Slide 1 RFID Network Infrastructure Overview P. Krishna Reva Systems.

Slides:



Advertisements
Similar presentations
Application Guide For Mesh AP – MAP-3120
Advertisements

Copyright © 2014 EMC Corporation. All Rights Reserved. Basic Network Configuration for File Upon completion of this module, you should be able to: Configure.
EPCglobal Class-1 Generation 2 UHF RFID
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Mobile IP Security Dominic Maguire Research Essay Presentation Communications Infrastructure Module MSc Communications Software, WIT
Rev A8/8/021 ABC Networks
Arsitektur Jaringan Terkini
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Circuit & Application Level Gateways CS-431 Dick Steflik.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
ORBIT NSF site visit - July 14, Location-based Services & data propagation in ORBIT Henning Schulzrinne Dept. of Computer Science.
1 CCNA 3 v3.1 Module 9. 2 CCNA 3 Module 9 VLAN Trunking Protocol.
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
RADIUS Server (Brocade Controller)
Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.
Software Solutions for Product Developers Copyright 2005 Software Technologies Group, Inc. All Rights Reserved. An Overview of ZigBee The Power of the.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Uday O. Ali Pabrai, CISSP, CHSS Chief executive, HIPAA Academy Health care & HIPAA Security Remediation.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Scenario & Hands-on 7-1 VPN Configuration-PPTP
FLIP Architecture & Requirements Roger Cummings Symantec
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Basic Wireless Concepts & Configuration Chapter.
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
IETF54 Charter Issues Dealt with since IETF53 PANA WG Meeting Basavaraj Patil.
Module 5: Configuring Access for Remote Clients and Networks.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
Dnssd requirements draft-ietf-dnssd-requirements-01 Kerry Lynn Stuart Cheshire Marc Blanchet Daniel Migault IETF 89, London, 3 March 2014.
Department Of Electrical Engineering, IIT Kanpur Networked RFID System (NRS) for Remote Services Presented By: Piyush Keshri (Y5303) Biplab Deka (Y5147)
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
Doc.: IEEE /97 Submission March 1998 Pat Kinney, IntermecSlide 1 Wireless Solutions Continuum of needs for wireless products No one product which.
RFID Reader Network Infrastructure P. Krishna, PhD Chief Systems Architect Reva Systems.
Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Radio Frequency Identification
The Convergence of Home Networking & Automation Vijay Dhingra Director of Product Management Echelon Corporation.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
SLRRP BoF 62 nd IETF Scott Barvick Marshall Rose
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wireless Ad Hoc Networks
SLRRP BoF Overview 62 nd IETF Scott Barvick Marshall Rose
Presentation at ISMS WG Meeting1 ISMS – March 2005 IETF David T. Perkins.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
I2rs Requirements for NETCONF IETF 93. Requirement Documents
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
CCNA 3 Chapter 10 Virtual Trunking Protocol
Web-based Console for Controlling a Wireless Sensor Network (WeConWSN)
Near field communication (NFC)
Configure a Wireless Router
Configure a Wireless Router
Presentation transcript:

Slide 1 RFID Network Infrastructure Overview P. Krishna Reva Systems

Slide 2 RFID Network End-nodes Client Application Tag Tag Memory Tag Model information Tag ID Passwords User area Sensor data - Write information to tag - Read information from tag - Where is the tag? - When was the tag seen? - Associate tag to tag-group …. Actions

Slide 3 Can they talk directly? Client Application Tag - Passive -Unpredictable state - No network address - Mobile ?

Slide 4 Need a gateway node … Client Application TagReader Network Side interface R  T Comms -Tag energizing -Access tag’s memory RF

Slide 5 Many tags … Client Application Tag RF Reader Network Side interface Tag R  T Comms -Tag energizing -Access tag’s memory -RF link control -Interference mgmt -T to T Typical tag density in a facility: 100s to millions

Slide 6 Many readers required … Client Application Tag RF Reader Tag IP Network Reader Tag R  T Comms -Tag energizing -Access tag’s memory -RF link control -Interference mgmt -T to T Reader Infrastructure -Interference mgmt -R to R -R to T -Device discovery -Device config -Device Mgmt -Security Typical reader density in a facility: dozens to 1000s Limited range

Slide 7 Multiple Consumers Tag RF Reader Tag IP Network Reader Tag R  T Comms -Tag energizing -Access tag’s memory -RF link control -Interference mgmt -T to T Client Application Client Application Reader Infrastructure -Interference mgmt -R to R -R to T -Device discovery -Device config -Device Mgmt -Security -Tag access rules mgmt

Slide 8 Reader Infrastructure Network Problems Multiple reader problem –Control/feedback of the reader operation E.g., Air protocol, RF parameters Multiple air protocol support Multiple application problem –Create/manage access rules at the readers E.g., Access operations, tag filters, TIDs Reader Device Discovery and Configuration Reader Device Management Security/Authentication

Slide 9 Summary Inevitable: large number of readers –May even be the most densely deployed networked device in a facility Standards based solutions to the infrastructure problems –Key to large-scale deployments Leverage IETF expertise to develop solutions for –Device operations and management –Security & Authentication –Communication protocol to/from readers