1. | What are the two primary types of energy fields used in RFID communication? (Select two options.)
|
|
2. | High-frequency (HF) RFID is best suited for which of the following applications? (Select two options.)
|
|
3. | The magnetic field created by an electric current flowing through a straight wire ___________________.
|
|
4. | What kind of interface do interrogators not usually provide?
|
|
5. | What are the parts of the interrogator? (Select three options.)
|
|
6. | What is the listen-before-talk technique used for?
|
|
7. | Which commands are supported by Generation 2 interrogators? (Select two options.)
|
|
8. | What is ambient environmental noise (AEN)?
|
|
9. | What is the primary purpose of using blueprints when designing an RFID network deployment?
|
|
10. | What is the proper test equipment for an adequate site survey?
|
|
11. | What type of chip-attachment method is the most suitable for handling very small chips?
|
|
12. | Which type of tag has the longest read ranges?
|
|
13. | What is the maximum expected read rate of Gen 2 tags in the United States?
|
|
14. | What is the difference between an ultra-high-frequency (UHF) tag and a high-frequency (HF) tag?
|
|
15. | A tag has concentric rings of conductive ink attached to a single chip and is read about six inches from the reader, what type of tag is it most likely?
|
|
16. | When testing for ambient environmental noise (EAN) how long should you run the spectrum analyzer for the most effective results?
|
|
17. | The differential time of arrival is related to which of the following?
|
|
18. | Light stacks are used mainly for what?
|
|
19. | Why does a printer have to know the location of the RFID inlay within a label?
|
|
20. | What do you need to make sure of when installing an interrogator? (Select two options.)
|
|
21. | What do you need to do in order not to delay the installation?
|
|
22. | What is the first step you should take to troubleshoot an RFID network?
|
|
23. | Which type of cable connecting an antenna to a reader would exhibit the lowest loss?
|
|
24. | What primary role does middleware play on an RFID reader?
|
|
25. | What is the main purpose of tag data protocols?
|
|
26. | What does the ISO/IEC 14443 specify?
|
|
27. | What is the most important concern when installing an RFID system?
|
|
Answers
1. | A, B. Electromagnetic waves form the basis for near-field and far-field communication using RFID. An electromagnetic field is made up of both an electric field and a magnetic field. For more information, see Chapter 1. |
2. | A, C. HF has a shorter range than UHF, microwave, or active tags, so it is best suited for close-range applications, particularly if metal or liquids are involved. For more information, see Chapter 1. |
3. | C. The current flowing through a straight wire does not create a magnetic north pole and south pole. The current creates a magnetic field that forms concentric circles around the wire. The right-hand rule is used to determine the direction of the magnetic field. For more information, see Chapter 1. |
4. | D. RS-485 is not usually provided by the interrogators. The most common interfaces are serial, Ethernet, USB, and I/O control. For more information, see Chapter 2. |
5. | A, B, D. An interrogator includes a transmitter, a receiver, and a processor. It does not include a light stack, which is usually connected to the interrogator as an I/O device through an I/O port. An RFID portal is the implemented structure, including the interrogator, antennas, mounts, and possible I/O devices. For more information, see Chapter 2. |
6. | A. A listen-before-talk (LBT) technique can be used during frequency hopping. The reader has to listen for whether any other reader transmits on the chosen channel; only after it determines that the channel is available can it start using this channel for communication. If the channel is being used by another reader, the listening reader has to switch to another channel in order to transmit. For more information, see Chapter 2. |
7. | A, B. The Select and Kill commands are supported by Generation 2 interrogators. The commands Secure and Unkill do not exist (yet). For more information, see Chapter 2. |
8. | B. The site survey and full Faraday cycle analysis are performed to determine whether there are any other systems in place that may interfere with the performance of an RFID network. Some of these systems include barcode scanners, alarm sensors, communication systems, and air traffic control radar. For more information, see Chapter 3. |
9. | C. The blueprints are your canvas to lay out the RFID network based on business process flows identified in the project planning phase. You cannot install an RFID reader without adequate power and some sort of connectivity. The blueprints will tell you what is in place already, and where you will need to install portal racks, receptacles, or LAN connections. For more information, see Chapter 3. |
10. | D. The spectrum analyzer is the most widely used testing tool in RFID, because it allows understanding and viewing of invisible waves in the local atmosphere. The signal generator adds to the functionality by allowing you to specifically replicate transmission of a reader and then test its behavior. For more information, see Chapter 3. |
11. | B. The most suitable method for handling very small chips is the strap-attachment method. A chip is placed on a conductive and the strap is then attached to an antenna. The strap provides a larger surface to connect to the antenna than the chip by itself. For more information, see Chapter 4. |
12. | A. Active tags have the longest read ranges because of their ability to broadcast a signal to the environment. They carry a battery to power the chip's circuitry as well as its transmitter and other components. For more information, see Chapter 4. |
13. | B. Theoretical read rates for Gen 2 tags are around 1,500 tags per second in the United States and 600 tags per second in Europe because of regulatory restrictions. For more information, see Chapter 4. |
14. | C. An HF tag is easily recognized by the multiple loops of antenna that circle around the chip, usually for five or six turns. This is so it can couple with the near field. The UHF tag has a single antenna, usually on either side of the chip. For more information, see Chapter 5. |
15. | D. If there is inductive coupling, a loop of some conductive metal like copper or silver or conductive ink needs to be looped several times to successful get power to the chip. This is the easiest way to tell an HF tag from a UHF tag. For more information, see Chapter 4. |
16. | A. The spectrum analyzer should be run for an entire business cycle, this is part of a full Faraday cycle analysis which looks at the environmental changes over all shifts of a business. There may be night-time security systems, adjacent radar facilities, communications gear, all which change their state at different times of the day. A 24-hour investigation is the only way to accurately detect those interferers. For more information, see Chapter 3. |
17. | B. The differential time of arrival is one of the principles used in real-time location systems. This principle is based on the difference in time it takes the signal to travel from the tag to each of the access points (RFID readers). For more information, see Chapter 6. |
18. | D. Light stacks are used mainly at the verification points to provide feedback as to whether a tag placed on a product functions correctly. For more information, see Chapter 6. |
19. | D. Knowing the location of the RFID inlay embedded in a label is important for proper reading, encoding, and verification. A best practice is also to avoid printing over the RFID chip because that can damage it. For more information, see Chapter 6. |
20. | D. When you are mounting an interrogator, you have to make sure that it has enough space for proper connections to antennas, network, and power, as well as for ventilation and possible troubleshooting. It also has to be protected from various environmental conditions including dust, rain, snow, heat, and others. For more information, see Chapter 7. |
21. | C. To prevent delays in installation, you must follow a project plan and not forget to establish communication channels. Do not underestimate people logistics or equipment logistics, including hardware certification and preassembly. For more information, see Chapter 7. |
22. | C. Sometimes readers will overload their processing capability and freeze, much like a laptop. The simplest first step after you've checked to see whether the power is on is to reboot the reader and see whether that fixes the problem. For more information, see Chapter 8. |
23. | B. LMR is most frequently used for RFID networks. The higher the number after "LMR," the better the insulation. So LMR-400 will have the least loss and should be used for the longer runs. For more information, see Chapter 8. |
24. | A. Middleware is at its basic level a very simple tool for filtering and smoothing data being captured by each RFID reader. As the name implies, it sits between the reader and the application-in the middle-and needs to be specifically written for each reader. It usually sends out data in an XML format to applications such as SAP, Oracle, and other business applications. For more information, see Chapter 8. |
25. | A. Tag data protocols specify the size and structure of the tag memory; tag data formatting and length; and the means of storing, accessing, and transferring information. For more information, see Chapter 9. |
26. | C. ISO/IEC 14443 provides guidelines for RF power, signal interface, transmission protocol, and physical characteristics of proximity cards. Guidelines for animal identifications are set by ISO 11784, ISO 11785, and ISO 14223. The air interface protocol for UHF tags is defined in ISO/IEC 18000-6, and the guidelines for freight containers in ISO 10374. For more information, see Chapter 9. |
27. | B. The most important concern when installing any system should be personnel safety. When you are installing a system, make sure that you appropriately connect and safeguard the electrical equipment so that it cannot harm anyone or cause any trip, fall, or injury hazards. You cannot block any safety devices or exit doors. For more information, see Chapter 9. |