CSL CS101-2 EPC CLASS 1 GEN 2 RFID HANDHELD READ ER USER'S MANUAL, VERSION 1.0
Copyright © Convergence Systems Limited, All Rights Reserved
4
10.2 APPLICATION DETAILS ..............................................................................................164
10.2.1 Business Process Analysis................................................................................164
10.2.2 Technology Selection........................................................................................ 167
10.2.3 Customer Expectation Management ................................................................ 168
10.2.4 Hardware Configuration.................................................................................. 169
10.2.5 Software Configuration....................................................................................170
10.2.6 System Integration............................................................................................ 172
10.2.7 Pilot Test........................................................................................................... 173
10.2.8 Optimization.....................................................................................................175
10.2.9 Customization................................................................................................... 176
10.2.10 Training........................................................................................................177
10.2.11 Test & Commissioning......................................................................................178
10.2.12 Maintenance & Statistics..............................................................................179
10.3 READERS FOR DIFFERENT BUSINESS APPLICATIONS..................................................180
10.4 ANTENNAS FOR DIFFERENT BUSINESS APPLICATIONS ...............................................181
11 RFID BEST PRACTICES............................................................................................. 182
11.1 INTRODUCTION..........................................................................................................182
11.2 INTEGRATION PROCESS DETAILS ...............................................................................184
11.2.1 Familiarization Process...................................................................................184
11.2.1.1 Familiarizing with Browser Interface..........................................................184
11.2.1.2 Familiarizing with Programming Interface................................................. 184
11.2.1.3 Full Scale Programming and Integration.................................................... 185
11.2.1.4 Reader Capability Envelope Discovery
.......................................................185
11.2.2 Integration Process..........................................................................................187
11.2.2.1 Use Cases and Requirements Gathering......................................................187
11.2.2.2 Draft Solution and In-House Testing............................................................187
11.2.2.3 API Programming........................................................................................ 187
11.2.2.4 Pilot Testing..................................................................................................187
11.2.2.5 Middlewar
e Testing ......................................................................................188
11.2.2.6 Finalizing Solution....................................................................................... 188
11.2.2.7 Scaling..........................................................................................................188
12 RFID USE CASES ..................................................................................................... 190
12.1 WAREHOUSE REAL TIME INVENTORY TRACKING ...................................................... 190
12.2 HIGH TRAFFIC HUMAN ACCESS CONTROL ................................................................ 191
12.3 REUSABLE PALLET TRACKING................................................................................... 192
12.4 WORK-IN-PROGRESS MONITORING........................................................................... 193
12.5 HUMAN ACCESS CONTROL BY AUT ONOMOUS TAG GROUPS IN READER.................... 194