Download presentation
Presentation is loading. Please wait.
Published byAlbert Pope Modified over 8 years ago
1
Slide 1 RFID Network Infrastructure Overview P. Krishna Reva Systems
2
Slide 2 RFID Network End-nodes Client Application Tag Tag Memory Tag Model information Tag ID Passwords User area Sensor data - Write information to tag - Read information from tag - Where is the tag? - When was the tag seen? - Associate tag to tag-group …. Actions
3
Slide 3 Can they talk directly? Client Application Tag - Passive -Unpredictable state - No network address - Mobile ?
4
Slide 4 Need a gateway node … Client Application TagReader Network Side interface R T Comms -Tag energizing -Access tag’s memory RF
5
Slide 5 Many tags … Client Application Tag RF Reader Network Side interface Tag R T Comms -Tag energizing -Access tag’s memory -RF link control -Interference mgmt -T to T Typical tag density in a facility: 100s to millions
6
Slide 6 Many readers required … Client Application Tag RF Reader Tag IP Network Reader Tag R T Comms -Tag energizing -Access tag’s memory -RF link control -Interference mgmt -T to T Reader Infrastructure -Interference mgmt -R to R -R to T -Device discovery -Device config -Device Mgmt -Security Typical reader density in a facility: dozens to 1000s Limited range
7
Slide 7 Multiple Consumers Tag RF Reader Tag IP Network Reader Tag R T Comms -Tag energizing -Access tag’s memory -RF link control -Interference mgmt -T to T Client Application Client Application Reader Infrastructure -Interference mgmt -R to R -R to T -Device discovery -Device config -Device Mgmt -Security -Tag access rules mgmt
8
Slide 8 Reader Infrastructure Network Problems Multiple reader problem –Control/feedback of the reader operation E.g., Air protocol, RF parameters Multiple air protocol support Multiple application problem –Create/manage access rules at the readers E.g., Access operations, tag filters, TIDs Reader Device Discovery and Configuration Reader Device Management Security/Authentication
9
Slide 9 Summary Inevitable: large number of readers –May even be the most densely deployed networked device in a facility Standards based solutions to the infrastructure problems –Key to large-scale deployments Leverage IETF expertise to develop solutions for –Device operations and management –Security & Authentication –Communication protocol to/from readers
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.