RFID Architecture

Embed Size (px)

Citation preview

  • 8/8/2019 RFID Architecture

    1/22

    RFID ARCHITECTURECHAPTER 2.CHAPTER 2.

  • 8/8/2019 RFID Architecture

    2/22

    C o n t e n t so n t e n t s. Confluence of Technologies. ey Functionalities. FID System Components. ystemic QualityConsiderations

    . rchitecture Guidelines

  • 8/8/2019 RFID Architecture

    3/22

    1 . A C o n f l u e n c e o f T e c h n o l o g ie s. A C o n f l u e n c e o f T e c h n o l o g ie svAdvances in semiconductor technologies

    FID would have remained a nicheechnology if it was not for Moore's lawnd the ability of the semiconductorndustry to produce chips that packagerocessing power at a level that makes.t affordable for the mass RFID market

    v Intell igent devices dvances in semiconductor technologies

    aven't just brought down the cost ofFID chips they are also the primaryrivers behind the development of,ntelligent devices including sensors.uch as RFID readers

  • 8/8/2019 RFID Architecture

    4/22

    vv Broadband wired and wireless networks and

    cheaper edge processing servers he availability of pervasive broadband data,etworks coupled with affordable yet,owerful servers has led to the developmentf architectures that move processing to .here the business processes are carried out

    v Edge processing capabil ity dge processing capability derives from having-owerful yet low cost personal computers andervers deployed at the edges of thenterprise network as well as a broadband.onnection to the data center

    v Service-oriented architecture -ervice oriented architectures allow us to-evelop and deploy loosely coupled moduleshat interface with each other using web- .ervices based standards he overall RFID system architecture followshe principles widely accepted today as the

    1 . A C o n f l u e n c e o f T e c h n o l o g ie s. A C o n f l u e n c e o f T e c h n o l o g ie s

  • 8/8/2019 RFID Architecture

    5/22

    2 . K e y F u n c t i o n a l i ti e s. K e y F u n c t i o n a l i t i esv The abil ity to encode RFID tags -eciding on an item numbering scheme

    D and the serial number is created by UDC D Center established universities andompanies hope was that they could developtandards that would reduce the cost ofndividual tags the component and thattandard identifiers could facilitate- .nformation sharing among industry partners ,e can and some bar code encoding systems are

    .lready being used to make RFID tags ncoding identities on RF tags

    ,ach type of identification tag from barodes and optical scatter codes to magnetic,tripes and RFID tags has a particularncoding that allows it to represent an.dentity f the identity only needs to be read by the,utomated system print the identity in a)orm that it can read very easily ex barcode

    n order to select the proper encoding to,rite an identity to an RFID tag you mustnow both the type of identity you want torite and the memory capacity and type of. )he tag itself ex GID encoding

  • 8/8/2019 RFID Architecture

    6/22

    Ex) bar codevv

    vv

    Ex) GID encodingurn:epc:tag:gid-96:FilterValue.GeneralManagerNumber.ObjectClass.SerialNumber

    urn:epc:tag:gid-96:0.00012345.054322.4208

    2 . K e y F u n c t i o n a l i ti e s. K e y F u n c t i o n a l i t i es

  • 8/8/2019 RFID Architecture

    7/22

    2 . K e y F u n c t i o n a l i ti e s. K e y F u n c t i o n a l i t i esv Attaching RFID Tags

    - -ar codes are often applied using print andpply machines that press or blow an adhesiveag onto an item as it passes by on an,ssembly line and similar devices exist for.mart label RFID tags ne important consideration when weighing theost of adopting an automated method forttaching smart labels is the relatively highefect rate of these RFID tags due to their.elicacy and sensitivity

    v Tracking the Movement of Items ,ags attached to the item more sooner that you.an see more useful information

    v Using RFID Data in Business Applicationsv Sharing RFID Data B2Bv Self Organization of Intell igent Devices

  • 8/8/2019 RFID Architecture

    8/22

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t sEnterprise application

    RFID information

    Service

    Enterprise service bus RFIDdatabase

    -nterprise levelPS informationservice

    FID enterprisenformation serviceat a c en te ra ta ce nte r

    Firewall

    Firewall

    FID information service

    usiness services

    usiness partners

    RFID middleware

    Edge applications RFID information

    Service

    RFIDdatabase

    ReaderFID Tags

    Storetore FID edge nformation service

  • 8/8/2019 RFID Architecture

    9/22

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t svTag

    Communication between RFID tags and a reader

    nybody here?

    here

    !here

    3 !ere

    ag 1

    ag 2

    ag 3

  • 8/8/2019 RFID Architecture

    10/22

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t svReaders

    eader APICommunications vent management ntenna subsystem

    Selecting Readers

    ,eaders as powerful radio,ransmitters must alsoonform to localegulations concerning, ,requency power level and(uty cycles how often theeader is actually).ransmitting

    ,hen selecting a reader alsoay close attention to thehysical environment in .hich it will be operated

    -n often overlookedonsideration in selectingreader is how well itill cooperate with yoururrent IT monitoring and.anagement tools

    Reader API

    Communications

    Event management

    Antenna subsystem

    tags

    RFID

    r

    ea

    der

  • 8/8/2019 RFID Architecture

    11/22

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t svRFID Middleware

    ne of the primary benefits of using RFIDiddleware is that it standardizes waysf dealing with the flood of information.hese tiny tags produce

    FID middleware

    pplication level interface vent management eader adapter

  • 8/8/2019 RFID Architecture

    12/22

    Motivations for using RFID middleware :ia the reader adapter providing connectivity with.eaders :ia the event manager processing raw RFID .bservations for consumption by applications -roviding an application level interface to manage.eaders and capture filtered RFID events

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t s

    nterprise application

    Readers Readers

    nterprise application

    Readers Readers

    FID middlewareFID middleware

    ]xposing applications directly to RFID readers sing RFID middleware

  • 8/8/2019 RFID Architecture

    13/22

    The reader adapter ,eader interfaces as well as data access and device, ,anagement capabilities differ widely so youhould try to use middleware that shields you fromaving to learn the idiosyncrasies of individual.eaders he reader adapter layer encapsulates the proprietaryeader interfaces so that they don't come in

    .ontact with the application developers The event manager

    -ost of these observations would be too fine grained,o be meaningful to applications so you want toncapsulate the reader interface to keep the .pplications from being bombarded by raw data -nterprises will thus need to deploy special purposeFID middleware near the edges of their IT.nfrastructures n RFID event manager aggregates raw RF read data( )rom multiple data sources such as readers andonsolidates and filters it based on previously- .onfigured application level event filters ost event managers then feed the filtered data to.he backend systems

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t s

  • 8/8/2019 RFID Architecture

    14/22

    filtering and smoothing system devised toddress typical scenarios experienced in.etail stores

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t s

  • 8/8/2019 RFID Architecture

    15/22

    The application-level interface -he application level interface is the top.ayer in the RFID middleware stack ts primary purpose is to provide atandardized mechanism that enablespplications to register for and receive

    iltered RFID events from a set of.eaders -he application level interface also ,rovides a standard API for configuring,onitoring and managing RFID middleware.nd the readers and sensors it controls

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t s

  • 8/8/2019 RFID Architecture

    16/22

    v The RFID Service Bus ( )n enterprise service bus ESB is aistributed integration platform designed,or application connectivity data, ,ransformation guaranteed transactions.nd messaging n RFID service bus is a type of ESB used .o integrate applications using RFID data ,enerally ESBs orchestrate business,rocesses across application or sometimes, .nterprise boundaries The RFID information service

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t s

  • 8/8/2019 RFID Architecture

    17/22

    The RFID information network -s RFID tagged products move through,he supply chain variousarticipants in the supply chain will

    -eed standards based means to shareheir tracking information and to geteference information on products( ) .ased on their product tags EPCs he RFID information network provides.ive principal services

    3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t s

  • 8/8/2019 RFID Architecture

    18/22

    ne vision of the RFID informationnetwork3 . R F I D S y s t e m C o m p o n e n t s. R F I D S y s t e m C o m p o n e n t s

    ONS( )local

    EPCIS

    ONS( )root

    EPCIS

    EPCIS

    ONS( )local

    EPC discoveryservices

    EPC global

    Manufacture Distributor Retailer

  • 8/8/2019 RFID Architecture

    19/22

    v Privacy and Security ,s in any enterprise system securityonsiderations for an RFID system ensuringhe authenticity of the information stored on,he tags themselves securing theransmission of information between tags and,eaders and ensuring overall application andnfrastructure security permeate the various.ayers of its architecture

    v Performance erformance is measured in terms of time taken.o perform a unit of activity epending on the layer of the RFID system at,hich you're working the performance

    .onsiderations will varyv Scalabil ity

    calability has to do with how small a systemay start and how quickly it must be ready to.row ,or RFID systems scalability involves much more

    " ."han CPU headroom

    4 . S y s t e m i c Q u a l i t y C o n s i d e r a t i on s. S y s t e m i c Q u a l i t y C o n s i d e r a t i on s

  • 8/8/2019 RFID Architecture

    20/22

    v Manageabil ity FID information servers are typically housed

    .n a data center or server room Operationstaff can monitor and manage the serverssing procedures developed for any other.pplication server ,reader may be just as complex as a server,equiring software or firmware upgrades, .onitoring and management n event manager is likely to be located onerver hardware but deployed close to the.eaders

    v Extensibil ity and Maintainabil ity ,or most organizations RFID readers are the.irst step into a new space at the edge FID systems are in a state of flux asechnology advances and standards only begin.o solidify n RFID installation of any size must berepared to plug in readers with different,ounting requirements different management,nterfaces and even different manufacturers.epending on what is available this week

    4 . S y s t e m i c Q u a l i t y C o n s i d e r a t i on s. S y s t e m i c Q u a l i t y C o n s i d e r a t i on s

  • 8/8/2019 RFID Architecture

    21/22

    he infrastructure for RFID edge components must be.ncredibly robust , , ,deally the readers RFID middleware and so on should- - .upport effortless plug and play functioningv Begin with Business Requirements

    hile you're defining the business requirements and,apturing functional requirements pay careful .ttention to accounting for exception processingv Don't Forget Your Existing Infrastructure

    ,ore often than not RFID systems will have to coexist, ,ith bar code systems providing alternate more.utomated capabilitiesv Process Data at the Edge Where Possible

    .rocess as much data as possible at its source he raw RFID observations collected by readers shoulde filtered at the edge before sending only what is

    .eaningful to applicationsv Track Items to the Level Your Business Processes Wil lSupport

    v he real challenge is not in identifying an RF tag,niquely but in figuring out what you are going to.o with that informationv , ,eigh the cost of generating storing and processing

    .his information against the business benefits

    5 . A r c h i t e c t u r e G u i d e l i n e s. A r c h i t e c t u r e G u i d e l i n e s

  • 8/8/2019 RFID Architecture

    22/22

    THANK YOU *^^*