CAPWAP and RFID Margaret Wasserman, ThingMagic IETF 66, Montreal.

Slides:



Advertisements
Similar presentations
Enabling New RFID Communication Opportunities with EPC Network Services Tony Rutkowski Vice President VeriSign Communication Services tel:
Advertisements

Collaborative Commerce. Electronic CommercePrentice Hall © Collaborative Commerce collaborative commerce (c-commerce) The use of digital technologies.
Toward Practical Public Key Anti- Counterfeiting for Low-Cost EPC Tags Alex Arbit, Avishai Wool, Yossi Oren, IEEE RFID April
Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
RFID Data Aggregation Dritan Bleco, Yannis Kotidis Department of Informatics Athens University of Economics and Business.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Kathy Means Produce Marketing Association Traceability: Linking the Supply Chain Copyright PMA
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
ThingMagic LLC / September 18, Development Fees versus IP Rights: Creating an IP Portfolio without VC Funding Bernd Schoner ThingMagic LLC MIT Enterprise.
THE GLOBAL eMARKETPLACE TM ONCE Meeting Dallas Texas October 2005 Master Data Management.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Lecture Notes #7 Radio Frequency Identification (RFID)
Barcoding in the supply chain
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
RFID Reader Management Requirements Margaret Wasserman ThingMagic
COMPANY CONFIDENTIAL Optimizing Reader Performance Jim Peternel.
Ch. 31 Q and A CS332 Spring Network management more than just Ethernet Q: Comer mentions that network managers need to be able to account for different.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
STIMULATING INNOVATION IN THE FOOD SUPPLY-CHAIN THROUGH SMART USE OF ICT: ASSISTING SMES PARTICIPATE IN DIGITAL SUPPLY CHAINS IN THE SINGLE MARKET WP3.
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
Intelligent Shipping Container Project IMPACT & INTEL.
Issues in Integrated Circuit Design for UHF RFID Zhihua WANG,Xuguang SUN, Chun ZHANG,Yongming LI Institute of Microelectronics, Tsinghua University,Beijing,100084,P.R.China.
Naming & Addressing ENUM, EPC, WINC overview JaeYoung Choi
1 A Local and Remote Radio Frequency Identification Learning Environment Andrew Shields & David Butcher Wireless and Mobility Research Group, Institute.
Clifford Poulard Team C – Cliff Po
INSERT GRAPHIC SQUARE HERE World Wide Web EPC Network DNS Authoritative system that routes requests for Web sites and ONS Authoritative record of.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
Austria RFID/EPC - what we have done in Austria Manfred Piller Head of Department GS1 Standards GS1 Austria.
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
The Present and Future of Electronic Payment Systems Vivek Reddy Information Assurance 5/19/04.
EPC Standards EPC System elements : EPC Coding structure The reader/ tag Protocols Savant platform The Object Numbering Service (ONS) PML server.
Using DHCPv6 for DNS Configuration in Hosts draft-ietf-droms-dnsconfig-dhcpv6-00.txt Ralph Droms.
Mathieu AUBERT Emilie POCCIOLI Pierre SCHAMBACHER.
Radio Frequency ID (RFID) Tracking System for a Building Complex Tim Gordon Matt Tracy John O’Malley Mentor: Y. Shang, Y. Saab.
Dynamic Virtual Networks (DVNE) Margaret Wasserman & Paddy Nallur November 11, 2010 IETF Beijing, China.
RFID Reader Network Infrastructure P. Krishna, PhD Chief Systems Architect Reva Systems.
GS1 System Thomas Bikeev B2B Group Manager, GS1 Oasis Adoption Forum, London 17 October 2005.
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Light Weight Access Point Protocol (LWAPP) Pat R. Calhoun draft-ohara-capwap-lwapp-01.txt.
Introduction to RFID Technology By: Vahid Bagher Poor 1.
La Piattaforma Applicativa RFID Giuseppe Russo Product Marketing Manager Giovanni Zoffoli Business Solutions Industry Marketing Manager.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
62 nd IETF – CAPWAP Working Group1 CAPWAP Objectives Saravanan Govindan March 2005.
Aviation RFID Solutions
SLRRP BoF 62 nd IETF Scott Barvick Marshall Rose
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Integrated Logistics Scenarios April 15, Integrated Logistics Scenarios 2005 RosettaNet. All Rights Reserved. Synergy of Integrated Standards.
July 2007 CAPWAP Protocol Specification Editors' Report July 2007
This is an individual character that consists of bands of image and space between them, thus illustrating the machine code of letters and numbers in binary.
ZigBee
Gijeong Kim ,Junho Kim ,Sungwon Lee Kyunghee University
Smarter, safer Pharmaceuticals
Multicast Outline Multicast Introduction and Motivation DVRMP.
Shi Yang David T. Perkins IETF 70th 3 Dec 2007, Vancouver
Multiplication table. x
Topic #1 & #5 “All that has to do with header formats”
CAPWAP Working Group IETF 66 Montreal
Chapter 10 – Integrating RFID Readers in Enterprise IT
Guide to Access Control Systems
Software Defined Networking (SDN)
IETF Liaison Report July 2003 Dorothy Stanley – Agere Systems
Mesh Relevance in CAPWAP and AP Functional Descriptions
Mesh Relevance in CAPWAP and AP Functional Descriptions
WLAN Architectural Considerations for IETF CAPWAP
Presentation transcript:

CAPWAP and RFID Margaret Wasserman, ThingMagic IETF 66, Montreal

Brief Outline Similarities and differences between APs and RFID Readers Related work in EPCglobal –RFID industry standards body Requests from the EPCglobal Reader Operations WG –Minor requests, nothing RFID-specific Thoughts on DSP-only readers

AP vs RFID Reader Both moving towards centralized controller with remote “radios” Similar need to maintain firmware and configuration for the full system, not individual radios In RFID, data packets go to not thru the controller Controller Radio Management

Introduction to EPCglobal EPCglobal is an industry standards body working on RFID standards, largely for the retail supply chain EPC = “Electronic Product Code” EPCglobal is part of GS1, which is also responsible for the UPC and barcode standards For more information see:

EPCglobal Organization Broken into “action groups” –Software Action Group (SAG) –Hardware Action Group (HAG) –Busiess Action Group (BAG) Each Action Group consists of several WGs CAPWAP currently being considered as a discovery and provisioning protocol by the Reader Operations (RO) WG in the SAG

Request from EPCg RO WG Separate firmware download from reboot in the state table –More scalable –Allows trickle download with reboot at planned downtime Make a clearer distinction between CAPWAP “base protocol” and specific control functions

DSP-Only RFID Readers DSP-only RFID Readers are quite common Most popular DSPs in the space are 16-bit systems optimized for multiplication, not addition AES takes a lot of cycles in this environment Not clear what we can do, given lack of other DTLS encryption bindings…