90 likes | 109 Views
Explore RFID network end-nodes, client applications, tag actions, and solutions for network infrastructure problems with a focus on large-scale deployments. Leverage IETF expertise for device operations, security, and communication protocols.
E N D
RFID Network InfrastructureOverview P. Krishna Reva Systems
RFID Network End-nodes Client Application Tag Actions • Write information to tag • Read information from tag • Where is the tag? • When was the tag seen? • Associate tag to tag-group • …. Tag Memory Tag Model information Tag ID Passwords User area Sensor data Actions
Can they talk directly? ? Client Application Tag • Passive • Unpredictable state • No network address • Mobile
Need a gateway node … Network Side interface Client Application Reader RF Tag • R T Comms • Tag energizing • Access tag’s memory
Many tags … Network Side interface Tag Tag Client Application RF Reader Tag • R T Comms • Tag energizing • Access tag’s memory • RF link control • Interference mgmt • T to T Typical tag density in a facility: 100s to millions
Many readers required … Tag Limited range Tag Reader IP Network Tag Client Application RF Tag Reader Tag • Reader Infrastructure • Interference mgmt • R to R • R to T • Device discovery • Device config • Device Mgmt • Security • R T Comms • Tag energizing • Access tag’s memory • RF link control • Interference mgmt • T to T Typical reader density in a facility: dozens to 1000s
Multiple Consumers Tag Client Application Tag Reader IP Network Tag RF Tag Client Application Reader Tag • Reader Infrastructure • Interference mgmt • R to R • R to T • Device discovery • Device config • Device Mgmt • Security • Tag access rules mgmt • R T Comms • Tag energizing • Access tag’s memory • RF link control • Interference mgmt • T to T
Reader Infrastructure Network Problems • Multiple reader problem • Control/feedback of the reader operation • E.g., Air protocol, RF parameters • Multiple air protocol support • Multiple application problem • Create/manage access rules at the readers • E.g., Access operations, tag filters, TIDs • Reader Device Discovery and Configuration • Reader Device Management • Security/Authentication
Summary • Inevitable: large number of readers • May even be the most densely deployed networked device in a facility • Standards based solutions to the infrastructure problems • Key to large-scale deployments • Leverage IETF expertise to develop solutions for • Device operations and management • Security & Authentication • Communication protocol to/from readers