23,99 €
Select, invest in, and deploy a Real Time Location System
Is your business ready for an RTLS? This friendly, hands-on guide shows you how to understand and implement this cutting-edge technology, explaining RTLS methodologies in plain English. From the initial deployment to monitoring to determining Return on Investment, you'll see how to successfully meet your needs, ensure data accuracy, and sustain your system.
Open the book and find:
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Seitenzahl: 451
Veröffentlichungsjahr: 2009
Table of Contents
Introduction
About This Book
Conventions Used in This Book
Foolish Assumptions
How This Book Is Organized
Part I: Getting Your Bearings in RTLS
Part II: Implementing RTLS in Your World
Part III: Tag-A-Palooza: RTLS Technology Tour
Part IV: Monitoring Performance and Securing RTLS
Part V: The Part of Tens
Part VI: Appendixes
Icons Used in This Book
Where to Go from Here
Part I: Getting Your Bearings in RTLS
Chapter 1: Getting to Know RTLS
Understanding How an RTLS Works
Using tags to locate people and assets
Adding value with bells and whistles
Knowing the location models
Knowing the underlying technologies
Recognizing the Need for an RTLS
Tagging assets
Tagging people
Putting an RTLS to Work
Healthcare
Manufacturing
Automotive
Aerospace and defense
Research and development
Retail
Mining
Visitor information
Industry conferences, amusement parks, and temporary setups
Public safety
Education
Chapter 2: Knowing the Many Parts of an RTLS
Starting with the All-Important Tag
Characterizing tags
Considering tag ergonomics
Recognizing the importance of a tag battery
Interpreting tag enclosure ratings
Tag environmental capabilities
Supporting telemetry
Connecting tags to assets
Programming tags
Increasing tag security
Working on tag serviceability
Making Sense of Location Sensors
Inspecting the Location Engine
Ranging techniques
Exploring the position estimation algorithm
Applying the earlier techniques to compute tag locations
Exploring the Technologies
Understanding Middleware
Understanding RTLS Applications
Chapter 3: Choosing the Right RTLS
Weighing Your Options
Knowing Your Objectives
Scope of the RTLS application
Responsiveness
Accuracy
Size
Life expectancy
Tolerance
Scalability
Assessing Deployment Needs
Environmental suitability
Impact to an existing infrastructure
Leverage of an existing infrastructure
Ease of deployment
Installation effort
Deployment tools
Estimating Maintenance Requirements
Knowing Your Integration Needs
Measuring Return on Investment
Considering Value Adds
Tag value adds
Application bells and whistles
Evaluating Security
Tracking Performance
Requiring a Standards-Based Solution
Ensuring Eco-Friendliness
Making Your Choice
Part II: Implementing RTLS in Your World
Chapter 4: Planning for a Successful Implementation
Visualizing the Goals
Identifying your users
Addressing how users will use the application
Knowing where users will work with the application
Asking what makes users happy
Supporting your help staff
Knowing what you don’t want
Understanding the Business Constraints
Working within budget and staffing constraints
Accommodating the technical landscape
Offsetting environmental conditions
Understanding business processes
Checking out your suppliers, clients, and competitors
Enlisting Support
Defining the Scope of Your RTLS Implementation
Anticipating the Future
Understanding the Technology
Creating an Implementation Plan
Chapter 5: Preparing for Installation
Adopting a Test Model
Selecting Technologies
Interviewing Vendors
Testing the Waters with the Prepilot
Conducting the Pilot
Identifying the tasks and resources
Getting ready and doing the rollout
Conducting the pilot testing
Chapter 6: Monitoring RTLS
Monitoring RTLS Applications
Knowing How to Monitor Your RTLS
Recognizing the benefits of proactive monitoring
Using reactive monitoring
Encouraging end users to participate
Establishing baselines
Chapter 7: Integrating RTLS
Understanding Integration
Streamlining inefficient procedures
Eliminating the cost of managing redundant data
Adding new business value
Increasing scalability
Unifying device management
Knowing the Requirements for Integrating an RTLS
Performing an RTLS Integration
Step 1: Perform an integration audit
Step 2: Define an integration implementation strategy
Part III: Tag-A-Palooza: RTLS Technology Tour
Chapter 8: Locating at Choke Points
Making Choke Points
Keeping track of tags with interrogators
Locating at choke points with exciters
Reading location with receivers
Locating at choke points using precision locating systems
Putting Choke Points to Work
Knowing the best uses for choke points
Knowing what choke points can’t do
Exploring the Underlying Technologies
Passive low frequency (passive LF)
Active low frequency (active LF)
RuBee
Passive high frequency (passive HF)
Passive ultra high frequency (passive UHF)
Semipassive ultra high frequency (semipassive UHF)
Surface acoustic wave (SAW)
Chapter 9: Locating at Room Level
Understanding the Methods of Locating at Room Level
Applying Room-Level Locating
Increasing healthcare efficiency
Staying safe at school
Knowing the Underlying Technologies
Using infrared
Understanding ultrasound
Understanding powerline positioning
Chapter 10: Precision Locating with Wide Area Coverage
Understanding Wide Area Coverage
Exploring the Underlying Technologies
Using satellite navigation systems
Locating with cellular
Working with WiMAX
Understanding TV-signal positioning
Chapter 11: Precision Locating with Local Area Coverage
Understanding Precision
Understanding the Underlying Technologies
Estimating position with dead reckoning
Using Wi-Fi for an RTLS
Locating with Bluetooth
Locating using passive RFID
Using active RFID
Using ultra-wideband (UWB)
Using ZigBee
Using computer vision
Using acoustic locating systems
Using building illumination
Chapter 12: Presence-Based Locating
Detecting Presence
Powerline positioning
Wi-Fi
Building illumination
Mobile locating
Using Presence-Based Applications
Chapter 13: Locating by Associating
Knowing When to Use Associations
Understanding the Underlying Technologies
Using Locating by Associating
Security applications
Safety applications
Analytic applications
Social-networking applications
Part IV: Monitoring Performance and Securing RTLS
Chapter 14: Measuring RTLS Performance
Defining the Metrics
Measuring the End-User Experience
Perceived accuracy
Perceived response time
Consistency
Tripping and training
Process intrusion
Gauging Operational Excellency
Establishing Application Objectives
Staff emergency response
Asset locating
Chapter 15: RTLS Vulnerabilities
Evaluating Security Threats
Availability loss
Integrity loss
Confidentiality loss
Knowing Your Options: Countermeasures
Catching the Attacks
Evaluating the Real Security Challenge
Part V: The Part of Tens
Chapter 16: Ten RTLS Pitfalls
Failing to Determine Compatibility
Creating an Abstract Business Case
Underestimating the Integration Cost
Estimating Location Sensor Deployment Unrealistically
Performing Inadequate Testing with Different Types of Assets
Forgetting about the Business Process
Foregoing Enterprise-Wide Coverage
Underestimating Maintenance Efforts
Planning for an Overzealous 1.0
Failing to Engage Privacy Groups
Chapter 17: Ten Tips for Selecting an RTLS Vendor
Seeking Critical Mass in an RTLS
Selecting a Strategic Vendor
Checking End User Sentiment
Knowing a Vendor’s Technological Focus
Knowing the Integration and Interoperability Potential
Asking about Developing Custom Solutions
Ensuring Smooth Operations with Site Surveys
Developing a Proof of Concept
Knowing the Shipping Volumes for RTLS Tags
Asking for Remote Troubleshooting and Updates
Chapter 18: Ten Best Ways to Use Batteries
Maximizing Battery Life
Understanding That Not All Batteries Are the Same
Disposing of Used Batteries
Knowing the Importance of Cell Casing
Preventing Sudden or Premature Battery Death
Interpreting the Low-Battery Indicator
Ensuring Battery Safety
Preventing Unauthorized Battery Use
Storing Batteries
Avoiding Bad Charging
Part VI: Appendixes
Appendix A: RTLS Resources and References
International Organization for Standardization (ISO)
IEEE
EPCglobal
AIM Global
Ubiquitous ID Center
Wi-Fi Alliance
ZigBee Alliance
3GPP
CEN
IEC
AIDC 100
Bluetooth SIG
RFID Tribe
RFID Journal
RFID Monthly
RFID Product News
Active Badge System
Active BAT Location System
HiBall Tracking System
RADAR
LANDMARC
Cricket
NearMe
GLONASS
Galileo
Beidou
Appendix B: Privacy Issues
Guarding against unauthorized tag readings
Regulating the use of data
Appendix C: Realizing the Benefits of an RTLS
Direct (hard) RTLS benefits
Indirect RTLS benefits
Soft RTLS benefits
Quantifiable RTLS soft benefits
Tips for creating reports
Capturing risks to ROI
RTLS For Dummies®
by Ajay Malik
RTLS For Dummies®
Published byWiley Publishing, Inc.111 River St.Hoboken, NJ 07030-5774www.wiley.com
Copyright © 2009 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.
For technical support, please visit www.wiley.com/techsupport.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Library of Congress Control Number: 2009924129
ISBN: 978-0-470-39868-5
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
About the Author
Ajay Malik, a computer science graduate from IIT Roorkee (one of the most prestigious engineering universities in India), has over 20 patents issued and pending, many in the field of RTLS. He’s been working in the field of RFID and RTLS for more than five years.
He works with a wide range of customers, vendors, and integrators for RTLS solutions in different market segments, such as health care, homeland security, education, industrial, and so on. Not only has he been involved in architecting and creating effective RTLS solutions by interacting with customers, but he also has been leading engineering teams to deliver components or complete RTLS solutions. He championed Real Time Location System, supporting multiple technologies at his tenure in Motorola and is currently working as CTO at RF Technologies, a company that has been involved with RTLS solutions for more than 21 years.
Dedication
To the three great women and a little man who define me every day — my mother Prabha, my wife Ritu, my daughter Shanaya, and my little son Aarush.
And, to my father, whom I could not get to tell all the things I had to say. He passed away too soon.
Author’s Acknowledgments
Let me take this opportunity to thank my family, friends, agent, and people at Wiley Publishing, Inc., whose support, dedication, and talent combined to make this book happen.
I want to thank my agent Matt Wagner, the best possible agent an aspiring book writer can have. He not only works hard to make things happen for you, but is also kind, encouraging, and very trustworthy. His sincere advice and efforts helped in getting this book underway.
At Wiley Publishing, I want to thank Katie Feltman and Jean Nelson for their encouragement and their ongoing support every step of the way. They made sure that the project stayed on course and made it into production so that all the talented folks on the Composition Services team could create this great final product. I also want to thank Colleen Totz Diamond, Kathy Simpson, and Jennifer Riggs for their manuscript reviews and updates and their invaluable input and suggestions on how best to present the content.
This book would not have been possible without the constant support from my wife, who constantly took over my responsibilities at home. She ensured that I had time available for this book. And my kids, who at the young ages of four and two somehow understood that “Daddy is busy.” I also want to thank my brother Dr. Sanjay Malik, sister Alka Chawla, and friends Alan O’Brien, Mahender Vangati, Sarosh Vesuna, and Sameer Kanagala, who encouraged me all the time.
And, this acknowledgement section would be incomplete if I didn’t mention Anthony Bartolo, Sujai Hajela, and Ray Martino, who introduced me to the world of RTLS; Glenn Jonas, CEO RF Technologies, Inc., who gave me the opportunity to try more in RTLS; and Terje “Terry” Aasen, Skip Speaks, Matt Perkins, Jarie Bolander, and Reik Read for providing me their views and inputs on different RTLS technologies. I sincerely thank them.
Publisher’s Acknowledgments
We’re proud of this book; please send us your comments through our online registration form located at www.dummies.com/register/.
Some of the people who helped bring this book to market include the following:
Acquisitions, Editorial, and Media Development
Project Editor: Jean Nelson
Senior Acquisitions Editor: Katie Feltman
Copy Editors: Jennifer Riggs, Kathy Simpson
Technical Editor: Sameer Kanagala
Editorial Manager: Kevin Kirschner
Media Development Project Manager: Laura Moss-Hollister
Media Development Assistant Project Manager: Jenny Swisher
Media Development Assistant Producers: Angela Denny, Josh Frank, Shawn Patrick, Kit Malone
Editorial Assistant: Amanda Foxworth
Sr. Editorial Assistant: Cherie Case
Cartoons: Rich Tennant (www.the5thwave.com)
Composition Services
Project Coordinator: Katie Key
Layout and Graphics: Shawn Frazier, Sarah Philippart, Christin Swinford, Christine Williams
Proofreader: Dwight Ramsey
Indexer: Potomac Indexing, LLC
Special HelpColleen Totz Diamond
Publishing and Editorial for Technology Dummies
Richard Swadley, Vice President and Executive Group Publisher
Andy Cummings, Vice President and Publisher
Mary Bednarek, Executive Acquisitions Director
Mary C. Corder, Editorial Director
Publishing for Consumer Dummies
Diane Graves Steele, Vice President and Publisher
Composition Services
Gerry Fahey, Vice President of Production Services
Debbie Stailey, Director of Composition Services
Part I
Getting Your Bearings in RTLS
In this part . . .
With all the buzz in recent years around RFID and then the success of GPS, the concept that you can locate anything or anybody automatically in real time is catching everyone’s attention. In Chapter 1, I give you some examples of where an RTLS is, or could be, used. An RTLS can be the solution for applications in which items or personnel need to be located within a given area — whether they’re moving or stationary. The examples I give get you thinking. The rest is up to you.
To get a good understanding of any RTLS, you have to know what it’s made of. That’s where Chapter 2 comes in, with the components, technologies, and methodologies of an RTLS. And because no single technology has been completely up to the task of providing an RTLS in all environments under all conditions, Chapter 3 lays down various things you might want to weigh before making your choice. From this humble beginning, it’s a quick trip to total RTLS mastery.
Chapter 1
Getting to Know RTLS
In This Chapter
Figuring out how an RTLS works
Discovering the need for an RTLS
Applying an RTLS to various markets
A Real Time Location System (RTLS) enables you to find, track, manage, analyze, leverage, and otherwise use the information regarding where assets or people are located. Imagine being able to track people and assets at a local, national, or even global level. Retailers, military, law enforcement, emergency first response, healthcare, education, almost every business — even home life — can all benefit, or already do, by using RTLS technology. This chapter provides you with an overview of the RTLS — what it is and how it works — and describes who is using it and why.
Understanding How an RTLS Works
Location depicts or illustrates where something is well, located. With a Real Time Location System, or RTLS, you locate and track people and assets by associating a tag, a small wireless device, with each person or asset. Assets are items like laptops, projectors, equipment, and machinery. For example, you may attach a tag to office equipment (an asset) so that you can locate it within your office building; or you may carry an ID badge (a tag), and someone can locate you within the building.
Here are the parts of an RTLS, as shown in Figure 1-1:
Tags: A mobile device that’s enabled with location technology. A tag is usually small enough that it can be attached to assets or carried by people.
Location sensors: Devices that usually have a known position. You use the location sensors to locate the tags that are affixed to the people and assets you want to track. For example, in the Global Positioning System (GPS), the satellites placed into orbit by the U.S. Department of Defense are the location sensors, and the location of tags (GPS receivers, such as the ones used in cars) is determined with signals from these satellites.
Location engine: The software that communicates with tags and locationsensors to determine the location of the tags. The location engine reports this information to middleware and applications.
Middleware: The software that resides among the pure RTLS technology components (the tags, the location sensors, and the location engine) and the business applications capable of exploiting the value of the technology. You can think of middleware as the plumbing. Not only the specific RTLS application but also all other business applications used by the enterprise can be enriched with real-time location information.
Application: The application (also known as application software,end-user application, or software application) is the software that interacts with the RTLS middleware and does work users are directly interested in. For example, an application that’s always checking the location of kids in an entertainment park and then providing a Web page for parents to check the location of their kids.
The location engine, middleware, and application software may run on the same computer or on different ones. These applications also usually have a client interface such as a browser or PDA interface.
Chapter 2 covers the parts of an RTLS and how they work in much more detail. The following sections provide a more general overview of an RTLS to get you started.
Figure 1-1: The basic parts that comprise an RTLS.
Using tags to locate people and assets
To locate people and assets in real time, an RTLS continually monitors the tag locations. Then the RTLS passes the location information to an application that makes use of the data. Here are just a few ways you can use RTLS tags to locate people and assets:
Attach tags to your company laptops so that you can get alerts when the laptops leave the building without the authorized owner.
Attach tags to your school projectors so that you can track which classes have the projector.
Build a tag right into the machinery so that you can track its location in the factory.
Require people to carry tags, such as
• Badges
• Wristbands
• Pendants
• Ankle bands
• Belt clips
Build tags into items that people already carry, such as cell phones.
Adding value with bells and whistles
Besides the technology that enables the location engine to locate the tags, tags often have bells and whistles that add tremendous value to the RTLS applications. These extra features are described in the following sections.
Push buttons
Tags with push buttons (or call buttons) can be used in multiple ways. One of the most common uses is as panic buttons that can be carried by people for summoning emergency response. Whenever the person presses the panic button, the location engine provides the alert and the location of the person pressing the button. Another use of push buttons in tags is when connected to assets, people can use the button to indicate status, such as Asset in Use, Work Order Completed, or Asset in Need of Repair.
Voice to voice
If a tag has voice-to-voice capability, you can use it to communicate with the person carrying the tag based on her location. For example, you can communicate location-based voice messages to a tourist in a museum, a visitor in an entertainment park, or a person trapped in any number of places.
Buzzers, LEDs, LCD screens, and vibrators
You can use buzzers, LEDs, or LCD screens on tags to communicate with the person carrying the tag, to identify or locate an asset, and to communicate with the person who has the asset or is expected to check the asset. Here’s how you can use buzzers, LEDs, or LCD screens on tags:
Buzzers can emit sounds, preprogrammed voice messages, ringtones, or live messages to give the tag carrier information or alerts.
LEDs can provide the tag carrier with messages based on LED colors and blink patterns.
LCD screens can display text messages for the tag carrier.
Sensors
You can incorporate many sensors in the tags to gain information about the environment, the status of the person carrying tag, or the asset that has the tag attached to it. Here are some examples of how sensors can help you work more effectively:
Motion sensors in the tag can indicate whether the person carrying tag is moving.
A temperature sensor attached to a painting can indicate whether that painting is in optimum thermal conditions.
A carbon monoxide sensor can indicate whether the person carrying the tag is in a safe environment.
Connectors
Tags can also have connectors that connect to various assets to communicate specific details about the asset or its operation state. For example, the tag can indicate not only where the asset is but also whether the asset is powered on. You also can use the tag to turn the asset on or off.
Writeable memory
Tags can have writeable memory that can be used to store some user data for that asset, such as the name of the equipment renting company that placed the equipment.
Knowing the location models
When you want to know the physical location of an asset or a person, depending on your needs, you may want to know the absolute position, relative position, or symbolic position:
Absolute position is the absolute coordinates, such as latitude, longitude,and altitude. For example, the Taj Mahal is situated at N27° 10’ 0 N, E78° 2’ 60, and the Washington Monument is at N 48.629283 and W –121.831533 with peak elevation of 4,455 feet (1,357.88 meters) above sea level.
Relative position is the distance in three dimensions with reference to a fixed point. For example, the security guard is standing at 10 meters south of the main entrance of the building.
Symbolic position implies presence in a specific area (for example, the doctor is in the operation theater room) or presence near something or someone (for example, the child is near her mom).
To satisfy the needs of various applications, whether they need precise location or room-level location, various RTLS systems report the location of tags in one of the following ways (see Figure 1-2):
Presence-based locating: In this model, the tag location is returned as to whether it’s present in a given area. For example, if your boss is carrying a tag, you can know whether he’s in the building.
Locating at room level: In this model, the tag location is returned as presence in a specific room. For example, if a schoolteacher presses the panic button to summon security assistance in the event of a classroom emergency, the location engine reports the teacher’s exact classroom to the security guard.
Locating at sub-room level: In this model, the tag location is returned as presence in a specific part of the room. For example, in hospital rooms that accommodate multiple patients, such as dual-bed rooms, if a nurse is carrying a tag, the location engine can report how much time the nurse spent by each patient’s side.
Locating at choke points: In this model, as shown in Figure 1-2, the tag location is returned by a specific choke point (an entry or exit point, such as a door; it’s assumed that people or assets move from one area to another through these choke points). By monitoring the time a tag was seen at a specific choke point, you can also determine the direction the tag is moving. In other words, you can determine whether the tag is present inside or outside an area and whether it’s entering or leaving the predetermined area. For example, if all visitors to a facility are required to carry tags, you can determine on which floor or building the visitors are located.
Figure 1-2: RTLS location models.
Locating by associating: In this model, tag location is returned as proximity with respect to another tag (see Figure 1-2). For example, if each patient in a clinic wears a tag and each IVF pump has a tag, the location of the IVF pump is returned as present next to a specific patient. The billing department can use this data, which indicates how long the IVF pump was in use with any patient, to calculate invoice amounts. Or maybe you need to know whether the owner of a specific laptop is actually next to that laptop. Many securities, financial, or other location-based services can benefit by knowing this type of information.
Locating precisely: In this model, the tag location is pinpointed precisely. You can pinpoint the exact tag location on the map of the world and/or in a given building. The location is reported as absolute or relative position as described earlier. Locating precisely is the exact form of RTLS, and depending upon the accuracy of reporting, the precise location information can be extrapolated to room level, sub-room level, association level, presence level, and choke point.
Knowing the underlying technologies
Many systems and technologies have been developed over the years by researchers and commercial companies to provide the location of people, equipment, and other assets. Today, an RTLS can be achieved using light, camera vision, infrared, sound, ultrasound, Bluetooth, Wi-Fi, radio frequency identification (RFID), ZigBee, Ultra Wideband, GPS, Cellular, and many more technologies. These technologies are discussed in detail in Part III.
Different technologies use different approaches, and each approach solves a slightly different problem or supports different applications. These systems vary in many parameters, such as the physical phenomena used for location determination, the tag’s form factor and location sensors, power requirements, range, indoor versus outdoor applicability, and time and space resolution. Some technologies determine location at room level, some can determine presence only, and some can determine location precisely. Some technologies work well outdoors whereas others are tailor-made for indoors. Some work well in an office environment, and others work well in an industrial environment. Some need additional location sensors, and some leverage existing infrastructures, such as electricity or Wi-Fi in the building.
In some systems, the tag being located actually computes its own position (also known as tag self-positioning); in some, the software that locates the tag is external to the tag (also known as tag remote-positioning); and in others, the tag position is determined by recognizing the location of a nearby tag (also known as tag indirect-positioning).
But all RTLS technologies share the common goal of computing the location of assets and people as accurately as needed by the application, and they all succeed in their own way.
Recognizing the Need for an RTLS
For the past few decades, the research, development, and standardization of radio frequency identification (RFID), Wi-Fi, and many other wireless technologies along with the success of GPS as a consumer navigation application have contributed to a dramatic increase in the number and type of users requiring the needs for location identification.
In addition to the developments in technologies that are making it increasingly feasible to identify and locate any thing or individual anywhere in real time, it’s the pursuit of what, how many, and where in real time that’s driving the need for RTLS. Whether you’re talking about businesses, consumers, or public sector markets, the need for an RTLS is arising from the inherent need for just-in-time actionable information — the right information at the right time and location — which is a fundamental concept to make effective decisions and take immediate action:
Business markets: The need for an RTLS is being driven by an ever more mobile workforce, the need for continuous information about worker and visitor safety, the economic pressures for operational efficiencies, aspirations to increase profit margins, the need to handle recalls effectively, demanding customers, and the desire for enhanced customer experience.
Customers are becoming less tolerant in accepting deficient products or services due to the wide range of choices available. For example, if a company can’t track its shipments in real time, it likely can’t deliver the kind of customer service its competitors offer. With an RTLS, customers can pick up the phone or check a Web site and find out instantly where their goods are at any given moment.
Consumer markets: Concern with safety and security, need of location knowledge for social networking, aging population, and need for Web 3.0 are driving the need of an RTLS. People want to know immediately where children and seniors are located. Consumers and regulatory bodies want the ability to track the food from the moment it’s picked in the field to the time it shows up at the grocery store so that they can pinpoint the source of accidental or malicious contamination of food and issue appropriate recalls. The youth and singles markets want to use location knowledge in the social network, and people expect a lot of location-based information from their personal navigation systems and when they surf the Web.
Public sector: The concerns about terrorism and continued breakdowns in emergency communications during major disasters have opened the doors to RTLS applications as complements, alternatives, or backups to existing systems.
The applications that are driving the needs for an RTLS vary depending on whether you’re talking about business, consumer, or public sector markets, the needs of individual segments within those markets, and the particulars of the targeted geographic region.
Tagging assets
Tagging is the act of affixing a tag to an asset or person. Tagging assets enables you to locate assets on demand, track and protect them, monitor their usage, trace them, and manage and plan inventory. Here are some examples of what you can accomplish by tagging assets:
Locate assets on demand: On large sites, equipment easily goes missing. People forget to return it, and a lot of equipment gets moved and isn’t returned to its original location. If the equipment is tagged, the RTLS can determine the equipment location. Such an application is especially useful in environments like hospitals where it’s important to locate certain equipment quickly in the event of an emergency. Similarly, equipment requiring predictive or preventive maintenance or pieces of equipment for which a repair order or a recall has been issued can be located easily.
Track assets: Sometimes you need to know not only the current location of an asset but also where it’s been. This information is useful — or even critical — in many applications, for example, in hospitals when the staff needs to verify whether an asset has been through a disinfectant room after being in a patient room. Tracking can also be combined with sensors, such as a temperature sensor connected in the tag. In that case, you can’t only determine where the sensor has been, but also see whether the asset has maintained or been stored at the right temperatures. For example, this can be used to capture information about the conditions the food is subjected to on the journey from the field to the grocer.
Protect assets: Attaching RTLS tags to assets provides alerts when an asset moves closer to the perimeter of the facility or moves out of the facility. This kind of application is applicable for almost every business or government facility.
Monitor usage of assets: Attaching RTLS tags to critical assets provides security officers the ability to track their movement and locate them at anytime. Tags also enable security to take corrective actions to ensure compliance with regulations when an unauthorized attempt to move that asset within a facility occurs, or even when the asset is taken from the facility. Furthermore, the storage of dangerous goods, such as explosives or weapons, can be made more secure. In this case, however, these goods can be additionally protected to ensure that only authorized personnel can be permitted to be within range of these assets. Alarms or other types of signals could be provided when the critical assets move without being close to the tags worn by the authorized personnel.
Trace assets: An RTLS can help achieve the level of traceability, as needed by consumers, businesses, or policy makers. With an RTLS tag, you can record the location of a container or an item along with the time when it was seen at that location on the tag itself. This way, when a recall is issued for a specific item, it’s easy to track the suspected path.
Improve asset utilization: Analysis of equipment locations and length of time spent in particular locations can lead to an understanding of how often various pieces of equipment are used, where they’re most often used, and what they’re used for. The results of these analyses can help in deciding how much equipment is required, where to put the equipment to enable optimum work usage, and when to schedule equipment maintenance.
Manage and plan inventory: One way to keep track of inventory is to subtract how many items you’ve used from how many you’ve ordered. The remaining difference is what you have in inventory. Whether because of human error, delay in entering information in inventory management systems, scrap, or stolen goods, data from books for inventory counting is rarely 100-percent accurate. Many organizations prefer to use a physical count of their materials. This is a great way to manage inventory if you’re a handmade violin manufacturer and you make one violin a week. If, however, you’re an equipment rental company dealing with tens of thousands of pieces of equipment and have constant turnaround, a physical count might not be so simple. Or, imagine if you had over 100 different types of products and maintaining optimal inventory levels for different types of products was an essential part of your business. Attaching tags to assets can help you in inventory reorder calculations, warehouse management, and some degree of inbound material planning.
Tagging people
You can benefit from tagging people in many ways. By tagging people, you can locate them on demand, protect and guide them, monitor their movement or activities, and provide emergency response. Here are some real-world examples of what you can accomplish by tagging people:
Locate people on demand: In hospitals, tagging babies and children enables staff to locate them within the hospital and generate appropriate alerts should the child be abducted or otherwise go missing.
Protect and track people: One of the highest risks within a senior care or assisted-living environment is a resident escape. A resident escape can cause harm to the resident and can be an enormous liability for the facility. An RTLS can help in resident tracking, and when a protected resident attempts to exit a facility, doors can be locked automatically and appropriate alerts can be triggered.
Monitor people’s movements: Many unique challenges can be solved by monitoring people’s movements. For example, by monitoring security guards, an RTLS can help ensure that facility surveillance isn’t hampered by a security guard sleeping on duty. Another example is in a mall or a city where security forces can be dispatched on detection of an unusual event, such as large number of people in smaller areas.
Provide emergency response: By making use of push-button tags, the tag wearer can summon assistance when faced with an emergency situation. This can be used by teachers or students in schools, nurses or patients in hospitals, lone workers working in hazardous environments, or police officers requesting other police officers in man-down events.
Manage evacuations: In events requiring evacuation, such as a fire, emergency first response can determine who’s evacuated and who hasn’t been evacuated.
Police restricted areas: By attaching the tags to criminals, employees, or visitors, areas that are restricted can be better policed and access can be allowed or disallowed based on privilege levels. Furthermore, at any given time, security officers can monitor the whereabouts of everybody and take appropriate actions when necessary.
Improve workflow: By analyzing trends of the utilization of assets and how workers and visitors spend their time, significant improvements in work practices and methodologies can be achieved. For example, in an emergency department, you can determine the key changes in equipment, staff, or processes required to decrease the time from the decision to admit a patient to the physical placement of the patient in an inpatient bed.
Improve customer service and response times: By analyzing trends of time the visitors are forced to spend at specific areas, appropriate customer service agents can be added at appropriate locations in the facilities. By rearranging the customer service agent count, the facilities can ensure that optimum levels of customer service are provided throughout the facility.
Improve structure of facilities: By analyzing trends of visitor dwell times, the facilities can be better structured for maximizing the facility’s purpose. For example, in a painting exhibition, if some parts receive dwell times significantly more than others, the temporary structures can be rearranged to improve the flow of traffic through the exhibition.
Putting an RTLS to Work
Because RTLS technology has the potential to provide radical improvement and advancements to efficiency beyond the ordinary scope of improvement, many sectors are currently using an RTLS. The following sections describe just a handful of these sectors and how they’re using an RTLS.
Healthcare
Hospitals, clinics, nursing homes, and other healthcare providers are looking at an RTLS to improve the bottom line and the care delivery potential. An RTLS can help
Locate healthcare personnel. Quickly locating healthcare personnel is critical when a patient or staff member summons assistance during an emergency medical situation.
Track the movements of patients. Tracking the physical movement of patients helps ensure patient safety. This is especially important for the safety and security of Alzheimer’s and dementia patients. An RTLS can alert staff and give the location of a resident who wanders too far from a designated area or tries to leave the premises (known as an elopement) as well as when a patient passes too close to an entrance or an exit. Another example is infant abduction prevention in which an RTLS enables immediate infant location tracking, mother/baby matching, automatic door locking, and so on.
Improve throughput management. Tracking patient flows for throughput management can potentially address problems, such as extended waiting times, overcrowding and boarding in the emergency department (ED) and post-anesthesia care units (PACUs), bumped and late surgeries, and lack of available routine and intensive care unit (ICU) beds. For example, using an RTLS reduces waiting and transfer time for patients because it may require less time to find staff or a wheelchair to transport the patient. Using an RTLS also enables close synchronization of housekeeping with patient discharge, enabling a faster bed turnaround rate.
Track equipment. Tracking expensive or shared equipment, such as infusion pumps, saves time and helps staff to more easily find equipment that’s recalled or due for preventive maintenance. Tracking equipment more quickly also improves inventory control, which reduces rental and purchasing costs.
Improve productivity of nurses and caregivers. Because an RTLS can automate many tasks on the basis of location and in real time, it can reduce many mundane and repetitive tasks that nurses and caregivers encounter on a daily basis. For example, a nurse or a caregiver typically has to go into a room to cancel a call or trip a registry light manually — which often involves in tripping over extra chairs, patient visitors, and other equipment — but an RTLS can perform the same task automatically, simply by recognizing the nurse’s presence in the room.
Improve patient/family satisfaction. An RTLS can improve a patient’s family satisfaction by increasing their awareness of patient location.
Improve staff safety. Nurses face acts of violence, threats to safety, exposure to abusive language, and aggressive behavior from staff, patients, and visitors. An RTLS can become an important part of the solution by giving nurses a tool to request emergency assistance during a crisis.
Track personnel. Tracking personnel alleviates security concerns by monitoring unauthorized access in restricted areas.
An RTLS is important for healthcare management personnel, other healthcare personnel, managed services providers, and those who are looking to solve complex issues in their respective healthcare organization.
Manufacturing
Manufacturers are always trying to do more with less. Manufacturers use RTLS technology to
Find products. Often valuable production time is lost because the pallet with the right materials isn’t where it should be and a search must be carried out. Armed with an RTLS and status information, manufacturers can reduce search time, which improves productivity and material flow while ensuring higher asset utilization.
Track progress. At any given time, a manufacturing plant can contain thousands of products in various states of assembly. An RTLS can instantly identify what still needs to be done to each product. Historically, an alternative to having an RTLS was to have workers use bar codes or paper to track the stage of the product. One major problem with such an approach is that many employees forget to scan or enter the data.
Trace parts. Using an RTLS enables manufacturers to trace parts, which can be used for recalls or investigations.
Track production items. Many manufacturing processes are lengthy and have hundreds of steps that take place often in several different factory buildings. Being able to track production items accurately across a plant and link the location to the manufacturing stage results in fewer errors and improved workflow.
Find tools. Manufacturers often need to tag shared tools so that they find them when needed without slowing production.
Locate works in process. A work order is an order received by an organization from a customer or a client or is created internally within the organization. In a manufacturing environment, a work order is converted from a sales order to show that work will begin on the manufacturing, building, or engineering of the products requested by the customer. Tagging work orders can enable you to locate at what stage of manufacturing that specific work order is. A supervisor can also use some LEDs or other indicators on tags to communicate urgency levels for specific work orders.
The interaction between workers, machines, tools, work areas, and the products they’re manufacturing has a significant location component. Whether in automotive, aerospace, computers, semi-conductor, or discrete manufacturing, RTLS technology can deliver improved quality at a reduced cost to make the manufacturing operations more competitive. An RTLS provides context and location-aware support to workers improving quality by reducing errors (and therefore reducing the cost of fixing them) and increasing efficiency by reducing process execution times. The devices and tools used by the workers can be made to know where they are and in which relation they stand to the production materials.
Automotive
The automotive industry has been one of the early adopters of RTLS technology. An RTLS helps in material logistics, vehicle management, and during manufacturing. Here are just a few tasks the auto industry accomplishes by using RTLS technology:
Reduce the cost of quality: Auto makers reduce the cost of quality by preventing a vehicle with quality problems from being shipped while still shipping other vehicles. This can be achieved by using an RTLS to track information of finished vehicles from pre-delivery to shipment.
Manage supplies: An RTLS locates critical tools and test equipment, and uses call buttons for replenishment of supplies.
Manage vehicles: An RTLS reduces the average dwell times for finding vehicles by improving in-line/off-line vehicle tracking, vehicle (yard) management, dealer lots, and resale auction lots.
Aerospace and defense
Significant opportunities exist for an RTLS to help aerospace and defense. By using an RTLS, you can
Manage supplies. An RTLS locates critical tools and test equipment, and uses call buttons for replenishment of supplies.
Fleet maintenance management. An RTLS can be used to manage check-in and check-out processes.
Track maintenance dates. An RTLS is flexible enough to track maintenance dates for critical support equipment and trailers across thousands of feet of open flight line or even while they move through metal cages in a warehouse.
Speed throughput. An RTLS can perform spot locating and auditing capabilities to speed up throughput at critical transit points.
Research and development
