View
2.896
Download
0
Embed Size (px)
DESCRIPTION
This slide was prepared for a seminar presentation of according to curriculum of undergraduate program of KUET. It is done following a paper of IEEE Computer magazine
Citation preview
Enabling Next Generation RFID Applications: Solutions and Challenges
Abdullah Al MahmudRoll : 0507006
Dept of CSE, KUETKhulna, Bangladesh.
Presented by:
Authors
Quan Z. Sheng -- University of Adelaide
Xue Li -- University of Queensland
Sherali Zeadally-- University of the District of
Columbia
It was published in IEEE Computer magazine, the September 2008 volume
2Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
• The term RFID means Radio Frequency Identification
• RFID is emerging as an important technology for revolutionizing a wide range of applications, including supply-chain management, retail sales and healthcare
• Predictions indicate that RFID will be worth billions of dollars in new investments. According to IDTechEx, the RFID market will increase from US$4.96 billion in 2007 to US$26.88billion in 2017
IntroductionIntroduction
3Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
RFID is Radio-frequency identification precisely used for identifying objects
What is RFID?What is RFID?
RFID uses radio-frequency waves to transfer identifying information between tagged objects and readers without line of sight (LOS), providing a means of automatic identification
4Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
Components of RFID systems
A typical RFID system consists of: Transponder or Tag Interrogator or Reader A computer network
Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh 5
A tag contains a chip that stores the identifying information of the object or person to which it is attached and an antenna that communicates the information via radio waves.
System Basics: The Tags
6Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
System Basics: System Basics: The ReadersThe Readers When a tag passes through an RF field that a
reader generates, the tag transmits that information to reader and identify that object or person
Readers (interrogators) can be at a fixed point such as
Entrance/exitPoint of saleWarehouse
7Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
RFID OperationsRFID Operations
8Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
TagInsert
Antenna Reader
Firmware
Customer’sMIS
Host
ApplicationSoftware API
TCP/IP
Power
~
Asset
Asset/Tag
RFID System ComponentsRFID System Components(block diagram)(block diagram)
9Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
Industrial and commercial Animal tracking Commercial system Outbreak of Mad-cow disease Retail and Ticketing
RFID Applications (1)RFID Applications (1)
10Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
RFID Applications (2)RFID Applications (2) On 2005, In Japan: RFID was in mobile and
used as electronic wallet and boarding pass for domestic air flights
Hong Kong Octopus transport ticketing system is used by 8 million people
EntertainmentSan Francisco Exploratorium service
Healthcare and pharmaceuticals Reducing operating cost and improving
patient safety by monitoring patient, doctors, medical assets and drugs
11Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
RFID Operations: ConveyorsRFID Operations: Conveyors
Read / Write OperationsHigher Accuracy than Bar Code
12Abdullah Al Mahmud, 0507006, Dept of CSE, KUET
RFID Operations: PortalsRFID Operations: Portals
Bill of LadingMaterial Tracking
13Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
Application Development Issues (1)Application Development Issues (1)
Devices layerThe devices layer consists of RFID tags and
readers as well as RFID protocolData processing layer
consists of several software components for communicating with RFID readers, filtering and cleaning RFID data
Data integration layerconsists of applications that exploit local RFID data
as well as RFID data coming from outside business entities
14Abdullah Al Mahmud, 0507006, Dept of CSE, KUET
Application Development Issues (2)Application Development Issues (2)
15Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
Data CharacteristicsData CharacteristicsInaccuracy
Duplicate reads, missed reads, ghost readsLarge-volume streams
Wal-Mart generated Tera bytes of dataTemporality and spatiality
Tagged objects are mobile, different places to moveImplicit inferences
Requires the context of other informationLimited active lifespan
In the active life period the system actively tracks, updates and monitors data
16Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
Data IntegrationData IntegrationScalabilitySystem should have ability for high volume of data and numerous transactions
HeterogeneityMultiple sites should have functionality to map the company structures among them
ManageabilitySupervision, testing, control, end-to-end processing of RFID data
SecuritySophisticated security measures must be in
17Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
ConclusionsConclusions
To precisely identify objects at low cost and without LOS creates many new and exciting opportunities for applications of our daily lives
To develop and deploy these applications, however, researchers must find robust, scalable, secure solutions to the unique challenges of RFID data
18Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
Thank You!Thank You!