TagMaster Sdn Bhd TM800 Manuel D’Utilisation
Date: 27 February 2012
Revision 001 DRAFT
© 2011-2012 TagMaster S/B
Page 3(8)
Ensuring people and assets are where they are expected to be
Ensuring people are authorised to be where they are
Ensuring people are safe and secure
Ensuring environment of people and assets is effective, comfortable and economical
For these reasons, active RFID is not only expected to perform traditional RFID tasks, but can also be
utilised as cost-effective wireless sensor networks and provide important functions as contributors to
applications in the Internet of Things.
utilised as cost-effective wireless sensor networks and provide important functions as contributors to
applications in the Internet of Things.
For this reason,
TagMaster has named its active RFID technology ‘RFIDS™’, which stands for ‘Radio
Frequency Identification & Sensing’.
TagMaster’s RFIDS™ product line is an active RFID technology designed to meet a broad scope of
requirements. Apart from identification, this may include tracking of movements, status verification,
data retrieval, positioning, security alert, sensing, data collection, sensor logging, sensor alerts and
actuation of events. Such requirements often demand reliable operation in tough environments at a
variety of ranges, typically 3 to 150 metres, and uncontrollable orientations. They may also include
requirement tags to perform useful tasks autonomously and independent of a reader.
requirements. Apart from identification, this may include tracking of movements, status verification,
data retrieval, positioning, security alert, sensing, data collection, sensor logging, sensor alerts and
actuation of events. Such requirements often demand reliable operation in tough environments at a
variety of ranges, typically 3 to 150 metres, and uncontrollable orientations. They may also include
requirement tags to perform useful tasks autonomously and independent of a reader.
To meet such broad scope of requirements, while maintaining very good cost-effectiveness and
optimal power prudence in all cases, the RFIDS
optimal power prudence in all cases, the RFIDS
™ is scalable from an ID tag to advanced sensor and
actuation tag. In all
variants of RFIDS™, the radio module is the same. The design has built-in
expandability with sensor and actuation interfaces, additional memory, security, user-interface, and
high accuracy calendar functions.
high accuracy calendar functions.
RFIDS™ makes use of TagMaster’s Fast RFID Air Protocol (FRAP), which can adjust its payload, i.e.
the useful information transmitted from tag to reader and from reader to tag, according to type of tag
and/or on a needs basis. For instance, a simple ID tag will indicate to the reader that it is a simple ID
tag and only include in its payload what is absolutely needed at that particular point in time. This is
important order to minimise duty cycle and thereby improve both anti-collision and battery life. An
advanced sensor-tag, on the other hand, might at times require an extended payload to communicate
sensor values, alerts, performed actuations and tag status.
the useful information transmitted from tag to reader and from reader to tag, according to type of tag
and/or on a needs basis. For instance, a simple ID tag will indicate to the reader that it is a simple ID
tag and only include in its payload what is absolutely needed at that particular point in time. This is
important order to minimise duty cycle and thereby improve both anti-collision and battery life. An
advanced sensor-tag, on the other hand, might at times require an extended payload to communicate
sensor values, alerts, performed actuations and tag status.
In the RFI
DS™ system, the FRAP allow all types of RFIDS™ tags to co-exist and be read by the
same readers without any confusion. The reader or application does not need to keep long lists of
tags for sorting and filtering purposes. Instead, each tag will tell the reader what type of tag it is and
what its payload contains.
tags for sorting and filtering purposes. Instead, each tag will tell the reader what type of tag it is and
what its payload contains.
1.3
Operating principles of RFIDS™
Information from the RFIDS™ tag is sent in ultra-short bursts, whose packets are merely 32 bytes
long.
long.
Figure 2
– Information packets sent from tag
Of the 32 bytes, 8 bytes contain security information and a checksum, 5 bytes contain the TID, 1 byte
is a payload selector and 18 bytes contain the actual payload.
is a payload selector and 18 bytes contain the actual payload.