RTLS For Dummies - Ajay Malik - E-Book

RTLS For Dummies E-Book

Ajay Malik

0,0
23,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Select, invest in, and deploy a Real Time Location System

Is your business ready for an RTLS? This friendly, hands-on guide shows you how to understand and implement this cutting-edge technology, explaining RTLS methodologies in plain English. From the initial deployment to monitoring to determining Return on Investment, you'll see how to successfully meet your needs, ensure data accuracy, and sustain your system.

  • Get your bearings — understand what RTLS does and its various methodologies, determine your needs, and select the right system
  • Prepare for installation — outline your goals, plan your applications, assess your site, select the right tag technology, and conduct a pilot test
  • Implement RTLS in your world — know how to train your staff, set expectations, set up monitoring, and assess whether the RTLS is working as desired
  • Deal with design issues — learn the most common pitfalls of RTLS implementation and how to handle them
  • Take the technology tour — use RTLS to locate at choke points, room level, presence, by association, and precisely
  • Monitor and secure your RTLS — verify and fine-tune your system, establish performance metrics, and manage security issues and vulnerabilities such as network attacks

Open the book and find:

  • An overview of RTLS and its uses
  • Explanations of underlying technologies
  • How to integrate RTLS into your other business applications
  • Comparative detail on technologies that enable different types of locating
  • Tips for evaluating RTLS vendors
  • Essential RTLS resources and references
  • Tips for getting the most out of the batteries used in tags
  • Privacy issues related to RTLS

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB
MOBI

Seitenzahl: 451

Veröffentlichungsjahr: 2009

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



®

Table of Contents

Introduction

About This Book

Conventions Used in This Book

Foolish Assumptions

How This Book Is Organized

Part I: Getting Your Bearings in RTLS

Part II: Implementing RTLS in Your World

Part III: Tag-A-Palooza: RTLS Technology Tour

Part IV: Monitoring Performance and Securing RTLS

Part V: The Part of Tens

Part VI: Appendixes

Icons Used in This Book

Where to Go from Here

Part I: Getting Your Bearings in RTLS

Chapter 1: Getting to Know RTLS

Understanding How an RTLS Works

Using tags to locate people and assets

Adding value with bells and whistles

Knowing the location models

Knowing the underlying technologies

Recognizing the Need for an RTLS

Tagging assets

Tagging people

Putting an RTLS to Work

Healthcare

Manufacturing

Automotive

Aerospace and defense

Research and development

Retail

Mining

Visitor information

Industry conferences, amusement parks, and temporary setups

Public safety

Education

Chapter 2: Knowing the Many Parts of an RTLS

Starting with the All-Important Tag

Characterizing tags

Considering tag ergonomics

Recognizing the importance of a tag battery

Interpreting tag enclosure ratings

Tag environmental capabilities

Supporting telemetry

Connecting tags to assets

Programming tags

Increasing tag security

Working on tag serviceability

Making Sense of Location Sensors

Inspecting the Location Engine

Ranging techniques

Exploring the position estimation algorithm

Applying the earlier techniques to compute tag locations

Exploring the Technologies

Understanding Middleware

Understanding RTLS Applications

Chapter 3: Choosing the Right RTLS

Weighing Your Options

Knowing Your Objectives

Scope of the RTLS application

Responsiveness

Accuracy

Size

Life expectancy

Tolerance

Scalability

Assessing Deployment Needs

Environmental suitability

Impact to an existing infrastructure

Leverage of an existing infrastructure

Ease of deployment

Installation effort

Deployment tools

Estimating Maintenance Requirements

Knowing Your Integration Needs

Measuring Return on Investment

Considering Value Adds

Tag value adds

Application bells and whistles

Evaluating Security

Tracking Performance

Requiring a Standards-Based Solution

Ensuring Eco-Friendliness

Making Your Choice

Part II: Implementing RTLS in Your World

Chapter 4: Planning for a Successful Implementation

Visualizing the Goals

Identifying your users

Addressing how users will use the application

Knowing where users will work with the application

Asking what makes users happy

Supporting your help staff

Knowing what you don’t want

Understanding the Business Constraints

Working within budget and staffing constraints

Accommodating the technical landscape

Offsetting environmental conditions

Understanding business processes

Checking out your suppliers, clients, and competitors

Enlisting Support

Defining the Scope of Your RTLS Implementation

Anticipating the Future

Understanding the Technology

Creating an Implementation Plan

Chapter 5: Preparing for Installation

Adopting a Test Model

Selecting Technologies

Interviewing Vendors

Testing the Waters with the Prepilot

Conducting the Pilot

Identifying the tasks and resources

Getting ready and doing the rollout

Conducting the pilot testing

Chapter 6: Monitoring RTLS

Monitoring RTLS Applications

Knowing How to Monitor Your RTLS

Recognizing the benefits of proactive monitoring

Using reactive monitoring

Encouraging end users to participate

Establishing baselines

Chapter 7: Integrating RTLS

Understanding Integration

Streamlining inefficient procedures

Eliminating the cost of managing redundant data

Adding new business value

Increasing scalability

Unifying device management

Knowing the Requirements for Integrating an RTLS

Performing an RTLS Integration

Step 1: Perform an integration audit

Step 2: Define an integration implementation strategy

Part III: Tag-A-Palooza: RTLS Technology Tour

Chapter 8: Locating at Choke Points

Making Choke Points

Keeping track of tags with interrogators

Locating at choke points with exciters

Reading location with receivers

Locating at choke points using precision locating systems

Putting Choke Points to Work

Knowing the best uses for choke points

Knowing what choke points can’t do

Exploring the Underlying Technologies

Passive low frequency (passive LF)

Active low frequency (active LF)

RuBee

Passive high frequency (passive HF)

Passive ultra high frequency (passive UHF)

Semipassive ultra high frequency (semipassive UHF)

Surface acoustic wave (SAW)

Chapter 9: Locating at Room Level

Understanding the Methods of Locating at Room Level

Applying Room-Level Locating

Increasing healthcare efficiency

Staying safe at school

Knowing the Underlying Technologies

Using infrared

Understanding ultrasound

Understanding powerline positioning

Chapter 10: Precision Locating with Wide Area Coverage

Understanding Wide Area Coverage

Exploring the Underlying Technologies

Using satellite navigation systems

Locating with cellular

Working with WiMAX

Understanding TV-signal positioning

Chapter 11: Precision Locating with Local Area Coverage

Understanding Precision

Understanding the Underlying Technologies

Estimating position with dead reckoning

Using Wi-Fi for an RTLS

Locating with Bluetooth

Locating using passive RFID

Using active RFID

Using ultra-wideband (UWB)

Using ZigBee

Using computer vision

Using acoustic locating systems

Using building illumination

Chapter 12: Presence-Based Locating

Detecting Presence

Powerline positioning

Wi-Fi

Building illumination

Mobile locating

Using Presence-Based Applications

Chapter 13: Locating by Associating

Knowing When to Use Associations

Understanding the Underlying Technologies

Using Locating by Associating

Security applications

Safety applications

Analytic applications

Social-networking applications

Part IV: Monitoring Performance and Securing RTLS

Chapter 14: Measuring RTLS Performance

Defining the Metrics

Measuring the End-User Experience

Perceived accuracy

Perceived response time

Consistency

Tripping and training

Process intrusion

Gauging Operational Excellency

Establishing Application Objectives

Staff emergency response

Asset locating

Chapter 15: RTLS Vulnerabilities

Evaluating Security Threats

Availability loss

Integrity loss

Confidentiality loss

Knowing Your Options: Countermeasures

Catching the Attacks

Evaluating the Real Security Challenge

Part V: The Part of Tens

Chapter 16: Ten RTLS Pitfalls

Failing to Determine Compatibility

Creating an Abstract Business Case

Underestimating the Integration Cost

Estimating Location Sensor Deployment Unrealistically

Performing Inadequate Testing with Different Types of Assets

Forgetting about the Business Process

Foregoing Enterprise-Wide Coverage

Underestimating Maintenance Efforts

Planning for an Overzealous 1.0

Failing to Engage Privacy Groups

Chapter 17: Ten Tips for Selecting an RTLS Vendor

Seeking Critical Mass in an RTLS

Selecting a Strategic Vendor

Checking End User Sentiment

Knowing a Vendor’s Technological Focus

Knowing the Integration and Interoperability Potential

Asking about Developing Custom Solutions

Ensuring Smooth Operations with Site Surveys

Developing a Proof of Concept

Knowing the Shipping Volumes for RTLS Tags

Asking for Remote Troubleshooting and Updates

Chapter 18: Ten Best Ways to Use Batteries

Maximizing Battery Life

Understanding That Not All Batteries Are the Same

Disposing of Used Batteries

Knowing the Importance of Cell Casing

Preventing Sudden or Premature Battery Death

Interpreting the Low-Battery Indicator

Ensuring Battery Safety

Preventing Unauthorized Battery Use

Storing Batteries

Avoiding Bad Charging

Part VI: Appendixes

Appendix A: RTLS Resources and References

International Organization for Standardization (ISO)

IEEE

EPCglobal

AIM Global

Ubiquitous ID Center

Wi-Fi Alliance

ZigBee Alliance

3GPP

CEN

IEC

AIDC 100

Bluetooth SIG

RFID Tribe

RFID Journal

RFID Monthly

RFID Product News

Active Badge System

Active BAT Location System

HiBall Tracking System

RADAR

LANDMARC

Cricket

NearMe

GLONASS

Galileo

Beidou

Appendix B: Privacy Issues

Guarding against unauthorized tag readings

Regulating the use of data

Appendix C: Realizing the Benefits of an RTLS

Direct (hard) RTLS benefits

Indirect RTLS benefits

Soft RTLS benefits

Quantifiable RTLS soft benefits

Tips for creating reports

Capturing risks to ROI

RTLS For Dummies®

by Ajay Malik

RTLS For Dummies®

Published byWiley Publishing, Inc.111 River St.Hoboken, NJ 07030-5774www.wiley.com

Copyright © 2009 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

For technical support, please visit www.wiley.com/techsupport.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Library of Congress Control Number: 2009924129

ISBN: 978-0-470-39868-5

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

About the Author

Ajay Malik, a computer science graduate from IIT Roorkee (one of the most prestigious engineering universities in India), has over 20 patents issued and pending, many in the field of RTLS. He’s been working in the field of RFID and RTLS for more than five years.

He works with a wide range of customers, vendors, and integrators for RTLS solutions in different market segments, such as health care, homeland security, education, industrial, and so on. Not only has he been involved in architecting and creating effective RTLS solutions by interacting with customers, but he also has been leading engineering teams to deliver components or complete RTLS solutions. He championed Real Time Location System, supporting multiple technologies at his tenure in Motorola and is currently working as CTO at RF Technologies, a company that has been involved with RTLS solutions for more than 21 years.

Dedication

To the three great women and a little man who define me every day — my mother Prabha, my wife Ritu, my daughter Shanaya, and my little son Aarush.

And, to my father, whom I could not get to tell all the things I had to say. He passed away too soon.

Author’s Acknowledgments

Let me take this opportunity to thank my family, friends, agent, and people at Wiley Publishing, Inc., whose support, dedication, and talent combined to make this book happen.

I want to thank my agent Matt Wagner, the best possible agent an aspiring book writer can have. He not only works hard to make things happen for you, but is also kind, encouraging, and very trustworthy. His sincere advice and efforts helped in getting this book underway.

At Wiley Publishing, I want to thank Katie Feltman and Jean Nelson for their encouragement and their ongoing support every step of the way. They made sure that the project stayed on course and made it into production so that all the talented folks on the Composition Services team could create this great final product. I also want to thank Colleen Totz Diamond, Kathy Simpson, and Jennifer Riggs for their manuscript reviews and updates and their invaluable input and suggestions on how best to present the content.

This book would not have been possible without the constant support from my wife, who constantly took over my responsibilities at home. She ensured that I had time available for this book. And my kids, who at the young ages of four and two somehow understood that “Daddy is busy.” I also want to thank my brother Dr. Sanjay Malik, sister Alka Chawla, and friends Alan O’Brien, Mahender Vangati, Sarosh Vesuna, and Sameer Kanagala, who encouraged me all the time.

And, this acknowledgement section would be incomplete if I didn’t mention Anthony Bartolo, Sujai Hajela, and Ray Martino, who introduced me to the world of RTLS; Glenn Jonas, CEO RF Technologies, Inc., who gave me the opportunity to try more in RTLS; and Terje “Terry” Aasen, Skip Speaks, Matt Perkins, Jarie Bolander, and Reik Read for providing me their views and inputs on different RTLS technologies. I sincerely thank them.

Publisher’s Acknowledgments

We’re proud of this book; please send us your comments through our online registration form located at www.dummies.com/register/.

Some of the people who helped bring this book to market include the following:

Acquisitions, Editorial, and Media Development

Project Editor: Jean Nelson

Senior Acquisitions Editor: Katie Feltman

Copy Editors: Jennifer Riggs, Kathy Simpson

Technical Editor: Sameer Kanagala

Editorial Manager: Kevin Kirschner

Media Development Project Manager: Laura Moss-Hollister

Media Development Assistant Project Manager: Jenny Swisher

Media Development Assistant Producers: Angela Denny, Josh Frank, Shawn Patrick, Kit Malone

Editorial Assistant: Amanda Foxworth

Sr. Editorial Assistant: Cherie Case

Cartoons: Rich Tennant (www.the5thwave.com)

Composition Services

Project Coordinator: Katie Key

Layout and Graphics: Shawn Frazier, Sarah Philippart, Christin Swinford, Christine Williams

Proofreader: Dwight Ramsey

Indexer: Potomac Indexing, LLC

Special HelpColleen Totz Diamond

Publishing and Editorial for Technology Dummies

Richard Swadley, Vice President and Executive Group Publisher

Andy Cummings, Vice President and Publisher

Mary Bednarek, Executive Acquisitions Director

Mary C. Corder, Editorial Director

Publishing for Consumer Dummies

Diane Graves Steele, Vice President and Publisher

Composition Services

Gerry Fahey, Vice President of Production Services

Debbie Stailey, Director of Composition Services

Part I

Getting Your Bearings in RTLS

In this part . . .

With all the buzz in recent years around RFID and then the success of GPS, the concept that you can locate anything or anybody automatically in real time is catching everyone’s attention. In Chapter 1, I give you some examples of where an RTLS is, or could be, used. An RTLS can be the solution for applications in which items or personnel need to be located within a given area — whether they’re moving or stationary. The examples I give get you thinking. The rest is up to you.

To get a good understanding of any RTLS, you have to know what it’s made of. That’s where Chapter 2 comes in, with the components, technologies, and methodologies of an RTLS. And because no single technology has been completely up to the task of providing an RTLS in all environments under all conditions, Chapter 3 lays down various things you might want to weigh before making your choice. From this humble beginning, it’s a quick trip to total RTLS mastery.

Chapter 1

Getting to Know RTLS

In This Chapter

Figuring out how an RTLS works

Discovering the need for an RTLS

Applying an RTLS to various markets

A Real Time Location System (RTLS) enables you to find, track, manage, analyze, leverage, and otherwise use the information regarding where assets or people are located. Imagine being able to track people and assets at a local, national, or even global level. Retailers, military, law enforcement, emergency first response, healthcare, education, almost every business — even home life — can all benefit, or already do, by using RTLS technology. This chapter provides you with an overview of the RTLS — what it is and how it works — and describes who is using it and why.

Understanding How an RTLS Works

Location depicts or illustrates where something is well, located. With a Real Time Location System, or RTLS, you locate and track people and assets by associating a tag, a small wireless device, with each person or asset. Assets are items like laptops, projectors, equipment, and machinery. For example, you may attach a tag to office equipment (an asset) so that you can locate it within your office building; or you may carry an ID badge (a tag), and someone can locate you within the building.

Here are the parts of an RTLS, as shown in Figure 1-1:

Tags: A mobile device that’s enabled with location technology. A tag is usually small enough that it can be attached to assets or carried by people.

Location sensors: Devices that usually have a known position. You use the location sensors to locate the tags that are affixed to the people and assets you want to track. For example, in the Global Positioning System (GPS), the satellites placed into orbit by the U.S. Department of Defense are the location sensors, and the location of tags (GPS receivers, such as the ones used in cars) is determined with signals from these satellites.

Location engine: The software that communicates with tags and locationsensors to determine the location of the tags. The location engine reports this information to middleware and applications.

Middleware: The software that resides among the pure RTLS technology components (the tags, the location sensors, and the location engine) and the business applications capable of exploiting the value of the technology. You can think of middleware as the plumbing. Not only the specific RTLS application but also all other business applications used by the enterprise can be enriched with real-time location information.

Application: The application (also known as application software,end-user application, or software application) is the software that interacts with the RTLS middleware and does work users are directly interested in. For example, an application that’s always checking the location of kids in an entertainment park and then providing a Web page for parents to check the location of their kids.

The location engine, middleware, and application software may run on the same computer or on different ones. These applications also usually have a client interface such as a browser or PDA interface.

Chapter 2 covers the parts of an RTLS and how they work in much more detail. The following sections provide a more general overview of an RTLS to get you started.

Figure 1-1: The basic parts that comprise an RTLS.

Using tags to locate people and assets

To locate people and assets in real time, an RTLS continually monitors the tag locations. Then the RTLS passes the location information to an application that makes use of the data. Here are just a few ways you can use RTLS tags to locate people and assets:

Attach tags to your company laptops so that you can get alerts when the laptops leave the building without the authorized owner.

Attach tags to your school projectors so that you can track which classes have the projector.

Build a tag right into the machinery so that you can track its location in the factory.

Require people to carry tags, such as

• Badges

• Wristbands

• Pendants

• Ankle bands

• Belt clips

Build tags into items that people already carry, such as cell phones.

Adding value with bells and whistles

Besides the technology that enables the location engine to locate the tags, tags often have bells and whistles that add tremendous value to the RTLS applications. These extra features are described in the following sections.

Push buttons

Tags with push buttons (or call buttons) can be used in multiple ways. One of the most common uses is as panic buttons that can be carried by people for summoning emergency response. Whenever the person presses the panic button, the location engine provides the alert and the location of the person pressing the button. Another use of push buttons in tags is when connected to assets, people can use the button to indicate status, such as Asset in Use, Work Order Completed, or Asset in Need of Repair.

Voice to voice

If a tag has voice-to-voice capability, you can use it to communicate with the person carrying the tag based on her location. For example, you can communicate location-based voice messages to a tourist in a museum, a visitor in an entertainment park, or a person trapped in any number of places.

Buzzers, LEDs, LCD screens, and vibrators

You can use buzzers, LEDs, or LCD screens on tags to communicate with the person carrying the tag, to identify or locate an asset, and to communicate with the person who has the asset or is expected to check the asset. Here’s how you can use buzzers, LEDs, or LCD screens on tags:

Buzzers can emit sounds, preprogrammed voice messages, ringtones, or live messages to give the tag carrier information or alerts.

LEDs can provide the tag carrier with messages based on LED colors and blink patterns.

LCD screens can display text messages for the tag carrier.

Sensors

You can incorporate many sensors in the tags to gain information about the environment, the status of the person carrying tag, or the asset that has the tag attached to it. Here are some examples of how sensors can help you work more effectively:

Motion sensors in the tag can indicate whether the person carrying tag is moving.

A temperature sensor attached to a painting can indicate whether that painting is in optimum thermal conditions.

A carbon monoxide sensor can indicate whether the person carrying the tag is in a safe environment.

Connectors

Tags can also have connectors that connect to various assets to communicate specific details about the asset or its operation state. For example, the tag can indicate not only where the asset is but also whether the asset is powered on. You also can use the tag to turn the asset on or off.

Writeable memory

Tags can have writeable memory that can be used to store some user data for that asset, such as the name of the equipment renting company that placed the equipment.

Knowing the location models

When you want to know the physical location of an asset or a person, depending on your needs, you may want to know the absolute position, relative position, or symbolic position:

Absolute position is the absolute coordinates, such as latitude, longitude,and altitude. For example, the Taj Mahal is situated at N27° 10’ 0 N, E78° 2’ 60, and the Washington Monument is at N 48.629283 and W –121.831533 with peak elevation of 4,455 feet (1,357.88 meters) above sea level.

Relative position is the distance in three dimensions with reference to a fixed point. For example, the security guard is standing at 10 meters south of the main entrance of the building.

Symbolic position implies presence in a specific area (for example, the doctor is in the operation theater room) or presence near something or someone (for example, the child is near her mom).

To satisfy the needs of various applications, whether they need precise location or room-level location, various RTLS systems report the location of tags in one of the following ways (see Figure 1-2):

Presence-based locating: In this model, the tag location is returned as to whether it’s present in a given area. For example, if your boss is carrying a tag, you can know whether he’s in the building.

Locating at room level: In this model, the tag location is returned as presence in a specific room. For example, if a schoolteacher presses the panic button to summon security assistance in the event of a classroom emergency, the location engine reports the teacher’s exact classroom to the security guard.

Locating at sub-room level: In this model, the tag location is returned as presence in a specific part of the room. For example, in hospital rooms that accommodate multiple patients, such as dual-bed rooms, if a nurse is carrying a tag, the location engine can report how much time the nurse spent by each patient’s side.

Locating at choke points: In this model, as shown in Figure 1-2, the tag location is returned by a specific choke point (an entry or exit point, such as a door; it’s assumed that people or assets move from one area to another through these choke points). By monitoring the time a tag was seen at a specific choke point, you can also determine the direction the tag is moving. In other words, you can determine whether the tag is present inside or outside an area and whether it’s entering or leaving the predetermined area. For example, if all visitors to a facility are required to carry tags, you can determine on which floor or building the visitors are located.

Figure 1-2: RTLS location models.

Locating by associating: In this model, tag location is returned as proximity with respect to another tag (see Figure 1-2). For example, if each patient in a clinic wears a tag and each IVF pump has a tag, the location of the IVF pump is returned as present next to a specific patient. The billing department can use this data, which indicates how long the IVF pump was in use with any patient, to calculate invoice amounts. Or maybe you need to know whether the owner of a specific laptop is actually next to that laptop. Many securities, financial, or other location-based services can benefit by knowing this type of information.

Locating precisely: In this model, the tag location is pinpointed precisely. You can pinpoint the exact tag location on the map of the world and/or in a given building. The location is reported as absolute or relative position as described earlier. Locating precisely is the exact form of RTLS, and depending upon the accuracy of reporting, the precise location information can be extrapolated to room level, sub-room level, association level, presence level, and choke point.

Knowing the underlying technologies

Many systems and technologies have been developed over the years by researchers and commercial companies to provide the location of people, equipment, and other assets. Today, an RTLS can be achieved using light, camera vision, infrared, sound, ultrasound, Bluetooth, Wi-Fi, radio frequency identification (RFID), ZigBee, Ultra Wideband, GPS, Cellular, and many more technologies. These technologies are discussed in detail in Part III.

Different technologies use different approaches, and each approach solves a slightly different problem or supports different applications. These systems vary in many parameters, such as the physical phenomena used for location determination, the tag’s form factor and location sensors, power requirements, range, indoor versus outdoor applicability, and time and space resolution. Some technologies determine location at room level, some can determine presence only, and some can determine location precisely. Some technologies work well outdoors whereas others are tailor-made for indoors. Some work well in an office environment, and others work well in an industrial environment. Some need additional location sensors, and some leverage existing infrastructures, such as electricity or Wi-Fi in the building.

In some systems, the tag being located actually computes its own position (also known as tag self-positioning); in some, the software that locates the tag is external to the tag (also known as tag remote-positioning); and in others, the tag position is determined by recognizing the location of a nearby tag (also known as tag indirect-positioning).

But all RTLS technologies share the common goal of computing the location of assets and people as accurately as needed by the application, and they all succeed in their own way.

Recognizing the Need for an RTLS

For the past few decades, the research, development, and standardization of radio frequency identification (RFID), Wi-Fi, and many other wireless technologies along with the success of GPS as a consumer navigation application have contributed to a dramatic increase in the number and type of users requiring the needs for location identification.

In addition to the developments in technologies that are making it increasingly feasible to identify and locate any thing or individual anywhere in real time, it’s the pursuit of what, how many, and where in real time that’s driving the need for RTLS. Whether you’re talking about businesses, consumers, or public sector markets, the need for an RTLS is arising from the inherent need for just-in-time actionable information — the right information at the right time and location — which is a fundamental concept to make effective decisions and take immediate action:

Business markets: The need for an RTLS is being driven by an ever more mobile workforce, the need for continuous information about worker and visitor safety, the economic pressures for operational efficiencies, aspirations to increase profit margins, the need to handle recalls effectively, demanding customers, and the desire for enhanced customer experience.

Customers are becoming less tolerant in accepting deficient products or services due to the wide range of choices available. For example, if a company can’t track its shipments in real time, it likely can’t deliver the kind of customer service its competitors offer. With an RTLS, customers can pick up the phone or check a Web site and find out instantly where their goods are at any given moment.

Consumer markets: Concern with safety and security, need of location knowledge for social networking, aging population, and need for Web 3.0 are driving the need of an RTLS. People want to know immediately where children and seniors are located. Consumers and regulatory bodies want the ability to track the food from the moment it’s picked in the field to the time it shows up at the grocery store so that they can pinpoint the source of accidental or malicious contamination of food and issue appropriate recalls. The youth and singles markets want to use location knowledge in the social network, and people expect a lot of location-based information from their personal navigation systems and when they surf the Web.

Public sector: The concerns about terrorism and continued breakdowns in emergency communications during major disasters have opened the doors to RTLS applications as complements, alternatives, or backups to existing systems.

The applications that are driving the needs for an RTLS vary depending on whether you’re talking about business, consumer, or public sector markets, the needs of individual segments within those markets, and the particulars of the targeted geographic region.

Tagging assets

Tagging is the act of affixing a tag to an asset or person. Tagging assets enables you to locate assets on demand, track and protect them, monitor their usage, trace them, and manage and plan inventory. Here are some examples of what you can accomplish by tagging assets:

Locate assets on demand: On large sites, equipment easily goes missing. People forget to return it, and a lot of equipment gets moved and isn’t returned to its original location. If the equipment is tagged, the RTLS can determine the equipment location. Such an application is especially useful in environments like hospitals where it’s important to locate certain equipment quickly in the event of an emergency. Similarly, equipment requiring predictive or preventive maintenance or pieces of equipment for which a repair order or a recall has been issued can be located easily.

Track assets: Sometimes you need to know not only the current location of an asset but also where it’s been. This information is useful — or even critical — in many applications, for example, in hospitals when the staff needs to verify whether an asset has been through a disinfectant room after being in a patient room. Tracking can also be combined with sensors, such as a temperature sensor connected in the tag. In that case, you can’t only determine where the sensor has been, but also see whether the asset has maintained or been stored at the right temperatures. For example, this can be used to capture information about the conditions the food is subjected to on the journey from the field to the grocer.

Protect assets: Attaching RTLS tags to assets provides alerts when an asset moves closer to the perimeter of the facility or moves out of the facility. This kind of application is applicable for almost every business or government facility.

Monitor usage of assets: Attaching RTLS tags to critical assets provides security officers the ability to track their movement and locate them at anytime. Tags also enable security to take corrective actions to ensure compliance with regulations when an unauthorized attempt to move that asset within a facility occurs, or even when the asset is taken from the facility. Furthermore, the storage of dangerous goods, such as explosives or weapons, can be made more secure. In this case, however, these goods can be additionally protected to ensure that only authorized personnel can be permitted to be within range of these assets. Alarms or other types of signals could be provided when the critical assets move without being close to the tags worn by the authorized personnel.

Trace assets: An RTLS can help achieve the level of traceability, as needed by consumers, businesses, or policy makers. With an RTLS tag, you can record the location of a container or an item along with the time when it was seen at that location on the tag itself. This way, when a recall is issued for a specific item, it’s easy to track the suspected path.

Improve asset utilization: Analysis of equipment locations and length of time spent in particular locations can lead to an understanding of how often various pieces of equipment are used, where they’re most often used, and what they’re used for. The results of these analyses can help in deciding how much equipment is required, where to put the equipment to enable optimum work usage, and when to schedule equipment maintenance.

Manage and plan inventory: One way to keep track of inventory is to subtract how many items you’ve used from how many you’ve ordered. The remaining difference is what you have in inventory. Whether because of human error, delay in entering information in inventory management systems, scrap, or stolen goods, data from books for inventory counting is rarely 100-percent accurate. Many organizations prefer to use a physical count of their materials. This is a great way to manage inventory if you’re a handmade violin manufacturer and you make one violin a week. If, however, you’re an equipment rental company dealing with tens of thousands of pieces of equipment and have constant turnaround, a physical count might not be so simple. Or, imagine if you had over 100 different types of products and maintaining optimal inventory levels for different types of products was an essential part of your business. Attaching tags to assets can help you in inventory reorder calculations, warehouse management, and some degree of inbound material planning.

Tagging people

You can benefit from tagging people in many ways. By tagging people, you can locate them on demand, protect and guide them, monitor their movement or activities, and provide emergency response. Here are some real-world examples of what you can accomplish by tagging people:

Locate people on demand: In hospitals, tagging babies and children enables staff to locate them within the hospital and generate appropriate alerts should the child be abducted or otherwise go missing.

Protect and track people: One of the highest risks within a senior care or assisted-living environment is a resident escape. A resident escape can cause harm to the resident and can be an enormous liability for the facility. An RTLS can help in resident tracking, and when a protected resident attempts to exit a facility, doors can be locked automatically and appropriate alerts can be triggered.

Monitor people’s movements: Many unique challenges can be solved by monitoring people’s movements. For example, by monitoring security guards, an RTLS can help ensure that facility surveillance isn’t hampered by a security guard sleeping on duty. Another example is in a mall or a city where security forces can be dispatched on detection of an unusual event, such as large number of people in smaller areas.

Provide emergency response: By making use of push-button tags, the tag wearer can summon assistance when faced with an emergency situation. This can be used by teachers or students in schools, nurses or patients in hospitals, lone workers working in hazardous environments, or police officers requesting other police officers in man-down events.

Manage evacuations: In events requiring evacuation, such as a fire, emergency first response can determine who’s evacuated and who hasn’t been evacuated.

Police restricted areas: By attaching the tags to criminals, employees, or visitors, areas that are restricted can be better policed and access can be allowed or disallowed based on privilege levels. Furthermore, at any given time, security officers can monitor the whereabouts of everybody and take appropriate actions when necessary.

Improve workflow: By analyzing trends of the utilization of assets and how workers and visitors spend their time, significant improvements in work practices and methodologies can be achieved. For example, in an emergency department, you can determine the key changes in equipment, staff, or processes required to decrease the time from the decision to admit a patient to the physical placement of the patient in an inpatient bed.

Improve customer service and response times: By analyzing trends of time the visitors are forced to spend at specific areas, appropriate customer service agents can be added at appropriate locations in the facilities. By rearranging the customer service agent count, the facilities can ensure that optimum levels of customer service are provided throughout the facility.

Improve structure of facilities: By analyzing trends of visitor dwell times, the facilities can be better structured for maximizing the facility’s purpose. For example, in a painting exhibition, if some parts receive dwell times significantly more than others, the temporary structures can be rearranged to improve the flow of traffic through the exhibition.

Putting an RTLS to Work

Because RTLS technology has the potential to provide radical improvement and advancements to efficiency beyond the ordinary scope of improvement, many sectors are currently using an RTLS. The following sections describe just a handful of these sectors and how they’re using an RTLS.

Healthcare

Hospitals, clinics, nursing homes, and other healthcare providers are looking at an RTLS to improve the bottom line and the care delivery potential. An RTLS can help

Locate healthcare personnel. Quickly locating healthcare personnel is critical when a patient or staff member summons assistance during an emergency medical situation.

Track the movements of patients. Tracking the physical movement of patients helps ensure patient safety. This is especially important for the safety and security of Alzheimer’s and dementia patients. An RTLS can alert staff and give the location of a resident who wanders too far from a designated area or tries to leave the premises (known as an elopement) as well as when a patient passes too close to an entrance or an exit. Another example is infant abduction prevention in which an RTLS enables immediate infant location tracking, mother/baby matching, automatic door locking, and so on.

Improve throughput management. Tracking patient flows for throughput management can potentially address problems, such as extended waiting times, overcrowding and boarding in the emergency department (ED) and post-anesthesia care units (PACUs), bumped and late surgeries, and lack of available routine and intensive care unit (ICU) beds. For example, using an RTLS reduces waiting and transfer time for patients because it may require less time to find staff or a wheelchair to transport the patient. Using an RTLS also enables close synchronization of housekeeping with patient discharge, enabling a faster bed turnaround rate.

Track equipment. Tracking expensive or shared equipment, such as infusion pumps, saves time and helps staff to more easily find equipment that’s recalled or due for preventive maintenance. Tracking equipment more quickly also improves inventory control, which reduces rental and purchasing costs.

Improve productivity of nurses and caregivers. Because an RTLS can automate many tasks on the basis of location and in real time, it can reduce many mundane and repetitive tasks that nurses and caregivers encounter on a daily basis. For example, a nurse or a caregiver typically has to go into a room to cancel a call or trip a registry light manually — which often involves in tripping over extra chairs, patient visitors, and other equipment — but an RTLS can perform the same task automatically, simply by recognizing the nurse’s presence in the room.

Improve patient/family satisfaction. An RTLS can improve a patient’s family satisfaction by increasing their awareness of patient location.

Improve staff safety. Nurses face acts of violence, threats to safety, exposure to abusive language, and aggressive behavior from staff, patients, and visitors. An RTLS can become an important part of the solution by giving nurses a tool to request emergency assistance during a crisis.

Track personnel. Tracking personnel alleviates security concerns by monitoring unauthorized access in restricted areas.

An RTLS is important for healthcare management personnel, other healthcare personnel, managed services providers, and those who are looking to solve complex issues in their respective healthcare organization.

Manufacturing

Manufacturers are always trying to do more with less. Manufacturers use RTLS technology to

Find products. Often valuable production time is lost because the pallet with the right materials isn’t where it should be and a search must be carried out. Armed with an RTLS and status information, manufacturers can reduce search time, which improves productivity and material flow while ensuring higher asset utilization.

Track progress. At any given time, a manufacturing plant can contain thousands of products in various states of assembly. An RTLS can instantly identify what still needs to be done to each product. Historically, an alternative to having an RTLS was to have workers use bar codes or paper to track the stage of the product. One major problem with such an approach is that many employees forget to scan or enter the data.

Trace parts. Using an RTLS enables manufacturers to trace parts, which can be used for recalls or investigations.

Track production items. Many manufacturing processes are lengthy and have hundreds of steps that take place often in several different factory buildings. Being able to track production items accurately across a plant and link the location to the manufacturing stage results in fewer errors and improved workflow.

Find tools. Manufacturers often need to tag shared tools so that they find them when needed without slowing production.

Locate works in process. A work order is an order received by an organization from a customer or a client or is created internally within the organization. In a manufacturing environment, a work order is converted from a sales order to show that work will begin on the manufacturing, building, or engineering of the products requested by the customer. Tagging work orders can enable you to locate at what stage of manufacturing that specific work order is. A supervisor can also use some LEDs or other indicators on tags to communicate urgency levels for specific work orders.

The interaction between workers, machines, tools, work areas, and the products they’re manufacturing has a significant location component. Whether in automotive, aerospace, computers, semi-conductor, or discrete manufacturing, RTLS technology can deliver improved quality at a reduced cost to make the manufacturing operations more competitive. An RTLS provides context and location-aware support to workers improving quality by reducing errors (and therefore reducing the cost of fixing them) and increasing efficiency by reducing process execution times. The devices and tools used by the workers can be made to know where they are and in which relation they stand to the production materials.

Automotive

The automotive industry has been one of the early adopters of RTLS technology. An RTLS helps in material logistics, vehicle management, and during manufacturing. Here are just a few tasks the auto industry accomplishes by using RTLS technology:

Reduce the cost of quality: Auto makers reduce the cost of quality by preventing a vehicle with quality problems from being shipped while still shipping other vehicles. This can be achieved by using an RTLS to track information of finished vehicles from pre-delivery to shipment.

Manage supplies: An RTLS locates critical tools and test equipment, and uses call buttons for replenishment of supplies.

Manage vehicles: An RTLS reduces the average dwell times for finding vehicles by improving in-line/off-line vehicle tracking, vehicle (yard) management, dealer lots, and resale auction lots.

Aerospace and defense

Significant opportunities exist for an RTLS to help aerospace and defense. By using an RTLS, you can

Manage supplies. An RTLS locates critical tools and test equipment, and uses call buttons for replenishment of supplies.

Fleet maintenance management. An RTLS can be used to manage check-in and check-out processes.

Track maintenance dates. An RTLS is flexible enough to track maintenance dates for critical support equipment and trailers across thousands of feet of open flight line or even while they move through metal cages in a warehouse.

Speed throughput. An RTLS can perform spot locating and auditing capabilities to speed up throughput at critical transit points.

Research and development