Hitachi America HSS-MUR-300 RFID Reader User Manual SR2500UserCOR

Hitachi America, Ltd. RFID Reader SR2500UserCOR

Users Manual

Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 1  1 HSS-MUR-300 RFID Reader User’s Manual
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 2  1 HSS-MUR-300 RFID READER USER’S MANUAL ............................................1 2 INTRODUCTION .......................................................................................................4 2.1 Contents of this Document.............................................................................................................................4 2.2 Audience..............................................................................................................................................................4 2.3 RFID System Quickstart................................................................................................................................4 2.4 Product Description.........................................................................................................................................5 2.5 Unpacking and Inspection.............................................................................................................................5 2.6 Product Installation.........................................................................................................................................6 3 INSTALLATION AND OPERATION OF DEMONSTRATION SOFTWARE...7 3.1 Minimum System Requirements..................................................................................................................7 3.2 Installation..........................................................................................................................................................7 3.2.1 Obtaining the IP Address of the Reader Using a Serial Connection................................................ 7 3.2.2 Configuring the  Reader Management Utility .................................................................................... 10 3.3 Using the Demonstration software ............................................................................................................16 3.4 Software / Communications Troubleshooting........................................................................................18 4 OVERVIEW OF READER COMMUNICATIONS AND CONFIGURATION UNDER EPCGLOBAL READER PROTOCOL ........................................................19 4.1 Message Channels ..........................................................................................................................................21 4.2 Command.........................................................................................................................................................21 4.3 Notification.......................................................................................................................................................21 4.4 Configurable Reader Components ............................................................................................................22 4.4.1 Reader Identification............................................................................................................................... 23 4.4.2 Data Selector............................................................................................................................................ 23 4.4.3 Read Filter ................................................................................................................................................ 23 4.4.4 Source........................................................................................................................................................ 24 4.4.5 Triggers ..................................................................................................................................................... 24 4.4.6 Message Channels ................................................................................................................................... 25 4.4.7 Vendor Specific Commands (VSC) ..................................................................................................... 26 5 HSS-MUR-300 RFID READER THEORY OF OPERATION ...........................28
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 3 6 TROUBLESHOOTING...........................................................................................29 7 TECHNICAL SPECIFICATIONS..........................................................................30 8 NOTICES..................................................................................................................31 8.1 RFID limitations.............................................................................................................................................31 8.2 Safety.................................................................................................................................................................31 8.3 Limitation of liability.....................................................................................................................................31 8.4 Patents ...............................................................................................................................................................31 8.5 Copyright notice .............................................................................................................................................32 8.6 Comments and feedback ..............................................................................................................................32 9 REGULATORY COMPLIANCE............................................................................32 9.1 FCC Statement................................................................................................................................................32 9.1.1 RF Radiation Exposure Statement........................................................................................................ 32 10 APPENDIX............................................................................................................33 10.1 RFID operating principles...........................................................................................................................33 10.2 RFID system components.............................................................................................................................33 10.2.1 Reader........................................................................................................................................................ 33 10.2.2 Antennas.................................................................................................................................................... 34
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 4  2 Introduction 2.1 Contents of this Document This manual describes installation and operation of the Hitachi America Ltd. HSS-MUR-300 2.4-GHz stationary RFID Tag Reader.  A description of the installation and use of the demonstration Graphical User Interface is also provided.  A summary description of the use of EPCglobal Reader Protocol to program and communicate with the reader is included. 2.2 Audience This manual assumes that the reader is generally familiar with Windows personal computers.  An introduction to RFID technology is provided for readers who are new to the field.   2.3 RFID System Quickstart Radio Frequency Identification (RFID) uses electromagnetic waves to exchange information between a tag, containing  (at least) a number uniquely identifying that physical tag and by implication the object to which it is attached, and a reader.  RFID tags are analogous to bar codes, but can contain more information and are more versatile.      The Hitachi America Ltd. HSS-MUR-300 reader operates in the US ISM frequency band from 2.4 to 2.483 GHz.  This reader is compatible with tags that comply with Hitachi’s proprietary  “µ-chip” standard.  This reader is not compatible with UHF (902-928 MHz) tags following the EPCglobal class 0 or class 1 (generation 1 or 2) standards or ISO-18000A or B, nor with  HF (13.56 MHz) tags generally used in Smart Cards, or LF (125/134 KHz) tags generally used in animal identification.   The Hitachi µ-chip is an RFID tag that operates in the 2.4-2.483 GHz band.  Each chip is factory-encoded with a unique identifier and cannot be re-written.  With a unique identifier, these chips can be used to authenticate currency and official documents and are suited to be embedded in paper.  The HSS-MUR-300 reader is configured to use an Ethernet interface to communicate with a host computer; direct optically-isolated I/O ports are also provided.  A conventional serial port is available for specialized maintenance tasks but is not used in normal operation.  With an appropriate host and appropriate external antennas, a stationary portal reader can be used to acquire the unique identification number (UID) of one compatible
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 5 tag in its reading range.  The “µ-chip” standard does not support anti-collision, and multiple tags simultaneously present in the read range may not be reliably read.    A more detailed discussion of RFID technology can be found in the Appendix (section 10) .    2.4 Product Description  The HSS-MUR-300 reader is a self-contained RFID reader configured for use at 2.4-2.483 GHz.  Two equivalent antenna connections, each using reverse-polarity SMA connectors, allow connection of one or more external antennas.  Each port can be connected to a linearly polarized patch antenna such as the recommended MP2400XFPT/RPSMA, or to a similar circularly polarized antenna.  Each antenna provides both transmit and receive functions to communicate with a tag, and only one antenna is needed, but two may be used.  When two antennas are used, they are addressed in time sequence as requested by the host, and are not used simultaneously.  Communications with a host controller is achieved through a 10/100 BaseT (Ethernet) port employing a conventional RJ45 connector.  Optically-isolated digital direct I/O is also available.  A serial port interface is provided solely for maintenance operations.    The HSS-MUR-300 RFID reader has 5 LEDs that provide status information for reader operation and Ethernet connectivity.  The following chart briefly describes each of the LEDs and its status.  Table 1 - HSS-MUR-300 RFID Reader LED Status LED Description Location Color Operational Status Ethernet Activity RJ-45 Ethernet Connector Yellow On – Transmitting or receiving Off – No activity Ethernet Link RJ-45 Ethernet Connector Green On –Connected Off – No connectivity Operating Ready Right Green On – Power On, Idle  Off – Processing a command or reading tags Read Activity Center Yellow On – Tag read Off – No tags detected Reader Operation Left Red On – Hardware fault. Off – No fault detected   2.5 Unpacking and Inspection  Box Contents:     • HSS-MUR-300 Reader  (1) • AC power adaptor (1) • external antenna and cable (1)
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 6 2.6 Product Installation  The HSS-MUR-300 reader is designed to be configured and installed by end users.  Product users should consult with Hitachi America Ltd. or their equipment vendor prior to modifying the installed configuration.    The HSS-MUR-300 reader uses an external antenna connected to the reader by a removable cable, and is controlled over a conventional 10/100 BASE-T (“Ethernet”) network connection.  A typical installed configuration is shown below.       The HSS-MUR-300 reader should be installed in a location protected from physical impact.  The reader may support up to 2 external antennas.  The antennas should not be located more than 1 meter (3 feet) from the reader.  The reader and antennas should not be located close to a strong source of RF interference such as a cordless telephone or WiFi (IEEE 802.11) wireless local area network (WLAN) basestation.  The antennas should not have any conductive (metallic) obstructions within 20 cm in the direction in which tag reading is to be performed.    The back panel of the HSS-MUR-300 reader is shown below.  The reader is equipped with an Ethernet connector, a serial port connector, a general-purpose I/O connector, antenna connectors, and a port for DC power.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 7 A possible installation sequence is as follows: 1. Mount the reader to a secure, stable surface, with adequate clearance and air flow. 2. Attach the antenna cables to the relevant reverse-SMA connectors at the reader.   You may optionally terminate an unused antenna connection with a reverse SMA terminator, but this is not required for normal operation.   3. Connect to the host or network.  Use a conventional CAT5 or above cable to connect to an Ethernet hub or switch; use a crossover cable to connect directly to a host computer.  4. Connect the +6 VDC power supply cable to the reader.   5. Place one appropriate RFID tag in front of one of the antenna at 5-25 cm distance.  At this point the reader should be ready for operation using the demonstration interface software, or other custom control software.      3 Installation and Operation of demonstration software  The following description assumes the host computer is operating under Microsoft Windows XP; slightly different screens will be visible if another operating system is employed.   3.1 Minimum System Requirements This software requires a host computer running Microsoft Windows 98, NT, 2000 or XP, with a Pentium-compatible PC and at least 128MB RAM, 50 MB available hard disk space, and 800x600 resolution or higher.  The configuration described presumes that an Ethernet network connection is available.  When powered up, the HSS-MUR-300 reader searches for a DHCP server; if found, the reader obtains an IP address and subnet mask from the DHCP server, and is thereafter visible to other devices on the network through a UDP ‘heartbeat’ message periodically declaring its presence.  In order to obtain the IP address, it is necessary to either access the reader through a serial connection (the console port), or detect the beacon broadcast by the reader to the network.  To use a serial connection, you need a host computer with a serial port, or a USB-to-serial converter, and a serial communications utility such as Hyperterminal.    The reader is shipped from the factor with the default IP address:    192.168.1.200  If no DHCP server is available, the reader will retain this address.  Communications can proceed directly between a host and the reader, using an Ethernet hub or a crossover cable, if the host computer’s IP address is on the same subnet as the default IP address.     3.2 Installation 3.2.1 Obtaining the IP Address of the Reader Using a Serial Connection  To obtain the reader’s IP address manually, perform the following steps.  The procedure assumes that a network with a DHCP server is available.    1. Connect the reader to an appropriate network port (Ethernet or LAN connection) using a standard (non-crossover) CAT5 cable.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 8 2. Connect the host computer directly to the reader using a serial cable (and USB converter if needed).  3. Start HyperTerminal or equivalent serial communications program.  (The instructions below assume Hyperterminal is used.)   4. You may be presented with a dialog box asking for phone connection information.  Press Cancel.  A second dialog box may ask you to confirm the cancellation; press Yes and then when asked to provide location information, press OK. 5. If you have not connected previously you may create a new connection and give it an appropriate name.  Press OK.  6. Again press Cancel, Yes, and OK in response to the (here irrelevant) requests for telephone information.  You will then be presented with a window containing the connection information for the new connection.  Select the appropriate COM port in the pop-up menu at the bottom.  Click OK.   If you don’t know which COM port to address, go to Control Panel and select System:Hardware:Device Manager.  Click on the + symbol next to Ports (COM & LPT) to find the serial ports enumerated.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 9   7. Configure the port settings as shown below:  57600 bits per second, 8 data bits, no parity, 1 stop bit, and no flow control.  Press OK.  8. Power up the reader.  After a few seconds, Hyperterminal should show a set of messages describing the operations taken by the Linux system as it boots up.  Wait until the prompt “Please press Enter to activate this console” appears.  Press Enter. 9. You should now see a # prompt.  Type ‘ifconfig’ <Enter>.  A set of messages describing the Ethernet configuration of the reader will appear.  The first message is headed ‘eth0’.  The second line will read something like:  inet addr:144.172.2.30  Bcast:144.172.255.255  Mask:255.255.240.0  These three numbers are the internet (IP) address, broadcast address, and subnet mask of the reader.  Select and copy this line and paste into another document, or write down the addresses.  At this point you can optionally quit Hyperterminal and disconnect the serial port.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 10 3.2.2 Configuring the  Reader Management Utility  Once you have obtained the reader’s IP address and subnet, subsequent communications take place using the Ethernet network connection.  The reader is configured to use the EPCglobal Reader Protocol and Vendor Specific Commands to communicate with a host.  The  Reader Management Utility implements these protocols and provides a convenient user interface.    The instructions below assume that the reader and the host computer are on the same subnet of a local area network.  When the reader and host are connected to neighboring ports on an Ethernet hub or switch this will almost certainly be the case.  If in doubt, check the host computer IP address using Control Panel: Network Settings and click on the active network connection’s Support tab.        If the first two dotted decimal numbers are the same for reader and host it is very likely they are on the same subnet.  (See any standard network reference for how to interpret the subnet mask to extract subnet organization.)  In most cases the host computer must be on the same subnet as the reader to communicate.  (It is in principle possible to assign a globally-routable IP address to the reader, if you wish to support remote access without using a virtual private network (VPN).  Such an arrangement involves important security issues.  Discuss this with your Information Technology staff or network administrator.)   Perform the steps below to install the Reader Management Utility.  1. Run rmu_1.1_setup.exe, from the CD or its download location.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 11    2. Click Next.  Select either a Personal or Common installation, and click Next. 3. If the default installation folder is not suitable, navigate to your preferred location, and then click Next.    4. Use the default program icon name or enter your own and click Next.      5. Uncheck the Desktop selection if you do NOT wish to have a shortcut on your desktop to the Reader Management Utility.  Click Next. 6. If the resulting configuration is what you wanted, click Next.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 12  7. Click Finish to complete setup.   You should now be able to start the Reader Management Utility from the desktop shortcut (if you chose to install one) or from the Start:All Programs menu.  It is now necessary to configure the Reader Management Utility by providing the IP address of the reader (obtained in section 1.2.2.1 above) and that of your computer.    1. Start the Reader Management Utility.  After a moment you should see the main screen.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 13  2. Select Settings:Edit Properties.  3. Set the Command IP address to the IP address of the HSS-MUR-300 reader obtained in section 1.2.2.1 above.  Set the Command Port to 4684.  Click Save.  The host computer is now configured to issue commands to the Reader.  4. We now need to configure the host computer to listen to the Notification Channel, to receive information about tags read by the reader.  Select Settings:Windows:Start nchannel.    5. After a moment, the Notification Channel 0.0.4 window will appear.  [Note that this is a separate application, launched from Reader Management Utility.]  Click Listen.  You may see a security message if you have a firewall active on your host computer; click Unblock to allow the Notification Channel application to connect.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 14  Click on the Console window (the DOS-style text window): the last message there should be ‘Listening’.    6. Select Command:Connect.     After a moment, the status bar at the bottom of the window should say “Command Channel: Connected”.      It is next necessary to configure the reader to communicate with the notification listener utility.  These configuration settings are contained in a text program called hitachi_settings.txt, provided in the load_files directory on the distribution CD.  You will need to save this program to your local hard disk and edit it with a text editor such as Notepad.  If you use a word processor such as Microsoft Word, you must be careful to save the file as a text file, and not as an .rtf or .doc file.      1. Open hitachi_settings.txt in a text editor.  Find the line reading:  NotificationChannel.create nc,000.000.000.000:4684  2. Replace the dotted decimal values with the IP address of your PC (the host computer, NOT the HSS-MUR-300 reader).  You can find this address by double-clicking on the active network connection in the Control Panel: Network Connections window, and selecting the Support tab.  An example of the resulting edited line is shown below:  NotificationChannel.create nc,144.172.2.25:4684  3. Do not make any other changes in the file.  Save the file to your local disk if you haven’t already done so.   4. Bring up the Reader Management Utility window and select Command:Load Settings.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 15  5. In the Load Settings window, click the Load button.     Navigate to the location in which you saved hitachi_settings.txt and select the file.  Click Open.    The contents of the file should appear in the Command List window.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 16  6. Click Run.  The right-hand panel should show a COMPLETE message as each command is run.  7. The text window should display Notification channel connected.  Note that the bottom of the Reader Management Utility window will still indicate Notification Channel: Disconnected, as the Notification Channel window is a separate application.  8. The final step is to add a read trigger to the source.  Click the Source pane on the right-hand side and navigate to the command Source#.addReadTriggers##.   Enter s1 in the text box after #. and t1 in the text box after ##.   Click the command to insert it with placeholders filled in into the command box, and click Send.    At this point it should be possible to begin reading tags.  Place a tag close to the antenna; note that if the antenna is linearly polarized, the long axis of the tag must be along the direction of polarization.    3.3 Using the Demonstration software   The Reader Utility and Notification Channel utility are used to control the reader through the definition of the EPCglobal Reader Protocol (version 1.1). The protocol defines the following classes of objects;  • ReaderDevice: base container for other objects in the model; includes at least one CommandChannel  • Sources: contains one or more ReadPoints (antenna, barcode scan, etc.)
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 17 o each source generally has the attributes MaxReadDutyCycle, ReadCyclesPerTrigger, ReadTimeout • Triggers: trigger a source to read, or a notification channel to get data from the report buffer • ReadFilter: encapsulated in a source; defines binary bit masks for tags • Events: changes in the tag list state: o evGlimpsed: a specific tag is seen for the first time o evObserved: a specific tag has been seen repeatedly over time > threshold [1]  o evLost: a specific tag is not seen for time > timeout o evPurged: a specific tag is not seen for time > purge timeout [1] o evNoEvents: the most recent trigger did not cause any tag events • Channels: command or notification channel • DataSelector: data to be sent; e.g. tag type, raw tag ID or URI, source name, trigger event, etc. note 1:  these events are not yet implemented in the Reader Management Utility  To read a tag, the reader needs a command channel, at least one source with at least one read point, and at least one trigger for that read point.  The read point is predefined to be assigned to one of the Antenna objects corresponding to the two physical antennas.  To report the tag events to the host, the object also needs at least one notification channel, and a data selector with at least one data item (such as the tag ID) selected for reporting.  All these objects should have been configured when you loaded the recreate_nc.txt file.  If some of the objects are missing, you can use the Reader Management Utility to add them.  You can also change the configuration of the reader to suit your requirements; e.g., you can add a continuous trigger or a timed trigger, or you can set up a filter that reports only tags that have been observed (read multiple times) rather than glimpsed (read once).    The Reader Management Utility provides a pane on the left side to display the reader object’s current state, a set of panes on the right side to send Reader Protocol commands to the reader to change its state, and a  set of menu commands for other specific purposes.    To find the current configuration of the reader’s object model, click on the Get Reader Information button.     The left-hand window will then be populated with a tree diagram depicting the state of the virtual reader.   Click on the [+] symbols to expand the tree any object and show what objects it contains.    You can issue Reader Protocol commands to the reader using the right-hand panels.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 18   Commands can be directly entered into the text box in the center of the pane, and sent to the reader by clicking Send.  Alternatively, the tabs can be used to navigate through the categories of commands.  Each supported command is provided with placeholders ‘#.’ and ‘##’ for the parameters of the command.  The placeholders can be filled by inserting the appropriate values in the ‘#.’ and ‘##’ text boxes at the top of the pane.  When a command is successfully received the response box at the bottom will show RECEIVED: followed by any return data and the > caret.    3.4 Software / Communications Troubleshooting  symptom likely cause corrective action no connection make sure serial cable and (if used) USB adaptor are plugged in wrong COM port check the SYSTEM: DEVICE MANAGER: HARDWARE control panel to see if the desired port is displayed USB adaptor isn’t shown make sure a driver for the USB adaptor has been loaded on your host computer serial communications software doesn’t see the reader wrong parameters ensure you’ve entered the communications parameters requested ifconfig returns 000-value or unexpected IP addresses no DHCP server make sure there is a DHCP server connected to the network connection the reader is using.  For example, hook a laptop or desktop computer to the same network port and renew your DHCP lease in the TCP control panel; make sure you get a new IP address after 15-30 seconds. Command channel fails to incorrect reader IP address or port check value in Settings menu
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 19 connect reader and host on different subnets check IP address of host; for most subnets it should differ only in the last dotted decimal block from the reader IP address;  if in doubt see your network administrator run recreate_nc.txt , after changing the IP address listed in that file to the address of your host computer Notification channel fails to connect no notification channel created reboot reader Run hitachi_settings.txt causes an ABORT message to appear Some objects to be created by hitachi_settings are already present. Issue the command ReaderDevice.resetToDefaultSettings to restore the reader to its initial state, and then reload and rerun hitachi_settings.txt       no source object defined add a source no read point add a read point; note that the read point must be assigned both to a source and to an antenna no data selector add a data selector and a data item (usually tagID) for the selector to select Tags are not read when placed near the reader no trigger add a trigger; note that the trigger must also be placed within the source   4 Overview of Reader Communications and Configuration Under EPCglobal Reader Protocol  The HSS-MUR-300 communicates based on the EPC Global Reader Protocol 1.1 (working draft dated: 06-27-2005) in development by EPC Global Inc.  The Reader Protocol communications approach is based on layering message channels on top of a transport channel.  The control channel and notification channel exchange information with a messaging layer, which provides the necessary syntax for the transport channel employed. The combination of the messaging layer and the selected transport layer forms a Message Transport Binding (MTB).  The HSS-MUR-300 uses a TCP/ Text Message MTB, so the primary transport mechanism is a TCP/IP connection, typically created over an Ethernet (IEEE 802) local area network.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 20 While this architecture is not required by the standard, it is expected that most reader subsystems will be configured with a read subsystem, an event subsystem, and output subsystem, and a communications subsystem.       Each acquisition of tag data from a single source is a read cycle.  The host can specify the frequency and number of read cycles and trigger conditions.  Triggers cause reads to flow to the report buffer but not necessarily to the host.  Filters are bitwise masks used to assist tag singulation.    Event smoothing reduces the amount of data in upper layers by recording only important events.  The reader maintains a tag list describing all reads by all sources; changes in the tag list produce events:  evGlimpsed: a specific tag is seen for the first time evObserved: a specific tag has been seen repeatedly over time > threshold  evLost: a specific tag is not seen for time > timeout evPurged: a specific tag is not seen for time > purge timeout  These events are transitions between the states: isUnknown isGlimpsed isObserved isLost  Data selection determines what data fields are to be reported and manages the report buffer queue.  The report buffer provides storage for the output of the data selector.  The host can request synchronous delivery of all events, or triggers can initiate asynchronous data transfer to host.  The buffer is cleared after data is delivered to host.  The message transport binding is responsible to bind the data to a specific transport protocol (here TCP/IP) and send it to the host.    The object model includes the objects: • ReaderDevice: base container for other objects in the model; includes at least one CommandChannel  • Sources: contains one or more ReadPoints (antenna, barcode scan, etc.)
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 21 o each source generally has the attributes MaxReadDutyCycle, ReadCyclesPerTrigger, ReadTimeout • Triggers: trigger a source to read, or a notification channel to get data from the report buffer • ReadFilter: encapsulated in a source; defines binary bit masks for tags • Events: changes in the tag list state: o evGlimpsed: a specific tag is seen for the first time o evObserved: a specific tag has been seen repeatedly over time > threshold  o evLost: a specific tag is not seen for time > timeout o evPurged: a specific tag is not seen for time > purge timeout o evNoEvents: the most recent trigger did not cause any tag events • Channels: command or notification channel • DataSelector: data to be sent; e.g. tag type, raw tag ID or URI, source name, trigger event, etc.  These objects and their implementation in the HSS-MUR-300 are described in more detail below.   4.1 Message Channels The HSS-MUR-300 uses a command channel and notification channel; configuring and managing the reader via the command channel, receiving data from the reader via the notification channel.  Once configured, the reader can function as a stand-alone reader that does not require outside action.  The command and notification channels communicate via an Ethernet link.  The reader supports one command channel and one notification channel.  The command channel host can be different from the notification channel host. 4.2 Command  The command channel carries all requests sent by the host to the reader as well as the responses to these requests from the reader to the host.  All messages exchanged over the command channel follow a request/response pattern.  The host acts as a client and connects to the reader, which acts as the server.   4.3  Notification The reader sends data it collects by means of a notification channel.  This channel is a talk-only link for the reader and a listen-only link for the host or management software.  The user assigns an IP address for the notification channel to send data to the host and the host is able to listen to receive the notification channel.  The notification channel carries messages issued asynchronously by the reader to the host.  The reader sends messages over the notification channel autonomously.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 22 For the notification channel, the reader acts as a client and connects to a host, which acts as a server.  CommandHost NotificationHost(s)NotificationChannelCommandChannelTCP TCPServerServerClientClientSource(s)Trigger0(Continuous, ...)Trigger1(Timer, ...)rpAnt1Class0rpAnt1Class1rpAnt4ClassIso... 4.4 Configurable Reader Components  The HSS-MUR-300 RFID Reader is designed to be user-configurable.  The “EPC Global Reader Protocol 1.1 (working draft dated: 06-27-2005) ratified by EPC Global Inc.” specification identifies configurable components of compliant readers using a well defined structure of objects.  The relationship of the various objects is intended to provide configuration flexibility, and a defined hierarchy which supports configurations ranging from very simple “Read on Command” operation, to sophisticated autonomous tag reading and tag data reporting operations under timer or externally triggered control.  The configurable objects (except for the Reader Device) are identified by name (up to 64 characters).  The HSS-MUR-300 RFID Reader supports the following configurable object types: • Reader Device – The highest level component of the reader.  Controls access to all of the other reader objects.  The ReaderDevice object is the base container for most other objects.  It represents the reader and contains several attributes used to manage the reader. • Source – Parameters and the grouping of reader objects configured to perform a single tag read and report operation.  A Source is a logical entity that can encapsulate one or more input sensors called read points.  A read point is any physical entity that is capable of acquiring data (i.e. an antenna).  A reader can have multiple Sources.  A Source can have multiple read points. • Triggers – A Trigger can be contained by a Source where they act as read triggers.   A read trigger causes the reader to acquire data from the Trigger’s associated Source.  Triggering a read causes data to flow from the Source to a report buffer, but it does not cause any communication with the host.  A notification channel uses a trigger known as a notification trigger.  A notification trigger causes the reader to send the entire content of the report buffer, which is associated with this trigger’s notification channel.  There are currently four types of Triggers: timer, IO edge, IO Value, and continuous. o Continuous – the activity is triggered as rapidly as possible.  For notificationTriggers, this means that a new event shall be sent whenever a new event appears in the report buffer.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 23 o Timer – the activity is triggered at regular time intervals. o IO Edge – the activity is triggered by a signal transition at an IO port. o IO Value – the activity is triggered by a value (using multiple GPIO pins) match at the IO port. • Read Point – Controls the reading of a single tag type using a single TX/RX antenna pair. • Read Filter – Defines the specific Tag Identities to be included in (or exc luded from) the tag event smoothing and Tag Event generation operations. • Notification Channel – A TCP/IP port Ethernet connection used to send tag data event report messages to a host computer. • Data Selector – Defines the field names data, and the tag event data for event types to be sent in the Tag Data Event Report messages for a ReadIDs command, or for the Notification Channel. • Field Names – Defines the Fields (by name) for which a value is to be reported in each Tag Data Event Report message associated with the Data Selector. • Event Type – Defines which Tag Identities with the corresponding Event Type(s) are to be reported in each tag data read Report message associated with the Data Selector.  Only Tag ID events matching the specified Event Type(s) are included in the report. Read and Notification Trigger – Definition of automatic control mechanisms to provide autonomous reader operation for tag reading and report generation of tag events.  The following sections provide a simple set of example commands for configuring the HSS-MUR-300 RFID reader. 4.4.1 Reader Identification  Assign the reader a unique identifying name ‘RFID Reader’: Format:    ReaderDevicesetName [Name] Example: ReaderDevice.setName RFID Reader  4.4.2 Data Selector  Create a data selector ‘DS1’ Format:    DataSelector.create [Name] Example:  DataSelector.create DS1 4.4.2.1 Data Selector Field Name  Define the report field name for tag data read reports: Format:    DataSelector#[Name].addFieldNames [Name1][Name2]…[NameN] Example:  DataSelector#DS1.addFieldNames TagID,ReaderID,ReaderNowTick" 4.4.2.2 Event Report  Define event types for tag data event reports: Format:    DataSelector#[Name].addEventFilters [FilterName],[FilterName] Example: DataSelector#DS2.addEventFilters evGlimpsed,evLost  4.4.3 Read Filter  Create an include read filter ‘I800X’ that Tag IDs that begin with ‘800x8004’ (where ‘x’ is any digit) are processed:
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 24 Format:    ReadFilter.create [Name],[TagID],[Boolean] • "ReadFilter.create I800X,80008004,FFF0FFFF,true"  Create an exclude read filter (‘X8001’) that Tag IDs that begin with ‘8001’ will be excluded: • "ReadFilter.create X8001,8001,FFFF,false"  4.4.4 Source Create the source object ‘dock_door’: Format:    Source.create [Name] Example: Source.create dock_door  4.4.4.1 Read Point  Assign Read Points ‘rpAnt1ClassMuChip’ (read µ-Chips using Antenna 1) which identify the class of tags, and the Antenna for a single tag data read: Format:    Source#[Source].addReadPoints rpAnt[Antenna][Tag Class] Example: Source#dock_door.addReadPoints rpAnt1ClassMuChip  Issue a raw read command to perform a single tag data read operation with all tag data reported on the command channel DS1 to control the report formatting): Format:    Source#[Source].rawReadIDs [Data Selector] Example: Source#dock_door.rawReadIDs DS1  4.4.5 Triggers 4.4.5.1 Creating Triggers  Create a continuous trigger called Notify1 to generate autonomous Tag Data Event Reports: Format:    Trigger.create [Name],[Type] Example: Trigger.create Notify1,Continuous  Create a timed trigger that causes autonomous tag data read operations every 200 milliseconds: Format:    Trigger.create [Name],[Type],[Interval] Example:  Trigger.create ReadTimer 200mSec,Timer,200  Create an I/O Edge Trigger that causes autonomous tag data read operations as the result of a Rising Edge on Digital I/O Pin 1 (Port Number is always 1): Format:    Trigger.create [Name],[Type],[Edge],1,[Pin] Example: Trigger.create ReadEdgeRising,IOEdge,rising,1,1  Create an I/O Value Trigger that causes autonomous tag data read operations as the result of a configurable value(s) are detected on the Digital I/O Pins (Port Number is always 1). The Mask parameter is optional, it is bitwise anded with the port data before comparing to the mask: Format:    Trigger.create [Name],[Type], 1, [Value], [Mask] Example: Trigger.create ReadValue, IOValue, 1, 0002, 0002Read Trigger   Add ‘ReadTimer‘ to ‘dock_door’ to read tags autonomously:
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 25 Format:   Source#[Source].addReadTriggers [Trigger] Example: Source#dock_door.addReadTriggers ReadTimer  Add the ‘ReadEdge‘ read trigger to cause autonomous tag data read operations when a rising edge signal is detected on digital I/O pin 1: Format: Source#[Source].addReadTriggers [Name] [I/O Pin] [Edge] Example: Source#dock_door.addReadTriggers ReadEdge 1 Rising  Add read filter ‘I800X’ to cause only tags that begin with ‘800x8004’ (where ‘x’ is any digit) to be processed: Format: Source#[Source].addReadFilters [Filter] Example: Source#front_door.addReadFilters I800X  4.4.6 Message Channels 4.4.6.1 Command Channel   In order to modify the IP Address, NetMask, and Port Number for the HSS-MUR-300 RFID Reader Command Channel, it is necessary to set Administrative Mode and then issue the command to set the new Command Channel values:  Enter Admin mode: Format:    +HAL:adminMode [Password] Example: +HAL:adminMode HALcomm  Change the reader’s IP address: Format:    +HAL:setIPaddr [Type],[IP Address],[NetMask],[Port] Example: +HAL:setIPaddr static,192.168.1.200,255.255.255.0,4599  4.4.6.2 Notification Channel  Create the notification channel ‘NC1’ for autonomous tag data event reports: Format:    NotificationChannel.create [Channel Name],[IP Address]:[Port] Example: NotificationChannel.create NC1,192.168.1.1:4684  Assign the data selector ‘DS1’ to the notification channel ‘NC1’: Format:    NotificationChannel#[Channel Name].setDataSelector [Selector Name] Example: NotificationChannel#NC1.setDataSelector DS1  Assign the source ‘dock_door 1’ to the notification channel ‘NC1’ Format:    NotificationChannel#[Channel Name].addSources [Source] Example: NotificationChannel#NC1.addSources dock_door 1"  Assign the continuous notification trigger ‘Cont’ to the notification channel ‘NC1’: Format:    NotificationChannel#[Channel Name].addNotificationTriggers[Trigger] Example: NotificationChannel#NC1.addNotificationTriggers Cont These commands capture autonomous tag data events from ‘dock_door 1’ and tag data event reports are sent on the notification channel.  The ‘DS2’ Data Selector to controls the report format.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 26 4.4.7 Vendor Specific Commands (VSC)  Set power level for antenna 1 at 27dBm: Format: .setFwdPower [Power(dBm)],[Antenna] Example: .setFwdPower27,1  Get power level on antenna 1: Format: .getFwdPower (Antenna) Example: .getFwdPower 1  Set a static IP address, 192.168.0.1, using port 4684: Format: .setIPaddr [Type],[Address],[Subnet],[Port] Example: .setIPaddr static,192.168.0.1,255.255.255.0,4684  Valid Types: DHCP, Static Note: the reader automatically reboots after an IP address type or value change  Set the heartbeat with period 15 for port 4500 Format: .setHeartbeat [Boolean],[Period],[Port] Example: .setHeartbeat true,15,4500  Set the administration mode password to ‘HAL’ Format: setPassword [password] Example: setPassword HAL  Set the reader to administration mode Format: adminMode [password] Example: adminMode [HAL]
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 27
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 28  5 SR2500 RFID Reader Theory of Operation  The HSS-MUR-300 RFID reader consists of a transmitter and receiver, both employing the same local oscillator and direct up- and down-conversion to/from the carrier frequency, configured for operation within the US Industrial Scientific and Medical (ISM) band at 2.4-2.483 GHz.  The transmitter signal both provides power to passive tags and delivers commands to the tags.  The system is thus full-duplex in the sense that the transmitter continues to operate during reception of tag signals, but half-duplex in terms of data transmis sion, since when tag data is being received the transmitted signal is unmodulated CW.  In a typical exchange, the transmitter first powers up and sends a CW signal to provide power to tags in the read zone.  Then a baseband on-off-keyed modulation, appropriately filtered, is imposed on the CW signal with a mixer.  The reader data provides tags with synchronization information, and requests tags to transmit their unique IDs.  After a command is given, the transmitter continues to transmit unmodulated CW power at the carrier frequency; this CW signal both provides power to operate the tag’s integrated circuit, and provides the RF signal that the tags backscatter to send their signals back to the reader.   The proprietary µ-chip tags do not support anti-collision algorithms, and do not support writing new identifying numbers or other user information to the tags.      The backscattered signal is mixed to baseband using the same VCO signal employed by the transmitter; the HSS-MUR-300 reader is a homodyne radio.  In-phase / quadrature (I/Q) demodulation is employed in order to ensure that the baseband signal can be received despite variations in the absolute phase of the reflected carrier.  (Without this provision, depending on the exact separation of the tag and reader antenna, the cable lengths, and other factors that cannot be controlled, the reflected signal would at times be in quadrature with the signal from the VCO, so that the mixer would produce no baseband output.)  The outputs of the two mixers are filtered and amplified and then demodulated to extract the reflected signal from the tags.  After each command set the power shuts down while processing of the commands proceeds.   The nominal channel spacing is 1 MHz, providing 75 channels (with guard bands) within the ISM band.  In
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 29 accordance with FCC regulations, the carrier frequency periodically ‘hops’ in a pseudo-random fashion over the ISM band to avoid persistent interference with other unlicensed users.    The overall system consists of the RF module, a controller, and interfaces to serial and Ethernet ports for communication with a host computer or network.      6 Troubleshooting   Symptom Probable Cause Corrective Action No DC power verify DC power block is plugged in and connected to reader; operating / ready ndicator LED red No antenna connection verify antenna is snugly connected to reader output and (if present) other adaptors Wrong antenna assignment verify that the read point being triggered corresponds to the antenna port physically connected to an antenna presented with tags Wrong tag orientation long axis of tag antenna must be perpendicular to reader-to-tag direction; if linearly polarized antenna is used, long axis must be oriented along polarization (i.e. tag must be horizontal if horizontal polarization is used);  see section 1.9.2.2 Tag too far read range is limited to approximately 30 cm   Power set too low read range will fall approximately 1 dB (factor of 0.9) for each 2 dB reduction in transmit power;  see table yy.yy Tag is not read Defective tag substitute another tag
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 30 tag environment tags cannot be read when resting directly on metal object or object containing aqueous fluids;  provide 1-2 cm spacing from such objects  reader antenna environment no metal obstacles should be present between reader antenna and tag Tag read sporadically interference check vicinity for likely interferers, including active WiFi (802.11) client or basestation, active Bluetooth client or basestation, cordless telephone operating at 2.4 GHz band   7 Technical specifications  PHYSICAL: Parameter Specification Dimensions 140 mm (5.50”) Length x 105 mm (4.13”) Width x 32 mm (1.25”) Height Weight 0.545 Kgm (1 lb 3.2 oz) Chassis Material Aluminum Antenna ports 2 Antenna connectors reverse-polarity SMA Network ports 1 (RJ45) Serial communications 1 (Female DB9) GPIO male DB15 Power 2.1 mm ID (pin positive); 5.5 mm OD (GND), 12 mm insert length  ELECTRICAL / PERFORMANCE: Parameter Specification DC power 6 VDC, 24 watts;  recommended power supply : CVI PN DTS060400UDC Operating Frequency US ISM band (2.4 –2.483 GHz)  Frequency-hopping: 75 channels at 1MHz spacing Maximum transmit power 28.0 dBm Protocol support Hitachi µ-chip Read range 30 cm typical Operating temperature -10 to 55°C  (-14 to 132°F) Recommended antennas MP2400XFPT/RPSMA (linear polarized)   HG2409PCR (RHCP) or  HG2409PCL (LHCP) Antenna Max Gain 8.5 dBi, 8.0 dBiC;  1 meter (3 foot) cable; see note [1]  COMMUNICATIONS: Parameter Specification network port 10/100 BASE T (Ethernet) serial port RS232 host interface complies with EPCGlobal draft Reader Host Specification 6-27-05 GPIO see note [2]  HARDWARE / OS: Parameter Specification Processor Cirrus Logic EP9302 ARM9 Core Memory 32MB Flash; 32MB SDRAM Operating System Debian Linux Kernel V2.4
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 31 [1]  Antennas of similar type (panel or patch) and the same or lower gain may be substituted for the recommended antenna.  Antenna gains listed above do not include 0.6 dB cable loss, which must be added to published antenna gains to calculate effective antenna gain. Use of antennas with higher effective gain than the recommended antenna may lead to failure of the unit to comply with applicable standards for unlicensed operation in the United States.   [2]  The HSS-MUR-300 RFID Reader provides 4 externally accessible digital inputs and 4 outputs.  These inputs are optically isolated (positive or negative, up to 30V differential) for external event sensing.  The 4 digital outputs (on/off MOSFET switch operation up to 30V differential) control external devices.   8   Notices 8.1 RFID limitations  Communication between tags and readers at  2.4 GHz is a complex phenomenon depending on details of the environment surrounding the tags and reader(s) as well as the equipment being used.  Some environmental aspects (such as tag placement and orientation) may be controllable by the user; others (such as reflections of the RF radiation by ambient objects) are generally not.  Careful installation and testing, and development and adherence to appropriate operating procedures, are indispensable for successful implementation of RFID.  Hitachi America Ltd.  makes no representation or warrantee that any specific configuration of RFID tags and readers will provide any given performance characteristics.   8.2 Safety   Any use of this equipment with antennas or cabling installed outdoors or otherwise exposed to inclement weather must avoid proximity with power lines or other high-voltage conductors, and provide for proper grounding and lightning arresting devices to protect the equipment user in the event of a lightning strike.  See National Electrical Code (NEC) requirements articles 725, 800, and 810 for further information.     Do not operate the stationary portal readers in any area where critical safety equipment may be sensitive to RF interference, such as medical or life support equipment.    Do not operate the stationary portal readers on board any aircraft in flight, or at any other time when operation of radio devices such as cellular phones is prohibited.    Personnel should not be closer than 20 cm (8 inches) from any Stationary portal reader antenna for prolonged periods of time.  See FCC bulletins 56 and 65 for further information on electromagnetic field exposure.   8.3 Limitation of liability The information in this manual is subject to change without notice and does not represent a commitment on the part of Hitachi America Ltd.   Hitachi America Ltd., specifically disclaims liability for any and all direct, indirect, special, general, incidental, consequential, punitive or exemplary damages, including but not limited to loss of profits, revenue, or anticipated loss of profits or revenue, arising out of the use or inability to use any Hitachi America Ltd. product, even if Hitachi America Ltd. has been advised or the possibility of such damages or they are foreseeable, or for claims by any third party.   8.4 Patents  Portions of the products described in this manual may be covered by granted or currently-pending US and foreign patents.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 32 8.5 Copyright notice The contents of this document are the property of Hitachi America Ltd., except where otherwise noted.  Individuals who have purchased or otherwise legally acquired the stationary portal reader hardware units described in this document are expressly permitted to make copies of the document, in electronic or paper form, for personal, backup, and archival use.  Brief segments may be excerpted and used with attribution for descriptive purposes in commentaries, reviews, or other informational documents.  All other reproduction in whole or in part is expressly prohibited without the consent of the copyright owner.    Copyright 2006 by Hitachi America Ltd. 8.6 Comments and feedback  Comments and feedback on this manual or the HSS-MUR-300 reader are welcomed:  By phone:   1-800-WJ1-4401  (951-4401)  or  (972) 705-2313 By email: RFID.info@wj.com 9 Regulatory Compliance 9.1 FCC Statement  This equipment has been tested [PENDING AT THE TIME OF THIS WRITING!] and found to comply with the limits for a Subparts B Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: -- Reorient or relocate the receiving antenna. -- Increase the separation between the equipment and receiver. -- Connect the equipment into an outlet on a circuit different from that to which the receiver    is connected. -- Consult the dealer or an experienced radio/TV technician for help.  NOTE: Changes or modifications not expressly approved by Hitachi America Ltd. could void the user's authority to operate the equipment described in this manual.  9.1.1 RF Radiation Exposure Statement  These devices comply with FCC radiation exposure limits set forth for an uncontrolled environment, and users must follow specific operating instructions for satisfying RF exposure compliance. To comply with FCC RF exposure requirements, a separation distance of at least 20cm must be maintained between the antenna of this device and all persons.  This device must not be co-located or operating in conjunction with any other antenna or transmitter.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 33  10 APPENDIX   10.1 RFID operating principles  Radio-frequency identification  (RFID) is an auto-identification technology, similar in concept to other common auto-identification technologies such as bar code scanners, magnetic strip readers, or magnetic ink readers. Like other auto-ID techniques. RFID associates an identifying number with a physical object.  In RFID, the unique identifying number (UID or, as will be explained below, EPC) is incorporated in a special system, an RFID transponder  (often simply known as a tag).  An RFID Interrogator (usually known as a reader) is used to obtain the UID from the tag using electromagnetic waves.  The tag is usually attached to a physical object that is to be identified, such as a carton, a pallet, or a container filled with a product.    In order to reduce the cost of the tag, most tags do not incorporate a battery or other source of power, but instead operate using DC power derived from the radio frequency signal they receive from the reader.  In addition, low-cost tags do not incorporate a radio transmitter, but instead use varying reflection of the received signal from the reader to communicate back to it.  Such tags are known as passive tags.   Since passive tags are the most common type, the description below will assume their use.  Variants are also available:  semi-active tags incorporate a battery to power the integrated circuit, but still use reflected waves (backscattering) to communicate with the reader.  Active tags incorporate both a battery and a radio transmitter, and are much more costly than passive tags, but also more versatile.  RFID systems can operate at different radio frequencies.  The frequency chosen has important effects on the way tags and readers interact and on what applications are appropriate.    RFID readers and tags operating in the microwave ISM band at 2.4-2.48 GHz are widely used.  The 2.4-2.48 GHz band is available for unlicensed operation in most jurisdictions worldwide.  At this frequency the wavelength is about 12 cm (5 inches).  Very small tags can be used in the 2.45 GHz band, but because of the consequent small antennas, the amount of power collected by a tag is reduced in comparison to UHF tags.    10.2 RFID system components An RFID system is composed of (at least) a reader, one or more antennas, and one or more compatible tags.   While standalone RFID systems are appropriate in some circumstances, more commonly the RFID reader is just a sensor that needs to interact with a larger information system in order to be useful.  Middleware is used to enable the interaction between the reader and the network, and to filter and aggregate the large amounts of data the reader collects into a more useful compendium provided to the network.   10.2.1 Reader  An RFID reader is a radio transmitter and receiver.  Most readers are capable of interrogating passive tags, and are equipped with certain features uniquely suited to use for communicating with passive RFID tags.  A reader reading passive tags simultaneously communicates with the tag and provides power to operate the integrated circuit contained in the tag.  During transmission, the reader transmits an amplitude-modulated signal that is received by tags within range.  The transmit power is generally limited by regulatory requirements; for example, in the United States, no more than 1 watt average RF power may be transmitted through antenna gain not exceeding 8 dBi.  Modulation rate varies depending on the standard employed, but is typically a few tens of kilobits per second for UHF tags.   Special coding of the transmitted data is often employed to maximize the power available to the tags.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 34  Once the tag has been powered up and received its instructions from the reader, it responds with its UID.  Because of the unique requirements of the backscatter radio system used by passive and semi-passive tags, the reader must continue to transmit a non-modulated (continuous-wave or CW) signal while it listens for tag responses.  The tags employ the CW signal to continue to provide power to the tag electronics, and modulate the impedance of their own antennas in order to vary the signal reflected back to the reader.  The reader must extract the very small tag reflections from all the other reflected signals it encounters.    In the United States, readers are required by law to hop randomly from one frequency channel to another when operating within the ISM band, residing for no longer than 0.4 seconds at any one frequency.  In addition, regulations forbid coordination of hopping patterns between collocated transmitters.   When configured for US operation, the HSS-MUR-300 reader uses 75 channels separated from one another by 1 MHz, and operates in each channel for 50 to 400 milliseconds.  During hops from one channel to another, the RF output is turned off.    Tag read range is influenced by many factors, but the most important is the reader output power.  A reduction of output power by 6 dB (a factor of 4) reduces the typical read range by about 3 dB (a factor of 2).  Typical read range vs. transmit power setting for an HSS-MUR-300 is depicted in table yy.  Table yy:  Read Range vs. power setting Power setting (dBm) Typical read range (cm) 28  30 25 21 22 15 19 11 16 7  10.2.2 Antennas Antennas are the intermediaries between the voltages sent and received by the reader, and the electromagnetic waves used to provide power to and communicate with the tags.  Three critical characteristics of antennas used in RFID systems are their maximum directive gain, polarization, and match.  Electromagnetic radiation consists of a traveling electric and magnetic field.  The electric field has a direction at any point in space, normally perpendicular to the direction of propagation of the wave; this direction is the polarization of the wave.  For linearly polarized radiation, the direction of the electric field is constant as the wave propagates in space.  Configurations can also be constructed in which the direction of the electric field rotates in the plane perpendicular to the direction of propagation as the wave propagates: this is known as circular polarization.    The best power transfer between antennas is obtained when their polarizations match.  Thus the best read range is obtained from e.g. a vertically polarized reader antenna transmitting to a vertically polarized tag antenna. This is an excellent scheme to employ when the orientation of the tag during reading can be controlled.  However, if the orientation of the tag can vary, the tag could accidentally be perpendicular to the polarization of the reader antenna – a horizontal tag with a vertically polarized signal in shown in the diagram below – in which case very little power is received, and the tag will not be read.  When the tag orientation is unknown or uncontrollable, a circularly polarized reader antenna should be used.  Vertical tags, horizontal tags, and tags rotated to intermediate angles can then be read with equal facility.  However, this versatility is not without cost.  A circularly polarized signal can be regarded as the combination of a horizontal and vertical signal, each containing half of the transmitted power.  A linearly polarized tag antenna only receives its own polarization, and thus half the transmitted power, being of the wrong polarization, is wasted.  The read range of a circularly polarized antenna with a linearly polarized tag is reduced from what could be obtained with a linearly polarized reader antenna, if the tag orientation is known.
Copyright© 2006 by Hitachi America Ltd.  Subject to change without notice.  This information is provided “as is”,  no claims of fit for purposes intended, merchantability or other are made.  All trademarks, service marks, trade names and logos are used in good faith and remain the property of their rightful owners.   page 35   Real antennas always transmit more effectively in some directions than others.  The ratio of the power density in the direction of highest power to the average power radiated in all directions is the maximum directive gain, often simply referred to as the gain of the antenna.  It is important to note that antennas are passive devices and don’t actually add any power to the signal provided by the reader: gain in this context refers to the increased power received by a device in the best direction relative to the average of all directions.   The recommended linear antenna for the HSS-MUR-300, the Maxrad MP2400XFPT,  provides about 8 dBi of gain on both transmit and receive.  In principle, antenna gain could be increased to increase read range.  However, in most jurisdictions, the maximum gain employed in unlicensed operation is limited by regulation.  For example, in the United States, the FCC limits the effective isotropic radiated power (EIRP, the product of the actual power and the antenna gain) to 4 watts.  Substitution of another antenna for the recommended antenna can only be performed when an antenna of similar or lower gain, and of the same general type, is used.   FCC regulations (title 47 part 15) require that antennas be approved for use with specific radio communications devices, unless they are installed by a professional installer, and that in all cases the combination of antenna and radio device must operate within regulatory constraints.    External antennas are generally connected to the reader using flexible coaxial cables and connectors.  It is important to select these cables and connectors appropriately for the application.  If an antenna must be mounted a long distance from the cable (more than 3 meters), a large-diameter low-loss cable, such as RG-213 or RG214 should be used.    The electrical impedance presented by an antenna is a complex function of the frequency, the antenna shape, and the near-antenna environment.  Antennas are carefully designed so that the electrical impedance of the antenna is well-matched to the impedance of the device to which they are connected.  For example, the HSS-MUR-300 reader will generally employ a cable with 50 ohm characteristic impedance to connect the reader to the antenna.  In order for the power from the reader to be effectively transferred to the antenna, the antenna must have an electrical impedance close to 50 ohms, with little capacitance or inductance, at the frequency of operation.  As noted previously, conductive objects or some other materials such as aqueous liquids placed close to an antenna will change its impedance and thus degrade its match to the cable.  For best read range, keep such obstructions away from the antenna in directions of maximum directive gain.

Navigation menu