Enabling Next Generation RFID Applications: Solutions and Challenges Abdullah Al Mahmud Roll : 0507006 Dept of CSE, KUET K...
Authors <ul><ul><li>Quan Z. Sheng  </li></ul></ul><ul><ul><li>--  University of Adelaide  </li></ul></ul><ul><ul><li>Xue L...
<ul><li>The term RFID means Radio Frequency Identification </li></ul><ul><li>RFID is emerging as an important technology f...
<ul><li>RFID is Radio-frequency identification precisely used for identifying objects </li></ul>What is RFID? <ul><li>RFID...
Components of RFID systems <ul><li>A typical RFID system consists of: </li></ul><ul><ul><ul><ul><li>Transponder or Tag </l...
<ul><li>A tag contains a chip that stores the identifying information of the object or person to which  it  is attached an...
System Basics:  The Readers <ul><ul><li>When  a  tag  passes through an RF field that a reader generates, the tag  transmi...
RFID Operations Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
Antenna Reader Firmware Customer’s MIS Host Application Software API TCP/IP Power ~ Asset Asset/Tag RFID System Components...
RFID Applications (1) <ul><li>  Industrial and commercial </li></ul><ul><ul><ul><ul><li>Animal tracking </li></ul></ul></u...
RFID Applications (2) <ul><ul><ul><li>On 2005, In Japan: RFID was in mobile and used as electronic wallet and boarding pas...
RFID Operations: Conveyors Read / Write Operations Higher Accuracy than Bar Code Abdullah Al Mahmud, 0507006, Dept of CSE,...
RFID Operations: Portals Bill of Lading Material Tracking Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
Application Development Issues (1) <ul><li>Devices layer </li></ul><ul><ul><ul><ul><li>The devices  layer  consists of RFI...
Application Development  Issues (2) Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
Data Characteristics <ul><ul><ul><li>I naccuracy </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Duplicate reads, missed reads...
Data Integration <ul><li>Scalability </li></ul><ul><li>System should have ability for high volume of  data and numerous tr...
Conclusions <ul><li>To precisely identify objects at low cost and without LOS creates many new and exciting opportunities ...
Thank You!
Upcoming SlideShare
Loading in …5
×

Enabling Next Generation RFID Application

2,432 views
2,335 views

Published on

This slide was prepared for a seminar presentation of according to curriculum of undergraduate program of KUET. It is done following a paper of IEEE Computer magazine

0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,432
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
162
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide
  • To help you understand how tightly integrated RFID applications are to the customer’s environment, we have prepared an analysis of each system component, describing the component and environmental properties and considerations.
  • Enabling Next Generation RFID Application

    1. 1. Enabling Next Generation RFID Applications: Solutions and Challenges Abdullah Al Mahmud Roll : 0507006 Dept of CSE, KUET Khulna, Bangladesh. Presented by:
    2. 2. Authors <ul><ul><li>Quan Z. Sheng </li></ul></ul><ul><ul><li>-- University of Adelaide </li></ul></ul><ul><ul><li>Xue Li </li></ul></ul><ul><ul><ul><li>-- University of Queensland </li></ul></ul></ul><ul><ul><li>Sherali Zeadally </li></ul></ul><ul><ul><ul><li>-- University of the District of Columbia </li></ul></ul></ul><ul><ul><li>It was published in IEEE Computer magazine, the September 2008 volume </li></ul></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    3. 3. <ul><li>The term RFID means Radio Frequency Identification </li></ul><ul><li>RFID is emerging as an important technology for revolutionizing a wide range of applications, including supply-chain management, retail sales and healthcare </li></ul><ul><li>Predictions indicate that RFID will be worth billions of dollars in new investments. According to IDTechEx, the RFID market will increase from US$4.96 billion in 2007 to US$26.88billion in 2017 </li></ul>Introduction Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    4. 4. <ul><li>RFID is Radio-frequency identification precisely used for identifying objects </li></ul>What is RFID? <ul><li>RFID uses radio-frequency waves to transfer identifying information between tagged objects and readers without line of sight (LOS), providing a means of automatic identification </li></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    5. 5. Components of RFID systems <ul><li>A typical RFID system consists of: </li></ul><ul><ul><ul><ul><li>Transponder or Tag </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Interrogator or Reader </li></ul></ul></ul></ul><ul><ul><ul><ul><li>A computer network </li></ul></ul></ul></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    6. 6. <ul><li>A tag contains a chip that stores the identifying information of the object or person to which it is attached and an antenna that communicates the information via radio waves. </li></ul>System Basics: The Tags Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    7. 7. System Basics: The Readers <ul><ul><li>When a tag passes through an RF field that a reader generates, the tag transmits that information to reader and identify that object or person </li></ul></ul><ul><li>Readers (interrogators) can be at a fixed point such as </li></ul><ul><ul><ul><li>Entrance/exit </li></ul></ul></ul><ul><ul><ul><li>Point of sale </li></ul></ul></ul><ul><ul><ul><li>Warehouse </li></ul></ul></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    8. 8. RFID Operations Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    9. 9. Antenna Reader Firmware Customer’s MIS Host Application Software API TCP/IP Power ~ Asset Asset/Tag RFID System Components (block diagram) Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh Tag Insert
    10. 10. RFID Applications (1) <ul><li> Industrial and commercial </li></ul><ul><ul><ul><ul><li>Animal tracking </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Commercial system </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Outbreak of Mad-cow disease </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Retail and Ticketing </li></ul></ul></ul></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    11. 11. RFID Applications (2) <ul><ul><ul><li>On 2005, In Japan: RFID was in mobile and used as electronic wallet and boarding pass for domestic air flights </li></ul></ul></ul><ul><ul><ul><li>Hong Kong Octopus transport ticketing system is used by 8 million people </li></ul></ul></ul><ul><li>Entertainment </li></ul><ul><li>San Francisco Exploratorium service </li></ul><ul><li>Healthcare and pharmaceuticals </li></ul><ul><ul><ul><li>Reducing operating cost and improving patient safety by monitoring patient, doctors, medical assets and drugs </li></ul></ul></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    12. 12. RFID Operations: Conveyors Read / Write Operations Higher Accuracy than Bar Code Abdullah Al Mahmud, 0507006, Dept of CSE, KUET
    13. 13. RFID Operations: Portals Bill of Lading Material Tracking Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    14. 14. Application Development Issues (1) <ul><li>Devices layer </li></ul><ul><ul><ul><ul><li>The devices layer consists of RFID tags and readers as well as RFID protocol </li></ul></ul></ul></ul><ul><li>Data processing layer </li></ul><ul><ul><ul><ul><li>consists of several software components for communicating with RFID readers, filtering and cleaning RFID data </li></ul></ul></ul></ul><ul><li>Data integration layer </li></ul><ul><ul><ul><ul><li>consists of applications that exploit local RFID data as well as RFID data coming from outside business entities </li></ul></ul></ul></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET
    15. 15. Application Development Issues (2) Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    16. 16. Data Characteristics <ul><ul><ul><li>I naccuracy </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Duplicate reads, missed reads, ghost reads </li></ul></ul></ul></ul></ul><ul><ul><ul><li>Large-volume streams </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Wal-Mart generated Tera bytes of data </li></ul></ul></ul></ul></ul><ul><ul><ul><li>Temporality and spatiality </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Tagged objects are mobile, different places to move </li></ul></ul></ul></ul></ul><ul><ul><ul><li>Implicit inferences </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Requires the context of other information </li></ul></ul></ul></ul></ul><ul><ul><ul><li>Limited active lifespan </li></ul></ul></ul><ul><ul><ul><ul><ul><li>In the active life period the system actively tracks, updates and monitors data </li></ul></ul></ul></ul></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    17. 17. Data Integration <ul><li>Scalability </li></ul><ul><li>System should have ability for high volume of data and numerous transactions </li></ul><ul><li>Heterogeneity </li></ul><ul><li>Multiple sites should have functionality to map the company structures among them </li></ul><ul><li>Manageability </li></ul><ul><li>Supervision, testing, control, end-to-end processing of RFID data </li></ul><ul><li>Security </li></ul><ul><li>Sophisticated security measures must be in </li></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    18. 18. Conclusions <ul><li>To precisely identify objects at low cost and without LOS creates many new and exciting opportunities for applications of our daily lives </li></ul><ul><li>To develop and deploy these applications, however, researchers must find robust, scalable, secure solutions to the unique challenges of RFID data </li></ul>Abdullah Al Mahmud, 0507006, Dept of CSE, KUET, Bangladesh
    19. 19. Thank You!

    ×