report on transparent supply chain1

Upload: ankit-garg

Post on 07-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 Report on Transparent Supply Chain1

    1/27

    1

    Project Report

    On

    Transparent Supply Chain

    using

    Radio Frequency Identification

    Submitted to:

    Professor S. Chandrashekhar

    Submitted by Group 6 (FMG19C):

    Ankit Garg(191126)

    Ankita Garg(191127)

    Gaurav Sakhuja(191140)

    Madhur Gautam(191144)

    Sonal Saraogi(191175)

    Sudarshan Chitlanga(191177)

  • 8/6/2019 Report on Transparent Supply Chain1

    2/27

    2

    Table of Contents

    INTRODUCTION ................................ ................................ ................................ .............. 3

    REVEALING TECHNOLOGIES................................ ................................ ...................... 4

    RFID................................ ................................ ................................ ................................ .... 5

    BASIC COMPONENTS OF AN RFID SYSTEM................................ ................................ ........... 5

    READ ONLY, READ/WRITE AND WORM TAGS ................................ ................................ ........ 8

    PASSIVE, SEMI-PASSIVE AND ACTIVE TAGS ................................ ................................ .......... 8

    PASSIVEVS.ACTIVE RFIDCOMPARISON................................ ................................ ............ 8

    EPC ................................ ................................ ................................ ................................ . 10

    RFID VS.BARCODES COMPARISON ................................ ................................ .................. 10

    RFIDFREQUENCIES ................................ ................................ ................................ ......... 11

    RFIDINTHERETAIL SUPPLY CHAIN ................................ ................................ ...... 14

    APPLICATIONS OFRFID................................ ................................ .............................. 18

    ADVANTAGES ANDDISADVANTAGES OFRFIDTECHNOLOGY ....................... 19

    ADVANTAGES: ................................ ................................ ................................ ................. 19

    DISADVANTAGES : ................................ ................................ ................................ ............ 19

    PROBLEMS WITH RFID ................................ ................................ ............................... 21

    TECHNICALPROBLEMS WITH RFID ................................ ................................ ................... 21

    SECURITY, PRIVACY AND ETHICS PROBLEMS WITH RFID ................................ ................... 22

    RFID MANUFACTURERS ................................ ................................ ............................. 24

    INDIAN COMPANIES IMPLEMENTING RFID................................ .......................... 25

    REFERENCES ................................ ................................ ................................ ................. 27

  • 8/6/2019 Report on Transparent Supply Chain1

    3/27

    3

    Introduction

    The definition of transparency in supply chain refers to a quality, characteristic, or state in

    which activities, processes, practices and decisions that take place in the supply chain become

    open and visible to the outside world.

    The origins of a companys products used to be pretty murky. Beyond the supply chain

    function, virtually no one cared. Of course, all thats changed. Consumers, governments, and

    companies are demanding details about the systems and sources that deliver the goods. They

    worry about quality, safety, ethics, and environmental impact. Farsighted organizations are

    directly addressing new threats and opportunities presented by the question, Where does this

    stuff come from?

    Consider the trouble an opaque supply chain can cause. Most iPhone owners probably dont

    think about the provenance of their devices, but worker suicides at Foxconn, one of Apples

    major Chinese suppliers, forced the company to pull the curtain back on part of its supply

    chain in 2009. It had to quell claims that it relied on sweatshop labor. Another high-profile

    case, the toxic drywall scandal, led to class-action lawsuits. The offending product was

    imported into the United States bearing no readily available information about its source

    other than a Made in China stamp. And a few years earlier, toy giant Mattel faced a tornado

    of publicity about lead in toys, which raised questions about how much control it had over its

    supply chain.

  • 8/6/2019 Report on Transparent Supply Chain1

    4/27

    4

    Revealing Technologies

    Driven by growing calls for transparency, firms such as Wal-Mart, Tesco, and Kroger are

    beginning to use new technologies to provide provenance data to the marketplace. In time,

    customers will perceive easy access to such information as the norm. Revealing origins will

    become an essential part of establishing trust and securing reputation.

    The key technologies are not fundamentally new, but they are evolving and blending to

    unleash new opportunities and threats. Product labeling has been transformed by microscopic

    electronic devices, genetic markers for agricultural products, and a new generation of bar

    codes that can be read with standard mobile phones. Combine these developments with the

    reach of the internet and virtually unlimited data storage, and firms can now contemplate

    more-sophisticated ways to trackand to revealthe manufacturing trajectory of theirproducts.

    Radio-frequency identification (RFID) tags, well established for inventory management

    and other purposes, are becoming smaller, cheaper, and more flexible. New generations of

    tagssuch as Hitachis sand-grain-size mu-chipcan be used, for instance, to label jewelry

    inconspicuously. It can even be embedded in paper and plastic, making the products

    provenance data part of the material itself. And smaller-scale tagslabeled exotically as

    radio dustare in development.

    Just like a paper label, a technology tag can be used in two ways. It can store data directly, in

    some cases even being updated as the item moves through the supply chain. Alternatively, the

    tag can simply hold a unique identifier, which acts as a pointer to a vast amount of web-based

    supporting data. The ubiquity of such mobile devices means that consumers can readily

    access this internet of things, gathering provenance information not just at the generic level

    of the item category or type but for the specific item. If Im interested in, say, food safety, the

    technology can tell me not just about this type of chicken, butthis chicken.

  • 8/6/2019 Report on Transparent Supply Chain1

    5/27

    5

    RFID

    RFID stands forRadio-Frequency Identification. The acronym refers to small electronic

    devices that consist of a small chip and an antenna. The chip typically is capable of carrying

    2,000 bytes of data or less.

    The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a

    credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code

    or magnetic strip must be scanned to get the information, the RFID device must be scanned to

    retrieve the identifying information.

    Basic components of an RFID system

    A basic RFID system consists of three components:

    y An antenna or coil

    y A transceiver (with decoder)

    y A transponder (RF tag) electronically programmed with unique information

    Antenna: The antenna emits radio signals to activate the tag and read and write data to it.

    Antennas are the conduits between the tag and the transceiver, which controls the system's

    data acquisition and communication. Antennas are available in a variety of shapes and sizes;

    they can be built into a door frame to receive tag data from persons or things passing through

    the door, or mounted on an interstate tollbooth to monitor traffic passing by on a freeway.

    The electromagnetic field produced by an antenna can be constantly present when multiple

    tags are expected continually. If constant interrogation is not required, a sensor device can

    activate the field.

  • 8/6/2019 Report on Transparent Supply Chain1

    6/27

    6

    Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a.

    interrogator), which can be configured either as a handheld or a fixed-mount device. The

    reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending

    upon its power output and the radio frequency used. When an RFID tag passes through the

    electromagnetic zone, it detects the reader's activation signal. The reader decodes the data

    encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host

    computer for processing.

    Tag: Chip tags consist of a microchip and a coupling element an antenna. Most tags are only

    activated when they are within the interrogation zone of the interrogator; outside they sleep. Chip

    tags can be both read-only (programmed during manufacture) or, at higher complexity and cost,

    read-write, or both. Chip tags contain memory. The size of the tag depends on the size of the

    antenna, which increases with range of tag and decreases with frequency.

    Tag shape: RFID tags come in a range of shapes and sizes. The following are the most common:

    y Label: The tag is a flat, thin, flexible form

    y Ticket: A flat, thin, flexible tag on paper

  • 8/6/2019 Report on Transparent Supply Chain1

    7/27

    7

    y Card: A flat, thin tag embedded in tough plastic for long life

    y Glass bead: A small tag in a cylindrical glass bead, used for applications such as animal

    tagging (e.g. under the skin)

    y Integrated: The tag is integrated into the object it is tagging rather than applied as a

    separate label, such as moulded into the object

    y Wristband: A tag inserted into a plastic wrist strap

    y Button: A small tag encapsulated in a ruggesdised, rigid housing

    Interrogator: Depending on the application and technology used, some interrogators not only read,

    but also remotely write to, the tags. For the majority of low cost tags (tags without batteries), the

    power to activate the tag microchip is supplied by the reader through the tag antenna when the tag is

    in the interrogation zone of the reader, as is the timing pulse these are known as passive tags.

    Middleware:Middleware is the interface needed between the interrogator and the existing company

    databases and information management software.

  • 8/6/2019 Report on Transparent Supply Chain1

    8/27

    8

    Read only, read/write and worm tags

    y Read only tags contain a unique licence plate number which cannot be changed

    y Worm Write Once Read Many enables users to encode tags at the first instance of

    use, and then the code becomes locked and cannot be changed

    y Read/write tags allow for updated or new information to be written to the tag

    Read only tags can be the cheapest, because they often require the least amount of memory,

    but they rely on an infrastrucutre and readily available database to retrieve useful

    information. Where this is not possible, read/write tags, whcih are more expensive (but do not

    need large infrastructure) and often used. In many cases these functionalities are combined

    with segmented memories.

    Passive, semi-passive and active tags

    Passive tags refer to RFID tags which are powered solely by the RFID interrogator. The

    interrogator emits a radio frequency (RF), which powers the silicon chip on the tag when it is

    within range of the RF field. When the power to the silicon chip on the tag meets the

    minimum voltage threshold it require to turn on, the silcion chip can then send back

    information on the same RF wave. Range is usually limited to several meters.

    Active tags refer to RFID tags which have their own power source, so they can recieve a

    weaker signal from the interrogator (i.e. be further away), and the power source on the tag

    boosts the return signal. These types can have ranges of many tens of meters and even

    hundreds of meters, but cost more becasue of their size and sophistication. Battery life can

    also limit the life of the tag.

    Semi Passive tags refer to tags with a power source (usually a laminar, flexible, low cost

    battery) which can be used for on tag sensing (e.g. temperature), but not to boost range.

    Passive vs. Active RFID Comparison

    The primary difference betwee passive and active RFID tags is that active tags are powered

    by a battery and automatically broadcast their signal, whereas passive tags do not have a

    power source and only transmit a signal upon receiving RF energy emmited from a reader in

    proximity of the tag.

  • 8/6/2019 Report on Transparent Supply Chain1

    9/27

    9

    Passive Active

    Read Range Up to 40 feet (fixed readers)

    Up to 20 feet (handheld

    readers)

    Up to 300 feet or more

    Power No power source Battery powered

    Tag Life Up to 10 years depending

    upon the environment the tag

    is in

    3-8 years depending upon the

    tag broadcast rate

    Tag Costs $.10-4.00 or more depending

    upon quantity, durability, and

    form-factor

    $15-50 depending upon

    quantity, options (motion

    sensor, tamper detection,

    temperature sensor), and

    form-factor

    Ideal Use For inventorying assets using

    handheld RFID readers

    (daily, weekly, monthly

    quarterly, annually). Can also

    be used with fixed RFID

    readers to track the

    movement of assets as long

    as security is not a

    requirement.

    For use with fixed RFID

    readers to perform real-time

    asset monitoring at choke-

    points or within zones.

    Typically necessary when

    security is a requirement.

    Readers Typically higher cost Typically lower cost

  • 8/6/2019 Report on Transparent Supply Chain1

    10/27

    10

    EPC

    The Electronic Product Code (EPC) is a family of coding schemes created as an eventual

    successor to the barcode. The EPC was created as a low-cost method of tracking goods using

    RFID technology. It is designed to meet the needs of various industries, while guaranteeing

    uniqueness for all EPC-compliant tags. EPC tags were designed to identify each item

    manufactured, as opposed to just the manufacturer and class of products, as bar codes do

    today. The EPC accommodates existing coding schemes and defines new schemes where

    necessary. The EPC was the creation of the MIT Auto-ID Center, a consortium of over 120

    global corporations and university labs. The EPC system is currently managed by EPCglobal,

    Inc., a subsidiary of GS1. The Electronic Product Code promises to become the standard for

    global RFID usage, and a core element of the proposed EPCglobal Network.

    RFID vs. Barcodes Comparison

    RFID and barcodes are similar in that they are both data collection technologies, meaining

    they automate the process of collecting data. However, they also differ significantly in many

    areas. Although this comparison primarily focuses on the advantages of RFID over barcodes,

    RFID will not completely replace barcode technology. Barcodes offer some advantages over

    RFID, most notably their low cost.

    Comparison Statistics

    y RFID is 15-20 times faster than manual and barcode processes for inventorying IT

    assets. (Source: RFID Journal)

    y Some companies experience a 95% reduction in time using RFID (Source: Motorola)

    y The #1 RFID application being deployed is IT asset tracking (Source: Aberdeen)

    RFID Barcodes

    Line of Site Not required (in most cases) Required

    Read Range Passive UHF RFID:

    - Up to 40 feet (fixed

    readers)

    - Up to 20 feet (handheld

    readers)

    Several inches up to several

    feet

  • 8/6/2019 Report on Transparent Supply Chain1

    11/27

    11

    Active RFID:

    - Up to 100's of feet or

    more

    Read Rate 10's, 100's or 1000's

    simultaneously

    Only one at a time

    Identification Can uniquely identify each

    item/asset tagged.

    Most barcodes only identify

    the type of item (UPC Code)

    but not uniquely.

    Read/Write Many RFID tags are

    Read/Write

    Read only

    Technology RF (Radio Frequency) Optical (Laser)

    Interference Like the TSA (Transportation

    Security Administration),

    some RFID frequencies don't

    like Metal and Liquids. They

    can interfere with some RF

    Frequencies.

    Obstructed barcodes cannot

    be read (dirt covering

    barcode, torn barcode, etc.)

    Automation Most "fixed" readers don't

    require human involement to

    collect data (automated)

    Most barcode scanners

    require a human to operate

    (labor intensive)

    RFIDFrequencies

    Frequency refers to the size of the radio waves used to communicate between the RFID

    systems components. It is generally safe to assume that a higher frequency equates to a faster

    data transfer rate and longer read ranges, but also more sensitivity to environmental factors

    such as liquid and metal that can interfere with radio waves. RFID systems currently operate

    in the Low Frequency (LF), High Frequency (HF) and Ultrahigh Frequency (UHF) bands.

    Each frequency has advantages and disadvantages relative to its capabilities. Generally a

    lower frequency means a lower read range and slower data read rate, but increased

    capabilities for reading near or on metal or liquid surfaces.

    No single frequency is ideal for all applications, even within a single industry. Just as

    separate bar code symbologies are used at different levels of consumer goods packaging,

  • 8/6/2019 Report on Transparent Supply Chain1

    12/27

    12

    from U.P.C./EAN symbols at the item level to Code 128 and two-dimensional symbologies

    on cases and pallets, RFID tags of different frequencies and functionality will be used

    together within overall supply chain operations.

    Frequency

    Band

    Description Operating

    Range

    Applications Benefits Drawbacks

    125KHz to

    134 KHz

    Low

    Frequency

    < .5M or

    1.5ft.

    Access

    Control

    Animal

    Tracking

    Vehicleimmobilizers

    Product

    Authentication

    POS

    applications

    Works

    well

    around

    water and

    metalproducts.

    Short read

    range and

    slower read

    rates

    13.56 MHz High

    Frequency

    < 1M or

    3ft.

    Smart Cards

    Smart shelve

    tags for item

    level tracking

    Library

    Books

    Airline

    Baggage

    Maintenance

    data logging

    Low cost

    of tags

    Higher read

    rate than LF

    860 MHz to

    930MHz

    Ultrahigh

    Frequency

    (UHF)

    3m or 9ft. Pallet tracking

    Carton

    Tracking

    Electronic

    toll

    EPC

    standard

    built

    around

    this

    Does not

    work well

    around

    items of

    high water

  • 8/6/2019 Report on Transparent Supply Chain1

    13/27

    13

    collection

    Parking lot

    access

    frequency or metal

    content

    2.4GHz Microwave 1m or3 ft. AirlineBaggage

    Electronic

    toll collection

    Mostexpensive

    Fastest readrates

  • 8/6/2019 Report on Transparent Supply Chain1

    14/27

    14

    RFID in the Retail Supply Chain

    Wal-Mart and DoD suppliers are moving forward with EPC RFID implementations to gain

    operational improvements, such as:

    100 percent inventory visibility

    major reduction in losses and shrinkage

    tracking lot and expiration dates

    work in process data management

    enabling tags to carry real-time databases of item information

    assigning unique serial numbers to items

    sharing EPC and other product data with partners in the supply chain

    Operational Procedure:

    1. In the Manufacturing plant, pallets arrive at the dock door where stationery readers pick

    up EPC numbers and other data about the shipment.

    2. Received goods are checked against the Shipping Manifest and will go to one of three

    areasInventory, Production orReturns.

    3. A new shipping smart label is created to ship Returnsback to suppliers.

    4. Inventory cases are read by a forklift reader that updates the system with product and

    location data where they will be stored in the Warehouse

    5. Production components are read at the case level, updating the system that these goods

    will be used immediately. Individual components needed to assemble new products are

    collected into bins at the start of the Production Line, allowing the manufacturer to link EPC

    data of raw materials with the finished products. A smart label is generated to identify the bin

    and its contents.

    6. As the bins move toward the work-in-process line, they are read into the system by

    stationary conveyor-belt readers.

    7. As workers assemble components into products, a smart label is attached to the product at

    the outset of Work In Process. Strategically positioned reader/encoders write data about

    each task that is completed to the read/write tag in the smart label.

    8. At Quality Control, a reader picks up EPC numbers of products that have passed

    inspection. EPC numbers and product data are recorded in the manufacturers database,

    providing QC documentation as goods move through the supply chain.

  • 8/6/2019 Report on Transparent Supply Chain1

    15/27

    15

    9. Finished goods go to Packaging and a smart label is created that contains specific new

    product data.

    10. A fork-lift reader is used to update the system with information about the location where

    finished goods are stored.

    11. Inventory is also stored in the warehouse. As cases are removed from shelves and used in

    manufacturing, a

    hand-held reader or forklift reader can be used to update the system.

    12. In the Warehouse, finished goods destined for a particular Distribution Center are

    collected into pallets.

  • 8/6/2019 Report on Transparent Supply Chain1

    16/27

    16

    13. As pallets leave the dock door, stationary readers at Dispatch take take a final reading of

    the goods and update the system that they have been loaded on to a truck for shipping out.

    14. Advance Shipping Manifests give Distribution Centers data about pallets of good that

    will arrive. Pallets are read by stationary readers that record the shipment and flag duplicate,

    unordered or suspect items.

    15. Forklift readers/encoders update the system with the location of goods that are being

    stored. At any time, sensors can record conditions in the DC and add data to the smart label,

    allowing products to carry their own pedigree or history.

    16. At the DC, goods from multiple suppliers are collected on pallets and targeted for a

    particularRetail destination. Pallets are shrink-wrapped to protect contents and keep them

    stable. A smart label is created to identify the contents of the pallet and encode shipping

    instructions. Stationary readers at the dock doors update the system about outbound

    shipments.

  • 8/6/2019 Report on Transparent Supply Chain1

    17/27

    17

    17. Stationary readers at the dock doors update the system to reflect what types of goods have

    been received, from whom and when. Again, goods that are accepted will be stored in the

    Backroom or placed directly onto shelves in-store.

    18. Stationary readers or forklift readers update the system as goods transition from the

    backroom into the Retail Store.

    19. Shelf readers report back into the system when items are low and shelves need restocking.

    20. EPC numbers become inactive at the end of the supply chain when containers are

    recycled in Compacting, unless assets, such as pallets or cartons, will be reused.

  • 8/6/2019 Report on Transparent Supply Chain1

    18/27

    18

    Applications ofRFID

    Supply Chain Management

    Thousands of inbound and outbound shipments can be identified with RFID smart labels that

    enable unattended identification, verification and sortation at different points in the supply

    chain across trading partners and distribution centers.

    Asset Management

    RFID promises more effective asset management by providing real-time information about

    location of assets ensuring employees always have equipment, tools and other resources

    when and where they need them.

    Anti-Counterfeiting/Track& Trace

    Materials authentication is another complementary asset management application. It provides

    a way to detect counterfeit products and can ensure that only authorized parts and supplies

    are used with equipment. Many organizations in the life sciences and pharmaceutical

    industries will use RFID to comply with FDA rules to create pedigrees to support drug

    traceability and security.

    Inventory Control

    RFID can significantly deliver correct and current information about inventory levels to allow

    companies to ensure they can deliver what they have promised. In addition better inventory

    control reduces storage space and labor costs and improves asset utilization as well as enables

    faster billing cycles and contributes to cash flow.

    Work in Process

    Along the assembly line, tasks associated with WIP can be reported back to the systems with

    RFID, identifying that each step of the assembly process was completed and ensuring that

    quality control measures were taken reducing makeovers.

  • 8/6/2019 Report on Transparent Supply Chain1

    19/27

    19

    Advantages and Disadvantages ofRFID Technology

    Advantages:

    RFID technology has a number of advantages.

    y RFID tags are very simple to install/inject inside the body of animals, thus helping to

    keep a track on them. This is useful in animal husbandry and on poultry farms. The

    installed RFID tags give information about the age, vaccinations and health of the

    animals.

    y RFID technology is better than bar codes as it cannot be easily replicated and

    therefore, it increases the security of the product.

    y Supply chain management forms the major part of retail business and RFID systems

    play a key role by managing updates of stocks, transportation and logistics of the

    product.

    y Barcode scanners have repeatedly failed in providing security to gems and jeweleries

    in shops. But nowadays, RFID tags are placed inside jewelry items and an alarm is

    installed at the exit doors.

    y The RFID tags can store data up to 2 KB whereas, the bar code has the ability to read

    just 10-12 digits.

    Disadvantages:The RFID technology, though very beneficial, is expensive to install. Small and medium

    scale enterprises find it costly to use it in their firms and offices.

    y It is difficult for an RFID reader to read the information in case of RFID tags installed

    in liquids and metal products. The problem is that the liquid and metal surfaces tend

    to reflect the radio waves, which makes the tags unreadable. The tags have to be

    placed in various alignments and angles for taking proper reading. This is a tedious

    task when the work involves big firms.y Interference has been observed if devices such as forklifts and walkie-talkies are in

    the vicinity of the distribution centers. The presence of mobile phone towers has been

    found to interfere with RFID radio waves. Wal-Mart, the retail sector giant, has

    installed billions of RFID tags in their products throughout the world and they have

    encountered such problems.

  • 8/6/2019 Report on Transparent Supply Chain1

    20/27

    20

    y The USA and Europe, for instance, have different range of frequencies that allow

    RFID tags to function. This makes it mandatory for international shipping companies

    and other organizations to be aware of the working pattern of other nations also,

    which can be very time-consuming.

    y RFID technology has been referred to as invasive technology. Consumers are

    apprehensive about their privacy when they purchase products with RFID tags. Once

    the radio chips are installed in the product, the customer can be tracked and his

    personal information can be collected by the RFID reader. However, many stores

    have a facility that deactivates the RFID tags after the product has been purchased.

    RFID technology can be the next tool for success and management of various businesses.

    With more research, the flaws and limitations of this technology can be removed. This will

    make RFID technology very useful for diverse sectors like retail, transport and jewelrybusinesses.

  • 8/6/2019 Report on Transparent Supply Chain1

    21/27

    21

    Problems with RFID

    RFID problems can be divided into several categories:

    y Technical problems with RFID

    y Privacy and ethics problems with RFID

    Technical problems with RFID

    Problems with RFID Standards

    RFID has been implemented in different ways by different manufacturers; global standards

    are still being worked on. It should be noted that some RFID devices are never meant to leave

    their network (as in the case of RFID tags used for inventory control within a company). This

    can cause problems for companies.

    Consumers may also have problems with RFID standards. For example, ExxonMobil's

    SpeedPass system is a proprietary RFID system; if another company wanted to use the

    convenient SpeedPass (say, at the drive-in window of your favorite fast food restaurant) they

    would have to pay to access it - an unlikely scenario. On the other hand, if every company

    had their own "SpeedPass" system, a consumer would need to carry many different devices

    with them.

    RFID systems can be easily disrupted

    Since RFID systems make use of the electromagnetic spectrum (like WiFi networks or

    cellphones), they are relatively easy to jam using energy at the right frequency. Although this

    would only be an inconvenience for consumers in stores (longer waits at the checkout), it

    could be disastrous in other environments where RFID is increasingly used, like hospitals or

    in the military in the field.

    Also, active RFID tags (those that use a battery to increase the range of the system) can be

    repeatedly interrogated to wear the battery down, disrupting the system.

    RFIDReader Collision

    Reader collision occurs when the signals from two or more readers overlap. The tag is unable

    to respond to simultaneous queries. Systems must be carefully set up to avoid this problem;

  • 8/6/2019 Report on Transparent Supply Chain1

    22/27

    22

    many systems use an anti-collision protocol (also called a singulation protocol. Anti-

    collision protocols enable the tags to take turns in transmitting to a reader.

    RFIDTag Collision

    Tag collision occurs when many tags are present in a small area; but since the read time is

    very fast, it is easier for vendors to develop systems that ensure that tags respond one at a

    time.

    Security, privacy and ethics problems with RFID

    The following problems with RFID tags and readers have been reported.

    The contents of an RFID tag can be read after the item leaves the supply chain

    An RFID tag cannot tell the difference between one reader and another. RFIDscanners are very portable; RFID tags can be read from a distance, from a few inches

    to a few yards. This allows anyone to see the contents of your purse or pocket as you

    walk down the street. Some tags can be turned off when the item has left the supply

    chain.

    RFID tags are difficult to remove

    RFID tags are difficult to for consumers to remove; some are very small (less than a

    half-millimetre square, and as thin as a sheet of paper) - others may be hidden or

    embedded inside a product where consumers cannot see them. New technologies

    allow RFID tags to be "printed" right on a product and may not be removable at all.

    RFID tags can be read without your knowledge

    Since the tags can be read without being swiped or obviously scanned (as is the case

    with magnetic strips or barcodes), anyone with an RFID tag reader can read the tags

    embedded in your clothes and other consumer products without your knowledge. Forexample, you could be scanned before you enter the store, just to see what you are

    carrying. You might then be approached by a clerk who knows what you have in your

    backpack or purse, and can suggest accessories or other items.

  • 8/6/2019 Report on Transparent Supply Chain1

    23/27

    23

    RFID tags can be read a greater distances with a high-gain antenna

    For various reasons, RFID reader/tag systems are designed so that distance between

    the tag and the reader is kept to a minimum (see the material on tag collision above).

    However, a high-gain antenna can be used to read the tags from much further away,leading to privacy problems.

    RFID tags with unique serial numbers could be linked to an individual credit card

    number

    At present, the Universal Product Code (UPC) implemented with barcodes allows

    each product sold in a store to have a unique number that identifies that product.

    Work is proceeding on a global system of product identification that would

    allow each individual item to have its own number. When the item is scanned for

    purchase and is paid for, the RFID tag number for a particular item can be associated

    with a credit card number.

  • 8/6/2019 Report on Transparent Supply Chain1

    24/27

    24

    RFID Manufacturers

    AeroScout

    - Leading manufacturer

    - Private firm

    - Headquarters in Redwood City California, USA

    - Offices in Europe, Middle East, Asia, Australia and Latin America

    - Revenues: $14.1 M

    - Employees: 150

    Alien Technologies

    - Private firm

    - Headquarters in Margan Hill, CA and RFID solutions center in Dayton, Ohio

    - Offices in US, Europe, Australia and Asia

    - Employees: 235

    - Clientele: WalMart, IBM, HP, Microsoft, Philips, US DOD

  • 8/6/2019 Report on Transparent Supply Chain1

    25/27

    25

    Indian Companies implementing RFID

    PantaloonRetail (India) Limited

    Headquarter - Mumbai (Bombay)

    Over 1000 stores across 73 cities in India and employs over 30,000 people.

    Operating Profit(2010): 600.44 crores

    Pantaloon's experiment with RFID

    The main objective was to smoothen the entire product lifecycle, introduce item-level

    tagging for identification, and track the entire RFID roadmap with Pantaloon.

    Pantaloon went in for RFID for its simplicity of tagging, efficacy of use, product

    buffering, ability to keep track of over-produced items, and ability to monitor product-

    line lead time at the warehouse and fast-moving product-lines. The company selecteda few lines of apparel, primarily shirts and trousers, for its RFID pilot.

    Developed by :Wipro Infotech

    Oracle database 10g, middleware along with an implementation of the RFID hardware

    It integrates with the existing IT infrastructure, the in-house developed Retail

    Enterprise Manager (a special variety of ERP package).

    Efficiency and accuracy: After the RFID implementation, the time saved on the

    same is about 80 percent in inward warehouse processing and 12 percent in outward.

    Real-time visibility of items during all stages of the supply chain improved to 98

    percent.

    Ashok Leyland

    Ashok Leyland, a Hinduja group company

    Manufacturer of commercial vehicles and diesel engines

    Deployed RFID technology within its assembling centers.

    Ashok Leyland has seven manufacturing plants - the mother plant at Ennore near

    Chennai, three plants at Hosur , the assembly plants at Alwar, Bhandara and state-of-

    the-art facility at Pantnagar. The total covered space at these seven plants exceeds

    650,000 sq m and together employ over 11,500 personnel.

    Operating Profit in March,2010 is Rs.423.67 crores

  • 8/6/2019 Report on Transparent Supply Chain1

    26/27

    26

    Benefits ofRFID in Engine Assembly

    The parts received from the supplier are scanned at assembly shops and the database is

    updated automatically. The objective of implementing RFID in engine assembly application

    is:

    To avoid mismatch of critical components that are to be assembled in the engine

    To improve quality control

    To facilitate JIT inventory

    To facilitate automation

    To facilitate genealogy tracking of critical engine components.

    Implementation:

    As a proof of concept, RFID was implemented at Instrumentation department of TechnicalCentre. Features of an RFID enabled Instrument transaction system:

    Real - time availability of information about Instrument status through ERP

    Availability of Instrument calibration information through ERP

    Instrument requisition through ERP

    Indication of Instruments going out of Instrumentation department

    With the RFID enabled Instrument transaction system, users will have access to the

    information regarding Instrument

    availability through ERP. As soon as the user requests for the Instrument, the concerned

    person at Instrumentation department gets an email. The authorized person at the

    Instrumentation department approves the request and the Instrument is issued. When the

    Instrument is issued to the user, the issue information is fed in the ERP, which sends it

    to the RFID reader, disabling the beep. If the Instrument is taken out of the Instrumentation

    department without being issued, the RFID system raises an alarm to indicate this.

  • 8/6/2019 Report on Transparent Supply Chain1

    27/27

    27

    References

    http://www.inlogic.com/rfid/rfid_vs_barcode.aspx

    http://www.buzzle.com/articles/passive-vs-active-rfid-tags.html

    http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=2

    http://www.howstuffworks.com/

    http://www.expresscomputeronline.com/