Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: The Physics of RFID
Figure 1.1: Electric field near a conducting surface
Figure 1.2: Oscillating magnetic field near a conducting plane
Chapter 2: Interrogation Zone Basics
Figure 2.1: Time in beam
Figure 2.2: Antenna sequencing
Figure 2.3: Perfect antenna coverage vs. reality
Chapter 3: Site Analysis
Figure 3.1: An antenna at the center of a target area
Figure 3.2: An antenna in the middle of a test zone for PLCM
Figure 3.3: Positioning the antenna and spectrum analyzer
Figure 3.4: An ODIN Technologies RFID double rack with covers removed to see the inside
Chapter 4: Tags
Figure 4.1: Examples of various types of tag antennas
Figure 4.2: EasyTag tag-testing software
Figure 4.3: Orientation with circular antenna
Figure 4.4: Correctly oriented tag
Figure 4.5: Incorrectly oriented tag
Chapter 5: Designing the RFID Network
Figure 5.1: Basics of an RFID reader
Figure 5.2: Stretch-wrap test setup
Figure 5.3: Cutaway view of coax cable
Figure 5.4: A well-matched RFID system
Chapter 6: Peripherals
Figure 6.1: Triangulation
Chapter 7: Deployment and Installation
Figure 7.1: BOM tracking via IP address in EasyReader
Figure 7.2: The testing and certification setup for RFID readers
Figure 7.3: Visio diagram of an average dock door
Figure 7.4: RFID rack with side cover removed
Figure 7.5: A Properly Connected RFID Reader
Figure 7.6: Critical boundary in EasyReader
Figure 7.7: Protective bollards in front of an RFID portal
Chapter 8: Troubleshooting and Optimizing an RFID Network
Figure 8.1: The process flow of troubleshooting an RFID system
Figure 8.2: Spectrum analyzer showing points of potential interference
Figure 8.3: Antenna performance
Figure 8.4: Performance factors of a tag
Previous page
Table of content
Next page
CompTIA RFID+ Study Guide Exam RF0-101, includes CD-ROM
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 136
BUY ON AMAZON
MySQL Stored Procedure Programming
Using SQL in Stored Programming
Performing Dynamic SQL with Prepared Statements
Defining a Transaction
Using MySQL Stored Programs in Applications
Using Stored Procedures with Hibernate
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
An Emerging Strategy for E-Business IT Governance
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Managing IT Functions
Governing Information Technology Through COBIT
The CISSP and CAP Prep Guide: Platinum Edition
Operations Security
Business Continuity Planning and Disaster Recovery Planning
Physical (Environmental) Security
Appendix E The Information System Security Management Professional (ISSMP) Certification
Appendix F Security Control Catalog
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Importing Data from Text Files
Correlating Data
Using Summation Functions
Using Trigonometry Functions
Shooting Boundary Value Problems
Comparing, Designing, and Deploying VPNs
IPsec: A Security Architecture for IP
Designing QoS for IPsec VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
User Interfaces in C#: Windows Forms and Custom Controls
Control Class Basics
Modern Controls
MDI Interfaces and Workspaces
Dynamic User Interface
GDI+ Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies