CSA Preface
Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).
For brevity, this Standard will be referred to as “CAN/CSA-ISO/IEC TR 24729-3” throughout.
At the time of publication, ISO/IEC TR 24729-3:14 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC.
This International Standard was reviewed by the TCIT under the jurisdiction of the Strategic Steering Committee on Information Technology and deemed acceptable for use in Canada. From time to time, ISO/IEC may publish addenda, corrigenda, etc. The TCIT will review these documents for approval and publication. For a listing, refer to the Current Standards Activities page at standardsactivities.csagroup.org. This Standard has been formally approved, without modification, by the Technical Committee and has been developed in compliance with Standards Council of Canada requirements for National Standards of Canada. It has been published as a National Standard of Canada by CSA Group.
Scope
This part of ISO/IEC TR 24729 provides reference information and practical knowledge in the selection, installation and application of ISO/IEC 18000-6C RFID Readers. RFID Readers include fixed mounted (such as portal, conveyor, and wrap stations), handheld (tethered and wireless), and mobile mounted (such as those found on forklifts). This part of ISO/IEC TR 24729 presents guidelines to improve the performance of RFID data collection systems for more successful applications and to cover the approaches necessary to ensure that the operational requirements of the end user are met. Many of the techniques recommended are the result of practical tests in working environments. However, each application is different and thus the techniques recommended herein might not be applicable in all situations.