />

not only dangerous for reasons of possible failures but also due to<br />

increasing commodity flows. A complexity problem arises.<br />

On the other h<strong>and</strong>, centralized architectures enable last second<br />

changes. Detailed information on the current network structure <strong>and</strong><br />

its performance is also available. This forms an optimization basis.<br />

Logistics systems are extraordinarily expensive ventures <strong>and</strong> required<br />

continuous optimization, something that is far easier <strong>with</strong> local<br />

structures.<br />

Apart from the suitable IT architecture, modern logistics relies on<br />

<strong>Auto</strong> <strong>ID</strong> technologies in order to identify logistical units – letters,<br />

packages, pallets, <strong>and</strong> containers. Logistics requires eyes <strong>and</strong> ears,<br />

that is, sensors such as barcode readers or <strong>RF<strong>ID</strong></strong> systems as a basis for<br />

240


21 Epilogue: En route to the “internet of things”<br />

automated control. For example, barcodes are used to provide the<br />

shipment <strong>with</strong> information such as the destination or customer information<br />

(e.g. in direct marketing <strong>with</strong> Customer Response coding).<br />

The 2D code here is obviously superior to the classic barcode because<br />

information density is considerably higher. 2D can also be used to<br />

store security relevant information on the shipment, e.g. for postage<br />

invoicing purposes.<br />

Therefore, our integrated concept initially works decentralized <strong>with</strong><br />

information available in printed codes. However, should the (extensive)<br />

barcode not be available or only partially readable, enabling<br />

identification only, then the centralized system takes over. This central<br />

component is normally a monitoring system performing the required<br />

optimization.<br />

<strong>RF<strong>ID</strong></strong> provides an extraordinarily important addition to this architecture.<br />

The most important advantages of <strong>RF<strong>ID</strong></strong> compared to barcodes<br />

are transponder writability <strong>and</strong> groupability. If a barcode needs to be<br />

updated, this can only be done by printing on a further barcode,<br />

whereas an <strong>RF<strong>ID</strong></strong> transponder is simply reprogrammed. This is important<br />

because logistics always entails many changes (e.g. in the<br />

destination or routing). If the barcode of a shipment contains wrong<br />

information (or has changed in the meantime), the barcode becomes<br />

obsolete. Therefore, subsequent changes to the data stored on the<br />

<strong>RF<strong>ID</strong></strong> chip are of the greatest significance. The groupability enables<br />

the use of <strong>RF<strong>ID</strong></strong> to record a box <strong>with</strong> 100 dispatches in a single working<br />

step – if barcodes were used, this would have required the individual<br />

scanning of every single letter or package.<br />

Economical application of <strong>RF<strong>ID</strong></strong><br />

However, the introduction of <strong>RF<strong>ID</strong></strong> is still hindered by three limitations<br />

currently. On the one h<strong>and</strong>, this is the read rate, which is a purely<br />

technical problem that will be dealt <strong>with</strong> satisfactorily in the coming<br />

years. Moreover, it is a fact: also a barcode cannot always be read<br />

100 %, for example if it is soiled. The second problem is the transponder<br />

price. Once <strong>RF<strong>ID</strong></strong> transponders really become printable (polymer<br />

transponders, cf. Chapter 18) <strong>and</strong> the costs are only in the cent range,<br />

<strong>RF<strong>ID</strong></strong> will fully replace the barcode. Today, there are already application<br />

areas where it is worthwhile using <strong>RF<strong>ID</strong></strong> – this book reports on a<br />

small selection of such success stories. At the same time, the economical<br />

use for letters is not possible yet. The price war in this area between<br />

the postal services providers is too fiercely fought – one or two<br />

241


21 Epilogue: En route to the “internet of things”<br />

cents cost advantage per consignment is significant. Finally yet importantly,<br />

a further problem is posed by the international st<strong>and</strong>ardization<br />

of both the frequencies <strong>and</strong> the data model. A specific data<br />

model is required practically for each domain, which is similar to today’s<br />

barcode development that is developed to be differentiated. The<br />

st<strong>and</strong>ardization of the IT interfaces, especially in the middleware area,<br />

goes h<strong>and</strong> in h<strong>and</strong> <strong>with</strong> this.<br />

There are two approaches to improve profitability: the first option is<br />

to re-use the transponders. Today, for example we are working on the<br />

use of <strong>RF<strong>ID</strong></strong> for baggage h<strong>and</strong>ling, where each case is equipped <strong>with</strong><br />

an <strong>RF<strong>ID</strong></strong> label (Chapter 15). This label is torn off upon arrival <strong>and</strong> destroyed.<br />

It would actually be far cleverer to use the transponder for<br />

the next flight, for example by integrating it into a case. The second<br />

approach is to use the <strong>RF<strong>ID</strong></strong> transponder for additional process steps<br />

such as saving security-relevant information, for example. Thus, the<br />

second screening could be saved as the contents of the case are already<br />

known. <strong>RF<strong>ID</strong></strong> integrated as a fixture in cases to improve flight<br />

security could become an amazing application.<br />

Further business cases are for the taking everywhere where the costs<br />

for <strong>RF<strong>ID</strong></strong> <strong>and</strong> also the readout costs are a small proportion of the value<br />

of the product. If, for example, a baggage or letter sorting system<br />

costs hundreds of thous<strong>and</strong>s anyway, it is really <strong>with</strong>out problems to<br />

plan <strong>RF<strong>ID</strong></strong> at an appropriate location right from the start. This is definitively<br />

also applicable to the distribution industry. Moreover,<br />

when ensuring product security, there are application scenarios:<br />

complete monitoring may reduce losses in logistics, for example for<br />

luxury articles such as watches. New marketing options such as intelligent<br />

cross-selling are possible in business. Service processes also<br />

profit from <strong>RF<strong>ID</strong></strong>: if products are returned today, an employee must<br />

key in long serial numbers <strong>with</strong> corresponding error risks. If you<br />

have ever stood in the claims line in an electronics shop, you know<br />

very well how long it can take to identify <strong>and</strong> allocate a product unequivocally.<br />

Finally yet importantly, <strong>RF<strong>ID</strong></strong> provides the opportunity to<br />

optimize all the service provision processes associated <strong>with</strong> a highvalue<br />

product.<br />

However, in reality we must determine that the implementation of<br />

<strong>RF<strong>ID</strong></strong> is running slower than was expected by many market observers.<br />

The problem is: the use of <strong>RF<strong>ID</strong></strong> requires ample investment in the required,<br />

area-wide infrastructure. It is not a technology that can be<br />

gradually realized systematically. At Deutsche Post, for example, all<br />

83 letter sorting centers would have to be equipped, each letter sort-<br />

242


21 Epilogue: En route to the “internet of things”<br />

ing center perhaps <strong>with</strong> 20 delivery gates. On the other h<strong>and</strong>, in particular<br />

the logistics service providers have already achieved a high degree<br />

of automation: the expensive existing systems would have to be<br />

re-equipped at high costs. For <strong>RF<strong>ID</strong></strong>, this means that a successful introduction<br />

on a large scale is only to be expected <strong>with</strong> the next automation<br />

level. If new machines are purchased, it is no problem to<br />

switch to <strong>RF<strong>ID</strong></strong>. These investments, which have already been made,<br />

are the only reason why hybrid solutions are talked about at all. It is a<br />

fact that the barcode <strong>and</strong> <strong>RF<strong>ID</strong></strong> will co-exist during a transitional period<br />

of ten years.<br />

En route to “internet of things”<br />

However, <strong>RF<strong>ID</strong></strong> also allows for completely new approaches possible.<br />

The concept of “internet of things” is an outst<strong>and</strong>ing example of cooperation<br />

between Siemens, Professor Michael ten Hompel, <strong>and</strong> the<br />

Fraunhofer Institute for Materials Flow <strong>and</strong> Logistics (IML). The reason<br />

for our involvement: in order to develop a logistical system such<br />

as a baggage transport system for a large airport, considerable expenses<br />

are incurred due to the enormous complexity. This enormous<br />

complexity can only be mastered by a decentralized system. Moreover,<br />

central systems are more prone to disturbances. Why does the<br />

Internet work so well? Because it is decentralized. Why is it decentralized?<br />

Because it was originally a military system <strong>and</strong>, therefore, was<br />

not allowed to be vulnerable. However, the vulnerability for optimization,<br />

cost, <strong>and</strong> quality reasons has considerable significance. “Internet<br />

of things” always follows this remote approach. The individual object<br />

(item) in the “internet of things” knows where it must go on its<br />

own accord. Furthermore, it can communicate the route it must take<br />

locally. Just as for E-mails if the route is not pre-planned <strong>and</strong> is developed<br />

from server to server.<br />

Let us take a baggage h<strong>and</strong>ling system at a large airport as an example<br />

(Fig. 21.2). If there is central architecture, the central computer<br />

will always know where every case is <strong>and</strong> determine the route for every<br />

branch. For this purpose, considerable data quantities must be<br />

pumped through the system on high-performance network cables. If<br />

a switch is disturbed or a case jammed, a diversion must be switched<br />

<strong>and</strong> this may well be five switches further back as the station directly<br />

before the disturbance has no chance at all to reach the correct destination.<br />

Such disturbances are dealt <strong>with</strong> automatically in “internet of<br />

things”. The advantage: it is all possible at considerably less expense,<br />

both on the software side <strong>and</strong> the hardware side to achieve the same<br />

243


21 Epilogue: En route to the “internet of things”<br />

Fig. 21.2 “Internet of things” could already soon optimize the<br />

processes at the airports (Photo: Werner Hennies/FMG)<br />

effect as <strong>with</strong> the current architecture. The first simulations carried<br />

out by our experts using data from a real airport proved the feasibility<br />

of the concept in principle. “Internet of things” is thus no longer a<br />

utopian dream but rather a realistic alternative draft to today’s large<br />

central systems.<br />

However, “internet of things” must still prove how such a decentralized<br />

system is able to realize the necessary control <strong>and</strong> quality assurance<br />

mechanisms. A superordinated level will also remain necessary,<br />

even if it may well enjoy a considerably leaner form. This central component<br />

no longer works in real-time. However, it can measure the service<br />

quality continuously <strong>and</strong> calculate the appropriate optimization<br />

from this data.<br />

In ten years, there will definitely be sectors that use <strong>RF<strong>ID</strong></strong> comprehensively<br />

even if not all branches of industry will be ready. The global<br />

logistics network will become more flexible as a consequence <strong>and</strong> enjoy<br />

the considerable advantage: the customer is provided <strong>with</strong> the<br />

same quality at a higher speed <strong>and</strong> at substantially lower costs. The<br />

use of resources for a defined service quality will also drop, making<br />

an important contribution to the protection of global resources <strong>and</strong><br />

the climate. <strong>RF<strong>ID</strong></strong> will create a unified language in the world of logistics,<br />

independent of the source or target of a consignment.<br />

244


Bibliography<br />

Ralph Brugger: Der IT Business Case. Springer 2005<br />

Hans-Joerg Bullinger, Michael ten Hompel (Eds.): Internet der Dinge.<br />

Springer 2007<br />

Jari-Pascal Curty, Michel Declerq, Catherine Dehollain, Norbert Joehl:<br />

Design <strong>and</strong> Optimization of Passive UHF <strong>RF<strong>ID</strong></strong> Systems. Springer 2007<br />

Klaus Finkenzeller: Rfid H<strong>and</strong>book. Fundamentals <strong>and</strong> Applications in<br />

Contactless Smart Cards <strong>and</strong> Identification. Wiley, 2 nd Edition 2003<br />

Werner Franke, Wilhelm Dangelmaier: <strong>RF<strong>ID</strong></strong>-Leitfaden für die Logistik –<br />

Anwendungsgebiete, Einsatzmöglichkeiten, Integration, Praxisbeispiele.<br />

Gabler 2006.<br />

Frank Gillert, Wolf-Ruediger Hansen: <strong>RF<strong>ID</strong></strong> for the Optimization of Business<br />

<strong>Processes</strong>. Wiley 2008<br />

Milan Kratochvil, Charles Carson: Growing Modular – Mass Customization<br />

of Complex Products, Services <strong>and</strong> Software. Springer 2005<br />

Bernhard Lenk: Data Matrix ECC 200, Monika Lenk Fachbuchverlag 2007<br />

Michael ten Hompel, Hubert Buechter, Ulrich Franzke: Identifikationssysteme<br />

und <strong>Auto</strong>matisierung. Springer 2008<br />

Günther Pawellek: Produktionslogistik – Planung-Steuerung-Controlling.<br />

Hanser 2007.<br />

Dylan Persaud: Are you tuned into <strong>RF<strong>ID</strong></strong>? – A how-to guide for <strong>RF<strong>ID</strong></strong> Implementations.<br />

TEC Technology Evaluation Centers<br />

Charles Poirier, Duncan McCollum: <strong>RF<strong>ID</strong></strong> Strategic Implementation <strong>and</strong><br />

ROI – A Practical Roadmap to Success. J. Ross Publishing 2006<br />

Herbert Ruile: Gläserne Prozesse – <strong>RF<strong>ID</strong></strong>-Einsatz in betrieblichen Abläufen.<br />

In: <strong>RF<strong>ID</strong></strong> Practice Reports 2007/2008. TradePressAgency 2007<br />

S. Sarma, S. Weis <strong>and</strong> D. Engels: <strong>RF<strong>ID</strong></strong> Systems <strong>and</strong> Security <strong>and</strong> Privacy<br />

Implications. In Proceedings of the International Conference on Security<br />

in Pervasive Computing, Boppard, pages 454-469, Mar. 2003.<br />

Bruce Schneier: Schneier's Cryptography Classics Library: Applied Cryptography,<br />

Secrets <strong>and</strong> Lies, <strong>and</strong> Practical Cryptography. Wiley 2007<br />

245


Bibliography<br />

Martin Strassner: <strong>RF<strong>ID</strong></strong> im Supply Chain Management. Deutscher Universitätsverlag<br />

2005<br />

Stroh, Ringbeck, Plenge: <strong>RF<strong>ID</strong></strong> Technology: A new innovation engine for<br />

the logistics <strong>and</strong> automotive industry? Report by Booz-Allen-Hamilton<br />

<strong>and</strong> University of St. Gallen 2004<br />

F. Thiesse: Architektur und Integration von <strong>RF<strong>ID</strong></strong>-Systemen. In: Das Internet<br />

der Dinge – Ubiquitous Computing und <strong>RF<strong>ID</strong></strong> in der Praxis. Springer<br />

2005<br />

246


Editor <strong>and</strong> authors<br />

Dr. Norbert Bartneck<br />

Dr. Norbert Bartneck is the Competence Center <strong>RF<strong>ID</strong></strong><br />

manager at Siemens AG Mobility Division. He is responsible<br />

for <strong>RF<strong>ID</strong></strong>-based logistical solutions <strong>with</strong> a<br />

main focus on postal <strong>and</strong> airport logistics. Norbert<br />

Bartneck studied Electrical Engineering at the Technical<br />

University Darmstadt <strong>and</strong> obtained his doctorate<br />

at the Institute for Communications Engineering<br />

at the Technical University Braunschweig.<br />

Volker Klaas<br />

Volker Klaas is the Competence Center <strong>Auto</strong> <strong>ID</strong>/<strong>RF<strong>ID</strong></strong><br />

manager at Siemens AG, IT-Solutions <strong>and</strong> Services.<br />

He is a member of the <strong>RF<strong>ID</strong></strong> working circle at BITKOM<br />

<strong>and</strong> in the EPCglobal EAG. During his career, he has<br />

gained substantial experience in the management<br />

of sales, consulting, <strong>and</strong> project management areas.<br />

Volker Klaas studied Economics <strong>and</strong> Business Administration<br />

at the Bergische Universität Wuppertal.<br />

Holger Schoenherr<br />

Holger Schoenherr is the Competence Center <strong>RF<strong>ID</strong></strong><br />

manager at Siemens AG, Industry <strong>Auto</strong>mation Division.<br />

He is an AIM Germany board member. During<br />

his work in various positions at Siemens, he gained<br />

a wide scope of experience in engineering <strong>and</strong> the<br />

management of large IT <strong>and</strong> automation projects.<br />

Holger Schoenherr studied <strong>Auto</strong>mation Technology<br />

at the Technical University Chemnitz.<br />

247


Editor <strong>and</strong> authors<br />

Marcus Bliesze<br />

Marcus Bliesze studied Electrical Engineering at the University of<br />

Erlangen-Nuremberg. Following this, he worked in the areas of research,<br />

development, <strong>and</strong> product management in the field of Real-<br />

Time Locating Systems (RTLS) <strong>and</strong> <strong>RF<strong>ID</strong></strong>. His vocational ports of call<br />

include the Fraunhofer Institute for Integrated Circuits, Cairos Technologies<br />

AG, <strong>and</strong> Siemens AG.<br />

Hans-Juergen Buchard<br />

Hans-Juergen Buchard studied Computer Science at the University of<br />

Paderborn. He has worked on automation tasks in the automobile<br />

<strong>and</strong> logistics industry at Siemens AG for several years.<br />

Jens Dolenek<br />

Jens Dolenek is a consultant for the automobile <strong>and</strong> supplier industry<br />

at the <strong>RF<strong>ID</strong></strong> Competence Center at the Siemens AG Industry <strong>Auto</strong>mation<br />

Division. His work includes the development of new types of <strong>RF<strong>ID</strong></strong><br />

utilization concepts in this sector. Jens Dolenek studied Electrical <strong>and</strong><br />

<strong>Auto</strong>mation Technology at the University of Applied Sciences Darmstadt.<br />

Kirsten Drews<br />

Kirsten Drews has worked at the Siemens AG, Industry <strong>Auto</strong>mation<br />

Division in Nuremberg since 1991. She is responsible for product<br />

management of the Simatic Machine vision products. Mrs Drews<br />

holds a degree in Industrial Engineering.<br />

Gerd Elbinger<br />

Following his studies of Communications Engineering at the University<br />

of Applied Sciences, Gerd Elbinger worked in the development<br />

departments of well-known companies <strong>and</strong> managed <strong>and</strong> implemented<br />

development projects in the control <strong>and</strong> automation areas.<br />

Since 1995, he has been responsible for product management for<br />

<strong>RF<strong>ID</strong></strong> systems at Siemens.<br />

Peter Hager<br />

Peter Hager is the Head of Marketing Management for Simatic sensors<br />

at Siemens AG, Industry <strong>Auto</strong>mation Division. After studying Communications<br />

Engineering he worked as a hardware <strong>and</strong> software<br />

248


Editor <strong>and</strong> authors<br />

developer at Siemens in Munich as well as managing projects for<br />

high-frequency recording systems.<br />

Dieter Horst<br />

Dieter Horst is the manager of <strong>RF<strong>ID</strong></strong> hardware development in the Factory<br />

Sensors Segment at Siemens AG, Industry <strong>Auto</strong>mation Division.<br />

In addition to his tasks in the area of research <strong>and</strong> development, he<br />

also works on various st<strong>and</strong>ardization committees at DIN <strong>and</strong> ETSI.<br />

Dieter Horst is a Communications Engineering graduate from the<br />

University of Applied Sciences Regensburg.<br />

Thomas Jell<br />

Thomas Jell is Head of Department <strong>and</strong> Senior Principal Consultant at<br />

Siemens AG, IT Solutions <strong>and</strong> Services. He also executes management<br />

consulting <strong>and</strong> projects in the areas of Mobile Business Solutions,<br />

<strong>RF<strong>ID</strong></strong>-based <strong>and</strong> Embedded Systems, Supply Chain Management, <strong>and</strong><br />

Intelligent Label (<strong>RF<strong>ID</strong></strong>) Systems. Thomas Jell is the author of the book<br />

“Objektorientierte Programmierung in C++” <strong>and</strong> the editor of the<br />

book “Component based Software Engineering”. He is an honorary<br />

member of the ComponentWare Consortium <strong>and</strong> a founder of the<br />

LICON Logistic Consortium.<br />

Dr. Stefan Keh<br />

Dr. Stefan Keh leads the Siemens business unit Infrastructure Logistics,<br />

the world market leader in postal <strong>and</strong> parcel service automation<br />

as well as baggage <strong>and</strong> cargo h<strong>and</strong>ling. In his carrier Stefan Keh<br />

acquired significant experience in development <strong>and</strong> sales of automation<br />

<strong>and</strong> software solutions. He held various executive positions<br />

<strong>with</strong>in Siemens <strong>and</strong> other companies. Stefan Keh holds a master<br />

degree <strong>and</strong> a PhD in physics; he got his education at the universities<br />

of Wuerzburg, Stony Brook, Hamburg, Stanford <strong>and</strong> the research<br />

institutes DESY in Hamburg <strong>and</strong> CERN in Geneva.<br />

Harald Lange<br />

Harald Lange was responsible in the Siemens AG <strong>RF<strong>ID</strong></strong> Competence<br />

Center, Industry <strong>Auto</strong>mation Division as an industry consultant for<br />

the pharmaceuticals, chemistry, <strong>and</strong> foodstuffs sectors <strong>and</strong> worked<br />

out <strong>and</strong> implemented <strong>RF<strong>ID</strong></strong>-based applications in these industries.<br />

Harald Lange is a graduate engineer, specialized in the field of energy<br />

conversion engineering.<br />

249


Editor <strong>and</strong> authors<br />

Dr. Stephan Lechner<br />

Dr. Stephan Lechner is a Doctor of Cryptology <strong>with</strong> more than 18<br />

years’ experience in IR security. He managed central security research<br />

at Siemens AG from 2002 to 2007. He is a member of several<br />

national <strong>and</strong> European security committees <strong>and</strong> a certified information<br />

security expert (CISSP). He has been the director of the Institute<br />

for Security <strong>and</strong> Protection of Citizens of the European Commission<br />

since November 2007. Dr. Lechner studied Mathematics at Gießen<br />

University.<br />

Wolfgang Mildner<br />

Wolfgang Mildner has been the managing director of PolyIC GmbH<br />

<strong>and</strong> Co.KG, a joint venture between Siemens AG <strong>and</strong> Leonhard Kurz<br />

GmbH, since 2004. PolyIC develops technologies for printable electronics,<br />

focusing on <strong>RF<strong>ID</strong></strong> transponders. He is the chairman of the<br />

Organic Electronic Association/VDMA. Wolfgang Mildner read Informatics<br />

at the Technical University Erlangen.<br />

Heinz-Peter Peters<br />

Heinz-Peter Peters works as an industry consultant for transportation<br />

<strong>and</strong> logistics in the <strong>RF<strong>ID</strong></strong> competence center at Siemens AG<br />

Industry <strong>Auto</strong>mation Division, <strong>and</strong> is responsible for elaborating<br />

<strong>RF<strong>ID</strong></strong> solution concepts for airports/airlines <strong>and</strong> aerospace, logistics,<br />

<strong>and</strong> postal services. He works in several committees, for example<br />

IATA (International Air Transportation Association). Heinz-Peter<br />

Peters studied Electrical Engineering at the Lower Rhine University<br />

of Applied Sciences.<br />

Regina Schnathmann<br />

Regina Schnathmann has been working on <strong>RF<strong>ID</strong></strong> for several years at<br />

Siemens AG. She has been responsible for worldwide communication<br />

activities such as a key account manager for airport <strong>and</strong> postal automation<br />

at Siemens AG since 2006. Mrs. Schnathmann attended Business<br />

Studies at Otto-Friedrich University in Bamberg.<br />

Peter Schrammel<br />

Peter Schrammel is a systems architect for <strong>RF<strong>ID</strong></strong> solutions at Siemens<br />

AG, IT Solutions <strong>and</strong> Services in the area of program <strong>and</strong> system<br />

development. Since his studies of Computer Science at the Vienna<br />

University of Technology <strong>and</strong> the Ecole Polytechnique Fédérale de<br />

250


Editor <strong>and</strong> authors<br />

Lausanne, he has worked intensely on <strong>RF<strong>ID</strong></strong> systems. His work focuses<br />

on design <strong>and</strong> development of <strong>RF<strong>ID</strong></strong> systems <strong>and</strong> components.<br />

Michael Schuldes<br />

Michael Schuldes is a Senior Process Consultant at Siemens AG, IT<br />

Solutions <strong>and</strong> Services in Munich. He advises companies on the topic<br />

of transport <strong>and</strong> logistics as well as Supply Chain Management.<br />

Michael Schuldes has many years’ experience in designing <strong>and</strong> piloting<br />

projects for the optimization of processes using <strong>RF<strong>ID</strong></strong> technology.<br />

He studied Mechanical Engineering in Munich.<br />

Georg Schwondra<br />

Georg Schwondra is responsible for <strong>RF<strong>ID</strong></strong> solutions in the area of program<br />

<strong>and</strong> system development at Siemens AG, IT Solutions <strong>and</strong> Services.<br />

In this function, he is responsible for product development,<br />

platform development, <strong>and</strong> solution projects in the <strong>RF<strong>ID</strong></strong> sector.<br />

Georg Schwondra studied Industrial Electrical Engineering <strong>and</strong> Control<br />

Technology at the Vienna University of Technology.<br />

Peter Segeroth<br />

Peter Segeroth is a senior consultant in the Siemens AG, IT Solutions<br />

<strong>and</strong> Services Center of Competence for <strong>Auto</strong> <strong>ID</strong>/<strong>RF<strong>ID</strong></strong>. His extensive<br />

experience includes project management, process analysis, <strong>and</strong> profitability<br />

analysis for large IT projects. Peter Segeroth studied Business<br />

Administration at the University of Applied Sciences in Cologne.<br />

Markus Weinlaender<br />

Markus Weinlaender is the marketing manager of the Competence<br />

Center <strong>RF<strong>ID</strong></strong> at Siemens AG, Industry <strong>Auto</strong>mation Division <strong>and</strong> coordinates<br />

the marketing activities for the Group-wide <strong>RF<strong>ID</strong></strong> initiative<br />

by Siemens. He is a graduate of the Siemens Technical Academy in<br />

Erlangen in the special field of data <strong>and</strong> automation technology <strong>and</strong><br />

studied European Business Administration at the EFH Hamburg.<br />

His book “Entwicklung paralleler Betriebssysteme” was published<br />

in 1994.<br />

251


Index<br />

2D code 38, 119, 190<br />

A<br />

Acceleration 217<br />

Activation modules 65<br />

Active systems 35<br />

Actual Process Analysis<br />

96<br />

Advanced Encryption<br />

St<strong>and</strong>ard (AES) 231<br />

AIM website 40<br />

Air Canada 181<br />

Airside 180<br />

ALE 72<br />

Alternating border 41<br />

Ambient data 67<br />

Ambient parameters<br />

217<br />

Anti-counterfeit 212<br />

Anti-theft devices 33<br />

Application Level Events<br />

Interface (ALE) 72<br />

Architecture 57, 240<br />

Arl<strong>and</strong> Stockholm 181<br />

Assembly 117<br />

Asset management 136,<br />

193<br />

Asymmetric cryptography<br />

235<br />

<strong>Auto</strong><strong>ID</strong> Lab 18<br />

<strong>Auto</strong>mation hierarchy<br />

118<br />

<strong>Auto</strong>mobile industry<br />

167<br />

<strong>Auto</strong>motive industry<br />

115, 132, 150<br />

Availability 70, 233<br />

Aztec code 40<br />

B<br />

Backscatter 32<br />

Baggage h<strong>and</strong>ling system<br />

243<br />

252<br />

Baggage transport 179<br />

BagTag 182<br />

Barcode 38, 74, 118,<br />

128, 189<br />

Benefit 100<br />

Blood preserves 205,<br />

223<br />

Boxes 135<br />

Br<strong>and</strong> protection 212<br />

Business case 94, 242<br />

Business models 145<br />

Business processes 57,<br />

95<br />

C<br />

Calculation 100<br />

Camera unit 48<br />

Capability 191<br />

Capacity 28<br />

Capital 98<br />

Cargo Logistics 185<br />

CCD camera 53<br />

CE marking 82<br />

Central architecture<br />

systems 58<br />

Centralized architecture<br />

240<br />

CEPT 83<br />

Certificate 234<br />

Chain 217<br />

Chemical industry 132,<br />

151<br />

Cincinnati international<br />

airport 180<br />

Cold chain 205<br />

Communication modules<br />

27<br />

Communication parameter<br />

68<br />

Confidentiality 233<br />

Configuration 68<br />

Consumer goods industry<br />

158<br />

Container management<br />

135<br />

Container tracking 227<br />

Containers 135, 190<br />

Control 227<br />

Controller unit 48<br />

Cost estimate 102<br />

Cost optimization 114<br />

Costs 94, 123<br />

Coupling 30<br />

D<br />

Data Encryption St<strong>and</strong>ard<br />

(DES) 231<br />

Data Matrix Code 38, 74<br />

Data protection 227<br />

Data-on-network 67<br />

Data-on-tag 67<br />

Decentralization 118<br />

Decentralized data<br />

storage 240<br />

Degression effect 114<br />

Direct Part Marking<br />

(DPM) 39, 75<br />

Distribution logistics<br />

130<br />

Dock <strong>and</strong> Yard Management<br />

167, 174, 194<br />

E<br />

EAN 38, 89<br />

ECC200 42<br />

Economic viability 141,<br />

204<br />

Edge servers 60<br />

Edgeware 60<br />

EDI 90, 141<br />

Electromagnetic coupling<br />

31<br />

Electronic passport 229<br />

Electronics industry<br />

116, 131, 160<br />

Emirates Airlines 181


Encryption 230<br />

Enterprise Resource<br />

Planning (ERP) 60, 78<br />

EPCglobal 71, 89<br />

E-Pedigree 151<br />

ERP systems 78<br />

Error Correcting Code<br />

(ECC) 43<br />

Error diagnosis 69<br />

Ethernet 27, 51<br />

European Article Number<br />

(EAN) 38, 89<br />

European Conference of<br />

Postal <strong>and</strong> TelecommunicationsAdministrations<br />

(CEPT) 83<br />

F<br />

FDA 153<br />

Feasibility test 105<br />

Federal Aviation Administration<br />

(FAA) 180<br />

Field test 105<br />

Finder border 41<br />

Fingerprint 190<br />

Finsa 132<br />

Firmware 69<br />

Fleet management 172<br />

Flexible manufacturing<br />

stations 118<br />

Food industry 116, 131,<br />

224<br />

Food stuff industry<br />

151, 211<br />

Ford, Henry 114<br />

Frankfurt Airport 184<br />

Freight 177<br />

G<br />

German Federal Office<br />

for IT Security 229<br />

Global Returnable Asset<br />

Identifier (GRAI) 140<br />

Goods receipt 127<br />

Groupability 28, 241<br />

Grupo Leche Pascual<br />

155<br />

GS1 40, 89, 140<br />

H<br />

Healthcare 198<br />

Heartbeat messages 68<br />

High-frequency 36<br />

Hong Kong international<br />

airport 181<br />

Hybrid solutions 243<br />

I<br />

IATA 182<br />

Identification 25<br />

Imaging Science Institute<br />

(ISI) 204<br />

Individualized serial<br />

products 115<br />

Inductive coupling 30<br />

Industry 177, 212<br />

Information security<br />

227<br />

Infrastructure 57, 123<br />

Integration 64, 111,<br />

239<br />

Integrity 233<br />

Interface 26, 29, 51, 64<br />

International unique<br />

identification of RTIs<br />

139<br />

Internet of things 18,<br />

133, 196, 243<br />

Internet platform 239<br />

Investments 98<br />

Inward stock movement<br />

129<br />

ISI 204<br />

ISO/IEC 18000 83<br />

IT backbone 239<br />

IT systems 109<br />

J<br />

Jacobi Medical Center<br />

199<br />

Johnson Controls 132<br />

Just-in-sequence 128<br />

Just-in-time 128<br />

K<br />

Kanban 128, 130<br />

Klinikum rechts der Isar<br />

201<br />

Klinikum Saarbruecken<br />

199<br />

KSW-VarioSens 221<br />

Index<br />

L<br />

L<strong>and</strong>side 180<br />

Laser etching 45<br />

Lighting 47<br />

Localization 193<br />

Locating 25<br />

Locating systems (RTLS)<br />

35<br />

Location 198<br />

Logging 219<br />

Logistics 126, 238<br />

Low frequency 36<br />

M<br />

MacoPharma 224<br />

Made-to-order 115<br />

Mail items 190<br />

Mail-item 195<br />

Maintenance 172, 183<br />

Maintenance concept<br />

111<br />

Manipulation 230<br />

Manufacturing 149<br />

Manufacturing technologies<br />

117<br />

Mass customization<br />

115<br />

Maxdata 131<br />

Maxwell, James Clerk<br />

15<br />

MedicAlert 200<br />

Memory capacity 122<br />

Microwaves 37<br />

Middleware 60<br />

Mobile data storage unit<br />

25<br />

Moby U 122<br />

Moby I 124<br />

Moby M 17<br />

Moby R 170<br />

Models 29<br />

MVRC 76<br />

N<br />

Near Field Communication<br />

(NFC) 32<br />

Newark international<br />

airport 180<br />

253


Index<br />

O<br />

Object description data<br />

66<br />

Object identification 66<br />

Object Naming Service<br />

(ONS) 72<br />

Odette 139<br />

Open Mail H<strong>and</strong>ling System<br />

(OMS) 238<br />

Operating model 165<br />

Optimization 100<br />

Option diversity 158<br />

Orbit Logistics Europe<br />

132<br />

P<br />

Pallets 131, 135<br />

Partner management<br />

109<br />

Passive systems 30<br />

Patient files 201<br />

Patient security 198<br />

Patients 198<br />

Pharmaceutical industry<br />

152, 211, 225<br />

Picking 131<br />

Pilot operation 108<br />

Polymer 196, 210<br />

Polymer technology<br />

241<br />

Postal logistics 188<br />

Pressure 217<br />

Printed electronics 211<br />

Printing 45<br />

Process 74<br />

Process data 67<br />

Process industry 151<br />

Process reengineering<br />

111<br />

Process sequence performance<br />

model 96<br />

Process slip 118<br />

Processing 48<br />

Product imitations 211<br />

Production 114<br />

Production data 121<br />

Production logistics<br />

126<br />

Production process 131<br />

Productivity 100<br />

Profibus 51, 65<br />

254<br />

Profitability 94, 242<br />

Programmable Logic<br />

Controller (PLC) 27,<br />

76, 119, 152<br />

Project 104<br />

Protection measures<br />

230<br />

Public Key Infrastructure<br />

(PKI) 235<br />

Public local transport<br />

172<br />

Push principle 130, 238<br />

Q<br />

QoS 69<br />

QR code 40<br />

Quality assurance 148,<br />

155<br />

Quality management<br />

155<br />

Quality of Service (QoS)<br />

69<br />

Quantify 102<br />

Quelle 131<br />

R<br />

Radio Frequency Identification<br />

(<strong>RF<strong>ID</strong></strong>) 24, 74,<br />

120-121, 128, 178, 190,<br />

198, 210<br />

Range 122<br />

Rate 52<br />

Reader 25<br />

Reading distance 28<br />

Reading rate 109<br />

Real-Time Locating Systems<br />

(RTLS) 167<br />

Relative humidity 217<br />

Repair 163<br />

Requirements 74<br />

Returnable Transport<br />

Items (RTI) 135<br />

Return-on-Invest (ROI)<br />

102, 105, 204<br />

Reusable transport<br />

trusses 131<br />

Reusable transport unit<br />

135<br />

<strong>RF<strong>ID</strong></strong> 24, 74, 120-121,<br />

128, 178, 190, 198, 210<br />

<strong>RF<strong>ID</strong></strong> clones 233<br />

<strong>RF<strong>ID</strong></strong> gates 169, 192<br />

<strong>RF<strong>ID</strong></strong> reading device 25<br />

<strong>RF<strong>ID</strong></strong> systems 34<br />

ROI 102, 105, 204<br />

Roll-out 110<br />

Roll-to-roll process 213<br />

Routing information<br />

129<br />

RS232 27, 51, 65<br />

RS422 27, 65<br />

RS485 51<br />

RTI 135<br />

RTLS 35, 167<br />

RTLS-Access-Point 168<br />

S<br />

SEAGsens 219<br />

Security 69, 227<br />

Semi-active systems 34<br />

Sensors 192, 217, 221<br />

Separation 122<br />

Service 183<br />

Shipping 127<br />

Sicalis RTL 170<br />

Siemens 123, 144, 238<br />

Simatic RBS 182<br />

Simatic RF Manager 65<br />

Solution design 108<br />

St<strong>and</strong>ardization 236<br />

St<strong>and</strong>ards 82<br />

Supply chain 238<br />

Supply chain networks<br />

139, 159<br />

Supply network 212<br />

Swissair/Sabena 181<br />

System stability 70<br />

Systems 30, 34-35, 181<br />

T<br />

Target analysis 95<br />

Target concept 97, 104<br />

Technology 46<br />

Temperature 217<br />

Temperature sensor<br />

205<br />

Test concept 106<br />

Theater equipment 198<br />

Tnuva 131<br />

Tool management 145<br />

Toronto airport 181


Tracking <strong>and</strong> tracing<br />

148<br />

Trade 161<br />

Training 111<br />

Transformation process<br />

117<br />

Transponder 16, 29<br />

Transport technology<br />

129<br />

Trolleys 135, 180<br />

U<br />

Ultra-high frequency<br />

36<br />

Uniform Code Council<br />

(UCC) 89<br />

Unique Identification<br />

(U<strong>ID</strong>) 40<br />

Unit Load Devices (ULD)<br />

185<br />

USB 65<br />

USB interface 51<br />

V<br />

Value chain 115<br />

Vancouver airport 181<br />

Variety options 115<br />

VDA 139<br />

Vehicle control system<br />

175<br />

Vehicle logistics 167<br />

Vendor Managed Inventory<br />

(VMI) 132<br />

Version variety 114<br />

Vibration 217<br />

Index<br />

W<br />

WLAN 65<br />

Workpiece carrier 121,<br />

135<br />

Wuhan airport 182<br />

X<br />

X.509 236<br />

XML 66<br />

Z<br />

Zaventem Brussels 181<br />

ZOMOFI 222<br />

Zurich airport 181<br />

255

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!