Sunteți pe pagina 1din 33

Proposal for RFID Security & Circulation Solution for (client)

Technical Proposal

For

RFID Security System


Library Management

For

(Client)

Page 1 of 33
Proposal for RFID Security & Circulation Solution for (client)

Seller Restrictions
This data shall not be disclosed and shall not be duplicated, used, or disclosed in
whole or in part for any purpose. If a contract is awarded to HCL as a result of or
in connection with the submission of this data, the client or prospective client shall
have the right to duplicate, use, or disclose this data to the extent provided in the
contract. This restriction does not limit the client’s or prospective client’s right to
use the information contained in the proposal if it is obtained from another source
without restriction. The data subject to this restriction is contained in all marked
sheets.

Page 2 of 33
Proposal for RFID Security & Circulation Solution for (client)

HCL PROFILE

HCL Infosystems Limited is one of the pioneers in the Indian IT market, with its origins
in 1976. For over quarter of a century, HCL has developed and implemented solutions
for multiple market segments, across a range of technologies in India. HCL has been in
the forefront in introducing new technologies and solutions, now HCL is amongst the
top 20 business houses in India with 14000+ employees spread across 38 countries and
revenue of around 14 billion US dollars.

HCL Infosystems Ltd. is the Internet Infrastructure initiative of the HCL group, India’s
premier information technology group. Through the pioneering presence of the HCL
group companies the vast experience of the markets, HCL Infosystems has propelled
itself to the path of “Total Technology Integration”.

HCL Infosystems has established state-of-the-art ATM / Frame-Relay IP based network


infrastructure across 43 cities in the country and offers an entire range of managed
services. Its portfolio of services includes Virtual Private Networks (VPNs), Broadband
Internet access; Hosting Co-location Services; Designing and deploying Disaster

Page 3 of 33
Proposal for RFID Security & Circulation Solution for (client)

Recovery solutions and Business Continuity solutions; Application services; Managed


Security services and NOC services.

All these services are delivered with a turnkey approach that includes delivering
Infosystems’s core services, third party hardware and network provisioning,
maintenance activities and project management.

HCL Infosystems comes with the promise of delivering the committed ‘Quality of
Service’ backed by significant investments in infrastructure, network management
solutions and its round the clock centralized Customer Support Call Center. This holds
even more when we consider the leverage Infosystems draws from its parent
company’s unparalleled experience in networking.

LIBRARY MANAGEMENT SOLUTION

HCL Infosystems Limited is providing one of the leading library management solutions
(LMS) in the global market. Our LMS is designed on all international standards like
MARC-21, UNICODE, SIP/SIP2, etc. LMS is completely user-friendly menu driven
interface, online help, complete and elaborative help documentation, online
downloading of bibliographic details, sharing of database or bibliographic details with
international or national libraries based on international standards like ISO 2709,
Z39.50, etc. HCL is also can provide solutions like RFID based security and circulation
including drop box, self check-out station, EAS Security Gate; biometric based access or
simple barcode based circulation system. The same LMS solution can be used for the
digital library also; any digital format document can be attached with the proposed
LMS. HCL also have dedicated a software for the management of the digital library,

Page 4 of 33
Proposal for RFID Security & Circulation Solution for (client)

where simply scanned images or any e-documents like .pdf, .avi, .mp3, .mpeg, etc. WE
BELIEVE IN PROVIDING 100% SOLUTION FOR A LIBRARY.

HCL’s Customer Support

We have the highest regard for our esteem customers, and to meet this, we have geared
up ourselves with following services across the country:

• We organize customer’s meets all over the country to have the first hand
interaction, which enable us to interact with our customers and review their
feedback one to one. We also strive to improve our services standards for more
customer satisfaction.

Page 5 of 33
Proposal for RFID Security & Circulation Solution for (client)

• We have the key-client concept, where in we constantly monitor the upkeep of


our products, being used for achieving highest level of service standards. The
parameters governed by this (viz. Up-time, Preventive Maintenance Schedule
etc.) are appraised by specialized team at the regional office and Head office.
Further, these clients are provided with an Up Time Certificate authenticated by
the respective user department and these are sent by the President & CEO
himself.

We have across the country –

Number of Machines 50,000 (All products including


photocopier)
10,000 (Telecom products alone)
Number of Software Solutions 1,000
Number of Professionals 14,000
Number of Trained Engineers 5,000
Number of Offices 170 cities
Number of Service Centres 360
Customer Satisfaction 9 out of 10 *
ISO Certification ISO 9001:2000 & ISO 14001:2004

* Survey done internally by HCL Infosystem directly to its customers.


With trained engineers around 360 locations around India, we are able to provide better
customer support and reach well above the industrial customer satisfaction level
standards.

HCL is itself synonymous with customer satisfaction, we are proud to offer the best
solutions and services anywhere in India.

The best in the “Corporate Users expectation and Satisfaction Survey 2003” - Voice &
Data Magazine.
Page 6 of 33
Proposal for RFID Security & Circulation Solution for (client)

HCL has been ranked No.5 among India’s Top 5 groups impacting the dynamics of the
IT Industry - DataQuest

“The Most Responsive Company, 2005”– IT Hardware Category by the Economic


Times - Avaya Global Connect

Page 7 of 33
Proposal for RFID Security & Circulation Solution for (client)

HCL’s Presence in India

Page 8 of 33
Proposal for RFID Security & Circulation Solution for (client)

RFID Solution for (Client)

Overview

Radio Frequency Identification (RFID) is the technology that is slated to replace barcodes in
library applications. It is a form of identification that is contact-less and does not require line of
sight. The technology, though new to libraries, has been in use in other sectors for more than 20
years. The RFID tags are placed in books and generally covered with a property sticker.
Antennas of different sizes, based on application, are used to read the tags and manage the
various library functions.

The RFID Solution is a revolutionary application of automatic identification and data capture
(AIDC) technology. In a library environment, RFID technology resembles a traditional barcode
system in that it provides a means of assigning an ID to an item and reading that ID to perform
circulation transactions or to take inventory. But while RFID technology resembles a traditional
barcode system in application, the HCL RFID Solution is far superior in performance—plus it
offers built-in security.

How the HCL RFID Solution Works

HCL has partnered with leading RFID hardware security providers, leading manufacturers of
RFID hardware, to bring you the latest in RFID technology. A standard
RFID system consists of four main parts:

• RFID Tags - Flexible, paper-thin smart labels that are applied


directly to library items. Each RFID tag contains a tiny chip,
which is both readable and writable and can store information
to identify items in your collection. In library applications, it
also stores a security bit and if needed, information to support sorting systems.
Page 9 of 33
Proposal for RFID Security & Circulation Solution for (client)

• Passive (this is what mostly used now)


 Tags are inactive until the reader’s interrogation signal “wakes” them up
 Cheap, but short range only
• Semi-passive
 On-board battery, but cannot initiate communication
 Can serve as sensors, collect information from environment: for example,
“smart dust” for military applications
 More expensive, longer range
• Active
 On-board battery, can initiate communication

• RFID Member Card: Library members were given membership card enabled with
RFID chip inside. Member details are printed on plastic sheet which is pasted on the
RFID Member Card. Member has to use/bring along with the RFID Tag enabled
books/resources for the issue/return of the same.

• Readers – A
handheld or
EAS Gates
programmed to
capture radio
waves signals
omitted by the
RFID Tags. The
devices are responsible for the security and circulation of resources as programmed in
the server, it will alarm if the resource is taken out without proper process.

• Database: all the information related to RFID tags and corresponding information
about the resource/books/member is stored in the database which is stored in a
centralized location a PC or a Server. The software installed in the server verifies the
tag reading captured by the Reader (Transceiver).

Page 10 of 33
Proposal for RFID Security & Circulation Solution for (client)

The HCL RFID Solution can be implemented with any library automation system that uses the
Standard Interface Protocol (SIP/SIP2 & NCP IP protocol) for circulation transactions.

Page 11 of 33
Proposal for RFID Security & Circulation Solution for (client)

Advantages of an RFID System over a Traditional Barcode System

The HCL RFID Solution provides numerous advantages over traditional barcode systems. Here
are just a few of the benefits:

Features RFID Barcode


Read more than one item at a time
 ×
Read while item is moving
 ×
Programmable
 ×
Line of site read not required
 ×
Life guarantee (100,000 reads)
 ×
Sturdy in harsh environments Might want to consider use
 ×
of the term “environmentally hardened”, this term is
becoming more common place in USA electronics
markets. (I am not certain of global acceptance of this
term)
Able to resist water damage
 ×
Built‐in security
 ×
Inventory tool without handling items
 ×
Able to locate specific items on shelves
 ×
Use with borrower self checks units
 
Use with automated sorting and handling systems
 ×

Page 12 of 33
Proposal for RFID Security & Circulation Solution for (client)

Particulars RFID Barcode


Physical Size Tags range in size from a Bar codes are larger than the
postage stamp to a book. The smallest tag and very sensitive
aspect ratio of a Tag's length vs to the aspect ratio for
width is very flexible and not a presentation to a scanner. The
significant factor for the ratio of a bar code's length vs
Reader. width is critical to its
operation.
Lifespan Tags have no moving parts and Bar Codes have unlimited
are embedded in protective shelf life but are subject to
material for an indestructible degradation with handling.
case and multi-year lifespan.
Harsh Environments Tags may be placed in extreme
environments and perform to
specification. They are very
robust to handling, sensitive to
environment, and generally
degrade once used, stored or
handled in a non-office
environment.
Product Codes Digital data is stored on the
Tag and provides for a
significant capability to
encode: 1) Tag originator 2)
User data as needed by the
segment or application 3)
Serial number as needed by
the segment/application
Major vertical markets like

Page 13 of 33
Proposal for RFID Security & Circulation Solution for (client)

Retail have standards which


are excellent at coding
product type and
manufacturer. Additional
information beyond these
basic parameters is not
feasible because the size of
the Bar Code becomes too
large.
Counterfeiting Tags are produced with a Bar Codes may easily be
unique identity code (UIC) or duplicated and attached to
serial number from the products and are, therefore,
manufacturer. This is easily counterfeited.
embedded digitally on the
microchip and may not be
changed, therefore, making
them extremely resistant to
counterfeiting.

Dynamic Updates Tags may be written to and Once a Bar Code is printed it

offer on board memory to remains frozen. The Code and

retain information. This the process of attaching the


BC is not supportive of real
feature may be used to store
time updates. It is a labor
a product calibration
intensive process to update
history, preventive
any information on a BC once
maintenance, etc. Updates
printed.
may be made within the
blink of an eye and
automatically without

Page 14 of 33
Proposal for RFID Security & Circulation Solution for (client)

human intervention. Once a


Bar Code is printed it
remains frozen. The Code
and
Traceable The combination of UIC BC is limited to an entire class

(unique identification code), of products and unable to drill

user data, serial number and down to a unique item. It is


not feasible to recall, track or
on-board memory makes it
document a single item.
possible to track, recall, or
document the life span of a
single item. For example,
with livestock this means
that the birthplace of the
animal, its vaccine history,
feed lots, slaughter house,
processor, etc may all be
tracked. This kind of
information supports a
complete pedigree for an
item attached to the Tag.
Scanning RFID - Offers a range from The Bar Code must be

inches to hundreds of feet presented to the scanner in an

and does not require line of orientation and distance that


is very limited. Individual
sight. This means that
reading requires that each box
individual Tags placed
on a pallet be opened and the
within a carton, packed in a
item pulled for presentation to
box and stored on a pallet
the scanner.
may be read. You do not

Page 15 of 33
Proposal for RFID Security & Circulation Solution for (client)

have to open each box and


present the individual item.
BC - Offers a range over
inches and requires line of
sight to read the code.
Simultaneous Scanning RFID - Standards have Limited to one bar code at a

algorithms to support time. Unable to support

simultaneous reading of simultaneous reads.

Tags at one time.


Cost High volume Tags are This is a clear advantage for

currently 25 cents each with BC unless you expand cost to

the potential to continue to be fully loaded.

drop per the experience


curve. High volume bar
codes are less then a penny.
In this scenario the labor
savings from items like
physical counts, etc. give
RFID greater feasibility.
Reusable Yes No

RFID System Components and Applications

In a basic RFID system; tags, antennas and a controllers are used to read the tags affixed to each
item in your collection. At various administrative points within your library, you can
implement specific read/write stations, each of which uses an RFID reader:

Page 16 of 33
Proposal for RFID Security & Circulation Solution for (client)

• RFID Programming Workstation - Serves as a programming workstation for tags, once


these tags are programmed with unique item number and other information. Once these
tags are activates the security bit for the theft detection.

• Self-Checkout Station - Allows patrons to self issue items without assistance from the
library staff. Complete with a touch screen and receipt printer, the Patron Self- Checkout
Station helps libraries to manage the human resources efficiently.

• Security Gates – These gates are the focal point of the RFID security system. When any
member try to steal a book/resource from the library which fitted with RFID activated
tags, the security gate will raise the alarm, whereas if the member had legitimately
issued the book/resources the gates will not raise any alarm. These gates are pride item
of any library.

• Staff Circulation Station – Very similar to Self Checkout Station but it is managed the
circulation staff rather than the library member themselves. But it is not like the
traditional circulation process or barcode, these process are mainly used in cases where
number of users are less or resources are costly or rare so that circulation staff is directly
involved in the issue process and inform the member about the resources, etc.

• Self-return Book Drop – It provide libraries the best service possible to its; members.
Library can place the Drop Box (Self Return Drop Box) anywhere in the campus for
example canteen, entry gate, etc and members can drop the books/resources in them
and take the return receipt for the same, without visiting the library. The return process
online, library will get online updates into it’s resource database. Libraries can make
arrangement for collecting the books at any given point of the time during the day.

Page 17 of 33
Proposal for RFID Security & Circulation Solution for (client)

• Auto Sorting Station – RFID enabled sorting machine will help in automatically sorting
the books/resources according to predefined sorting setup. These help the shelving staff
in sorting the books.

• Handheld RFID Scanner for stock taking and shelf rectification: Handheld scanner is
able to two function they are: -
o Stock Taking: Imagine a library with a collection of millions of books, and they
have to do stock taking of all the collection. Generally with collection more than
1-2 lakh, a library can take more than 3 months
to do a complete stock taking. Whereas, a RFID
handheld scanner can scan 50 books in a 05
seconds i.e. in one hour a library can take stock
taking of 30,000 books approximately and that
also 100% accurate.
o Shelf Rectification: imagine the condition of the user or the circulation staff in
locating a book/resources in the library which is hidden by students/user.
Libraries have option of rectifying the shelves in the library during the stock
taking process itself or under some periodic process with the help of the RFID
Handheld Scanner. RFID has to programmed in such a way that it exactly knows
the position of the book/resources in the shelf/library and it will beep/alarm if
the location of the book is not matched with the record.

Page 18 of 33
Proposal for RFID Security & Circulation Solution for (client)

RFID Process

Perhaps the most difficult and disliked function in libraries is stock management and shelf man-
agement (rectification and re-shelving). Both the function becomes extremely simple with RFID
technology.

The components necessary for inventory management consist of a handheld reader and a Wand
with an IPAQ (hand-held personal digital assistant) at the end. The Reader weighs only 607
grams (0.6 kgs) and the Wand 435 grams (0.4 kg), making the weight of the entire unit
approximately one kilogram. A shelf can be inventoried in a matter of a few minutes as the
units can read up to 50-60 tags a minutes. The system allows for two different methods for
taking inventory.

There are two process used in the using the RFID handheld scanner.

The first method for taking inventory is to run the RFID Handheld Scanner across the shelf.
This process captures the RFID data to the PDA, which can store data for more than 6 million

Page 19 of 33
Proposal for RFID Security & Circulation Solution for (client)

books. This data is uploaded, through wired or wireless connections, to the ILS system, where
the software program performs the stock taking functions.

The second method involves a pre-processing step where data is downloaded from the ILS
system to the Reader. This method is more effective when there is a need to search for specific
books or to identify miss-shelved or missing books. The unit comes with an audible alarm to
provide appropriate feedback to the user.

All in all, this technology converts the otherwise tedious task of managing stock management to
aa convenient technique for helping libraries gain control over their collections.

EAS Gate

Library EAS security gate can be fixed with a video camera

The single-lane gate should consist of 02 (two) pedestals: Each pedestal is standalone and plug
and play to the main power. The Security Gates need to be linked to the library database, and
should still operate even when the Integrated Library Management Software System is down or
under maintenance.

• Frequency Support: 860-960 MHz

• Controllable Volume for Alarm


• Strobe light
• Alarm Count

• Member Traffic Counter

• Options for integrating with security video camera with Access Control System

Handheld RFID Inventory Management System


Features
• High Standard multi-protocol

Page 20 of 33
Proposal for RFID Security & Circulation Solution for (client)

• Circular Polarized antenna


• Reading up to 1.5 mts
• EPC Gen2 reader management
• WiFi & blue-tooth interface
• Light weight

PDA based Handheld Reader complies with multi-protocol and is designed for item level
management. This device is ideal to track and monitor assets and for stock management inside
and outside the library. The handheld reader is featured with wi-fi which enables quick
verification and associated action with the help of enterprise management system. It also works
well when connected to a desktop or a laptop via USB. The handheld reader is powered by re-
chargeable Lithium lon and ni-MH batteries. Designed with integrated microphone speaker,
status LED’s and single button operations.

Technical Specification
Physical Characteristics Model no.: ORUHP Processor: Samsung 400Mhz processor
Weight: 500g (approx.) Resolution: 240 (W) x 320 (H) pixels
Color: Black/Grey Protocols: EPC Gen2 EPC Generation 2
Display: 2.83 in (72 mm)TFT QVGA color, R/W,Full Anti-collision and DRM
With LED Interface: USB Interface, Wi-Fi
Backlight & power save mode 802.11b/g,Blue-tooth (Enhanced data rate)
Indicators: Power-Red, Read-Green Power: Rechargeable Ni-MH cell
Temperature: Operating temp. -25°C up to Transmitting power: Up to 1W
60°C Storage temp. -25°C upto 85° C Frequency: ETSI/WPC (India): 865-868 MHz,
APIs: EPC Gen2 reader management protocol MIC: 910-914 MHz,FCC: 902-928 MHz
as Windows DLL/ Java library Battery: 2700mAH for RF and Removable/
Memory: 192MB (128MB ROM and 64MB rechargeable 1200mAh Lithium-lon for
SDRAM) Main memory for running integrated PDA
applications, Up to 64 user available Antennas: 50 ohm internal antenna
Operating Software: Microsoft Windows Reading distance: 0.5m-2m
Page 21 of 33
Proposal for RFID Security & Circulation Solution for (client)

Mobile 5.0 Software for pocket PC, mobile Keypads: 21 membrane key-pads, including
versions of Microsoft, Office Software includes side,
(Word, Excel, and Powerpoint), Microsoft alpha-Numerical, Read, Power
Outlook 2002 for Pocket PC

Industrial Grade Handheld Reader


Features
• Rugged-design
• Displays exceptional clarity
• Cost-effective
• Reads and writes Gen2 RFID tags
• Captures 1D,2D barcodes and images
• Enables wireless synchronization
• Blue-tooth adds to productivity

The rugged-design enables the mobile workers to use the device in the manufacturing
unit, in the warehouse or in the asset tracking, hassle-free due to its reliable
functionality. It has the exceptional feature to read both RFID tags and the barcodes. It
includes Microsoft pocket pc and Microsoft office as the operating software. It ensures
work rapidly with reduced errors. The industrial handheld reader provides maximum
readability, easy-to-use and comfortable

Technical Specification
Physical characteristics
Weight: 700g (approx) Processor: Samsung 400Mhz processor
Color: Black/Grey Transmitting power: Up to Power: Rechargeable Ni-MH cell
1W Resolution: 240 (W) x 320 (H) pixels
Display: 2.83 in (72 mm) TFT QVGA color, Protocols: EPC Gen2 EPC Generation 2 R/W,
With LED Backlight & power save mode Full Anti-collision and DRM
Indicators: Power-Red, Read-Green Interface: USB Interface, Wi-Fi 802.11b/g,
Page 22 of 33
Proposal for RFID Security & Circulation Solution for (client)

Temperature: Operating temp. -25°C up to Blue-tooth (Enhanced data rate)


60°C Frequency: ETSI/WPC (India): 865-868 MHz,
Storage temp. -25° C up to 85°C MIC: 910-914 MHz, FCC: 902-928 MHz
APIs: EPC Gen2 reader management protocol Battery: 2700mAH for RF and Removable/
as rechargeable 1200 mAh Lithium-lon for
Windows DLL/ Java library integrated PDA
Operating Software: Microsoft Windows Antennas: 50 ohm internal antenna Reading
Mobile 5.0 Software for pocket PC, mobile distance: 0.5m-2m
versions of Microsoft, Office Software Keypads: 16 key-pads, including side, alpha-
include(Word, Excel, Powerpoint) Microsoft Numerical, Read, Power
Outlook 2002 for Pocket PC Water/Dust resistance: IP 54 certified
Drop specification: 5 ft (1.5m) multiple drops Vibration testing: Based on MIL STD 810 F
to Environment operating temp.14oF to -122oF
concrete* Humidity: operating: 5% to 80% (-10o C to-50oC) storage temp. -4oF to -158oF
Anti-shock: withstands multiple drops up to (-20oC to -70oC)
1.5m to concrete*
Memory: 192MB (128MB ROM and 64MB
SDRAM) main memory for running
applications, up to 64 user

The Shelf Management System supports following functions:


• Item search (single/multiple)
• Stock verification
• Arm/disarm items
• Locate misplaced items

The system provides web-based reports for the following purposes:


• Stock taking report
• Missing items report

• Non Library items report

Page 23 of 33
Proposal for RFID Security & Circulation Solution for (client)

UHF Self Check In – Check Out Kiosk

Features
• Motherboard with built-in Audio/ Video/ Ethernet 100 Mbps
• Thermal Printer with auto-cut feature
• Compatible with Class1 Gen2 Tags
• Touch screen LCD monitor
Self-Kiosk’s multi functionality is mainly used in Libraries to bring the accuracy in the
check-in and check-out process and for efficient authorization. The easy-to –use features
of the Kiosk enables the users to avail the library processes in a very short span of time.
The users need not wait in queues to get the books or to submit them; they just need to
make use of the Kiosk. The tagged book should be kept on the Kiosk and follow the
renewal or submission steps. This can further be used in many applications according
to its requirements.

Technical Specifications

Physical Characteristics
Dimensions: 50cm (W)x1500cm (H)x80cm**
Drive: CD-ROM
Color: Black/Grey
Power: 230V A.C/12V D.C
Weight: 50kg
Temperature: Operating temp. 0° C up to 60° C Storage temp. -25° C up to 85° C
Display: 15” TFT LCD Monitor with touch screen
Reading distance: 10-30cm
Network: Motherboard with built in Audio /Video/Ethernet 100 Mbps
Protocols: EPC Gen2 EPC Generation 2 R/W, Full Anti-collision and DRM
Page 24 of 33
Proposal for RFID Security & Circulation Solution for (client)

Memory: 256 MB/1GB RAM


Interface: Ethernet
Hard-disk: 80GB
Printer: Thermal Printer with auto-cut feature
Frequency: 865-868 MHz
** Dimension can vary as per the specification selected by the customer

Drop Box

Benefits
• Cut down long queues
• Avoid overdue fines
• Can drop books anytime, especially off hours
• Employees can give much time to customers than attending the queues
• The process is fully automated

Features
• The book drop box is enclosed with a receiving cart, UHF RFID reader and antenna.
• High speed Thermal slip printer
• Standard: EPC Gen2 EPC Generation 2 R/W, Full Anti-collision and DRM
• Frequency: 865-868 MHz (Reader)
• Housing: Wood

RFID Antenna

RFID antenna is waterproof, easy to install with the 4 port Gen2 fixed reader. It can be used
with any application that requires a circular polarization for transponders reading. VSWR is
typically less than 1.5:1 and gain not less than 8dbi.

Technical specifications

Page 25 of 33
Proposal for RFID Security & Circulation Solution for (client)

Electrical
Frequency: 865 - 867 MHz
Gain: 8 dbi
VSWR: Typically less than 1.5:1
Azimuth 3 dB Beamwidth: 65o (typ)
Elevation 3 dB Beamwidth: 65o (typ)
Polarization: RHCP
Sidelobes Level @ 90II_-16 dB (max)
Axial ratio @ boresight: less than 2dB (max)
F/B Ratio: -18 dB (max) -20 dB (typ)
Input Impedance: 50 (Ohm)
Input Power: 6 W (max)
Power: 10 W
Enclosure: PVC/Acrylic
Lightning Protection: DC Grounded

Mechanical
Dimension: 305 x 305 x 25 mm
Weight: 1.2 kg
Antenna polarization: Circular
RF connector: N-type
Radome: Plastic UV Resistant per ETSI 300
BASE PLATE: Aluminum with chemical conversion coating

UHF Linear polarized Antenna-ORUAL

Antenna is linearly polarized antenna which has a frequency up to 950 MHz. It is ideal for
outdoor application. VSWR is typically less than 1.5:1 and gain up to 8dbi.

Technical specifications
Page 26 of 33
Proposal for RFID Security & Circulation Solution for (client)

Frequency: 865 - 867 MHz


Dimension: 305 x 305 x 25 mm
Gain: 8 dbi
Weight: 1.2 kg
VSWR: Typically less than 1.5:1
Antenna polarization: Circular
Azimuth 3 dB Beamwidth: 65o (typ)
RF connector: N-type
Elevation 3 dB Beamwidth: 65o (typ)
Radome: Plastic UV Resistant per ETSI 300
Polarization: RHCP
BASE PLATE: Aluminum with chemical conversion coating
Sidelobes Level @ 90II_-16 dB (max)
Axial ratio @ boresight: less than 2dB(max.)
F/B Ratio: -18 dB (max) -20 dB (typ)
Input Impedance: 50 (Ohm)
Input Power: 6 W (max)
Power: 10 W
Enclosure: PVC/Acrylic
Lightning Protection: DC Grounded

RFID Reader

Features:
• Operates in noisy RF environments
• Read range up to 3-8m(depending upon

• Environment and configuration)

• Rugged reader for industrial environment

Page 27 of 33
Proposal for RFID Security & Circulation Solution for (client)

UHF Network reader is best in class and designed for high speed performance. This can give a
read-range of 8m using the right set of tags and antennas. The network reader operates in noisy
RF environments. It is configured to operate in 860-950 MHz bands. High reader’s sensitivity
enables to track weaker or otherwise unreadable tags.

Technical Specifications
Physical characteristics
Dimensions: 165mm*175mm*42mm
Host Interface: Ethernet (optional Ethernet to USB converter)
Weight: 800g
Firmware: Upgradeable via Ethernet Connection
Color: Black and blue
Protocols: EPC Generation 2 R/W, Full Anti-collision and DRM
LED Indicators: Power- Red, Read-Green
Antennas: External
Housing: Metal
Reading distance: Antenna dependent
Temperature: Operating temp. 0° C up to 55°C Storage temp. -25° C up to 85° C
Frequency: ETSI/WPC (India): 865-868 MHz, MIC: 910-914 MHz, FCC: 902-928 MHz
Power: 5 V DC +/- 15% via External power supply
RF Interface: 2/4 SMA Female Connectors
Transmitting power: Up to 1W
Read-rate: 150 tags/sec

UHF Tags

UHF squiggle tags delivers exceptional range and outstanding performance in the item -level
tagging. It has the unique combination of size and performance. Based on the applications and
requirement, the UHF inlays can be used either encapsulated or labeled.

Page 28 of 33
Proposal for RFID Security & Circulation Solution for (client)

Technical Specifications
Antenna Size: 97mm x 11mm
Anti-Collision: For multi-read
Anti-theft: Security Bit
Read/write: capability with data locking option
Data retention: >10 years for each write
Data re-write: 100,000 times for each address
Memory capacity: 1024/2048 bits
Standard: Class 1 Gen 2

Page 29 of 33
Proposal for RFID Security & Circulation Solution for (client)

Deliverables
No Particulars Quantity
1. RFID Tags 01 Nos. Per Book
2. Hand Held Portable RFID reader 01 Nos.
3. Multi Item RFID reader / station 01 Nos.
4. RFID Walk through Security Gate 01 Nos.
6. Onsite Installation and Training 04 Days
7 Integration with Existing Library 01 Nos
Management Software

Page 30 of 33
Proposal for RFID Security & Circulation Solution for (client)

Commercial Proposal
For
RFID Security & Circulation for
For

(Client)

Page 31 of 33
Proposal for RFID Security & Circulation Solution for (client)

HCL here by submit its Commercial Proposal for Total Library Management Solution to
(Client). Kindly find following as our Commercial proposal:

Commercial Offer for RFID Library Management Software


Sr. No. Particulars Quantity Price (Rs.)
1. RFID Tags for Books As Reqd 17.50
2. Security Gate – Pair Plus Software Module 01 Nos. 2,89,800.00
3. Reader & Antenna 01 Nos. 1,02,500.00
5. Integration with LibSys As Reqd 1,05,937.00

Optional
Sr. No. Particulars Quantity Price (Rs.)
1. Handheld Reader for Inventory Management 1 1,29,000.00

Terms & Conditions:

• Delivery: 6-8 weeks from the date of receipt of the PO and payment.

• Taxes: The above prices are exclusive of all local Taxes. The same will be charged extra
as applicable by HCL to (Client Name).

• Warranty: There is a warranty on the solution purchased for one year from the date
purchased. Thereafter, the warranty will continue to get extended on an annual basis as
long as (Client Name) continues to renew the Annual Maintenance on an annual and
timely basis from the second year onwards.

• Validity of Prices: These prices are valid for 30 days.

• Force Majeure: HCL shall be under no liability whatsoever on the occurrence of any
Force Majeure event such as war, fire, arson, industrial action, orders of government or
other duly constituted authority, any natural calamities or Act of God, etc.

Page 32 of 33
Proposal for RFID Security & Circulation Solution for (client)

• HCL and (Client Name) will come into a agreement to fulfil the scope and when ever
there is change in scope mutually will agree and the same in the agreement as and when
it arises.

• Above pricing is for generic software. In case of any customisation in software charges
will be taken as per the degree of customisation in the software

Hope the above is in order.

Sincerely,

For HCL Infosystems Ltd.

Page 33 of 33

S-ar putea să vă placă și