Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 10 – Integrating RFID Readers in Enterprise IT

Similar presentations


Presentation on theme: "Chapter 10 – Integrating RFID Readers in Enterprise IT"— Presentation transcript:

1 Chapter 10 – Integrating RFID Readers in Enterprise IT

2 Table 10.1 Base Service Set (BSS)

3 Figure 10.1 Timeline of RFID operation featuring services
Timeline of RFID operation featuring base, configuration, monitoring and data processing services

4 Table 10.2 Configuration Service Set (CSS)

5 Figure 10.2 “Select” command defined in the EPCglobal UHF Class 1 Generation 2 Protocol
EPCglobal 2005a A particular tag population is selected with the “Select” command before the inventory process is initiated with the “query” command. Only tags matching the mask of the “Select” command, reply with a random number (RN16) and with their unique ID (EPC).

6 Figure 10.3 Timeline of RFID services
Timeline of RFID operation featuring base, configuration, monitoring and data processing services with frequent changes to the reader configuration.

7 Figure 10.4 Filtering and aggregation of RFID data
Filtering and aggregation of RFID data: data of two dock door readers are combined, duplicate EPCs are eliminated, EPC is filtered out, and quantities of product categories are calculated. Eliminated ‘reads’ are shown in grey.

8 Table 10.3 Data Processing Service Set (DPSS)

9 Table 10.4 Monitoring Service Set (MSS)

10 Figure 10.5 Centralized Architecture

11 Figure 10.6 Autonomous Architecture

12 Figure 10.7 (a) Centralized with Controller

13 Figure 10.7 (b) Centralized without Controller

14 Figure 10.7 (c) Autonomous

15 Figure 10.8 High-level Overview
High-level Overview of the Services Supported By the EPCglobal Specifications DCI, RM, LLRP, RP and ALE.

16 Figure 10.9 LLRP (a) Single channel (b) Multiple reporting channels

17 Figure 10.10 High-level reader protocols

18 Figure 10.11 (a) Specification of tag identification in ALE 1.1

19 Figure 10.11 (b) Specification of tag identification in LLRP

20 Figure 10.12 Tag data reports in ALE 1.1 and LLRP

21 Figure 10.13 Tag memory access (reading) in ALE 1.1 and LLRP

22 Figure 10.14 Adoption of EPCglobal specifications ALE, RP and LLRP in the centralized architecture

23 Figure 10.15 High-level reader protocols such as ALE or RP

24 Figure 10.16 RFID reader with standard runtime environment
RFID reader with standard runtime environment for application code and internal interface to reader module providing the base services such as tag inventory and memory access.


Download ppt "Chapter 10 – Integrating RFID Readers in Enterprise IT"

Similar presentations


Ads by Google