RFID readers route tag traffic

动不动,网络必须处理来自新源额外的流量。其中的网络流量增加的最新和即将兴起源起实施产生radio frequency identification, which is being used for needs such as supply-chain management, tracking airport baggage and prescription medication shipments. These examples alone suggest a growing volume of TCP/IP network traffic and data.

While conventional RFID readers were essentially data radios, today's enterprise-grade RFID tag readers - created specifically for electronic product code (EPC) usage - have been designed to be full-fledged network devices that can support mission-critical operations. In addition to managing a dynamic population of tags, then routing data into networks, databases and business applications, these RFID readers have to speak TCP/IP natively and fully support standard network technologies such as DHCP, User Datagram Protocol (UDP)/IP over Ethernet, 802.11x, HTTP, SNMP and remote upgrades.

This design lets RFID be widely deployed in an economical, scalable, secure and manageable manner on WANs and LANs, even with the two-way demands of RFID data for networks and changes to RFID tags emanating from within the network.

通过快速的网络处理器和先进的软件驱动,RFID阅读器提供同样的负载均衡,QoS和安全性的高端IP路由器发现。标签读取器将被作为IP网络,并提供读写数据存储,车载传感器和其他功能的标签之间的网关方便高级应用。

The network gateway functionality of RFID readers becomes even more critical in light of the channel-sharing, data-exchange and air-interface protocols required to accommodate two-way TCP/IP traffic. Before exchanging information with a tag, a networked reader searches for and retrieves the ID of each tag in its read zone. This discovery process produces a list of IDs, which then must be made available to an external software system such as a warehouse management system that resides on a remote networked server.

When the warehouse management system wishes to read, write and update data on the tag, it routes the updated data back to the tag via the reader through which the tag was orignally read. This is analogous to an IP routing procedure in which a reader forwards an encapsulated data packet to a specific tag.

The scenario is clearer in the case of sensor or actuator tags, which typically contain a miniature battery and are used for applications such as time-temperature monitoring of perishable goods in the supply chain.

First, the same networked discovery process applies in the case of sensor tags. Then, bidirectional communication occurs between the tag and software residing on a networked server. In some cases, such as time-critical movement of tagged packages on a conveyor belt, the reader might be given authority to act quickly on a networked server's behalf. This can be accomplished by running specialized software on the reader, or by implementing and populating a policy-based decision-making mechanism, mimicking those employed by high-end IP routers.

The new RFID readers are designed to provide the functionality of a gateway for large networks. RF interfaces to the tags reside on one side of a reader, with a database server and a TCP/IP network interface on the other side, fully equipped to be part of a networked-distributed data aggregation and analysis system.

How it works: RFID tag reader

沃瑟曼是ThingMagic公司开发的副总裁,还担任IETF的指导小组,是互联网协会的董事会成员。她可以在到达margaret@thingmagic.com.

Learn more about this topic

RFID研究中心

The latest news, opinion, case studies and more.

On the leading edge of RFID

Network World, 12/13/04

Using RFID to boost business' bottom line

Network World, 02/21/05

Speakers debate RFID benefits, challenges

IDG News Service, 09/29/04

Join the Network World communities onFacebookandLinkedInto comment on topics that are top of mind.

Copyright © 2005Raybet2

IT Salary Survey:结果是在