Skip to content

Need of WI-FI Tester !!

Wi-Fi is a complex technology, but testing it doesn’t have to be. The AirCheck Wi-Fi tester allows network technicians to quickly verify and troubleshoot 802.11 a/b/g/n networks.

Designed specifically for dispatched troubleshooting, AirCheck simplifies wireless testing by providing:

  • A one-button AutoTest, which quickly provides a pass/fail indication of the wireless environment and identifies common problems – for any level of Wi-Fi technician’s expertise
  • An instant view to required test results including network availability, connectivity, utilization, security settings, rogue hunting, and interference detection
  • A rugged, purpose-built Wi-Fi tester that’s easy to use and easy to carry

Its intuitive design makes it simple for anyone to quickly master AirCheck. Instant power-up, automated testing, and quick access to more detailed information, lets you close trouble tickets faster – making technicians and users alike more productive. Easily manage test results and documentation using AirCheck Manager software. From start to finish, AirCheck helps take the guesswork out of everyday wireless troubleshooting.

 And We Nipun Net Solutions Pvt Ltd Deal with these WI-FI testing. NIPUN NET SOLUTIONS PVT LTD are the partners of FLUKE NETWORKS.

http://www.nipun.net

Advertisements

RFID vs Barcode

RFID vs. Barcodes Comparison :

RFID and barcodes are similar in that they are both data collection technologies, meaining they automate the process of collecting data. However, they also differ significantly in many areas. Although this comparison primarily focuses on the advantages of RFID over barcodes, RFID will not completely replace barcode technology. Barcodes offer some advantages over RFID, most notably their low cost. 

Comparison Statistics

  • RFID is 15-20 times faster than manual and barcode processes for inventorying IT assets. (Source: RFID Journal)
  • Some companies experience a 95% reduction in time using RFID (Source: Motorola)
  • The #1 RFID application being deployed is IT asset tracking (Source: Aberdeen)
  RFID Barcode
Line of Site Not required (in most cases) Required
Read Range Passive UHF RFID: 
   – Up to 40 feet (fixed readers) 
   – Up to 20 feet (handheld readers) 

Active RFID: 
   – Up to 100’s of feet or more

Several inches up to several feet
Read Rate 10’s, 100’s or 1000’s simultaneously Only one at a time
Identification Can uniquely identify each item/asset tagged. Most barcodes only identify the type of item (UPC Code) but not uniquely.
Read/Write Many RFID tags are Read/Write Read only
Technology RF (Radio Frequency) Optical (Laser)
Interference Like the TSA (Transportation Security Administration), some RFID frequencies don’t like Metal and Liquids. They can interfere with some RF Frequencies. Obstructed barcodes cannot be read (dirt covering barcode, torn barcode, etc.)
Automation Most “fixed” readers don’t require human involement to collect data (automated) Most barcode scanners require a human to operate (labor intensive)

RFID Business Benefits

RFID Benifits :

Use of RFID technology can increase business productivity and reduce associated costs. To ensure that companies benefit from the advantages RFID provides it is important to understand how to adopt this technology.

The RFID Centre can give you an insight into how other companies have approached such implementations and the business benefits that have been derived in a number of business sectors including but not limited to:

  • Retail & CPG
  • Clothing & Apparel
  • Food & Drink Manufacturing
  • Leisure industry & Service sector
  • Logistics & Transportation
  • Health & Pharmaceuticals
  • Building & Construction
  • IT, Electrical & Electronics
  • Defence
  • Automotive
  • Livestock

By analysing current practices and procedures 8 main areas of benefit can be identified. These are:

Improved Productivity and Cost Avoidance

Identifying items by RFID involves less work than using barcode scanning and other less automated ways. This leads to greater process effectiveness in many tasks such as receiving and putting away, picking and shipping goods where the time required and cost of identifying items by RFID is substantially less than other methods.

Decreased Cycle Time and Taking Costs Out

RFID scanning is not a serial process, like traditional Barcode scanning, so the business can perform identical tasks much more quickly. This means processes moving goods through a supply chain are more efficient leading to a reduction in the need for larger inventories.

Reduced Rework

As RFID scanning has a greater first time pass accuracy this reduces the number of errors that are generated and retries needed.

Reduced Business Risk & Control of Assets

RFID tagging enables better audit and asset control. The ability to track and trace items better means assets can be located more easily. The opportunity for enhanced data collection leads to increased accuracy of record keeping and improved asset maintenance. Regulatory compliance can be achieved more effectively.

Improved Security and Service

Being able to validate information relating to an item enables increased security. This individual identification contributes to more effective access control, reductions in shrinkage and other losses and the ability to provide fast and efficient services at the point of need. Ability to authenticate information can prevent activities like counterfeiting and fraud.

Improved Utilisation of Resources

Information obtained by RFID scanning can be used to improve planning. Processes can be improved, time can be saved, assets can be utilised better.

Increased Revenues

By eliminating uncertainty companies will suffer less “out of stock” situations and obtain greater item availability, reducing lost sales and increasing choice leading to more sales.

Exception Management

RFID enables processes and procedures to be measured better. Until a process can be measured accurately it often can’t be improved. Decisions that are based on limited, inaccurate, out-of-date information are often poor decisions. The contribution information captured by RFID offers to IT applications will allow managers in companies to be alerted when compensatory business decisions need to be taken.

Examples of the implementation of RFID include:

  • Logistics & Tracking
    • Real Time Item Location/ Item Visibility & Status
    • Anti Theft/Tamper evidence
    • Authentication
  • Asset Tracking
    • Hospital Equipment
    • Laundry & Library systems
    • Reusable Assets
  • Personal Identification
    • Access Control
    • Animal Tagging
    • Car Immobilisers
  • Payment Systems
    • Road Toll
    • Electronic Tickets
    • Mass Transit Ticketing
  • Workflow Processes
    • Service/Maintenance Records
    • Remote Management
    • Mobile Data
  • Healthcare
    • Patient Operations
    • Drug Trials & Clinical Testing

IP Surveillance

IP surveillance :

IP surveillance is a digitized and networked version of closed-circuit television (CCTV). In an IP surveillance system, an IP camera records video footage and the resulting content is distributed over an IP (Internet protocol) network.

Digitization offers a number of benefits over traditional analog CCTV, including:

  • Improved search capability.
  • Greater ease of use.
  • Better quality images and no degradation of content over time.
  • The ability to record and play simultaneously.
  • The ability to compress content for improved storage.

Adding networking capability to digital CCTV provides additional benefits, including:

  • Improved ability for remote viewing and control. Anyone on the network can potentially see video from any camera connected to the network.
  • IP storage makes it possible to store data in any geographic location.
  • Greater ease of distribution. An image of a crime suspect, for example, can be immediately distributed to officials.
  • The ability to connect to email and other communications systems so that alerts can be sent automatically.

There is a growing industry trend towards replacing analog CCTV  with IP surveillance systems.

Benefits of network video surveillance

The digital, network video surveillance system provides a host of benefits and advanced functionalities that cannot be provided by an analog video surveillance system. The advantages include remote accessibility, high image quality, event management and intelligent video capabilities, easy integration possibilities and better scalability, flexibility and cost-effectiveness.

Remote accessibility

Network cameras and video encoders can be configured and accessed remotely, enabling multiple, authorized users to view live and recorded video at any time and from virtually any networked location in the world. This is advantageous if users would like a third-party company, such as a security firm, to also gain access to the video. In a traditional analog CCTV system, users would need to be at a specific, on-site monitoring location to view and manage video, and off-site video access would not be possible without such equipment as a video encoder or a network digital video recorder (DVR). A DVR is the digital replacement for the video cassette recorder.

High image quality

In a video surveillance application, high image quality is essential to be able to clearly capture an incident in progress and identify persons or objects involved. With progressive scan and megapixel technologies, a network camera can deliver better image quality and higher resolution than an analog CCTV camera.

Image quality can also be more easily retained in a network video system than in an analog surveillance system. With analog systems today that use a DVR as the recording medium, many analog-to-digital conversions take place: first, analog signals are converted in the camera to digital and then back to analog for transportation; then the analog signals are digitized for recording. Captured images are degraded with every conversion between analog and digital formats and with the cabling distance. The further the analog video signals have to travel, the weaker they become.

In a fully digital IP-Surveillance system, images from a network camera are digitized once and they stay digital with no unnecessary conversions and no image degradation due to distance traveled over a network. In addition, digital images can be more easily stored and retrieved than in cases where analog video tapes are used.

Event management and intelligent video

There is often too much video recorded and lack of time to properly analyze them. Advanced network cameras and video encoders with built-inintelligence or analytics take care of this problem by reducing the amount of uninteresting recordings and enabling programmed responses. Such functionalities are not available in an analog system.

Axis network cameras and video encoders have built-in features such as video motion detection, audio detection alarm, active tampering alarm, I/O (input/output) connections, and alarm and event management functionalities. These features enable the network cameras and video encoders to constantly analyze inputs to detect an event and to automatically respond to an event with actions such as video recording and sending alarm notifications.

Image

Setting up an event trigger using a network camera’s user interface.

Event management functionalities can be configured using the network video product’s user interface or a video management software program. Users can define the alarms or events by setting the type of triggers to be used and when. Responses can also be configured (e.g., recording to one or multiple sites, whether local and/or off-site for security purposes; activation of external devices such as alarms, lights and doors; and sending notification messages to users).

Easy, future-proof integration

Network video products based on open standards can be easily integrated with computer and Ethernet-based information systems, audio or security systems and other digital devices, in addition to video management and application software. For instance, video from a network camera can be integrated into a Point of Sales system or a building management system.

Scalability and flexibility

A network video system can grow with a user’s needs. IP-based systems provide a means for many network cameras and video encoders, as well as other types of applications, to share the same wired or wireless network for communicating data; so any number of network video products can be added to the system without significant or costly changes to the network infrastructure. This is not the case with an analog system. In an analog video system, a dedicated coaxial cable must run directly from each camera to a viewing/recording station. Separate audio cables must also be used if audio is required. Networkvideo products can also be placed and networked from virtually any location, and the system can be as open or as closed as desired.

Cost-effectiveness

An IP-Surveillance system typically has a lower total cost of ownership than a traditional analog CCTV system. An IP network infrastructure is often already in place and used for other applications within an organization, so a network video application can piggyback off the existing infrastructure. IP-based networks and wireless options are also much less expensive alternatives than traditional coaxial and fiber cabling for an analog CCTV system. In addition, digital video streams can be routed around the world using a variety of interoperable infrastructure. Management and equipment costs are also lower since back-end applications and storage run on industry standard, open systems-based servers, not on proprietary hardware such as a DVR in the case of an analog CCTV system.

Furthermore, Power over Ethernet technology, which cannot be applied in an analog video system, can be used in a network video system. PoE enables networked devices to receive power from a PoE-enabled switch or midspan through the same Ethernet cable that transports data (video). PoE provides substantial savings in installation costs and can increase the reliability of the system. More on Power over Ethernet.

Image

A system that uses Power over Ethernet.

RFID system

A basic RFID system consists of three components:

  • An antenna or coil
  • A transceiver (with decoder)
  • A transponder (RF tag) electronically programmed with unique information

 

RFID syste,

  • The antenna emits radio signals to activate the tag and to read and write data to it.
  • The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When anRFID tag passes through the electromagnetic zone, it detects the reader’s activation signal.
  • The reader decodes the data encoded in the tag’s integrated circuit (silicon chip) and the data is passed to the host computer for processing.

What is RFID ?

RFID :
Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. It’s grouped under the broad category of automatic identification technologies.

RFID is in use all around us. If you have ever chipped your pet with an ID tag, used EZPass through a toll booth, or paid for gas using SpeedPass, you’ve used RFID. In addition, RFID is increasingly used with biometric technologies for security.

Unlike ubiquitous UPC bar-code technology, RFID technology does not require contact or line of sight for communication. RFID data can be read through the human body, clothing and non-metallic materials.

COMPONENTS :
A basic RFID system consists of three components:

An antenna or coil
A transceiver (with decoder)
A transponder (RF tag) electronically programmed with unique information

.The antenna emits radio signals to activate the tag and to read and write data to it.
.The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader’s activation signal.
.The reader decodes the data encoded in the tag’s integrated circuit (silicon chip) and the data is passed to the host computer for processing.

The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. RFID technology has been used by thousands of companies for a decade or more. . RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive – and invasive – uses for RFID tags are in the works.

A typical RFID tag consists of a microchip attached to a radio antenna mounted on a substrate. The chip can store as much as 2 kilobytes of data.

To retrieve the data stored on an RFID tag, you need a reader. A typical reader is a device that has one or more antennas that emit radio waves and receive signals back from the tag. The reader then passes the information in digital form to a computer system.

CURRENT AND POTENTIAL USES OF RFID :

Asset Tracking
It’s no surprise that asset tracking is one of the most common uses of RFID. Companies can put RFID tags on assets that are lost or stolen often, that are underutilized or that are just hard to locate at the time they are needed. Just about every type of RFID system is used for asset management. NYK Logistics, a third-party logistics provider based in Secaucus, N.J., needed to track containers at its Long Beach, Calif., distribution center. It chose a real-time locating system that uses active RFID beacons to locate container to within 10 feet.

Manufacturing
RFID has been used in manufacturing plants for more than a decade. It’s used to track parts and work in process and to reduce defects, increase throughput and manage the production of different versions of the same product.

Supply Chain Management
RFID technology has been used in closed loop supply chains or to automate parts of the supply chain within a company’s control for years.

As standards emerge, companies are increasingly turning to RFID to track shipments among supply chain partners.

Retailing
Retailers such as Best Buy, Metro, Target, Tesco and Wal-Mart are in the forefront of RFID adoption. These retailers are currently focused on improving supply chain efficiency and making sure product is on the shelf when customers want to buy it.

Payment Systems
RFID is all the rage in the supply chain world, but the technology is also catching on as a convenient payment mechanism. One of the most popular uses of RFID today is to pay for road tolls without stopping. These active systems have caught on in many countries, and quick service restaurants are experimenting with using the same active RFID tags to pay for meals at drive-through windows.

Security and Access Control
RFID has long been used as an electronic key to control who has access to office buildings or areas within office buildings. The first access control systems used low-frequency RFID tags. Recently, vendors have introduced 13.56 MHz systems that offer longer read range. The advantage of RFID is it is convenient (an employee can hold up a badge to unlock a door, rather than looking for a key or swiping a magnetic stripe card) and because there is no contact between the card and reader, there is less wear and tear, and therefore less maintenance.

As RFID technology evolves and becomes less expensive and more robust, it’s likely that companies and RFID vendors will develop many new applications to solve common and unique business problems.

What information does one have to give up to participate in social media ?

Social networks such as Facebook and Google+ require at a minimum that you provide them with your name, gender and date of birth. Many people provide additional profile information, and the act of using the services – writing comments or uploading photos or “friending” people – creates additional information about you. Most of that information can be kept hidden from the public if you choose, though the companies themselves have access to it.

If you use your Facebook credentials to log-on to other Web sites, or if you use Facebook apps, you might be granting access to parts of your profile that would otherwise be hidden. Quora, for example, a popular online Q&A site, requires that Facebook users provide it access to their photos, their “Likes” and information that their friends share with them. TripAdvisor, by contrast, requires only access to “basic information” including gender and lists of friends.

Social media apps on smartphones, which have access to personal phone call information and physical location, put even more information at play. On Apple Inc’s iPhone, apps must get user permission to access GPS location coordinates, a procedure that will now be applied to address book access as well after companies including Twitter were found to be downloading iPhone address book information.