Transcript slrrp-1

RFID Network Infrastructure
Overview
P. Krishna
Reva Systems
Slide 1
RFID Network End-nodes
Client
Application
Actions
Tag
Actions
- Write information to tag
- Read information from tag
- Where is the tag?
- When was the tag seen?
- Associate tag to tag-group
….
Tag Memory
Tag Model information
Tag ID
Passwords
User area
Sensor data
Slide 2
Can they talk directly?
Client
Application
?
Tag
- Passive
-Unpredictable state
- No network address
- Mobile
Slide 3
Need a gateway node …
Network
Side interface
Client
Application
Reader
RF
Tag
R  T Comms
-Tag energizing
-Access tag’s memory
Slide 4
Many tags …
Network
Side interface
Client
Application
Reader
Tag
Tag
RF
Tag
R  T Comms
-Tag energizing
-Access tag’s memory
-RF link control
-Interference mgmt
-T to T
Typical tag density in a facility: 100s to millions
Slide 5
Many readers required …
Limited range
Tag
Reader
Client
Application
IP
Network
Tag
RF
Tag
Tag
Reader
Reader Infrastructure
-Interference mgmt
-R to R
-R to T
-Device discovery
-Device config
-Device Mgmt
-Security
Tag
R  T Comms
-Tag energizing
-Access tag’s memory
-RF link control
-Interference mgmt
-T to T
Typical reader density in a facility: dozens to 1000s
Slide 6
Multiple Consumers
Tag
Client
Application
IP
Network
Client
Application
Tag
Reader
RF
Tag
Tag
Reader
Reader Infrastructure
-Interference mgmt
-R to R
-R to T
-Device discovery
-Device config
-Device Mgmt
-Security
-Tag access rules
mgmt
Tag
R  T Comms
-Tag energizing
-Access tag’s memory
-RF link control
-Interference mgmt
-T to T
Slide 7
Reader Infrastructure Network
Problems
• Multiple reader problem
– Control/feedback of the reader operation
• E.g., Air protocol, RF parameters
• Multiple air protocol support
• Multiple application problem
– Create/manage access rules at the readers
• E.g., Access operations, tag filters, TIDs
• Reader Device Discovery and Configuration
• Reader Device Management
• Security/Authentication
Slide 8
Summary
• Inevitable: large number of readers
– May even be the most densely deployed networked
device in a facility
• Standards based solutions to the infrastructure
problems
– Key to large-scale deployments
• Leverage IETF expertise to develop solutions for
– Device operations and management
– Security & Authentication
– Communication protocol to/from readers
Slide 9