0
RFID Middleware Design: Accomplishing real time integration  of an RFID Application with Oracle Apps or any Business Appli...
<ul><li>The concept of RFID </li></ul><ul><li>Advantages offered and constraints imposed by RFID technology </li></ul><ul>...
<ul><li>RFID describes a class of technology that exchanges data wirelessly. </li></ul><ul><li>RFID systems consist of thr...
<ul><li>The key characteristics that influence RFID performance are: </li></ul><ul><li>FREQUENCY  determines RFID range, r...
<ul><li>Advantages offered by the RFID technology </li></ul><ul><li>Exceptional speed and accuracy : More than a thousand ...
<ul><li>Key challenges in RFID Middleware Design </li></ul><ul><li>Seamless Data Bridging : Maintain a channel of communic...
TAGS Protocol Engine Oracle Apps SAP SCM TAGS TAGS TAGS TAGS RFID HARDWARE R1 R2 R3 R4 R5 PROTOCOLS MESSAGING SERVER DATA ...
<ul><li>Rule Engine </li></ul><ul><li>Well suited to the nature (large sets of data from multiple sources) and status (cha...
<ul><li>Context Based Data filtering </li></ul><ul><li>Filtering weeds our the inconsistencies in tag reading or writing l...
<ul><li>Data Aggregation </li></ul><ul><li>- Reduces the flood of raw tag reads to more meaningful events. </li></ul><ul><...
<ul><li>Buffering </li></ul><ul><li>Data persistence component of the middleware, which is based on message queues. </li><...
<ul><li>RFID data dissemination </li></ul><ul><li>- Classifies the extracted data into relevant transaction types. </li></...
<ul><li>VTMS: Reading from and writing to a tag </li></ul><ul><li>VTMS is specifically aimed at shielding the application ...
Manufacturing WIP Status [SUPPLIERS] MFG - WIP Finished Goods [SUPPLIERS] MFG - Complete Pick release and RFID tag attachm...
<ul><li>Shipment Number Vendor Name Airway Bill Number </li></ul><ul><li>Transaction Date Quantity Unit of Measure </li></...
<ul><li>Intra warehouse movements </li></ul><ul><li>Movement from one stocking location to another within the warehouse. <...
Application based filtering and classification The transaction classification along with the RFID data will be used to ide...
<ul><li>Summary </li></ul><ul><li>RFID is a promising technology that could yield immense contextual intelligence. </li></...
Upcoming SlideShare
Loading in...5
×

Sameer Pandee, Gantec Corporation

209

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
209
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Sameer Pandee, Gantec Corporation"

  1. 1. RFID Middleware Design: Accomplishing real time integration of an RFID Application with Oracle Apps or any Business Application
  2. 2. <ul><li>The concept of RFID </li></ul><ul><li>Advantages offered and constraints imposed by RFID technology </li></ul><ul><li>Key challenges in RFID Middleware Design </li></ul><ul><li>Proposed design for an RFID middleware </li></ul><ul><ul><li>The Rule Engine </li></ul></ul><ul><ul><li>Data filtering </li></ul></ul><ul><ul><li>Data Aggregation </li></ul></ul><ul><ul><li>Buffering and Exception Handling </li></ul></ul><ul><ul><li>Data classification and dissemination </li></ul></ul><ul><li>Case Study: Understanding the middleware design concepts through actual business transactions </li></ul><ul><li>Summary </li></ul>AGENDA
  3. 3. <ul><li>RFID describes a class of technology that exchanges data wirelessly. </li></ul><ul><li>RFID systems consist of three key components: </li></ul><ul><ul><li>TAG, a microchip that contains a unique digital serial number and is attached to an antenna. </li></ul></ul><ul><ul><li>READER, a device used to communicate with RFID tags to read data. </li></ul></ul><ul><ul><li>SOFTWARE, that processes, routes and manages Tag data and Readers. </li></ul></ul>The concept of RFID
  4. 4. <ul><li>The key characteristics that influence RFID performance are: </li></ul><ul><li>FREQUENCY determines RFID range, resistance to interference and other performance </li></ul><ul><li>attributes. Most commercial RFID systems operate at either the UHF band (859 to 960 MHz), </li></ul><ul><li>or High Frequency (HF) at 13.56 MHz. </li></ul><ul><li>RANGE : The proximity to the tag that a reader antenna must be within, to read the information </li></ul><ul><li>stored on the tag’s chip – varies from a few centimeters to tens of meters. </li></ul><ul><li>SECURITY : RFID chips are extremely difficult to counterfeit. One would need specialized </li></ul><ul><li>knowledge of wireless engineering, encoding algorithms and encryption techniques to break-in. </li></ul><ul><li>STANDARDS : RFID standards exist for item management, logistics containers, fare cards, </li></ul><ul><li>animal identification and many other uses. The International Standards Organization (ISO) </li></ul><ul><li>and EPCglobal Inc. are two of the standards organizations most relevant for the supply chain. </li></ul>
  5. 5. <ul><li>Advantages offered by the RFID technology </li></ul><ul><li>Exceptional speed and accuracy : More than a thousand reads can be performed each second. </li></ul><ul><li>Versatility: RFID enables monitoring and data collection even in extreme environments, without </li></ul><ul><li>any manual intervention required. </li></ul><ul><li>Tag-reader alignment: Unlike bar codes, RFID does not require direct line of sight between tag </li></ul><ul><li>and reader. </li></ul><ul><li>Total Cost of Ownership : The data on an RFID tag can be altered repeatedly. </li></ul><ul><li>Constraints imposed by the characteristics of RFID </li></ul><ul><li>Limited communication bandwidth. </li></ul><ul><li>Reliability issues. </li></ul><ul><li>Tag memory. </li></ul>
  6. 6. <ul><li>Key challenges in RFID Middleware Design </li></ul><ul><li>Seamless Data Bridging : Maintain a channel of communication between the business application and the RFID application. </li></ul><ul><li>Filtering : Weeding out duplicates from the data flowing in. </li></ul><ul><li>Data Classification : Mapping the classified data to – First the business application it should hit, and secondly the actual transaction bucket it falls into. </li></ul><ul><li>Buffering and aggregation. </li></ul><ul><li>Extendibility and adaptability. </li></ul><ul><li>Interoperability: To cater to the heterogeneous reader landscape. </li></ul><ul><li>Flexibility: Interfacing the data to the application in a format that is acceptable to that application. </li></ul><ul><li>Two-Way data integration: Writing back to the tags. </li></ul>
  7. 7. TAGS Protocol Engine Oracle Apps SAP SCM TAGS TAGS TAGS TAGS RFID HARDWARE R1 R2 R3 R4 R5 PROTOCOLS MESSAGING SERVER DATA PRESENTATION Filtering Filtering Data Classification Buffering Aggregation RULES ENGINE Exception Handling VTMS RDBMS Proposed design for RFID Middleware
  8. 8. <ul><li>Rule Engine </li></ul><ul><li>Well suited to the nature (large sets of data from multiple sources) and status (changing standards, protocols) of the RFID technology. </li></ul><ul><li>Rule driven: All forms of data handling and options to publish or subscribe the data are driven by the rules. </li></ul><ul><li>Based on the concept of solving a problem using a set of logical rules specific to the problem domain. </li></ul><ul><li>Converts data and messages from lower layers to actionable information for the upper layers; based on the business or process semantics as perceived by the end user. </li></ul><ul><li>Fits in perfectly for solutions requiring processing of large sets of rapidly changing data – like in an RFID network. </li></ul><ul><li>Offers immense flexibility to the users to incorporate their own rule chunks. </li></ul>
  9. 9. <ul><li>Context Based Data filtering </li></ul><ul><li>Filtering weeds our the inconsistencies in tag reading or writing like </li></ul><ul><li>Multiple reads of the same tag. </li></ul><ul><li>Some tags not being read. </li></ul><ul><li>Erroneous reads. </li></ul><ul><li>Removal of such tag read events based on the reader which generated the event and the tag data captured is the key objective of the filtering mechanism. </li></ul><ul><li>Two filter types can be supported by the proposed middleware design </li></ul><ul><li>Reader Identifier </li></ul><ul><li>This filter type allows the application to specify that it is only interested data from a particular set of readers. </li></ul><ul><li>Tag Identifier and Data </li></ul><ul><li>The application can define the tag population that it is interested in, e.g., the restriction to </li></ul><ul><li>tags attached to pallets. </li></ul>
  10. 10. <ul><li>Data Aggregation </li></ul><ul><li>- Reduces the flood of raw tag reads to more meaningful events. </li></ul><ul><li>- Addresses the problem of temporary false negative reads and to smooth the data accordingly. </li></ul><ul><li>Following aggregate types can be supported by the middleware design </li></ul><ul><li>Entry & Exit </li></ul><ul><li>Reduces a number of successful reads of a tag to the best estimate when the tag appeared and disappeared from the read range. </li></ul><ul><li>Count </li></ul><ul><li>Applications can prefer to receive information about the total number of items of a specific category detected rather than the individual ID of each object. </li></ul><ul><li>Passage </li></ul><ul><li>When a tagged object passes a gate, applications would prefer receiving a passage event rather than being forced to interpret a sequence of entry and exit events from two individual readers. </li></ul><ul><li>Virtual readers </li></ul><ul><li>When an application does not distinguish between two readers, this aggregate type allows it to virtually join their read range. </li></ul>
  11. 11. <ul><li>Buffering </li></ul><ul><li>Data persistence component of the middleware, which is based on message queues. </li></ul><ul><li>Buffering is required for two main purposes </li></ul><ul><li>Facilitates asynchronous processing of the data streams. This is imperative for providing sufficient time for the rules to “add value” to the raw data. </li></ul><ul><li>Supports different latencies of the destination applications, depending on the application type. </li></ul><ul><li>Exception Handling </li></ul><ul><li>Raising the red flags: Any discrepancy of data during the data scrubbing is processed as exceptions. Numerous alerting systems are available for resolution – emails, messages, or user defined triggers. </li></ul>
  12. 12. <ul><li>RFID data dissemination </li></ul><ul><li>- Classifies the extracted data into relevant transaction types. </li></ul><ul><li>- Classifies the transactions to the relevant business application. </li></ul><ul><li>Full content-based routing </li></ul><ul><li>Key element for classifying the data into correct transaction buckets. </li></ul><ul><li>Full content-based routing (rather than subject- or topic-based routing) is accomplished in order to carry out the filtering within the messaging system itself. </li></ul><ul><li>Air Interface: Subscription feedback mechanism </li></ul><ul><li>Overcomes the constraint of limited bandwidth available to RFID. </li></ul><ul><li>Feeds back the readers to communicate whether applications are interested in </li></ul><ul><li>the RFID data they produce. </li></ul><ul><li>Leads to appropriate adaptation of the queries exercised by a reader over the air interface, (e.g. targeting a particular tag population at a higher sampling rate or switching off completely to make the bandwidth available to another reader). </li></ul><ul><li>The filtering of the RFID data is then no longer carried out in software, but over the air interface. </li></ul>
  13. 13. <ul><li>VTMS: Reading from and writing to a tag </li></ul><ul><li>VTMS is specifically aimed at shielding the application from the particularities of RFID tag memory: </li></ul><ul><li>limited memory size. </li></ul><ul><li>different memory organizations. </li></ul><ul><li>reduced write range. </li></ul><ul><li>VTMS response to different write scenarios </li></ul><ul><li>If the write succeeds, the RFID middleware will acknowledge this to the application and will store a </li></ul><ul><li>backup copy of the data in the virtual representation of the tag in the VTMS. </li></ul><ul><li>If the memory gets corrupted at a later stage or the application wants to access the tag’s memory, </li></ul><ul><li>while the tag is outside the range of any reader, the RFID middleware can make the data available </li></ul><ul><li>via this virtual memory. </li></ul><ul><li>If the write to the tag fails due to insufficient power, the key-value pair will be stored in </li></ul><ul><li>the VTMS and flagged as “open”. The RFID middleware will retry the write command at a later </li></ul><ul><li>point of time. </li></ul><ul><li>If there is insufficient memory space, the application will receive the appropriate </li></ul><ul><li>error message and the key-value will be stored in the virtual tag memory only. </li></ul>
  14. 14. Manufacturing WIP Status [SUPPLIERS] MFG - WIP Finished Goods [SUPPLIERS] MFG - Complete Pick release and RFID tag attachment [SUPPLIERS] Ready to Ship Transport enroute to stocking location Shipment Intransit <ul><li>Receiving at Receiving dock </li></ul><ul><li>Inspect all components installed </li></ul><ul><li>Sales order shipment </li></ul><ul><li>Warehouse </li></ul>Transport enroute to Customer site Shipment Intransit <ul><li>Port of Import (POI) </li></ul><ul><li>Scan/Verify </li></ul><ul><li>Unload & On Hand at POI </li></ul><ul><li>Departure from POI </li></ul><ul><li>POI- In/POI- Out </li></ul><ul><li>Installed at site </li></ul><ul><li>Scan/Verify </li></ul><ul><li>Installation, Periodic meter data </li></ul><ul><li>for maintenance </li></ul><ul><li>Asset Management </li></ul>In- House Mfg. WIP Status [SHOP FLOOR] MFG - WIP Case Study: Deployment of RFID in the Supply Chain
  15. 15. <ul><li>Shipment Number Vendor Name Airway Bill Number </li></ul><ul><li>Transaction Date Quantity Unit of Measure </li></ul><ul><li>Item Description Document and Line Number Vendor Site </li></ul><ul><li>Bill of Lading Packing Slip Number of Containers </li></ul><ul><li>Additional data generated by the reader at the Receiving dock: </li></ul><ul><li>Location Code (Row / Rack / Bin) </li></ul><ul><li>Reader Id </li></ul><ul><li>Transaction Date </li></ul><ul><li>The filtered transaction then can be classified as a PO receiving transaction. This can be done by a combination of the tag id, reader id, location at the receiving dock and PO number. </li></ul><ul><li>TAG ID + READER ID + PO NUMBER + LOCATION AT RCV DOCK </li></ul>Supplier ASN PO RECEIVING TRANSACTION PO receiving against ASN
  16. 16. <ul><li>Intra warehouse movements </li></ul><ul><li>Movement from one stocking location to another within the warehouse. </li></ul><ul><li>Movement from the warehouse to a manufacturing facility. </li></ul><ul><li>Movement to a packing and staging area for shipment against a sales order. </li></ul>Transaction Type Transaction Date Bill of Lading Physical Location Packing Slip Demand Source Shipment number Quantity and UOM Tag ID Warehouse Location Code Transfer Subinventory Sales Order Number LPN Delivery Number Transfer organization Combination of these fields along with the tag ID and reader ID identifies and classifies the type of business transaction. TAG ID + READER ID + SALES ORDER + LPN + DELIVERY NUMBER SALES ORDER BASED SHIPMENT Manufacturing Facility
  17. 17. Application based filtering and classification The transaction classification along with the RFID data will be used to identify the business application bucket in which it resides. READER LOCATION TRANSACTION CLASSIFICATION DESTINATION APPLICATION Receiving Dock PO Receipt ERP/WMS Warehouse Intra warehouse movement ERP/WMS Supplier Site Customer Service CRM Once this classification is completed, the data will be mapped as per the requirements of the destination application.
  18. 18. <ul><li>Summary </li></ul><ul><li>RFID is a promising technology that could yield immense contextual intelligence. </li></ul><ul><li>RFID middleware forms the bridge between the RFID Application and the pre-existing business applications. </li></ul><ul><li>RFID can be deployed at each stage of the Supply Chain for improved visibility of goods. </li></ul><ul><li>The proposed RFID middleware design: </li></ul><ul><ul><li>- Talks to the RFID application and extracts data. </li></ul></ul><ul><ul><li>- Performs context-based Data Filtering. </li></ul></ul><ul><ul><li>- Classifies the extracted data into relevant transaction types. </li></ul></ul><ul><ul><li>- Classifies the transactions to the relevant business application. </li></ul></ul><ul><ul><li>- Performs Buffering, Aggregation and Exception handling. </li></ul></ul><ul><ul><li>- Adheres to the relevant protocols. </li></ul></ul><ul><ul><li>- Is Interoperable and Scalable. </li></ul></ul><ul><ul><li>- Overcomes the limitations of Tag Memory through VTMS. </li></ul></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×