{"id":6911,"date":"2020-02-24T12:41:47","date_gmt":"2020-02-24T12:41:47","guid":{"rendered":"https:\/\/rfid4u.com\/?page_id=6911"},"modified":"2020-09-19T04:08:14","modified_gmt":"2020-09-19T04:08:14","slug":"rfid-reader-interrogation-zone","status":"publish","type":"page","link":"https:\/\/rfid4u.com\/rfid-reader-interrogation-zone\/","title":{"rendered":"RFID Reader Interrogation Zone"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600488468626{background: #ffffff url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/Rfid4uWebsite-Background-Image-1.jpg?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Explore \/ RFID Basics &amp; Resources&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;RFID Basics &#8211; RFID Reader Interrogation Zone&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1589007174025{background-color: #ffffff !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_row][vc_column][vc_column_text]An interrogation zone (or read zone) consists of the RFID reader (or interrogator), antennas, cables, peripherals, and the environment in which the equipment is installed. The complexity of an interrogation zone is determined by its environment, in which the presence of multiple objects can cause reflections, absorption, or interference with the original signal. These factors can cause unintentional reads, can block the intended reads, and can reduce throughput processing capability.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>Hardware and software for an interrogation zone must be properly selected and configured to eliminate or overcome the environmental and business procedural obstacles and limitations. Before you can create a properly functioning interrogation zone, you must understand its components.<cite><\/cite><\/blockquote><\/div>[vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;INTERROGATOR FUNCTIONALITY&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Interrogators (also called readers or transceivers) read and write data to and from tags. Interrogators are responsible for remotely powering the tags (in passive and semi-passive systems), establishing the bidirectional data flow between themselves and the tags, and performing analog to digital as well as digital to analog signal conversion.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14349&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221; el_class=&#8221;explore_image_width&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]Interrogators can also run attached to peripheral devices, such as light stacks or alerting horns that provide feedback on conditions within the system; and triggering devices, which control when the interrogators are turned on and off. Peripherals are usually attached to the I\/O ports of the interrogators.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>Interrogators can also communicate with and control nearby sensors integrated within the interrogation zone and are responsible for communications over networks for alerting back-end systems of the assets or goods they are tracking.<cite><\/cite><\/blockquote><\/div>[vc_column_text]According to their capabilities, interrogators are often called either smart or dumb. Smart interrogators carry built-in computers that run programs, which filter, aggregate, and analyze data to turn it into meaningful events for the back-end system. A dumb interrogator reads tag data and reports what it sees to the back-end system. This type of interrogator is highly dependent on a middleware product that performs filtering and aggregation functions and converts the data read into a meaningful format, which acts as the input to the back-end system. Most of the interrogators today are smart interrogators.[\/vc_column_text][vc_column_text]Interrogators often have a graphical user interface (GUI) by which they can be controlled. An interrogator GUI is typically accessible through a web interface using any commercial Internet browser on the computer or through a simple application program. Following are some typical features of a GUI:<br \/>\n\u2022 Read from and write to tag capability<br \/>\n\u2022 Network configuration settings<br \/>\n\u2022 Antenna settings<br \/>\n\u2022 Power settings<br \/>\n\u2022 Input\/Output port configuration settings<br \/>\n\u2022 Firmware upgrade capability[\/vc_column_text][vc_column_text]Firmware upgrades on the interrogator are performed to enhance performance, support new features, or resolve issues with the existing platform. They are usually downloaded from the manufacturer\u2019s site and can be deployed to the interrogators in a variety of methods. Most common methods are a Pull method, where the new firmware is downloaded or \u201cpulled\u201d by the reader using File Transfer Protocol (FTP), or Hyper Text Transfer Protocol (HTTP), and an automated Push method, where the new firmware is automatically uploaded or \u201cpushed\u201d to a reader from the host. The method used depends on the manufacturer and middleware used in the installation.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;INTERROGATOR COMPONENTS&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_single_image image=&#8221;14369&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;explore_image_width&#8221;][vc_column_text]An interrogator includes a transmitter, a receiver, an oscillator and a control unit (processor).[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;OSCILLATOR&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Oscillator provides carrier signal to modulator (in transmitter) and a reference signal to demodulator (in receiver) circuits.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;TRANSMITTER&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The transmitter part of an interrogator consists of the following:<br \/>\n\u2022 <strong>Base band transmitter<\/strong>\u2003Sends the carrier wave that powers the tags<br \/>\n\u2022 <strong>Power amplifier<\/strong>\u2003Amplifies the signals produced by the oscillator<br \/>\n\u2022 <strong>Modulator\u2003<\/strong>The original RF wave\u2019s amplitude, frequency of transmission, or phase[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;RECEIVER&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The receiver part of an interrogator consists of the following:<br \/>\n\u2022 <strong>Amplifier<\/strong> Amplifies the weak signals received from the tag before demodulation<br \/>\n\u2022 <strong>Demodulator<\/strong> Compares the modulated signal to the original signal, thereby extracting the information embedded within[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;CONTROL UNIT (PROCESSOR)&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]A processor embedded within the interrogator provides these functions:<br \/>\n\u2022 Controls network communications with the middleware or back-end system<br \/>\n\u2022 Runs the primary operation systems for the interrogator<br \/>\n\u2022 Controls the functions of the interrogator<br \/>\n\u2022 Controls the memory (ROM, RAM, hard drive type data storage)<br \/>\nToday, many of these components are contained within a digital signal processor (DSP) so that the radio portion of the interrogator is essentially software-controlled and features can be changed or upgraded on the fly.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>The external interfaces to the interrogator are various communication ports such RS-232, RS-245, or RS-422 serial ports; universal serial bus (USB); Bluetooth and 802.11 wireless network interfaces; LAN ports; general purpose I\/O ports; and most importantly antenna ports typically found in batches of four or eight antennas, depending on whether the interrogator is monostatic or bistatic.<cite><\/cite><\/blockquote><\/div>[vc_column_text]Interrogators can be powered in different ways. For installations of almost any commercially available interrogator, you will need readily accessible 110 V or 240 V AC outlets (for US and European installations, respectively). Handheld interrogators can utilize an internal battery, but they will have to be recharged using a docking station connected to an AC outlet. In certain situations, it may be appropriate to use Power Over Ethernet (POE), which allows the same wire that transfers data to the interrogator to provide power to it also.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;MONOSTATIC VERSUS BISTATIC INTERROGATOR&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]A monostatic interrogator uses a single antenna to transmit and\/or receive data to or from a tag. A circulator that lives inside the interrogator turns the antenna from the transmitting to receiving function in a very rapid manner. A bistatic interrogator uses two antennas, each dedicated either to transmitting or receiving. Bistatic interrogators usually have twice as many antenna ports as monostatic interrogators.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;INTERROGATOR TYPES&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Interrogators come in multiple formats, and you choose the most appropriate type to match the business process in which you are trying to use this technology. The main types are Fixed interrogators and Mobile Interrogators, which include handheld and vehicle-mounted interrogators. Interrogators can also come in the form of a USB stick for laptops, or module-based interrogators found in RFID-enabled printers.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14347&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;explore_image_width&#8221;][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;FIXED INTERROGATORS&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]A monostatic interrogator uses a single antenna to transmit and\/or receive data to or from a tag. A circulator that lives inside the interrogator turns the antenna from the transmitting to receiving function in a very rapid manner. A bistatic interrogator uses two antennas, each dedicated either to transmitting or receiving. Bistatic interrogators usually have twice as many antenna ports as monostatic interrogators.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;VEHICLE-MOUNTED INTERROGATORS&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Vehicle-mounted interrogators, which can automate shipping and receiving of goods, are usually integrated into material handling devices such as forklifts, paper trucks, cargo trucks, and pallet jacks. These interrogators usually have a special shape for easier installation onto the vehicle and a rugged design to survive the vibrations and other environmental conditions.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;HANDHELD INTERROGATORS&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Mobile interrogators, such as handheld interrogators, are often used for low-volume reading or writing in exception processing, quality assurance, and mobile shipping receiving units. Handheld interrogators come in a variety of forms and have a vast selection of options for communications. They can be tethered, receiving power and accomplishing data transmission via a nearby base unit using an extensible cord. Other types of handhelds can be wireless, depending on wireless networks or Bluetooth communications for data transfer, limiting operational time to battery life between charges. Newer renditions of handheld interrogators are appearing in forms of cellular phones and personal digital assistants (PDAs).<br \/>\nHandheld interrogators are usually monostatic, with integrated linear antennas. The monostatic design keeps their size to a minimum since only one antenna is used, while the linear antenna polarization is used to get the best read range. The interrogator\u2019s orientation can be changed simply by turning your wrist.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;INTERROGATOR ANTENNAS&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The interrogator antenna is a converter between the radiated waves and wired voltage that feeds the system. It is the largest and most obvious and most exposed point of the system, as it must be near the assets it is identifying. This also makes it the most vulnerable point of the system, because it be physically impacted by goods traversing the interrogation zone. Antennas tend to be near doorways in distribution centers and manufacturing centers so they are occasionally exposed to rain, snow, wind, and high-speed vehicles (such as fork trucks) traveling through the interrogation zone.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;14340&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221; css=&#8221;.vc_custom_1590568114111{padding-bottom: 30px !important;}&#8221;][vc_single_image image=&#8221;14342&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221; css=&#8221;.vc_custom_1590568187904{padding-bottom: 150px !important;}&#8221;][vc_single_image image=&#8221;6986&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221;][vc_single_image image=&#8221;6987&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;ANTENNA FOOTPRINT&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The footprint of the antenna will dictate the size of the interrogation zone and how well the zone will be covered by the antenna. Most antennas come with a radiation plot that defines the area the antenna will cover, how far away the signal can be measured, and how wide the antenna beam is at its widest. Overlapping antenna coverage is always a good idea in fixed interrogator installations to ensure consistent and maximum coverage within the interrogation zone.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;6988&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221;][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_custom_heading text=&#8221;ANTENNA GAIN&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The length and width of the read zone will be determined by the gain of the antenna. Antennas with higher gain will have longer and narrower RF pattern. On the other hand, antennas with lower gain will have shorter and wider RF pattern. Most antennas come with standard 8.5 dBi gain, however, you can also get lower and higher gain antennas for special application.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;ANTENNA POLARIZATION&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Both linearly and circularly polarized antennas are used in common RFID supply chain applications. Linear antennas propagate only on a single plane, so they are either horizontally or vertically polarized. Linear antennas have a more focused beam than a circular antenna, and as a result, more power is realized on a single plane in the interrogation zone compared to circular antennas. Therefore, linear antennas achieve longer read ranges and better penetration of dense objects than circular antennas.<br \/>\nCircularly polarized antennas spread their power equally across a vertical and a horizontal plane; therefore, the signal is not propagated as far and a tag does not receive as much power as it would from a linear antenna, because the power is split across two planes. The main advantage of a circular antenna is, however, that the objects do not need to be in a specific orientation in order to be read.<br \/>\nIn a mixed environment where orientation cannot be controlled, circular antennas work best. In a manufacturing environment where orientation can be assured, linear antennas are better because they can penetrate dense objects.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;6989&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221; css=&#8221;.vc_custom_1582958412128{padding-bottom: 30px !important;}&#8221;][vc_single_image image=&#8221;6990&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221;][vc_single_image image=&#8221;6991&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221; css=&#8221;.vc_custom_1582958445962{padding-bottom: 150px !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>Note: Antennas are neither monostatic nor bistatic, as this is determined by the interrogator. However, they are sometimes referred to in these ways because an antenna that is intended for use in a bistatic interrogator usually consists of two antennas in its casing and is larger in size. Theoretically, this antenna could be used as two monostatic antennas if it were connected to two antenna ports on a monostatic interrogator.<cite><\/cite><\/blockquote><\/div>[vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;PROTOCOLS&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]An air interface protocol is the means by which the tag communicates with the interrogator and the interrogator communicates with the tag. Data protocols determine how the interrogator interprets the numbers it reads during this exchange. Air interface protocols and data protocols are governed by various standard bodies such as the International Organization for Standardization (ISO) and EPCglobal, the two primary bodies that define how these protocols work.<br \/>\nFor more information about Standards and Protocols visit<\/p>\n<ul class=\"page-link\">\n<li><a href=\"https:\/\/rfid4u.com\/rfid-regulations\/\">RFID Regulations<\/a><\/li>\n<li><a href=\"https:\/\/rfid4u.com\/epc-gen2-reader-commands-and-q-parameter\/\">EPC Gen2 Reader Commands and Q Parameter<\/a><\/li>\n<li><a href=\"https:\/\/rfid4u.com\/rfid-standards-mandates\/\">How to select a correct RFID tag \u2013 Standards &amp; Mandates<\/a><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;INTERROGATION ZONE CONFIGURATION&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]To make an interrogator function properly, you must configure it properly using settings that differ by the type of the interrogator as well as the manufacturer. Following are the most common settings you may encounter.<br \/>\n\u2022 <strong>Output power<\/strong>\u2003One of the most important settings is the transmit power level of an interrogator. The power level is usually set so that interrogators do not interfere with interrogation zones installed parallel to one another. Power levels will be usually provided in watts (W), milliwatts (mW), decibels (dB) or as a percentage, where 100 percent will equal to 1 W (or the maximum allowed power for that region of the world). In certain situations, you may be able to adjust both the reading power and writing power.<br \/>\n\u2022 <strong>Antenna settings<\/strong>\u2003You can combine antennas into groups within the configuration of an interrogator. This allows multiple antennas to act as a single device, pushing more power into the interrogation zone to flood the area with a signal and ensure that all tags in that area are read. In many cases, you can also choose antenna sequencing, which allows multiple antennas to operate in a particular order.<br \/>\n\u2022 <strong>Retries\u2003<\/strong>You can set up the number of times an interrogator will attempt to find new tags in the interrogation zone before reporting its findings. This is known as retries.<br \/>\n\u2022 <strong>Filtering\u2003<\/strong>This feature allows the interrogator to communicate only with the portion of the tag population it is looking for. For instance, a dock door interrogator may filter out all case tags and communicate results from pallet tags only.<br \/>\n\u2022 <strong>Polling\u2003<\/strong>Interrogators can scan for tags either continuously, in preset intervals, or on demand.<br \/>\n\u2022 <strong>Modes of reading<\/strong>\u2003Sometimes you can choose from various modes of reading that are already preset to ensure a specific interrogator performance. You can encounter a conveyor mode, self-mode, or rapid read mode, and although manufacturers use different terms to refer to these modes, they all are basically the same for all interrogators.<br \/>\nFor instance: When in conveyor mode, the interrogator reads in fast intervals with a low number of retries; in this mode, usually few tags are in the interrogation zone but they need to be read quickly, since the tag is in view of the antenna for only a short time. Inventory mode is more of a transitional mode. The interrogator will report when it sees a change; it will see a large number or a given number of tags for a specific amount of time, and when that number changes, the interrogator instantly generates a report to the back-end system to indicate the loss or gain of a new tag identity.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_btn title=&#8221;EPC Gen2 Reader Commands and Q Parameter&#8221; style=&#8221;outline&#8221; shape=&#8221;square&#8221; color=&#8221;warning&#8221; align=&#8221;left&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-left&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Frfid4u.com%2Fepc-gen2-reader-commands-and-q-parameter%2F|title:EPC%20Gen2%20Reader%20Commands%20and%20Q%20Parameter||&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_btn title=&#8221;RFID Printers Encoders&#8221; style=&#8221;outline&#8221; shape=&#8221;square&#8221; color=&#8221;warning&#8221; align=&#8221;right&#8221; i_align=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-right&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Frfid4u.com%2Frfid-printers-encoders%2F|title:Printers%20Encoders||&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600488468626{background: #ffffff url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/Rfid4uWebsite-Background-Image-1.jpg?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Explore \/ RFID Basics &amp; Resources&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;RFID Basics &#8211; RFID Reader Interrogation Zone&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1589007174025{background-color: #ffffff !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_row][vc_column][vc_column_text]An interrogation zone (or read zone) consists of the RFID reader (or interrogator), antennas, cables, peripherals, and the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-6911","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/6911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/comments?post=6911"}],"version-history":[{"count":0,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/6911\/revisions"}],"wp:attachment":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/media?parent=6911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}