What is 5G NR all about? Check out this presentation to see all the key design components of this new unifying air interface for the next decade and beyond.
Cellular networks have facilitated positioning in addition to voice or data communications from the beginning, since 2G, and we’ve since grown to rely on positioning technology to make our lives safer, simpler, more productive, and even fun. Cellular positioning complements other technologies to operate indoors and outdoors, including dense urban environments where tall buildings interfere with satellite positioning. It works whether we’re standing still, walking, or in a moving vehicle. With 5G, cellular positioning breaks new ground to bring robust precise positioning indoors and outdoors, to meet even the most demanding Industry 4.0 needs.
As we look to the future, the Connected Intelligent Edge will bring a new dimension of positional insight to a broad range of devices, improving wireless use cases still under development. We’re already charting the course to 5G Advanced and beyond by working on the evolution of cellular positioning technology to include RF sensing for situational awareness.
Download the deck to learn more.
What is 5G NR all about? Check out this presentation to see all the key design components of this new unifying air interface for the next decade and beyond.
Cellular networks have facilitated positioning in addition to voice or data communications from the beginning, since 2G, and we’ve since grown to rely on positioning technology to make our lives safer, simpler, more productive, and even fun. Cellular positioning complements other technologies to operate indoors and outdoors, including dense urban environments where tall buildings interfere with satellite positioning. It works whether we’re standing still, walking, or in a moving vehicle. With 5G, cellular positioning breaks new ground to bring robust precise positioning indoors and outdoors, to meet even the most demanding Industry 4.0 needs.
As we look to the future, the Connected Intelligent Edge will bring a new dimension of positional insight to a broad range of devices, improving wireless use cases still under development. We’re already charting the course to 5G Advanced and beyond by working on the evolution of cellular positioning technology to include RF sensing for situational awareness.
Download the deck to learn more.
RFID Technology - Electronics and Communication Seminar TopicHimanshiSingh71
RFID Technology - Electronics and Communication Seminar Topic.
Radio Frequency Identification. Active tag and passive Tag
Scope of rfid. Current uses of RFID Technology. Applications.
Overview of which LPWAN technologies (LoRa, Sigfox, Weightless, etc.) are right for various IoT applications. Clear look at the pros and cons of each technology.
This ppt explains how to record the attendance of students using RFID tags, student is provided with his/her authorized tag to swipe over the reader to record their attendance.
Edgefxkits.com has a wide range of electronic projects ideas that are primarily helpful for ECE, EEE and EIE students and the ideas can be applied for real life purposes as well.
http://www.edgefxkits.com/
Visit our page to get more ideas on popular electronic projects developed by professionals.
Edgefx provides free verified electronic projects kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
In this deck from the 2016 Stanford HPC Conference, Kurt Keville from R&D Labs at MIT presents: Introduction to RISC-V.
"Today’s server systems provide many knobs which influence energy efficiency and performance. Some of these knobs control the behavior of the operating systems, whereas others control the behavior of the hardware itself. Choosing the optimal configuration of the knobs is critical for energy efficiency. In this talk recent research results will be presented, including examples of big data applications that consume less energy when dynamic tuning is employed."
Kurt works on optimizing HPC codes for educational and institutional (R&D labs) purposes at MIT. He assesses new supercomputing hardware as part of his responsibilities. He has published in IEEE conferences and journals and he teaches embedded programming once a year. Kurt has a BS from West Point and an MS from MIT.
Learn more: http://soc.mit.edu
Sign up for our insideHPC Newsletter: http://insideHPC.com/newsletter
Introduction to RF Module and its parts and its types.
1) Introduction
2) different modules and ranges
3) RF transmitter
4) RF receiver
5) Transceiver
6) Applications
7) Characterstics
RFID Technology - Electronics and Communication Seminar TopicHimanshiSingh71
RFID Technology - Electronics and Communication Seminar Topic.
Radio Frequency Identification. Active tag and passive Tag
Scope of rfid. Current uses of RFID Technology. Applications.
Overview of which LPWAN technologies (LoRa, Sigfox, Weightless, etc.) are right for various IoT applications. Clear look at the pros and cons of each technology.
This ppt explains how to record the attendance of students using RFID tags, student is provided with his/her authorized tag to swipe over the reader to record their attendance.
Edgefxkits.com has a wide range of electronic projects ideas that are primarily helpful for ECE, EEE and EIE students and the ideas can be applied for real life purposes as well.
http://www.edgefxkits.com/
Visit our page to get more ideas on popular electronic projects developed by professionals.
Edgefx provides free verified electronic projects kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
In this deck from the 2016 Stanford HPC Conference, Kurt Keville from R&D Labs at MIT presents: Introduction to RISC-V.
"Today’s server systems provide many knobs which influence energy efficiency and performance. Some of these knobs control the behavior of the operating systems, whereas others control the behavior of the hardware itself. Choosing the optimal configuration of the knobs is critical for energy efficiency. In this talk recent research results will be presented, including examples of big data applications that consume less energy when dynamic tuning is employed."
Kurt works on optimizing HPC codes for educational and institutional (R&D labs) purposes at MIT. He assesses new supercomputing hardware as part of his responsibilities. He has published in IEEE conferences and journals and he teaches embedded programming once a year. Kurt has a BS from West Point and an MS from MIT.
Learn more: http://soc.mit.edu
Sign up for our insideHPC Newsletter: http://insideHPC.com/newsletter
Introduction to RF Module and its parts and its types.
1) Introduction
2) different modules and ranges
3) RF transmitter
4) RF receiver
5) Transceiver
6) Applications
7) Characterstics
RFID Circle Event: DISRUPTIVE INNOVATION: The Internet of Things & Long-range RFID + Sensors -Improving the Retail Flow of Goods
November 5, 2012,
Range matters! Tag size matters! Sensing often matters! All at a very low cost!
TODAY’S PROBLEM: Humans manually collect visibility data – it should be automatic! Data on the Internet has been largely created by human beings—typing, bar code scans, digital photos and more. Initial deployments of RFID solutions have relied heavily upon human intervention. Manual data collection is very time consuming and prone to errors. Implementing RFID solutions is a lot of hard work!
THE SOLUTION – Smaller, Cheaper, Faster, Longer, Better!
Long-range, low cost RFID takes the human out of the loop.
The market for visibility solutions is soaring. The “Internet of Things” is hitting the mainstream. Today sensors, cameras, RFID, bar codes, and a variety of visibility viewing platforms are commonplace throughout the working world. In 2012 over 4 billion long-range RFID tags are expected to be produced for retail apparel. We are experiencing the initial stages of an onslaught of BIG Data automatically generated by an abundance of highly distributed wireless devices.
Long-range RFID to track elements of the physical world couples with ubiquitous connectivity to the Internet to distribute BIG DATA and view information generated by these ubiquitous digital identifiers and sensors.
TODAY’s CHALLENGES
End users are confronted by an overwhelming number of questions.
What to buy? What’s good? What to avoid? Typical pitfalls?
How best to organize?
How to install the systems?
‘Peaceful co-existence’ with legacy systems and business processes . . . . . POS, bar code, inventory management . . . . . How to blend the old with the new? Seamless adoption, integration and deployment?
How best to analyze BIG DATA? For what purpose?
‘Fit’ with other innovative technologies?
Costs? Tags, Infrastructure, Integration . . . . .
Speakers:
Sprague Ackley, Technologist, Intermec
Christophe Loussert, VP, RFID integration, Tagsys
Greg Morello, CMO, Port Logistics Group (PLG)
Thomas Reese, Sr. Director, Business Development, Intelleflex Corp.
Moderator:
Michael Ohanian, retired President of Intermec Technologies
RFID Shopping system uses RFID tags to identify products while providing automated shopping experience. The shopping system also provides integrated data mining techniques to facilitate management with real time data with product sales and inventory tracking. The system consists of smart cart system which is attached to the customer cart. The smart cart system also includes intercom module, which facilitates the customer to talk directly to customer service without having to search for one. All the data processing is provided by the central server system which handles all the carts in the system.
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas
Radio Frequency identification (RFID) technology has become emerging
technique for tracking and items identification. Depend upon the function; various RFID
technologies could be used. Drawback of passive RFID technology, associated to the range
of reading tags and assurance in difficult environmental condition, puts boundaries on
performance in the real life situation [1]. To improve the range of reading tags and
assurance, we consider implementing active backscattering tag technology. For making
mobiles of multiple radio standards in 4G network; the Software Defined Radio (SDR)
technology is used. Restrictions in Existing RFID technologies and SDR technology, can be
eliminated by the development and implementation of the Software Defined Radio (SDR)
active backscattering tag compatible with the EPC global UHF Class 1 Generation 2 (Gen2)
RFID standard. Such technology can be used for many of applications and services.
Similar to Presentation 2 rfid standards & protocols (20)
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Strategies for Successful Data Migration Tools.pptxvarshanayak241
Data migration is a complex but essential task for organizations aiming to modernize their IT infrastructure and leverage new technologies. By understanding common challenges and implementing these strategies, businesses can achieve a successful migration with minimal disruption. Data Migration Tool like Ask On Data play a pivotal role in this journey, offering features that streamline the process, ensure data integrity, and maintain security. With the right approach and tools, organizations can turn the challenge of data migration into an opportunity for growth and innovation.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
Presentation 2 rfid standards & protocols
1. RFID Applications
Presentation
1
• Introduction
• components
• Layers
Presentation
2
• Regulations
• Standards
• Protocols
Presentation
3
• RFID Software
Developer
• Middleware
• Labs
March/2014
Presentation
4
• RIFIDI
Emulator LAB
Mouhanad Alkhaldi | Postgraduate Taught Part Time - Information Technology (SS), MSc |ma1049@hw.ac.uk
2. RFID Applications
Regulations
Standards
Protocols
March/2014
It is not intended in this course to reach every detail in the standards or protocols or regulations.
The purpose is to give the student a head start , and guide him through the concepts.
Mouhanad Alkhaldi | Postgraduate Taught Part Time - Information Technology (SS), MSc |ma1049@hw.ac.uk
3. Index
4. Electromagnetic Spectrum
5. Spectrum Regulations
6. Spectrum Regulations - Example from UAE
7. RFID standards
8. Industry based Standard bodies
9. ISO RFID Standards
10. ISO RFID Standards (Continued)
11. ISO Standards Contactless Smart Cards
12. ISO Air Interface Standards 18000 series RFID
13. Relation between ISO 18000 standards
14. GS1 - EPCglobal
15. EPC Standards evolution
16. EPCglobal Tag Classes
17. EPCglobal Protocol framework
18. EPCglobal Protocol framework – simplified diagram
19. Identify Objects -Tag specific Standards
20. Identify Objects - Air Interface Protocols
21. Capture output - RFID Readers Protocols
22. Data Exchange Protocols
23. Identify Objects - TDS – Tag Data Standard
24. TDS : URI grammar
25. TDS : URI grammar (C)
26. Application level events (ALE)
27. ALE 7 Schemas
28. ALE Sample Schema - XSD
29. ALE Sample Schema -WSDL
30. ALE service consumer Quick lab
31. ALE service consumer Quick lab
32. ALE Sample Schema – UML (ECReports)
33. Data Exchange Protocols EPCIS: EPC Information
Services
34. EPCIS Within and Across Enterprises
35. Readers Protocols - LLRP
36. Readers Protocols - LLRP (C)
37. Good Reads
38. References (52+53+54+55)
4. Icon Meaning
Reader Related topic
Air Interface Related Tag Related Topic
Good Reads
Data Exchange related
Lab
6. Spectrum Regulations
• Because RFID systems generate and radiate electromagnetic waves, they
are legally classified as radio systems
• Every country has it’s own spectrum regulations.
• Many follows pre-defined standards like
– FCC: Federal Communications Commission
– ETSI: European Telecommunications Standards Institute
• UHF RFID Sample national Regulation Examples :
– UAE is 868-875.4 MHz .
– UK 865-868 MHz for RFID .
– China standard (920~925MHz)
– American standard (902~928MHz),
– European standard (865~868MHz) , 840MHz~960MHz working
frequency
7. Spectrum Regulations
Example from UAE
To zoom in: http://www.tra.gov.ae/download.php?filename=spectrum_affairs/national_allocation_chart_english.pdf
8. RFID standards
Main standard bodies
• EPCglobal – Electronic Product Code organization
• Auto-id labs
• ISO - International Standards Organizations
ISO - International Organization for Standardization
ITU - International Telecommunication Union
IEC - International Electro-technical Commission
JTC 1 - Joint Technical Committee
• ETSI - European Telecommunications Standards Institute
• National Standards Organizations
FCC – Federal Communication Commission
ANSI - American National Standards Institute
BSI - British Standards Institute
9. RFID standards
Industry based Standard bodies
Industry Standards Organizations
• AIAG - Automotive Industry Action Group
• ATA - American Trucking Associations
• AAR - American Railroads
• GS1 VICS Item Level RFID Initiative (VILRI) oversees standards
around item-level tagging and the use of RFID technology
throughout the retail supply chain
10. ISO RFID Standards
RFID Standard Details
ISO 10536 ISO RFID standard for close coupled cards
ISO 11784 ISO RFID standard that defines the way in which data is structured on an RFID tag.
ISO 11785 ISO RFID standard that defines the air interface protocol.
ISO 14443
ISO RFID standard that provides the definitions for air interface protocol for RFID tags used
in proximity systems - aimed for use with payment systems
ISO 15459 Unique identifiers for transport units (used in supply chain management)
ISO 15693 ISO RFID standard for use with what are termed vicinity cards
ISO 15961
ISO RFID standard for Item Management (includes application interface (part 1), registration
of RFID data constructs (part 2), and RFID data constructs (part 3).
ISO 15962
ISO RFID standard for item management - data encoding rules and logical memory
functions.
ISO 16963 ISO RFID standard for item management - unique identifier of RF tag.
Some of the main RFID standards
11. ISO RFID Standards (Continued)
RFID Standard Details
ISO 18000 ISO RFID standard for the air interface for RFID frequencies around the globe
ISO 18001 RFID for item management - application requirements profiles.
ISO 18046 RFID tag and interrogator performance test methods.
ISO 18047
The ISO RFID standard that defines the testing including conformance testing of RFID tags
and readers. This is split into several parts that mirror the parts for ISO 18000.
ISO 24710
Information technology, automatic identification and data capture techniques - RFID for
item management - Elementary tag license plate functionality for ISO 18000 air interface.
ISO 24729
RFID implementation guidelines - part : RFID enabled labels; part 2: recyclability of RF
tags; part 3: RFID interrogator / antenna installation.
ISO 24730
RFID real time locating system: Part 1: Application Programming Interface (API); Part 2: 2.4
GHz; Part 3: 433 MHz; Part 4: Global Locating Systems
ISO 24752 System management protocol for automatic identification and data capture using RFID
ISO 24753 Air interface commands for battery assist and sensor functionality
ISO 24769 Real Time Locating System (RTLS) device conformance test methods
ISO 24770 Real Time Locating System (RTLS) device performance test methods
Some of the main RFID standards
12. ISO Standards Contactless Smart Cards
ISO/IEC 10536 Close-coupling 0–1 cm
ISO/IEC 14443 Proximity-coupling 0–10 cm
ISO/IEC 15693 Vicinity-coupling 0–1m
Available standards for contactless smart cards Standard Card type Approximate range
13. ISO Air Interface Standards
18000 series RFID
ISO 18000 Standard Details of the particular ISO 18000 series standard
ISO 18000-V1 Generic parameters for air interfaces for globally accepted frequencies
ISO 18000-V2 Air interface for 135 KHz
ISO 18000-V3 Air interface for 13.56 MHz
ISO 18000-V4 Air interface for 2.45 GHz
ISO 18000-V5 Air interface for 5.8 GHz
ISO 18000-V6 (EPC) Air interface for 860 MHz to 930 MHz
ISO 18000-V7 Air interface at 433.92 MHz
15. GS1 - EPCglobal
• GS1 is an international not-for-profit association with Member
Organizations in over 100 countries.
• an organization of industry leaders devoted to the development of
standards for the Electronic Product Code (EPC) and Radio Frequency
Identification (RFID) technologies.
• GS1 is dedicated to the design and implementation of global standards
and solutions to improve the efficiency and visibility of supply and
demand chains globally and across sectors. The GS1 system of standards is
the most widely used supply chain standards system in the world.
• GS1 EPCglobal is a suite of RFID standards and services for increased
visibility and efficiency throughout the supply chain and higher quality
information flow between companies and their key trading partners.
• GS1 EPCglobal is leading the development of industry-driven standards for
the Electronic Product Code™ (EPC) to support the use of Radio Frequency
Identification (RFID) in today's fast-moving, information rich, trading
networks.
17. EPCglobal Tag Classes
Class 0 UHFl read-only, preprogrammed passive tag
Class 1 UHF or HF; write once, read many (WORM)
Class 2 Passive read-write tags that can be written to at any point in the supply chain
Class 3
Read-write with onboard sensors capable of recording parameters like
temperature, pressure, and motion; can be semi-passive or active
Class 4
Read-write active tags with integrated transmitters; can communicate with other
tags and readers
Class 5
Similar to Class 4 tags but with additional functionality; can provide power to
other tags and communicate with devices other than readers
20. Identify Objects
Tag specific Standards
TDS – Tag Data Standard
Defines EPC/RFID tag data, including the encoding of GS1 Keys in
EPC memory, as well as their encoding in the context of EPCIS
TDT – Tag Data Translation
EPC Tag Data Translation standard is concerned with a machine-readable
version of the EPC Tag Data Standards specification
21. Identify Objects
Air Interface Protocols
• UHF Air Interface Protocol Standard "Gen2v2“
– defines the physical and logical requirements for an RFID system of
interrogators and passive tags, operating in the 860 MHz - 960 MHz UHF
range. (we will not include further info in this presentation)
• EPC RFID Protocols EPC Class-1 HF RFID Air Interface Protocol
– defines the physical and logical requirements for a passive-backscatter,
Interrogator-talks-first (ITF), RFID system operating in at 13.56 MHz
frequency.
– The system comprises Interrogators (also known as Readers), and Tags
(also known as Labels).
– This standard uses signaling (ASK) that is backwards compatible to ISO
15693. Also included is an optional signaling method (PJM).
– (we will not include further info in this presentation)
22. Capture output
RFID Readers Protocols
LLRP – Low Level Reader Protocol
Specifies an interface between RFID Readers and Clients. The interface
protocol is called low-level because it provides control of RFID air
protocol operation timing and access to air protocol command
parameters.
DCI - Discovery configuration & initialization
Specifies an interface between RFID Readers and Access Controllers
and the network on which they operate
RM - Reader Management
Used by management software to monitor the operating status and
health of EPCglobal compliant RFID Readers
23. Data Exchange Protocols
ALE – Application Level Events
specifies an interface through which clients may obtain filtered, consolidated Electronic
Product Code™ (EPC) data from a variety of sources
EPCIS - EPC Information service
specification that defines Version 1.0 of EPC Information Services (EPCIS). The goal of EPCIS
is to enable disparate applications to leverage Electronic Product Code (EPC) data via EPC-related
data sharing, both within and across enterprises. Ultimately, this sharing is aimed at
enabling participants in the EPCglobal Network to gain a shared view of the disposition of
EPC-bearing objects within a relevant business context.
CBV - Core Business Vocabulary
Business Vocabulary Standard is to specifies various vocabulary elements and their values
for use in conjunction with the EPCIS standard, which defines mechanisms to exchange
information both within and across company boundaries. The vocabulary identifiers and
definitions in this standard will ensure that all parties who exchange EPCIS data using the
Core Business Vocabulary will have a common understanding of the semantic meaning of
that data.
ONS - Object Name Service
specifies how the Domain Name System is used to locate authoritative metadata and
services associated with the SGTIN portion of a given Electronic Product Code™ (EPC). Its
target audience is developers that will implement Object Name Service (ONS) resolution
systems for applications
24. Identify Objects
TDS – Tag Data Standard
TDS
• Defines EPC/RFID tag data,
including the encoding of GS1 Keys
in EPC memory, as well as their
encoding in the context of EPCIS
TDS: Tag URI
• Guarantees worldwide uniqueness
of the EPC across all types of physical
objects and applications.
• The formal grammar for the EPC URI
is as follows:
– SGTIN-URI | SSCC-URI | SGLN-URI |
GRAI-URI | GIAI-URI | SRN-URI |
GDTI-URI | GID-URI | DOD-URI |
ADI-URI | CPI-URI
URI example : urn:epc:id:sgtin:0614141.112345.400
25. TDS : URI grammar
EPC
Scheme
Schema
Description
Typical Use General syntax Example
sgtin Serialized Global
Trade Item
Number
Trade item urn:epc:id:sgtin:CompanyPrefix.Ite
mReference.SerialNumber
urn:epc:id:sgtin:0614
141.112345.400
sscc Serial Shipping
Container Code
Logistics unit urn:epc:id:sscc:CompanyPrefix.Seria
lReference
urn:epc:id:sscc:0614
141.1234567890
sgln Global Location
Number With or
Without
Extension
Location2 urn:epc:id:sgln:CompanyPrefix.Loca
tionReference.Extension
urn:epc:id:sgln:0614
141.12345.400
grai Global
Returnable Asset
Identifier
Returnable asset urn:epc:id:grai:CompanyPrefix.Asset
Type.SerialNumber
urn:epc:id:grai:06141
41.12345.400
giai Global Individual
Asset Identifier
Fixed asset urn:epc:id:giai:CompanyPrefix.Indivi
dulAssetReference
urn:epc:id:giai:06141
41.12345400
26. TDS : URI grammar (Continued)
EPC
Schem
e
Schema Description Typical Use General syntax Example
gdti Global Document
Type Identifier
Document urn:epc:id:gdti:CompanyPrefix.Docu
mentType.SerialNumber
urn:epc:id:gdti:06141
41.12345.400
gsrn Global Service
Relation Number
Service relation
(e.g., loyalty card)
urn:epc:id:gsrn:CompanyPrefix.Servi
ceReference
urn:epc:id:gsrn:0614
141.1234567890
gid General Identifier Unspecified urn:epc:id:gid:ManagerNumber.Obj
ectClass.SerialNumber
urn:epc:id:gid:95100
000.12345.400
usdod US Department of
Defense Identifier
US Dept of Defense
supply chain
urn:epc:id:usdod:CAGEOrDODAAC.S
erialNumber
urn:epc:id:usdod:2S1
94.12345678901
Adi Aerospace and
Defense Identifier
Aerospace and
Defense sector for
unique identification
of aircraft and other
parts and items
urn:epc:id:adi:CAGEOrDODAAC.Orig
inalPartNumber.Serial
urn:epc:id:adi:W81X
9C.3KL984PX1.2WM
A52
Cpi Component / Part
Identifier
Technical industries
(e.g. automotive
sector) for unique
identification of parts
and
Components
urn:epc:id:cpi:CompanyPrefix.Comp
onentPartReference.Serial
urn:epc:id:cpi:06141
41.123ABC.12345678
9
27. • Application Level Events (ALE) is a standard created by EPCGlobal, Inc., The
ALE specification is a software specification indicating required
functionality and behavior, as well as a common API expressed through
XML Schema Definition (XSD) and Web Services Description Language
(WSDL).
• It is a standard introduced by EPC global.
• The role of the ALE interface is to provide independence between:
– the infrastructure components that acquire the raw EPC data
– the architectural component(s) that filter & count that data
– and the applications that use the data.
This allows changes in one without requiring changes in the other, offering
significant benefits to both the technology provider and the end-user.
•
Data Exchange Protocols
ALE - Application Level Events
28. ALE Schemas
Because an implementation may not implement all five ALE APIs, the schemas are
divided into separate files, one per API
Schema Imported Schemas Top-level Elements ALE Standard Section
EPCglobal - - 3.3 EPCglobal Base Schema
ale-common EPCglobal
3.4 Schema for Datatypes Common to
the Reading API and 387 Writing API
ale
EPCglobal
ale-common ECSpec ECReports 3.5 ALE Reading API Schema
alecc
EPCglobal
ale-common
CCSpec
CCParameterList
CCReports
EPCCacheSpec
EPCPatternList
AssocTableSpec
AssocTableEntryList
RNGSpec 3.6 ALE Writing API Schema
aletm EPCglobal TMSpec 3.7 ALE Tag Memory API Schema
alelr EPCglobal LRSpec LRProperty 3.8 ALE Logical Reader API Schema
aleac EPCglobal
ACPermission
ACRole
ACClientIdentity 3.9 ALE Access Control API Schema
29. ALE Sample Schema - XSD
http://www.gs1.org/gsmp/kc/epcglobal/ale/ale_1_1-schemas-20071202/EPCglobal-ale-1_1-ale.xsd
30. ALE Sample Schema - WSDL
http://www.gs1.org/gsmp/kc/epcglobal/ale/ale_1_1-schemas-20071202/EPCglobal-ale-1_1-ale.wsdl
31. ALE service consumer
- Quick lab -
• reference ALE web service in a visual studio console project ,
• same sample can be with eclips and javabeans
1- create console application
2- add reference to http://www.gs1.org/gsmp/kc/epcglobal/ale/ale_1_1-schemas-
20071202/EPCglobal-ale-1_1-ale.wsdl
32. ALE service consumer
- Quick lab -
Now you can work with the ALE classes, start your ALE protocol
implementation,
To implement the protocol you have to read the protocol
documentation , and apply the messages in the right sequence.
33. ALE Sample Schema – UML
(ECReports)
A sample schema from ALE – representing the
ECReports class.
To be familiar with the full schema , and
implement it , you will need to read the full
protocol documentation
http://www.gs1.org/gsmp/kc/epcglobal/ale/ale
34. Data Exchange Protocols
EPCIS: EPC Information Services
EPCIS: is an EPCglobal standard for sharing EPC related information
between trading partners. EPCIS provides important new capabilities to
improve efficiency, security, and visibility in the global supply chain, and
complements lower level EPCglobal tag, reader, and middleware
standards.
EPCIS V. 1.0 Standard Machine-readble Artifacts
36. Readers Protocols - LLRP
Low Level Reader Protocol
• The LLRP interface protocol is called low-level because it
provides control of RFID air protocol operation timing and
access to air protocol command parameters.
• The design of this interface recognizes that in some RFID
systems, there is a requirement for explicit knowledge of
RFID air protocols and the ability to control Readers that
implement RFID air protocol communications
• LLRP is specifically concerned with providing the formats and
procedures of communications between a Client and a
Reader
37. Readers Protocols - LLRP
Low Level Reader Protocol (Continued)
A typical LLRP sequence between an application software
client and a reader involves the following processes:
• client polling the reader for its capabilities
• setting the reader configuration
• sending reader operation commands.
– Reader Operation Specifications (ROSpecs)
– Antenna Inventory Specifications (AISpec)
• sending the reader Access specifications (AccessSpec)
• obtaining reports back from the reader
38. Good Reads
1. http://www.gs1.org/docs/GS1_System_of_Standards.pdf
2. http://www.gs1.org/gsmp/kc/epcglobal/llrp
3. http://www.gs1.org/gsmp/kc/epcglobal/ale
4. http://www.gs1.org/gsmp/kc/epcglobal/epcis
5. Global RFID – the value of the EPCglobal Network for
Supply Chain Management
– Case studies : manufacturing and supply chain
39. Good Reads
Extend your RFID knowledge
Read about RFID collision issues , and anti collision algorithms
• A Geometric Distribution Reader Anti-Collision Protocol for RFID Dense Reader
Environments
M. Victoria Bueno-Delgado, Member, IEEE, Renato Ferrero, Filippo Gandino, Member, IEEE,
Pablo Pavon-Marino, Member, IEEE, and Maurizio Rebaudengo, Member, IEEE
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 10, NO. 2, APRIL
2013
• Assigned Tree Slotted Aloha RFID Tag Anti-Collision Protocols
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 11, NOVEMBER 2013
5493
Lijuan Zhang, Jin Zhang, and Xiaohu Tang, Member, IEEE
• Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision
Haifeng Wu, Yu Zeng, Jihua Feng, and Yu Gu
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 1, JANUARY
2013
• AN ALOHA-BASED IMPROVED ANTI-COLLISION ALGORITHM FOR RFID SYSTEMS
YEJUN HE AND XIAOYE WANG, SHENZHEN UNIVERSITY
40. Good Reads
Extend your RFID knowledge
Read about RFID Security
• RFID Security and Privacy
Concepts, Protocols, and Architectures
Dirk Henrici
41. References
Teaching RFID Information Systems Security
Thompson, D.R.; Jia Di; Daugherty, M.K., "Teaching RFID Information Systems
Security," Education, IEEE Transactions on , vol.57, no.1, pp.42,47, Feb. 2014
doi: 10.1109/TE.2013.2264289
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6524969&isnumber=6729118
RFID Handbook 3rd edition (2010)
Klaus Finkenzeller Giesecke & Devrient GmbH, Munich, Germany
http://www.rfidhandbook.de
Labs info and sources
• https://support.impinj.com/entries/30534123-How-do-I-create-RFID-applications-with-Java-
• http://sourceforge.net/projects/rifidi/?source=recommended
• http://www.llrp.org/
• http://www.microsoft.com/en-us/server-cloud/products/biztalk/default.aspx
• http://msdn.microsoft.com/en-us/library/dd352570.aspx
• https://code.google.com/p/fosstrak/
Slide Notes:
These are only some bodies … as examples …
Slide Resources:
EPCglobal - Electronic Product Code global - organization set up to achieve world-wide adoption and standardization of EPC technology and was a joint venture between GS1 and GS1 US, now other
Slide Resources:
https://www.impinj.com/guide-to-rfid/rfid-standards.aspx
https://www.aiag.org/scriptcontent/index.cfm
https://www.aiag.org/staticcontent/files/AIAGBook.pdf
http://www.truckline.com/
https://www.aar.org/Pages/Home.aspx