COPYRIGHT ACKNOWLEDGEMENTS The contents of this document are the property of Alien Technology™ Corporation and are copyrighted. All rights reserved. Any reproduction, in whole or in part, is strictly prohibited. For additional copies if this document please contact: Ron Gilbert Alien Technology Corporation 18220 Butterfield Blvd. Morgan Hill, CA 95037 Phone 408-782-3900 Fax 408-782-3910 www.alientechnology.
TABLE OF CONTENTS Alien Technology Nanoscanner™ Reader User Guide Table of Contents CHAPTER 1.....................................................................................................1 INTRODUCTION .............................................................................................1 AUDIENCE ..........................................................................................................1 NANOSCANNER READER OVERVIEW .............................................................
TABLE OF CONTENTS Installation Procedure..............................................................................26 SYSTEM OPERATION ........................................................................................28 CHAPTER 4...................................................................................................29 READER ENTERPRISE PROTOCOL .......................................................29 OVERVIEW ...........................................................................
CHAPTER 1 INTRODUCTION CHAPTER 1 Introduction The Nanoscanner Reader User Guide provides basic instructions for installing and operating the Nanoscanner reader. It also includes an overview of RFID technology and covers the reader firmware protocol in detail. This book is designed for use by those who wish to develop software products and extended systems that take full advantage of the Nanoscanner reader’s capabilities.
CHAPTER 1 INTRODUCTION Host software (Alien demo software or your own custom software) Refer to the Nanoscanner Reader Developer’s Guide for reader-host protocols.
CHAPTER 1 INTRODUCTION RS-232 PORT PINOUTS RS232 Connector (Female DB-9F) Pin 1 DCD Connected to Pin 6 Pin 2 TR1 Transmit Data (Output) Pin 3 RC1 Receive Data (Input) Pin 4 DTR Connected to Pin 6 Pin 5 Ground Pin 6 DSR Connected to Pin 4 Pin 7 RTS Connected to Pin 8 Pin 8 CTS Connected to Pin 7 Pin 9 Not Connected 5 4 9 3 8 2 7 1 6 I/O Port Connector (Male DB-9M) Pin 1 CTL0 Pin 2 CTL1 Pin 3 TRIG0 Pin 4 TRIG1 Pin 5 Ground Pin 6 CTL0 Pin 7 CTL1 Pin 8 TRIG0 Pin 9 TRIG1
CHAPTER 2 RFID OVERVIEW CHAPTER 2 RFID Overview Radio-frequency identification (RFID) technology uses radio frequency signals to acquire data remotely from tags within read (or “interrogation”) range. The data is then used for a variety of purposes such as opening doors and gates, paying tolls or tracking equipment and materials.
CHAPTER 2 RFID OVERVIEW manufacturing lot. These capabilities have improved the speed and handling of products and materials around the world. However, barcodes cannot identify a specific case of paper towels that is in the center of a pallet surrounded by other cases of towels. And barcodes cannot record the temperatures a perishable product has been exposed to and calculate a more realistic expiration date for that specific item.
CHAPTER 2 RFID OVERVIEW RFID Components Any RFID system needs certain basic components. These include: Transmitter Receiver Usually combined in a “reader” or “interrogator.
CHAPTER 2 RFID OVERVIEW No matter what it may be called, the reader typically contains a: transmitter, receiver, and microprocessor. The reader unit also contains an antenna as part of the entire system (see below). Antenna(s) The antenna broadcasts the RF signals generated inside the reader’s transmitter into the immediate environment. The antenna also receives responses from tags within range. In general, readers may use one or more antennas to detect and interrogate tags.
CHAPTER 2 RFID OVERVIEW Although an antenna may manifest its energy in a certain pattern, how your system can use that energy depends on a great many factors including antenna characteristics, tag and reader characteristics, the nature of the items tagged, and the changing nature of the reading environment. Polarization.
CHAPTER 2 RFID OVERVIEW (Passive) Backscatter Tags. A passive tag uses a method called “modulated backscatter” to convey its data to the reader. Essentially, the tag reflects (or backscatters) the RF signal transmitted by the reader and embeds its unique ID and data by modulating that reflected signal. ZZZzzz ZZZzzz TAG READER “What’s your name?” “What’s your name?” MY NAME IS GORT.
CHAPTER 2 RFID OVERVIEW Transmitters. A transmitter tag can broadcast a message into the environment even if there is no reader active nearby to “hear” it. This tag is like a telephone can ring even when no one is home to answer it. MY NAME IS GORT...MY NAME IS GORT...MY NAME... TAG Active tags (transmitters) contain their own little radio stations and can transmit messages even the absence of a reader. Transponders.
CHAPTER 2 RFID OVERVIEW CAUTIONS REGARDING TERMS AND EXPRESSIONS The authors of this manual have chosen to use the simplest and most precise definitions of RFID terms to make the concepts as clear as possible throughout this text. However, you should be aware of alternative definitions and uses of these same terms, which you may encounter elsewhere in the industry. To be sure of precise meaning, always clarify how these terms are being defined.
CHAPTER 2 RFID OVERVIEW Although beam power is used more often for passive tags, certain active tags are capable of storing energy from a reader’s signal, then using that stored energy to actively transmit data. Tags (whether passive or active) that perform functions in addition to providing their IDs (such as recording temperature or meter usage for later transmission to a reader) normally require some kind of augmenting power source.
CHAPTER 2 RFID OVERVIEW may, in fact, function as a wireless computer, able to interact with other tags and devices or link to the Internet. Memory vs. Power. While tags with minimal memory capacity can easily function on the tiny bit of energy provided by the RF signal alone, higher tag memory and processing demands typically require the support of a battery or other type of power source.
CHAPTER 2 RFID OVERVIEW In access control applications, a tag read whose ID is on a list of authorized IDs can trigger the opening of a door or gate. In warehouse applications, reading the tag on a specific pallet can turn on a light, or ring a bell to indicate the desired case has been located. INPUT FUNCTIONS (OPTIONAL) An RFID system may also be designed to respond to certain input conditions. Readers are often configured to interface with input devices such as presence detectors.
CHAPTER 2 RFID OVERVIEW RFID and ePC Tag Classes ePC Tag Classes (AIDC and Alien) Alien Class 1 Emulator* AIDC AIDC Alien Long Range AIDC 2 3 ePCID 96 ePCID emulator ePCdata ePCdata+ Long-range data tag CommTag B B B B B B T 2. Tag power Beam = RF beam powered Batt = battery or other power source Beam Beam Batt Beam Batt Batt Batt 3a. Memory capacity (available to user) 64 bits 96 bits 64 bits TBD TBD 1k byte TBD 4.
CHAPTER 2 RFID OVERVIEW Each category may allow additional identifiers to be added to the core terms to indicate variations within the type (as in the designation “ePCdata+” for an ePCdata tag with a battery, or as in “ePCID 64” and “ePCID 96” indicating the differences in user ID memory size) CLASS 1 (EPCID TAGS) Class 1 tags are most closely related to today’s barcode labels, thus they may be referred to as the simplest component of the system: the “ePCID” tag.
CHAPTER 2 RFID OVERVIEW ALIEN LONG-RANGE TAGS The Alien Long-range tag is very similar to the ePCdata+ tag (Class 3). The primary enhancements it offers over the Class 3 tag are increased range and more memory. This tag will be in the same price range as the ePCdat+ tag. CLASS 4 (COMMTAG) The Class 4 tag is an entirely different breed of animal from all the other AIDC and Alien tags described previously.
CHAPTER 3 INSTALLATION AND OPERATION CHAPTER 3 Installation and Operation This chapter describes the Nanoscanner reader and provides installation and operation information. The following chapter details the Reader<–>Host protocol, which will allow you to create software that will interact with the reader and perform the desired processing functions.
CHAPTER 3 INSTALLATION AND OPERATION Standard 120 VAC power. Host software (either Alien’s demo software or your own custom software). Refer to the Nanoscanner Developer’s Guide for reader-host protocols. Tags (AIDC Class 1 compliant or Alien long-range data tags) Standard power cord (desired length) with grounded, 3-pronged plugs Receiving the Nanoscanner Your Nanoscanner reader will be shipped with the items listed below. Please verify the contents of your received shipment before assembling.
CHAPTER 3 INSTALLATION AND OPERATION • 9-pin D male I/O port • 3 LEDs (Power/red, Sniff/yellow, Lock/green) • 9-pin D female RS-232 serial port • LAN TCP/IP port Power I/O port (male) RS-232 (female) LAN TCP/IP port Reader I/O panel READER LEDS The LEDs provide external indication of three conditions: • Power (red). Indicates power is applied to the reader. • Sniff (yellow). Indicates tag signal has been detected, though it may not yet be strong enough to complete a transaction.
CHAPTER 3 INSTALLATION AND OPERATION ANTENNA PANEL The antenna panel (opposite the reader’s I/O panel) contains two coax antenna connector ports as shown below. These are reverse-threaded connectors. Reader antenna ports CAUTION: If only one antenna is being used, the 50 ohm terminator cap must remain attached to the unused port on the left to prevent possible transmitter damage. System Assembly and Bench Test Assembling the Nanoscanner reader system is very easy.
CHAPTER 3 INSTALLATION AND OPERATION Reader I/O panel To antenna Antenna ports (2) To power supply & 120VAC wall outlet RS-232 to PC 2. Connect the RS-232 cable to the reader. • Align the male cable connector so that its shape and pins match the shape and holes of the female DB-9 serial port. • Push the aligned connector into the port. • Finger-tighten the screws to secure the cable/connector to the reader. 3. Connect the RS-232 cable to the serial port on the PC.
CHAPTER 3 INSTALLATION AND OPERATION 5. Connect the coaxial cable to antenna port 0. Caution: For single antenna applications, you must use port 0, keeping the 50 ohm terminator cap on port 1 to prevent transmitter damage. • Antenna port 0 is on the right if viewing reader with flange side down. • Align the coax cable’s center pin and push into the port • Screw the fitting from the cable end onto the reader connector counterclockwise until finger tight to secure the cable to the reader.
CHAPTER 3 INSTALLATION AND OPERATION Bench Test Procedure 1. Access an operational mode suitable for bench testing. • Select a mode that will allow multiple consecutive reads of a single tag. • Refer to the applicable software application user guide for specific instructions. 2. Position the reader to you can see the LEDs. • You may also want to position the PC so you can view the monitor simultaneously for later tests. 3. Move a tag slowly into the antenna’s range.
CHAPTER 3 INSTALLATION AND OPERATION System Design The following Installation section provides basic guidance for configuring components in your RFID system. We recommend you refer to the Nanoscanner Reader Developer’s Guide for detailed system design information before permanently mounting your equipment. Installation Installation involves all the same connection steps required for bench test.
CHAPTER 3 INSTALLATION AND OPERATION PC running Windows 98 or higher, with CD-ROM drive (for demo system software) and one available RS-232 serial port Standard 120 VAC power for the reader location and PC location Host software (Optional) second antenna (if desired for additional coverage) Any additional RS-232 cables or connectorized antenna coax cables needed to accommodate routing requirements Standard grounded, three-pronged power cord of desired length Mounting hardware suitable for the surface to w
CHAPTER 3 INSTALLATION AND OPERATION 3. Select location for host PC. • Situate the host PC within 50 ft of the reader in a safe location away from vehicular and foot traffic. 4. Install reader. • Secure the reader through the three mounting holes on either flange to its mounting location (wall, post, mounting bracket) using appropriate hardware. • If desired, position the reader so that the LEDs are easily observed. 5. Install antennas.
CHAPTER 3 INSTALLATION AND OPERATION System Operation Because the Nanoscanner reader is operated autonomously according to programming from the host, there is little for the user to do in terms of direct operation of the reader. SOFTWARE DEVELOPERS If you are a software developer, please refer to the next chapter, “ReaderHost Protocol,” for information relevant to creating software to enable readerhost communications and reader operation tailored to the desired application.
CHAPTER 4 READER-ENTERPRISE PROTOCOL CHAPTER 4 Reader Enterprise Protocol Overview The Reader<->Enterprise protocol is a text-based communications protocol for configuring and operating the Alien RFID Type I Reader for Enterprise Systems connectivity. Document Specifications Nanoscanner Reader<->Enterprise Protocol Revision Date June 24, 2002 Prepared By Christopher I. Parkinson John M.
CHAPTER 4 READER-ENTERPRISE PROTOCOL Introduction This document describes the programming interface that links the Alien RFID Type I Reader to the outside world. Reader Tag List During normal operation of the reader, the device maintains an internal list of the tags that are active. Active tags are the ones read by the reader at least once within a predefined time period.
CHAPTER 4 READER-ENTERPRISE PROTOCOL Communication Protocol Overview Commands can be issued to the Reader in one of three ways: • Serial Communication • Network Communication • Web Based Interaction Serial Communication Commands can be issued to the Reader using a direct Serial connection from a computer to the Reader.
CHAPTER 4 READER-ENTERPRISE PROTOCOL Commands Introduction Overview There are two distinct categories of Reader<->Enterprise command: those that are instantiated by the Enterprise host (Action commands), and those that instantiated by the Reader itself (Notify commands) Action Commands Action commands are instantiated by an Enterprise system, which creates and issues a command to the Reader. The Reader always responds to these commands with an immediate reply.
CHAPTER 4 READER-ENTERPRISE PROTOCOL FirmwareVersion = 1.0[CR][LF] SoftwareVersion = 1.0[CR][LF][0] Commands are case insensitive. i.e., set readername is equivalent to Set ReaderName Suppressing Command Prompts By default all commands are set up for interactive use over a serial console or telnet style interface. Consequently replies are always followed by a command prompt indicating user input is required.
CHAPTER 4 READER-ENTERPRISE PROTOCOL Network Configuration Commands Command Description Get DHCP Turn on or off the DHCP mode for the Reader. If DHCP is on, the Reader will automatically configure itself for the network on power-up.
CHAPTER 4 READER-ENTERPRISE PROTOCOL Notify Commands Command Description Get NotifyAddress Get and Set the address to push tag lists to. Set NotifyAddress Set NotifyTime Get NotifyTime Set NotifyTrigger Get and Set the time interval for automatically pushing tag lists. Get and Set the trigger for pushing tag lists.
CHAPTER 4 READER-ENTERPRISE PROTOCOL GET READERVERSION Description: The reader version text can be retrieved using this command. The resulting text is a multi-line reply. Each line of the reply describes the version number of a major reader component. Example Command >Get ReaderVersion Response >Hardware Version = 1.0.02 Firmware Version = 1.0.01 Software Version = 1.1.22 SET ANTENNALIST GET ANTENNALIST Description: The reader can support the use of multiple antennae.
CHAPTER 4 READER-ENTERPRISE PROTOCOL GET TIME GET TIME Description: These commands allow the current time to be obtained or set within the Reader. The primary purpose for having a real time clock is to timestamp the tags in the taglist so that their discovery time can be recorded. Times are always specified by the format YYYY/MM/DD hh:mm:ss. Changes made with this command will require a reboot of the Reader to take effect.
CHAPTER 4 READER-ENTERPRISE PROTOCOL GET IPADDRESS SET IPADDRESS Description: If DHCP is not used for automatic configuration the Reader must be manually configured for use on a network. The IPAddress command pair allow the host’s IP Address to be assigned and interrogated. Changes made with this command will require a reboot of the Reader to take effect. Example Command >Get IPAddress Response >IPAddress =12.34.56.78 Command >Set IPAddress =34.55.33.
CHAPTER 4 READER-ENTERPRISE PROTOCOL GET DNS SET DNS Description: If DHCP is not used for automatic configuration the Reader must be manually configured for use on a network. The DNS command pair allow the DNS server location to be assigned and interrogated. DNS Servers must be specified as an IP address. Changes made with this command will require a reboot of the Reader to take effect. Example Command >Get DNS Response >DNS=12.34.56.78 Command >Set DNS=45.224.124.
CHAPTER 4 READER-ENTERPRISE PROTOCOL GET HEARTBEATPORT SET HEARTBEATPORT Description: The Reader can be configured to periodically send out a Heartbeat message to the network. This heartbeat takes the form of a single UDP packet (Universal Datagram Packet) broadcast out to the entire subnet that the Reader is configured for. The actual port number that this packet is sent out to is configured using the HeartbeatPort command.
CHAPTER 4 READER-ENTERPRISE PROTOCOL GET COMMANDPORT SET COMMANDPORT Description: The Reader can be configured and operated over the network using standard network sockets. The CommandPort settings are used to set and get the exact port number used by the Reader for this network connectivity. Changes to this setting do not affect Serial communication and/or Web communication with the Reader. Changes made with this command will take effect immediately.
CHAPTER 4 READER-ENTERPRISE PROTOCOL CLEAR TAGLIST Description: The clear taglist command will cause the Reader to immediately clear out its internal tag list. Example Command >Clear TagList Response >OK GET PERSISTTIME SET PERSISTTIME Description: The persist time is used by the Reader to build up its internal list of active tags. Persist times are specified in seconds.
CHAPTER 4 READER-ENTERPRISE PROTOCOL GET READTIME SET READTIME Description: The read time specifies when and for how long the Reader attempts to read tags. The read time is set using two parameters, the sleep time followed by the read duration. Both parameters are specified in seconds. When set, the reader will repeat a cycle of sleeping for the specified sleep time, then waking up and reading for the specified read duration and then sleeping again.
CHAPTER 4 READER-ENTERPRISE PROTOCOL Notify Commands GET NOTIFYADDRESS SET NOTIFYADDRESS Description: The notify address command pair specify where messages should be sent to when they arise and how they should be sent. The form of the address determines the method of delivery. Currently there are 3 delivery methods supported: NotifyAddress Description blank Do not use automatic notification. user@domain.com Send a message via Email to the address specified.
CHAPTER 4 READER-ENTERPRISE PROTOCOL GET NOTIFYTIME SET NOTIFYTIME Description: The notify time defines the time interval for automatic tag list pushing to a listening machine. The time is specified in seconds. If set to zero or a negative number the time-based automatic notification is disabled. When set to a positive number of seconds, the complete tag list will be pushed out each period. Changes made with this command will take effect immediately.
CHAPTER 4 READER-ENTERPRISE PROTOCOL NOTIFY MESSAGE FORMAT When either the Notify Trigger is activated or the Notify Time has elapsed a formatted message is sent to the listener specified by the Notify Address. The format of this message is always a multi-line response of trigger reason followed by a list of tags.