SlideShare a Scribd company logo
RFID Applications 
March/2014 
Presentation 
1 
• Introduction 
• components 
• Layers 
Presentation 
2 
• Regulations 
• Standards 
• Protocols 
Presentation 
3 
• RFID Software 
Developer 
• Middleware 
• Labs 
Presentation 
4 
• RIFIDI 
Emulator LAB 
Mouhanad Alkhaldi | Postgraduate Taught Part Time - Information Technology (SS), MSc |ma1049@hw.ac.uk
RIFIDI Emulator 
to test your programs 
March/2014 
http://www.transcends.co/ 
http://sourceforge.net/projects/rifidi/ 
Mouhanad Alkhaldi | Postgraduate Taught Part Time - Information Technology (SS), MSc |ma1049@hw.ac.uk
Background 
RIFIDI Training : 
• Helps RFID Middleware developer in testing. 
• Helps RFID developer testing the LLRP layer. 
• Helps RFID implementer doing RFID POC, test , prototype 
implementation. 
• Shows how to connect to reader using telnet client. 
• Also it shows how to verify the reader using Microsoft BizTalk RFID.
RIFIDI 
• Rifidi is a middleware and development platform for 
RFID. 
• With Rifidi you can prototype an RFID application down 
to the core RFID Hardware 
• using Rifidi Edge you can develop business rules to turn 
RFID events into real business applications
RIFIDI Architecture Overview
Getting started 
http://wiki.rifidi.net/index.php?title=Edge_Server_Getting_Started 
Run it 
1. Download the Edge Server from our sourceforge page. The download comes bundled with two programs: 
the Edge Server which does the core work of connecting to sensors (such as RFID readers), collecting tag 
information, and making that data available. It ships with adapters for Alien, LLRP, Awid, and several other 
types of RFID readers. It also ships with ALE support. The second program isWorkbench which is a user 
interface that allows you to control the edge server and view tag information that it is collecting, as well as 
experiment with ALE. 
2. Download Rifidi Emulator. This program allows you to virtualize several popular types of RFID readers on 
your desktop. 
3. Follow the quick start guide to start getting tag reads back from virtual readers. 
Develop Your Own Application 
The edge server by itself allows you to connect to sensors and collect tag data from them, but if you really want to 
put it to work, you will need to develop your own applications that run on the edge server. 
1. Download our SDK (Standard Development Kit). This provides our API, sourcecode and examples to help you 
get started. You can find out how to set up a development environment here: Edge Server Development 
Environment. 
2. Develop an application. There are several example applications which ship with the Rifidi Edge Server. You 
can read about them in detail in the developer guide that is included in the release 
3. Export your application 
4. Deploy the application you've built. Once you've built and tested your application, you can deploy it onto the 
edge server that you've downloaded.
Rifidi’s Repositories 
• To access Subversion via traditional clients, please 
use the following address: 
https://svn.sourceforge.net/svnroot/rifidi 
• To browse the repository using a web-interface, 
point your browser to 
http://svn.sourceforge.net/viewcvs.cgi/rifidi/ 
• http://sourceforge.net/projects/rifidi/
Rifidi Help 
• Main Help 
http://wiki.rifidi.net/index.php?title=Main_Page 
• Emulator User's Guide 
http://wiki.rifidi.net/index.php?title=Emulator_User%27s_Guide 
• RIFIDI LLRP Reader 
http://wiki.rifidi.net/index.php?title=LLRP_Reader 
• LLRP XML Messages 
http://wiki.rifidi.net/index.php?title=LLRP_XML_Messages
LAB – Step by Step 
All the lab steps are done by me on my machine 
• The purpose of this lab is to learn how to create a virtual LLRP reader 
through “RIFIDI Emulator”. 
• Use “MS BizTalk RFID” Server to communicate with this virtual device 
(same way as Biztalk is used with real devices). 
1- Start Rifidi Server 
2- Start Rifidi Emulator , Add virtual LLRP reader 
3- Adding virtual tags 
4- attach tags to reader antenna 
5- Start the reader 
6- RIFIDI with LLRP 
8- Your Reader is ready ! 
9- connect the virtual reader through MS BizTalk RFID middleware 
10- Enable The reader 
11- View Tags 
12- Check Request & Response in RIFIDI
1- Start Rifidi Server 
RIFIDI Server Running
2- Start Rifidi Emulator , 
Add virtual LLRP reader 
1. Start RIFIDI Emulator 
2. click on create new reader 
3. then select LLRP reader from the list 
4. Define the reader properties: name, number of antennas , IP addresses , Ports..
3- Adding virtual tags 
1. Click on add tags 
2. Select the tag data type , generation , and number of tags 
3. You have also to define the tag prefix
4- attach tags to reader antenna 
Drag the tags to the antenna ….
5- Start the reader 
Right click on the reader and “start reader”
6- RIFIDI with LLRP 
In command line: 
telnet ip port 
In telnet: 
mode client [IP] [PORT]
8- Your Reader is ready ! 
You can try to connect to the reader 
through your code … 
or any other middleware 
In next slides we are going to connect through another middle ware 
Microsoft BizTalk RFID Server
9- connect the virtual reader through MS 
BizTalk RFID middleware 
1. Open MS BizTalk RFID “RFID Manager” Console 
2. Right Click on devices 
3. Click add new device wizard
10- Enable The reader 
• Now the reader is defined in RFID Manager 
• Right click and enable the device
11- View Tags 
• Right click, and view tags… 
• You will see the communication happening in RIFIDI (next slide)
12- Check Request & Response in RIFIDI 
• We can see the data flow (Requests & Responses) through “RIFIDI” 
• When sending the commands like “Read Tag” from “BizTalk RFID“ , xml commands 
are sent behind the scene , and RIFIDI helps you seeing the message content 
• Request in red , response in green
Sample LLRP request & Response 
from RIFIDI 
Request (LLRP Sample Request): 
<Messagetype="GetReaderCapabilities"> 
<RequestedData value="0"/> 
</Message> 
Response (LLRP Reader Response to the above request) 
File: 
Sample Request & Response: 
Full LLRP communication sample from RIFIDI console , 
helps to show different LLRP commands in XML 
File:
End of RIFIDI Lab
RIFIDI for non LLRP Readers 
Get TagList on “Alien” Reader 
Rifidi supports LLRP and some non-LLRP RFID readers 
• get TagList - Displays the tags currently detected by the reader. 
• get $PROPERTY - Returns the value for the passed property. 
• set $PROPERTY=$VALUE - Sets the passed property to the passed value. q - Close the connection
Similar open source Projects 
– Tag Centric - 
http://sourceforge.net/projects/tag-centric/ 
TagCentric is RFID middleware that controls 
heterogeneous RFID devices and gathers RFID-related 
data into a user-specified database. It's cost (free!) 
and simplicity make it ideal for use by small 
businesses, RFID testing facilities, and universities.
References 
• http://www.transcends.co/ 
• http://sourceforge.net/projects/rifidi/ 
• https://svn.sourceforge.net/svnroot/rifidi 
• http://svn.sourceforge.net/viewcvs.cgi/rifidi/ 
• http://www.rifidi.org/documentation_architecture.html 
• http://wiki.rifidi.net/index.php?title=Edge_Server_Getting_Started 
• http://wiki.rifidi.net/index.php?title=Main_Page 
• http://wiki.rifidi.net/index.php?title=Emulator_User%27s_Guide 
• http://wiki.rifidi.net/index.php?title=LLRP_Reader 
• http://wiki.rifidi.net/index.php?title=LLRP_XML_Messages 
• http://wiki.rifidi.net/index.php?title=Alien_Beginners_Guide 
• http://wiki.rifidi.net/index.php?title=Alien_9800 
• http://sourceforge.net/projects/tag-centric/ 
• http://sourceforge.net/projects/rifidi/
Thank You

More Related Content

What's hot

Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
rajkanakaraj007
 
RFID based Access Control using 8051 Micro Controller
RFID based Access Control using 8051 Micro ControllerRFID based Access Control using 8051 Micro Controller
RFID based Access Control using 8051 Micro Controller
CircuitsToday
 
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using KurentoFIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE
 
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF AttacksIt’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
Priyanka Aash
 
M240 reader-bundle for environmental monitoring in IT / Network Closets.
M240 reader-bundle for environmental monitoring in IT / Network Closets.M240 reader-bundle for environmental monitoring in IT / Network Closets.
M240 reader-bundle for environmental monitoring in IT / Network Closets.
pe2six
 
Rfid parking for chaotic free parking
Rfid parking for chaotic free parkingRfid parking for chaotic free parking
Rfid parking for chaotic free parking
nephsystem
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
Hristo Borislavov Kolev
 
Materials Handling to Reduce Operating Costs
Materials Handling to Reduce Operating CostsMaterials Handling to Reduce Operating Costs
Materials Handling to Reduce Operating Costs
loriayre
 
Rfid and gsm based attendence system
Rfid and gsm based attendence systemRfid and gsm based attendence system
Rfid and gsm based attendence system
Karthik Kumar
 
Hyperchem Ma, badbarcode en_1109_nocomment-final
Hyperchem Ma, badbarcode en_1109_nocomment-finalHyperchem Ma, badbarcode en_1109_nocomment-final
Hyperchem Ma, badbarcode en_1109_nocomment-final
PacSecJP
 
IP Address
IP AddressIP Address
IP Address
tishko18
 
A brief introduction to RTIR
A brief introduction to RTIRA brief introduction to RTIR
A brief introduction to RTIR
Jesse Vincent
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
FIWARE
 
Fuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasiFuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasiRahul Sasi
 
Gigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware TourGigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware Tour
gigamon_systems
 
RF Code solutions presentation
RF Code solutions presentationRF Code solutions presentation
RF Code solutions presentationpe2six
 
FIWARE Global Summit - Connecting to LoRa networks: Practical Demo
FIWARE Global Summit - Connecting to LoRa networks: Practical DemoFIWARE Global Summit - Connecting to LoRa networks: Practical Demo
FIWARE Global Summit - Connecting to LoRa networks: Practical Demo
FIWARE
 

What's hot (20)

Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
NISO Webinar: RFID Systems in Libraries Part 1: An Introduction
NISO Webinar: RFID Systems in Libraries Part 1: An IntroductionNISO Webinar: RFID Systems in Libraries Part 1: An Introduction
NISO Webinar: RFID Systems in Libraries Part 1: An Introduction
 
RFID based Access Control using 8051 Micro Controller
RFID based Access Control using 8051 Micro ControllerRFID based Access Control using 8051 Micro Controller
RFID based Access Control using 8051 Micro Controller
 
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using KurentoFIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
 
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF AttacksIt’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
 
M240 reader-bundle for environmental monitoring in IT / Network Closets.
M240 reader-bundle for environmental monitoring in IT / Network Closets.M240 reader-bundle for environmental monitoring in IT / Network Closets.
M240 reader-bundle for environmental monitoring in IT / Network Closets.
 
Rfid parking for chaotic free parking
Rfid parking for chaotic free parkingRfid parking for chaotic free parking
Rfid parking for chaotic free parking
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
 
Materials Handling to Reduce Operating Costs
Materials Handling to Reduce Operating CostsMaterials Handling to Reduce Operating Costs
Materials Handling to Reduce Operating Costs
 
Rfid and gsm based attendence system
Rfid and gsm based attendence systemRfid and gsm based attendence system
Rfid and gsm based attendence system
 
Hyperchem Ma, badbarcode en_1109_nocomment-final
Hyperchem Ma, badbarcode en_1109_nocomment-finalHyperchem Ma, badbarcode en_1109_nocomment-final
Hyperchem Ma, badbarcode en_1109_nocomment-final
 
IP Address
IP AddressIP Address
IP Address
 
RT and RT for Incident Response
RT and RT for Incident ResponseRT and RT for Incident Response
RT and RT for Incident Response
 
Ice
IceIce
Ice
 
A brief introduction to RTIR
A brief introduction to RTIRA brief introduction to RTIR
A brief introduction to RTIR
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
 
Fuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasiFuzzing usb modems rahu_sasi
Fuzzing usb modems rahu_sasi
 
Gigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware TourGigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware Tour
 
RF Code solutions presentation
RF Code solutions presentationRF Code solutions presentation
RF Code solutions presentation
 
FIWARE Global Summit - Connecting to LoRa networks: Practical Demo
FIWARE Global Summit - Connecting to LoRa networks: Practical DemoFIWARE Global Summit - Connecting to LoRa networks: Practical Demo
FIWARE Global Summit - Connecting to LoRa networks: Practical Demo
 

Similar to Presentation 4 rifidi emulator lab

Osiot13 IoT buildout
Osiot13 IoT buildoutOsiot13 IoT buildout
Osiot13 IoT buildout
Michael Koster
 
2022 APIsecure_Securing APIs with Open Standards
2022 APIsecure_Securing APIs with Open Standards2022 APIsecure_Securing APIs with Open Standards
2022 APIsecure_Securing APIs with Open Standards
APIsecure_ Official
 
Wifi direct p2p app
Wifi direct p2p appWifi direct p2p app
Wifi direct p2p app
geniushkg
 
IPMI is dead, Long live Redfish
IPMI is dead, Long live RedfishIPMI is dead, Long live Redfish
IPMI is dead, Long live Redfish
Bruno Cornec
 
How CodeIgniter Made Me A Freelancer
How CodeIgniter Made Me A FreelancerHow CodeIgniter Made Me A Freelancer
How CodeIgniter Made Me A Freelancer
Michael Wales
 
Zephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdfZephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdf
AswathRangaraj1
 
Asynchrone Echtzeitanwendungen für SharePoint mit SignalR und knockout.js
Asynchrone Echtzeitanwendungen für SharePoint mit SignalR und knockout.jsAsynchrone Echtzeitanwendungen für SharePoint mit SignalR und knockout.js
Asynchrone Echtzeitanwendungen für SharePoint mit SignalR und knockout.js
Christian Heindel
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
FFRI, Inc.
 
Securing your Container Environment with Open Source
Securing your Container Environment with Open SourceSecuring your Container Environment with Open Source
Securing your Container Environment with Open Source
Michael Ducy
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Android
todbotdotcom
 
Neev Open Source Contributions
Neev Open Source ContributionsNeev Open Source Contributions
Neev Open Source Contributions
Neev Technologies
 
API Documentation Workshop tcworld India 2015
API Documentation Workshop tcworld India 2015API Documentation Workshop tcworld India 2015
API Documentation Workshop tcworld India 2015
Tom Johnson
 
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoTInria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
Stéphanie Roger
 
SAP Integration with MuleSoft | MuleSoft Mysore Meetup #14
SAP Integration with MuleSoft | MuleSoft Mysore Meetup #14 SAP Integration with MuleSoft | MuleSoft Mysore Meetup #14
SAP Integration with MuleSoft | MuleSoft Mysore Meetup #14
MysoreMuleSoftMeetup
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
The Security of Things Forum
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
Nahidul Kibria
 
The FatRat
The FatRatThe FatRat
The FatRat
AjilSunny
 
SOLID Programming with Portable Class Libraries
SOLID Programming with Portable Class LibrariesSOLID Programming with Portable Class Libraries
SOLID Programming with Portable Class Libraries
Vagif Abilov
 
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream ProjectsITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
ITCamp
 
Advanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCONAdvanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCON
Lyon Yang
 

Similar to Presentation 4 rifidi emulator lab (20)

Osiot13 IoT buildout
Osiot13 IoT buildoutOsiot13 IoT buildout
Osiot13 IoT buildout
 
2022 APIsecure_Securing APIs with Open Standards
2022 APIsecure_Securing APIs with Open Standards2022 APIsecure_Securing APIs with Open Standards
2022 APIsecure_Securing APIs with Open Standards
 
Wifi direct p2p app
Wifi direct p2p appWifi direct p2p app
Wifi direct p2p app
 
IPMI is dead, Long live Redfish
IPMI is dead, Long live RedfishIPMI is dead, Long live Redfish
IPMI is dead, Long live Redfish
 
How CodeIgniter Made Me A Freelancer
How CodeIgniter Made Me A FreelancerHow CodeIgniter Made Me A Freelancer
How CodeIgniter Made Me A Freelancer
 
Zephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdfZephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdf
 
Asynchrone Echtzeitanwendungen für SharePoint mit SignalR und knockout.js
Asynchrone Echtzeitanwendungen für SharePoint mit SignalR und knockout.jsAsynchrone Echtzeitanwendungen für SharePoint mit SignalR und knockout.js
Asynchrone Echtzeitanwendungen für SharePoint mit SignalR und knockout.js
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
 
Securing your Container Environment with Open Source
Securing your Container Environment with Open SourceSecuring your Container Environment with Open Source
Securing your Container Environment with Open Source
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Android
 
Neev Open Source Contributions
Neev Open Source ContributionsNeev Open Source Contributions
Neev Open Source Contributions
 
API Documentation Workshop tcworld India 2015
API Documentation Workshop tcworld India 2015API Documentation Workshop tcworld India 2015
API Documentation Workshop tcworld India 2015
 
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoTInria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
Inria Tech Talk : RIOT, l'OS libre pour vos objets connectés #IoT
 
SAP Integration with MuleSoft | MuleSoft Mysore Meetup #14
SAP Integration with MuleSoft | MuleSoft Mysore Meetup #14 SAP Integration with MuleSoft | MuleSoft Mysore Meetup #14
SAP Integration with MuleSoft | MuleSoft Mysore Meetup #14
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 
The FatRat
The FatRatThe FatRat
The FatRat
 
SOLID Programming with Portable Class Libraries
SOLID Programming with Portable Class LibrariesSOLID Programming with Portable Class Libraries
SOLID Programming with Portable Class Libraries
 
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream ProjectsITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
 
Advanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCONAdvanced SOHO Router Exploitation XCON
Advanced SOHO Router Exploitation XCON
 

Recently uploaded

Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 

Recently uploaded (20)

Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 

Presentation 4 rifidi emulator lab

  • 1. RFID Applications March/2014 Presentation 1 • Introduction • components • Layers Presentation 2 • Regulations • Standards • Protocols Presentation 3 • RFID Software Developer • Middleware • Labs Presentation 4 • RIFIDI Emulator LAB Mouhanad Alkhaldi | Postgraduate Taught Part Time - Information Technology (SS), MSc |ma1049@hw.ac.uk
  • 2. RIFIDI Emulator to test your programs March/2014 http://www.transcends.co/ http://sourceforge.net/projects/rifidi/ Mouhanad Alkhaldi | Postgraduate Taught Part Time - Information Technology (SS), MSc |ma1049@hw.ac.uk
  • 3. Background RIFIDI Training : • Helps RFID Middleware developer in testing. • Helps RFID developer testing the LLRP layer. • Helps RFID implementer doing RFID POC, test , prototype implementation. • Shows how to connect to reader using telnet client. • Also it shows how to verify the reader using Microsoft BizTalk RFID.
  • 4. RIFIDI • Rifidi is a middleware and development platform for RFID. • With Rifidi you can prototype an RFID application down to the core RFID Hardware • using Rifidi Edge you can develop business rules to turn RFID events into real business applications
  • 6. Getting started http://wiki.rifidi.net/index.php?title=Edge_Server_Getting_Started Run it 1. Download the Edge Server from our sourceforge page. The download comes bundled with two programs: the Edge Server which does the core work of connecting to sensors (such as RFID readers), collecting tag information, and making that data available. It ships with adapters for Alien, LLRP, Awid, and several other types of RFID readers. It also ships with ALE support. The second program isWorkbench which is a user interface that allows you to control the edge server and view tag information that it is collecting, as well as experiment with ALE. 2. Download Rifidi Emulator. This program allows you to virtualize several popular types of RFID readers on your desktop. 3. Follow the quick start guide to start getting tag reads back from virtual readers. Develop Your Own Application The edge server by itself allows you to connect to sensors and collect tag data from them, but if you really want to put it to work, you will need to develop your own applications that run on the edge server. 1. Download our SDK (Standard Development Kit). This provides our API, sourcecode and examples to help you get started. You can find out how to set up a development environment here: Edge Server Development Environment. 2. Develop an application. There are several example applications which ship with the Rifidi Edge Server. You can read about them in detail in the developer guide that is included in the release 3. Export your application 4. Deploy the application you've built. Once you've built and tested your application, you can deploy it onto the edge server that you've downloaded.
  • 7. Rifidi’s Repositories • To access Subversion via traditional clients, please use the following address: https://svn.sourceforge.net/svnroot/rifidi • To browse the repository using a web-interface, point your browser to http://svn.sourceforge.net/viewcvs.cgi/rifidi/ • http://sourceforge.net/projects/rifidi/
  • 8. Rifidi Help • Main Help http://wiki.rifidi.net/index.php?title=Main_Page • Emulator User's Guide http://wiki.rifidi.net/index.php?title=Emulator_User%27s_Guide • RIFIDI LLRP Reader http://wiki.rifidi.net/index.php?title=LLRP_Reader • LLRP XML Messages http://wiki.rifidi.net/index.php?title=LLRP_XML_Messages
  • 9. LAB – Step by Step All the lab steps are done by me on my machine • The purpose of this lab is to learn how to create a virtual LLRP reader through “RIFIDI Emulator”. • Use “MS BizTalk RFID” Server to communicate with this virtual device (same way as Biztalk is used with real devices). 1- Start Rifidi Server 2- Start Rifidi Emulator , Add virtual LLRP reader 3- Adding virtual tags 4- attach tags to reader antenna 5- Start the reader 6- RIFIDI with LLRP 8- Your Reader is ready ! 9- connect the virtual reader through MS BizTalk RFID middleware 10- Enable The reader 11- View Tags 12- Check Request & Response in RIFIDI
  • 10. 1- Start Rifidi Server RIFIDI Server Running
  • 11. 2- Start Rifidi Emulator , Add virtual LLRP reader 1. Start RIFIDI Emulator 2. click on create new reader 3. then select LLRP reader from the list 4. Define the reader properties: name, number of antennas , IP addresses , Ports..
  • 12. 3- Adding virtual tags 1. Click on add tags 2. Select the tag data type , generation , and number of tags 3. You have also to define the tag prefix
  • 13. 4- attach tags to reader antenna Drag the tags to the antenna ….
  • 14. 5- Start the reader Right click on the reader and “start reader”
  • 15. 6- RIFIDI with LLRP In command line: telnet ip port In telnet: mode client [IP] [PORT]
  • 16. 8- Your Reader is ready ! You can try to connect to the reader through your code … or any other middleware In next slides we are going to connect through another middle ware Microsoft BizTalk RFID Server
  • 17. 9- connect the virtual reader through MS BizTalk RFID middleware 1. Open MS BizTalk RFID “RFID Manager” Console 2. Right Click on devices 3. Click add new device wizard
  • 18. 10- Enable The reader • Now the reader is defined in RFID Manager • Right click and enable the device
  • 19. 11- View Tags • Right click, and view tags… • You will see the communication happening in RIFIDI (next slide)
  • 20. 12- Check Request & Response in RIFIDI • We can see the data flow (Requests & Responses) through “RIFIDI” • When sending the commands like “Read Tag” from “BizTalk RFID“ , xml commands are sent behind the scene , and RIFIDI helps you seeing the message content • Request in red , response in green
  • 21. Sample LLRP request & Response from RIFIDI Request (LLRP Sample Request): <Messagetype="GetReaderCapabilities"> <RequestedData value="0"/> </Message> Response (LLRP Reader Response to the above request) File: Sample Request & Response: Full LLRP communication sample from RIFIDI console , helps to show different LLRP commands in XML File:
  • 23. RIFIDI for non LLRP Readers Get TagList on “Alien” Reader Rifidi supports LLRP and some non-LLRP RFID readers • get TagList - Displays the tags currently detected by the reader. • get $PROPERTY - Returns the value for the passed property. • set $PROPERTY=$VALUE - Sets the passed property to the passed value. q - Close the connection
  • 24. Similar open source Projects – Tag Centric - http://sourceforge.net/projects/tag-centric/ TagCentric is RFID middleware that controls heterogeneous RFID devices and gathers RFID-related data into a user-specified database. It's cost (free!) and simplicity make it ideal for use by small businesses, RFID testing facilities, and universities.
  • 25. References • http://www.transcends.co/ • http://sourceforge.net/projects/rifidi/ • https://svn.sourceforge.net/svnroot/rifidi • http://svn.sourceforge.net/viewcvs.cgi/rifidi/ • http://www.rifidi.org/documentation_architecture.html • http://wiki.rifidi.net/index.php?title=Edge_Server_Getting_Started • http://wiki.rifidi.net/index.php?title=Main_Page • http://wiki.rifidi.net/index.php?title=Emulator_User%27s_Guide • http://wiki.rifidi.net/index.php?title=LLRP_Reader • http://wiki.rifidi.net/index.php?title=LLRP_XML_Messages • http://wiki.rifidi.net/index.php?title=Alien_Beginners_Guide • http://wiki.rifidi.net/index.php?title=Alien_9800 • http://sourceforge.net/projects/tag-centric/ • http://sourceforge.net/projects/rifidi/

Editor's Notes

  1. Slide Notes: Slide Resources: http://www.transcends.co/ http://sourceforge.net/projects/rifidi/
  2. Slide Notes: Slide Resources:
  3. Slide Notes: Slide Resources: http://sourceforge.net/projects/rifidi/?source=recommended
  4. Slide Notes: Slide Resources: http://www.rifidi.org/documentation_architecture.html
  5. Slide Notes: Slide Resources: http://wiki.rifidi.net/index.php?title=Edge_Server_Getting_Started
  6. Slide Notes: Slide Resources:
  7. Slide Notes: Slide Resources: http://wiki.rifidi.net/index.php?title=Alien_Example_Client
  8. Slide Notes: Slide Resources:
  9. Slide Notes: Slide Resources:
  10. Slide Notes: Slide Resources:
  11. Slide Notes: Slide Resources:
  12. Slide Notes: Slide Resources:
  13. Slide Notes: Slide Resources:
  14. Slide Notes: Slide Resources:
  15. Slide Notes: Slide Resources:
  16. Slide Notes: Slide Resources:
  17. Slide Notes: Slide Resources:
  18. Slide Notes: Slide Resources:
  19. Slide Notes: Slide Resources:
  20. Slide Notes: Slide Resources:
  21. Slide Notes: Slide Resources:
  22. Slide Notes: Default User/Password : alien/password Slide Resources: wiki.rifidi.net/index.php?title=Alien_Beginners_Guide wiki.rifidi.net/index.php?title=Alien_9800
  23. Slide Notes: Slide Resources:
  24. Slide Notes: Slide Resources:
  25. Slide Notes: