An Overview of the ISO RFID Data Protocol & Library Applications

Slides:



Advertisements
Similar presentations
GSC: Standardization Advancing Global Communications ITU-T Status Report on standardization of Networked RFID P.A. Probst/Chairman of ITU-T SG16 SOURCE:ITU-T.
Advertisements

3 Copyright © 2005, Oracle. All rights reserved. Designing J2EE Applications.
Device Virtualization Architecture
Programming Paradigms and languages
Designing Services, Messages & Business Rules for eBusiness Graham Witt.
Topics covered: CPU Architecture CSE 243: Introduction to Computer Architecture and Hardware/Software Interface.
1 Chapter 2 The Digital World. 2 Digital Data Representation.
The ATA/IDE Interface Can we write a character-mode device driver for the hard disk?
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
Csc333 Data communication & Networking Credit: 2.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
File Management Systems
Chapter 1 Software Development. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 1-2 Chapter Objectives Discuss the goals of software development.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Introduction to Computers and Programming. Some definitions Algorithm: –A procedure for solving a problem –A sequence of discrete steps that defines such.
System Integration Week 7 – Lecture 1. For a successful client/server request We need –To identify the host and process that can provide the service –To.
Data Representation Kieran Mathieson. Outline Digital constraints Data types Integer Real Character Boolean Memory address.
Tuesday 13 November The QEII Conference Centre, Westminster, London SPONSORED BY SUPPORTED BYMEDIA SPONSORS PRESENTED BY Standards and Interoperability.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
2 Systems Architecture, Fifth Edition Chapter Goals Describe numbering systems and their use in data representation Compare and contrast various data.
Introduction to Computers and Programming. Some definitions Algorithm: Algorithm: A procedure for solving a problem A procedure for solving a problem.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3 Operating System Organization.
Introduction to Information Technology
LMS/RFID (Dis)integration Why Standards Matter Mick Fortune.
Chapter 2 Software Tools and Assembly Language Syntax.
AGENT-BASED GATEWAY OPERATING SYSTEM FOR RFID- ENABLED UBIQUITOUS MANUFACTURING ENTERPRISE - JI FANG, TING QU, ZHI LI, GANGYAN XU, GEORGE Q. HUANG HKUZIRI.
A. Mednonogov / Helsinki University of Technology / Conformance Testing of CORBA Services Using TTCN / / Page 1 Conformance Testing of CORBA Services.
Topics Introduction Hardware and Software How Computers Store Data
Input/OUTPUT [I/O Module structure].
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Copyright © 2012 Pearson Education, Inc. Chapter 1: Introduction to Computers and Programming 1.
Topics covered: Memory subsystem CSE243: Introduction to Computer Architecture and Hardware/Software Interface.
Protocols and the TCP/IP Suite
Chapter 1: Introduction to Computers and Programming.
Machine Instruction Characteristics
Status of IEEE A Suite of Smart Transducer Interface Standards for Sensors and Actuators November 28, 2006 Kang Lee
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Principles of I/0 hardware.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Indo-US Workshop, June23-25, 2003 Building Digital Libraries for Communities using Kepler Framework M. Zubair Old Dominion University.
Abstract Syntax Notation ASN.1 Week-5 Ref: “SNMP…” by Stallings (Appendix B)
Digital Computer Concept and Practice Copyright ©2012 by Jaejin Lee Introduction Lecture 01.
Advanced Computer Architecture 0 Lecture # 1 Introduction by Husnain Sherazi.
11 3 / 12 CHAPTER Databases MIS105 Lec15 Irfan Ahmed Ilyas.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
Ass. Prof. Dr Masri Ayob TK 6123 Lecture 13: Assembly Language Level (Level 4)
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
Department of Industrial Engineering Sharif University of Technology Session# 10.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
National Enrolment Service (NES) Overview October 2015 – June 2016.
4 Linking the Components Linking The Components A computer is a system with data and instructions flowing between its components in response to processor.
Digital Computer Concept and Practice Copyright ©2012 by Jaejin Lee Control Unit.
Achieving Semantic Interoperability at the World Bank Designing the Information Architecture and Programmatically Processing Information Denise Bedford.
Proposal for a Proximity-2 Protocol Ed Greenberg Greg Kazz May /11/20161.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Semantic Data Extraction for B2B Integration Syntactic-to-Semantic Middleware Bruno Silva 1, Jorge Cardoso 2 1 2
44222: Information Systems Development
May 2007 CTMS / Imaging Interoperability Scenarios March 2009.
LonWorks Introduction Hwayoung Chae.
Application architectures Advisor : Dr. Moneer Al_Mekhlafi By : Ahmed AbdAllah Al_Homaidi.
Software Connectors. What is a Software Connector? 2 What is Connector? – Architectural element that models Interactions among components Rules that govern.
Metadata Driven Clinical Data Integration – Integral to Clinical Analytics April 11, 2016 Kalyan Gopalakrishnan, Priya Shetty Intelent Inc. Sudeep Pattnaik,
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
DT80 range Modbus capability
Layered Architectures
File Transfer and access
RFID in CEN TC225 and ISO/IEC JTC1
Crossing the Chasm Toward RFID and Bar Code Co-existence
28 May ~ 2 June, 2006 Hyoungjun KIM TTA/ETRI
Presentation transcript:

An Overview of the ISO RFID Data Protocol & Library Applications Paul Chartier Project Editor ISO/IEC 15961 & 15962 June 2006

A Basic Question: “Why Standards?” BSI defines standardisation as the process of “establishing and applying an agreed set of solutions intended for repeated application, directed at benefits for stakeholders and balancing their diverse interests.” The library community has developed and adopted a broad variety of standards - but not yet for RFID

Some Benefits of RFID Standards Specifies the rules for components to be fit for purpose Establishes interoperability of RFID devices Establishes compatibility between library systems but still supports flexible applications Avoids systems clash with other applications - given that RFID tags on library items move around the community Stakes a claim for library systems so that other RFID systems do not corrupt library applications Provides a better chance of migration as technology improvements are made

RFID System The Generic Model Tag Data content Application protocol Air interface APPLICATION

RFID Standards Types of Standard Technology - air interface defines what it does Conformance & Performance compares actual devices with standards “Middleware” protocols how data and instructions are processed Data content how business data is supported Applications making it work for a specific sector

ISO RFID Standards Air Interface Standards Various aspects can be covered, but key are: The air interface: frequency, modulation, bit encoding Anticollision the ability to almost simultaneously address a number of tags unambiguously not always a requirement Commands and responses that address memory in terms of blocks (or words, or pages)

Tag Architecture ISO/IEC 18000-3 Mode 1 Single memory Can emulate a UII by placing this first Separate TID and System Info (inc AFI) Block size & number of blocks can vary

An RFID Implementation Based Only on the Air interface

Implications of the Application Working at the Air interface Level Memory map has to be pre-defined for encoding New data requires a new “message” or memory map rule Need to understand the memory map to read data Need to use RFID air interface commands Data might not be encoded most efficiently Data might not be encoded most efficiently, especially variable length and optional data

APPLICATION PROTOCOL STANDARDS Data Protocol The Data Protocol addresses data handling between the application and the RF tag ISO/IEC 15961 Data protocol - application interface: defines the application commands and responses uses object identifiers to define all data types ISO/IEC 15962 Data protocol - data encoding rules efficient encoding of object identifiers common data compaction

RFID Data Protocol Positioning ISO/IEC 15961 & 15962

RFID Data Protocol Overview • The Data Protocol fills a gap in communications • Business issues are addressed by the Application Interface • This generates commands and processes responses • The encoding rules convert the data in the commands into efficient encoding on the RF tag

RFID Data Protocol ISO/IEC 15961 Application Interface Application Family Data Format Access Method Generated based on ASN.1 Abstract syntax Transfer encoding

RFID Data Protocol ISO/IEC 15961 Object Identifiers Object identifiers used for selective read / write Based on ISO/IEC 9834-1 established rules and structures ISO/IEC 9834-1 allows systems to define objects to any level of granularity - just need an object ID A typical object identifier: 1 0 15961 127 13 The Hierarchical structure ensures uniqueness of objects Therefore, possible to encode different data, including closed system objects with no risk of corruption Extension techniques make the system totally expandable

ISO/IEC JTC1/SC31 Logical Tag Structure

ISO/IEC Air Interface & Data Protocol System Information This provides a protocol level - not data - method for managing the interface between application and RF tag, and includes: Application Family: to enable a subset of RF tags to be in the communication channel Data Format: to specify the interpretative nature of the encoded bytes on the RF tag Access Method: to create a logical structure of the bytes encoded on the RF tag

ISO/IEC Air Interface & Data Protocol System Information: Application Family There is a real need to manage the transactions across the air interface with large population of tags where there is a risk of different types of tag being present To be compatible with smart card rules (SC17), RFID for Item Management has to co-manage some codes Application Family codes are allocated to focus on a meaningful subset within the system, thus excluding RF tags from other systems

The AFI A Tool for Efficient Communications

The AFI: A Powerful Tool to Select Only Relevant Tags Reader

RFID Data Protocol ISO/IEC 15962 Data Encoding Rules Consider this like a bar code encoder, but common to many RF tags Each different air interface has its own Tag Driver, determining precise mapping rules

ISO/IEC 15962 Data Compaction Schemes The ISO/IEC 15962 process looks, on a case by case basis of each data object, at the byte encoding on the RF tag It selects the most efficient encoding scheme from the alternatives (the most efficient scheme is at the top of this list) Integer: encodes number as binary Numeric: 4 bits per digit 5-bit: uppercase alphabetic 6-bit: uppercase alphabetic, numeric, etc 7-bit: all ISO 646 (US ASCII) Octet: unaltered 8-bit It also preserves user-defined data and supports UTF-8 for international character sets

ISO/IEC 15962 Logical Memory A software representation of the RF tag memory Structured by extracting the system information from the RF tag Structure width = block (or codeword) size length = number of blocks (or codewords)

RFID Data Protocol Revisions to ISO/IEC 15961 & 15962 15961-1: 15961 (pub October 2004) needs to be simplified with respect to the data constructs topics New application commands for 18000-6C and sensors 15961-2: Rules for new Registration Authority for AFIs and other data constructs 15961-3: Specification of data constructs 15962: New encoding and data mapping processes for 18000-6C and sensors

ISO/IEC 15961 Data Constructs Application Family Identifier (AFI): Used to manage selection across air interface Data Format: A “shorthand” code to truncate the encoding of long Object Identifiers Object Identifier for UII - Register of key traceability codes Object Identifier for other item-attendant data - Register of OID structure for other data

Library Community Data Constructs Process - with SC31 EDItEUR has made initial request for registration, with the understanding that the application was incomplete The assignment of data constructs for libraries is accepted Additional information required for: Object Identifier for primary code Object Identifier structure for additional data objects JTC1/SC31 WG4 has a procedure that can approve the registration and assign the AFI and Data Format The data constructs will be published and maintained on the web

Library Community Data Constructs - within the Sector Define data objects (e.g. ISIL, ISBN) Specify data objects format (e.g. alphanumeric, numeric, UTF-8) fixed or variable length fixed or maximum length Specify relative-OID value Extend and revise with no constraints from SC31/WG4

Thank you for your attention paul.chartier@praxisconsultants.co.uk