CSL CS101-2 EPC CLASS 1 GEN 2 RFID HANDHELD READER
USER'S MANUAL, VERSION 1.0
Copyright © Convergence Systems Limited, All Rights Reserved
188
should be adjusted to overcome the effect of it.
Apart from system settings, RFID tags should be tested as well. System integrators should
select suitable tags to cater the business requirement. For example, 3D tag can be read from all
directions, but it is less sensitive and large in size. Regular tag has better sensitivity but the
read result is highly affected by orientation of the tag.
Some problems may not appear instantly, but only after the system running continuously for
hours or days. To identify such problems, long time burn-in testing is required. If any problem
related to the reader is found, the system integrator could send a bug report with reader settings,
antenna setup and site-specific factors to CSL for troubleshooting.
11.2.2.5 Middleware Testing
Usually, a middleware is used between the reader and enterprise application. It plays an
important role in the integration of reader and therefore it must be fully tested as well. CSL
provides service for such testing. System integrators can give the executable of the middleware
to CSL for long term testing to ensure that the middleware is free of problem after running
continuously. Moreover, all API calls requested by the middleware are logged in the reader
which allows CSL to analyst the cause of problem if there is any.
11.2.2.6 Finalizing Solution
The finalized solution should tackle all of the problems found in pilot test and fine tune the
solution if necessary. Then it is ready for production running.
11.2.2.7 Scaling
Scaling process should be done after the system is tested to be stable. Moreover, scaling
gradually at the end-customer site (if end-customer permits, of course) can reduce the chance
of system failure due to overloading. For a large scale RFID system that involves hundred of
readers, the system integrators should pay attention to the followings:
1.
Readers that are close to each other are recommended to use Profile 2 or 3 of Modulation
Profile. It allows the readers to work in dense reader mode such that jamming could be