Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Automated Data Collection Radio Freq. ID (RFID)

Slides:



Advertisements
Similar presentations
Leveraging an Integrated ERP and CRM System - Featuring Sage MAS 500 ERP and Sage SalesLogix CRM.
Advertisements

Module 3: Business Information Systems
Distributed Data Processing
Chapter 10: Designing Databases
© Pearson Prentice Hall Using MIS 2e Chapter 7 Information Systems within Organizations David Kroenke 10/16 – 5:30AM.
To Accompany Russell and Taylor, Operations Management, 4th Edition,  2003 Prentice-Hall, Inc. All rights reserved. Resource Planning Chapter 14.
Rafrex LLC - RFID Solutions
IEC Substation Configuration Language and Its Impact on the Engineering of Distribution Substation Systems Notes Dr. Alexander Apostolov.
Technical Architectures
__________________________________HDPL Believes in …_____________________________ Monitor - your company from anywhere in the world View - instant reports.
Supply Chain Management
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer.
SE 464: Industrial Information systems Systems Engineering Department Industrial Information System LAB 02: Introduction to SAP.
Ch1: File Systems and Databases Hachim Haddouti
9 C H A P T E R Transaction Processing and Enterprise Resource Planning Systems.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
All content in this presentation is protected – © 2008 American Power Conversion Corporation Rael Haiboullin System Engineer Capacity Manager.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
VENDORS, CONSULTANTS AND USERS
ERP Benefits.
Chapter 6 Supply Chain Technology—Managing Information Flows Learning Objectives After reading this chapter, you should be able to do the following: 
INTEGRATION OF E - BUSINESS WITH ERP SYSTEM P RESENTATION ON INTEGRATION OF E - BUSINESS WITH ERP SYSTEM Presenting by Presenting by, Shruti raj Anushree.
Introduction to Database
Enterprise Systems & Architectures. Enterprise systems are mainly composed of information systems. Business process management mainly deals with information.
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS DRIVEN TECHNOLOGY Chapter Twelve: Integrating the Organization from.
BUSINESS DRIVEN TECHNOLOGY
McGraw-Hill/Irwin Copyright © 2011 The McGraw-Hill Companies, All Rights Reserved Chapter 14 Enterprise Resource Planning Systems.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
1 A Local and Remote Radio Frequency Identification Learning Environment Andrew Shields & David Butcher Wireless and Mobility Research Group, Institute.
This presentation is the property of Paradigm Information Systems It is confidential to the intended recipient for the purpose of evaluating FMS Any other.
RFID TECHNOLOGY By: Sunil Patel Anat Krikunets Ge Qu Priya Pathmanathan.
Lecture On Database Analysis and Design By- Jesmin Akhter Lecturer, IIT, Jahangirnagar University.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Clifford Poulard Team C – Cliff Po
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Chapter 3 Network and System Design. Objectives After reading the chapter and reviewing the materials presented the students will be able to: Understand.
Chapter 6 Supporting Processes with ERP Systems Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 6-1.
StrategicTechnologyPlanning - Lecture 11 Strategic Technology Planning – Lecture 1 Identifying Core Technologies* *Based on “The Core Competence of the.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
© 2007 by Prentice Hall 1 Introduction to databases.
1-1 System Development Process System development process – a set of activities, methods, best practices, deliverables, and automated tools that stakeholders.
7-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Introduction to Database AIT632 Chapter 1 Sungchul Hong.
Enterprise Resource Planning (ERP)
KE EMu Collection Management Training Page 1 KE EMu Collection Management Training
 An Information System (IS) is a collection of interrelated components that collect, process, store, and provide as output the information needed to.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
1 © 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Getting Ready for the NOCTI test April 30, Study checklist #1 Analyze Programming Problems and Flowchart Solutions Study Checklist.
Chapter 6 Supply Chain Technology—Managing Information Flows
What is Database Administration ?
Chapter 6: Securing the Cloud
Fundamentals of Information Systems, Sixth Edition
Designing a Production Plan
Radio Frequency Identification (RFID)
CHAPTER 3 Architectures for Distributed Systems
BUSINESS DRIVEN TECHNOLOGY
PLANNING A SECURE BASELINE INSTALLATION
Enterprise Resource Planning Systems
NTC/302 NETWORK WEB SERVICES The Latest Version // uopcourse.com
NTC/302 NTC/ 302 ntc/302 ntc/ 302 NETWORK WEB SERVICES The Latest Version // uopstudy.com
NTC/302 NETWORK WEB SERVICES The Latest Version NTC 302 Entire Course Link
Presentation transcript:

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Automated Data Collection Radio Freq. ID (RFID) Lecture 8

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 ADC RFID – associated with the new “Automated Data Collection” (ADC) initiatives of leading ERP vendors. This is a direct response to corporate need for cycle time reduction in relation to “Just-In-Time” production schedules and low inventory requirements set forth by customers

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 ADC Typically ADC systems are designed to operate and collect data at the time the business function is being performed. This provides real time inventory visibility to ERP users and to the planning modules that rely on that data.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 ADC Thus it is imperative to minimize the required user interaction with the system so that the benefits of real time data collection can be realized while not negatively impacting job performance.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 ADC Traditionally the barcodes were used to optimize this important function BUT, process flexibility drives competitive advantage and thus ever increasing and more complex CA solutions need to be explored

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 ADC Real time data collection systems is a prime requirement. Information such as: –where to locate a material or whether a received item needs to go to inspection add to the benefits that can be realized by a data collection system, but at the same time add to the availability demands on the system. Fault tolerant, 24X7 redundant systems are the norm for this data collection environment

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Application Architecture is Important Not all application systems are suitable for the 24x7 real time requirements of ADC. The Large ERP vendors have spent much R&D $$ in order to make ADC a reliable system.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Application Architecture is Important For example: It is not uncommon for an ADC transaction to process multiple ERP transactions in the background. An effective implementation of ADC in the data collection environment demands a comprehensive knowledge of the technical and functional aspects of the specific ERP system.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Application Architecture is Important Two types of ADC Architectures Single Tier – Integrated as a workable component of the particular software vendor (i.e., ERP vendor build its own) Middleware – ERP vendor relies on third party ADC vendor to provide integration

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Application Architecture is Important What are the implications of this model What is the history of the large ERP vendors with regard to third party software (i.e.,Think of CRM, SCM, etc.)

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Applications Upside of the technology -- Downside of the technology -- This is not science fiction Your house/appliances will soon be RFID capable

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Components Source ACSIS Inc. RFID have a great many types; active vs. passive, hard-tag vs. insert (or smart label) they all serve the same purpose. They are electrical devices, using some form of antenna to communicate. They are the item, which is used to identify something to an RFID tag reader. Example “smart label” paper tag

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Components. RFID tag readers are a device that reads RFID tags. As with tags there are a great many variants with broad capabilities.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Components Source ACSIS Inc. RFID tag readers use an antenna to communicate to the RFID tag through the tag’s antenna. Some readers have integral antennas while others can have various types and sizes fitted to them.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 The Requirements Item Environment System Environment Data Requirements Tag Structure Tag Mounting Reader Capabilities Antenna Selection and Placement Software

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Item Environment Not all products are good candidates for tagging Deciding “What” to tag is very important In reality we’d like to tag every individual item (i.e., an item sitting in a pallet, grouped in a box, stacked in a carton)

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Item Environment That model is too complex – why? –Too much interference – especially if it’s metallic inventory –Too costly to implement (both from ERP and RFID technology view Tagging (at this time) is only cost effective at the aggregate level (i.e., the pallet or the box) – change is coming

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Cost vs. Miniaturization RFID on a microchip Cheap/portable Commodity priced and embedded in the product

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 System Environment What physical environment the system operate in (warehouse, production floor) is very important in the design. Magnetic interference from machinery motors can significantly impact the performance of an ADC system.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Data Environment Three basic parameters must be addressed: 1. Tag Data Storage 2. Data Transmission Requirements 3. Back-End Data Storage

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Data Environment: Tag Data Storage Data can be stored and edited on the tag (i.e. service history, etc.) This is an expensive option not only from a storage size point of view, but also form a processing perspective Necessitates real-time communication link with ERP (i.e., a part of your database is sitting on the tag -- without backup)

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Data Environment: Data Transmission Requirements Complex because each tag represents a potential transaction that must be transmitted and processed in real time Business logic in the ERP system must prioritize the data needs of the system so that the RF transmission network does not get overtaxed

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Data Environment: Back-End Data Storage DB must have an audit trail for each tag This procedure is time dependent and can cause a lot of redundant data to be collected at frequent intervals – thus populating the DB with may redundant records

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Tag Structure Tag structure refers to the physical structure of the tag. Tags can be in an inlay such as a smart label, credit card style, microchip, or as a hard tag. Many factors must be considered in tag structure selection.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Tag Structure Hard tags are available in many formats: such as encased in molded plastic, protected against harsh chemicals, in rubber discs, etc. Environment determines structure and ultimately the cost

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Tag Mounting Tag mounting is critical. Tags must be affixed to the item in a manner that insures it survives the system environment. It must protect the tag and possibly provide a critical level of offset, and provide a required angle possibly needed by the system design (for optimum operability)

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Reader Capabilities Readers may control multiple antennas. Readers are available with many different capabilities They are very configurable, but since this is new technology not much documentation and experience exists People usually experiment before.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Antenna Selection Modular steel warehouses pose a great challenge to RFID implementers They must balance controlling the RF field and distance Utilizing reflective and/or absorptive materials to control the field may be what is needed to provide a robust solution. Business process control and environmental changes may be required in many instances to provide a successful implementation.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Software The software must be robust enough to handle the multiple reads supported by RFID technologies such as: –understanding of the expected number of items that are to be in a read zone, –the coordination of timing and material flow, –the user feedback features, –event management, –backend systems updates, and –integration to other associated control systems.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Software Without providing these types of support functions, the system is an isolated island of information and will rarely provide a positive return on investment. The logic of understanding the condition of readers in an area in relation to users, operations, feedback, and various other systems requires a high level of understanding in advance data collection techniques.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Problem: Line of Sight Line of sight presents a problem in identifying particular items

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Problem: Multiple Reads Multiple reads can confuse the system if the application logic is not detailed enough The handler may run in and out of the read zone several times positioning the forklift Result -- multiple reads

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Problem: High Density When reading a large number of tags simultaneously management needs to be assured that the system actually read them all. Also, did the system read more than was expected?

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Problem: Interference Machines cause magnetic interference These inconsistent environments can rarely be served by a single configuration. Some level of customization per read zone may be required. These may be small, but they add to the complexity of the system design and raise support costs.

Policy Analysis Center George Mason University The School of Public Policy Copyright © R.A. Sommer, 2001 Course Evaluation