RIFD middleware design addressing application requirements and RIFD constraints - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

RIFD middleware design addressing application requirements and RIFD constraints

Description:

RIFD middleware design addressing application requirements and RIFD constraints ... Savant (Auto-ID Center) Requirement for application. Application Requirements ... – PowerPoint PPT presentation

Number of Views:52
Avg rating:3.0/5.0
Slides: 26
Provided by: supercom
Category:

less

Transcript and Presenter's Notes

Title: RIFD middleware design addressing application requirements and RIFD constraints


1
RIFD middleware design addressing application
requirements and RIFD constraints
Institute for Pervasive Computing Department of
Computer Science ETH Zurich, Switzerland
  • Son, Byung-kook

2
Content
  • Introduction
  • Related Work
  • Requirements for application
  • Constraints of passive RFID
  • RFID middleware design
  • RFIDStack
  • Conclusion
  • Other

3
Introduction
  • RFID system overview

Applications Combine RFID data with application
logic Provide persistence
Combines with application logic
Middleware Distributes filtered RFID
data Acquires raw RFID data
Acquires raw tag reads, filters and deliver them
to applications
Readers Identify tags
Identifies tags using radio-frequency
4
Introduction
  • Analysis the requirement for RFID M/W
  • Manage large deployments of readers
  • Manage the amount data of readers capture
  • Middleware design
  • For application needs
  • For constraints of passive RFID

5
Related Work
  • EPC Network (EPC Global)
  • Savant (Auto-ID Center)

6
Requirement for application
  • Application Requirements
  • RFID data dissemination
  • single application, multi application, business
    partners
  • ex) supports different latencies
  • Data filtering and aggregation
  • Rather than raw streams of RFID data
  • Reading from and writing to a tag
  • Reader integration in IT-service management
  • For increase reader (change, configuration)
  • Privacy

7
Constraints of passive RFID
  • Characteristics of RFID
  • Limited communication bandwidth
  • Exist 100 readers in 15 channels
  • Readers need to coordinate their activities
  • Restricts the number of tag that identified per
    sec
  • Reliability issues
  • False negative reads (by collision or
    transmission errors)
  • Tag memory
  • Impacted by the memory structure on the tags (a
    single random identifier or identifier that
    contains object info)
  • Heterogeneous reader landscape
  • Diverse computing and networking capabilities of
    readers

8
RFID middleware design(1)
  • Filtering and Aggregation

9
RFID middleware design(2)
  • Messaging
  • - Decouple between reader and application
  • Full content-based routing
  • Carry out the filtering within the messaging
    system (by reader ID, tag ID, tag data)
  • Subscription feedback mechanism
  • Determine whether applications are interested in
    the RFID data readers produced
  • Switching off completely to make bandwidth
    available to another reader
  • Filtering
  • No longer carried out in software , but over air
    interface
  • Reliability
  • POS system, magic medicine cabinet (real-time)

10
RFID middleware design(3)
  • Reading from and writing to a tag
  • - Writing to an RFID tag as easy as writing data
    to a hard disk
  • VTMS (Virtual Tag Memory Service)
  • Shield the application from the particularities
    of RFID tag memory
  • Limited memory size, different memory organization

11
RFID middleware design(4)
  • Reader integration in IT-Service Management
  • Integration of RFID readers in an existing
    IT-service
  • Perform change, release, configuration management
  • Requires methods to query and modify
  • Configuration of a reader
  • Remotely update the software on a reader
  • Exception reporting functionality

12
RFID middleware design(5)
  • Deployment diagram of the proposed RFID
    middleware design

13
RFIDStack
  • Middleware platform
  • Messaging component
  • feedback mechanism
  • built-in security feature
  • support seven different types of readers
  • filter and aggregate types
  • No support for IT service management

14
Sensor Based Services (ORACLE)
  • Overview

15
Sensor Based Services (ORACLE)
  • Oracle Sensor Edge Server
  • Device Management
  • Collect Sensor Data
  • Filter Sensor Data
  • Dispatch Sensor Data
  • Drive Response Device
  • Extend Drivers, Filters and
  • Dispatchers

16
Sensor Based Services (ORACLE)
  • Oracle Sensor Edge Server Architecture

17
Sun Java RFID Middleware (SUN)
  • Functionality

18
Sun Java RFID Middleware (SUN)
  • Key Middleware Considerations
  • Scalability
  • Ability to handle sensor and data volumes
  • Availability
  • Ability to satisfy application QOS requirements
  • Fail over and dynamic healing
  • Manageability
  • System health and performance issues
  • No IT support at the sensor edge
  • Identity and Security
  • Communicating with friends not foes

19
Sun Java RFID Middleware (SUN)
  • Sun Real-Time Enterprise Architecture

20
Sun Java RFID Middleware (SUN)
  • Sun Sensor Middleware

21
Sun Java RFID Middleware (SUN)
  • Sun RFID Internal Event Manager

22
IBM WebSphere RFID Solution Overview- IBM
Middleware in use with RFID
  • IBM RIFD Solution Overview

23
IBM WebSphere RFID Solution Overview- IBM
Middleware in use with RFID
  • IBM WebSphere RFID Premises Server
  • Platform for deployment of RFID enabled
    applications
  • Enables correlation of RFID events through
    pattern analysis and application of business
    rules
  • J2EE Application Platform for RFID business
    applications specific to a given premises
  • Creates and maintains a system of record for
    RFID events
  • Secure, reliable messaging for integration with
    enterprise
  • Enabled for remote system management

24
IBM WebSphere RFID Solution Overview- IBM
Middleware in use with RFID
  • Premises Server Architecture

25
  • The End
Write a Comment
User Comments (0)
About PowerShow.com