1 / 38

RFID Tutorial for 802

RFID Tutorial for 802. Enterprise use of RFID Ongoing Activities Challenges Radio Standards Issues. What is it? Where is it in technology life cycle? Challenges Issues Radio Issues What can IEEE and 802 do?. RFID. Low cost tag with pre-defined id Logically mapped to tracked asset

shaun
Télécharger la présentation

RFID Tutorial for 802

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RFID Tutorial for 802 Enterprise use of RFID Ongoing Activities Challenges Radio Standards Issues

  2. What is it? Where is it in technology life cycle? Challenges Issues Radio Issues What can IEEE and 802 do? RFID

  3. Low cost tag with pre-defined id Logically mapped to tracked asset Radio Field Excites Tag 4W Burst EPCGlobal Frequencies 857MHz Europe (3MHz wide) 915MHz US (26MHz wide) 960MHz Japan (3MHz wide) Location Last known Location Benefits: Reusable (can be re-assigned) Zero production costs (purchased ready-to-use from vendor) Boeing examples: Employee badge proximity chip id  bemsid Wichita Passive tag id  order number Philadelphia Passive tag id  part number Auburn pilot Passive tag id  cart  electronic manifest “Simple” passive RFID tag

  4. Battery Last 3-5 years Motion activated tags 802.11 Versions Real Time Location Services (using WLAN Access Points) Active Tag RFID

  5. Promotion by Wal-Mart and DoD Consumer product emphasis 2 cent tags Valley of Despair Been through the hype Been through the heights Radio issues put it in the valley of despair Passive Tag RFID Life Cycle

  6. Valley of Despair Little hype Expensive tags ($50) Radio advantages over passive (no burst of power) RSSI issues put it in the valley of despair for factory applications Minimally requires TDOA to be usable Active Tag RFID Life Cycle

  7. “Simple” RFID Architecture Asset Mapping Business Rules (Pre-defined RFID tag) Tag • Tag Id Vendor s/w Message Parser RFID “application” Reader/ Antenna (variation 2) • XML message: • Tag Id • Antenna • Date/Time • Tag Id • Antenna “RFID Application” can be used to determine whatneeds to be delivered where and how Business Application(s) (variation 1) Vendor Enterprise

  8. BadgeAccess Management System (AMS) AMS Application Verification request delivers proximity chip id Local Control Panel (upon verification, opens door) Proximity Reader BIT Badging Application Bems ID Translator The proximity (badge) reader communicates with a control panel that resides locally. The panel keeps a local copy of badges that have previously accessed the building along with some other data. If the badge being scanned is not in the panel, a request is sent to the AMS host to validate the badge. The AMS host executes the proximity chip id  employee BEMSID “look-up” as appropriate.

  9. Middleware Matrics Visibility Manager (MVM) Tag data in XML Files XML Parser Parsed Tag Data Temporary Flat Files RFID Architecture Logical View RFID Hardware Tag ID Assigned by Matrics Unprocessed Tag Data Tag ID Shop Orders Matrics Antenna Reader RFID Tag (Matrics format) Web based Management Visibility screen RFID Oracle Database Tag Data Database Loader DC/MRC I/F to ERP Parsed Tag Data User Screens HEI VAX Applications

  10. RFID Across an Enterprise Legend

  11. Challenges • Establishing “standards” within an evolving industry for a multi-dimensional systems (passive, active, semi-passive, etc) • Retail versus Manufacturing “requirements” (EPC??) • Minimize proprietary if/when possible • Successful implementations of suitable RFID product to business application • Defining data/tag and collection requirements • Security issues • Satisfying frequency management, etc. (avoiding conflicts, redundancy) • Providing enterprise-wide resources for: • Current & past RFID “lessons learned” • Technical expertise • Common approach for evaluation, implementation, etc.

  12. Electronic Product Code (EPC)

  13. “Finding the ROI in RFID” • From an AMR Research, Inc publication ( Report #16660, October 2003): • RFID must be business case/business process driven: • “The Bottom Line: In order for companies to find value in RFID, it needs to be viewed as more than a bar code replacement; successful companies have overhauled their business processes to take advantage of the process automation capabilities it offers” • “RFID will not cure a bad business process. Achieving the transformational potential of this technology requires creative thinking, often from cross-functional areas of your enterprise.” • Infrastructure is a major consideration in RFID implementations • “The back end is the key; there is too much focus on tags and readers and not enough on the impact on the software infrastructure and systems integration required to support RFID. Our research shows that this is the area that present the most risk of unexpected cost and project overrun.”

  14. What Problem(s) are we Trying to Solve? Contract Tools Hazardous Material Phones Critical Components Legal Documents How We Got Started How can we use RFID? In-Transit Materiel Computing Assets Technical Documents Large Assemblies Inventory Calibrated Measuring Tools Shipments Receipts

  15. Common Use Cases RFID Technology Standards Approved Hardware/Software RFID Project Approval Process Network Support (Local) Use Case Definition Frequency Management Council (Local) IT Interfaces Lean Assessment Process Identification Approval Safety Health Environmental Affairs (Local) Business Case (TCO) Non Standard Justification

  16. Operations Flow Velocity & Idle Time Inventory Where, How Much Supply Chain Visibility from Partner to Partner Transportation In-Transit Visibility Logistics Chain of custody, Movement history Demand Planning Inventory Behavior, Consumption History Asset Management Property, Equipment Visibility Value Proposition and Customers • Tooling tracking • Inventory tracking • Government property • Shipping Labels • Part tracking and reliability • Life Cycle Data Management • Emergency Equipment Sustainment Legacy OEM, Birth record, Certs/Specs Reliability Recurring Maintenance Actions, Failure Patterns Collaboration on Business Value Unstructured Data OEM feedback, Helpful observations Authenticity Validation of authenticity & Authorizations for Repair and custody Logistics Chain of custody, Movement history Maintenance Task manning/tooling/ requred certs) OSD Spend is over $250M/year on RFID technology BCA estimates $1M value increase of RFID enabled A/C Engineering Curious, life limited or Unique repair Control documents

  17. 802.11. D Usage Standards Other Boeing ISM & UNII RFID at the RF Layer RFID is a user of the unlicensed RF spectrum resource. Due to current and legacy technology and licensing constraints, this is a limited resource. The Boeing RF The Boeing RF resource must be used in accordance with established company RF management processes and priorities. The priorities for the use of the unlicensed spectrum resource were established at a company-wide wireless summit in St. Louis in May, 2001. Processes Priorities

  18. Boeing’s Wireless Priorities 1. Product 2. Process that support product 3. General purpose WLAN 4. Single purpose • Try to satisfy priority 2 and 4 requirements with services added to the general purpose wireless service. • CNO should team with Engineering to maximize compatibility and synergy between “e-enabled” products and facilities.

  19. Tag data standards (EPCGlobal) Schema Form factor Air-interface protocols Encryption (IEEE 802.11) Re-broadcast Location (IEEE 802.11k, 802.11y) Waveform Frequency (expanding with 802.11y) Reflection (i.e.: backscatter) Reader Protocol Content of Reader/Host Exchanges (abstract syntax) Message formatting Message framing Message syntax Error information O/S-provided network facility Network/application integration Standards Required

  20. RFID Boeing RF Priorities Passive Tag RFID: Passive tag RFID systems will in most cases be priority 4, single purpose users of the RF spectrum. Proposed applications must be reviewed with Boeing Frequency Management for compatibility with existing uses of the Boeing RF spectrum resource. Active Tag RFID (RTLS): Requirements for active tag RFID systems in most cases will be satisfied by a Boeing Network Location Service (BNLS) and its WLAN coverage. Requirements for a standalone non-standard RTLS are by definition priority 4, single purpose users of the RF spectrum. Proposed applications must be reviewed with Boeing Frequency Management for compatibility with existing uses of the Boeing RF spectrum resource.

  21. Tag data standards – Boeing Standards (Kathryn Chalfan/Susan Jordan/Ken Porad/Steve Georgevitch/Dave McCoy/Craig Dupler) Form factor Schema (maybe more than one) Air-interface protocols – EPCGlobal/ETSI/IEEE? Encryption Re-broadcast Etc. Waveform – EPCGlobal/ETSI/IEEE? Frequency Reflection (i.e.: backscatter) Reader Protocol – EPCGlobal/ETSI/IEEE? Content of Reader/Host Exchanges (abstract syntax) Message formatting Message framing Message syntax Error information O/S-provided network facility Network/application integration – Boeing Network/Applications Location Schema RFID Standards Big Picture

  22. Bar Coding – anywhere using IEEE 802.11 for communication to network (relatively close range laser bar code range at 10s of feet) RFID Passive Tag – gates and docks (receiving and transportation) Away from other RF at same frequency (902-928MHz) Confined RF location Work on “Good Neighbor” protocols at PHY/MAC RFID Active Tag – anywhere using the existing infrastructure (IEEE 802.11) RF Perspectives

  23. Security Requirements for RFID Tag Data Data collected from RFID tags, including either the tag’s or tagged item’s identifier may be subject to rules for both “sensitive data” and “data integrity.” SensitiveData • Data that is sensitive to disclosure (e.g. proprietary) shouldnot be stored on tags. • Any sensitive data to be stored on tags must be encrypted using an approved standard before being transmitted and written to the tag. Integrity • Tag writing and storage must use measures to detect tampering and provide non-repudiation of the originator commensurate with the value of the data (e.g. HMAC or digital signature).

  24. 125KHz and 2.4GHz Analysis

  25. Zigbee Coexistence Map

  26. 2005 Wireless Application (WAG) • RFID Active Tags • RFID Passive Tags • Asset Tracking (Location) • Supply Chain • Cable Replacement • VoWLAN and Data • Sensors • Line-of-Sight (LOS) Directional Delivery of Communications • Emergency Lighting WLANs can handle the application classes in “black”: Red applications not able to use WLANs Green can use either WLAN (SMA) or Zigbee

  27. Network Principles • Leverage what is Intranet equipment (almost ubiquitous 802.11 WLANs) • Do not interfere with 802.11 WLAN installed network 2.4GHz (ISM) and 5GHz (UNII+EU+WRC+Japan) deployments • Standardize unlicensed frequencies within the enterprise to optimize unlicensed wireless usage

  28. Principle 1: Underlying Wireless Communications Used by Wireless Applications Must be Secure Principle 2: Information on the Tags and Sensors Must be Capable of Being Secure Principle 3: Use Standards-Based specifications [IEEE 802.11, IEEE 802.15.4 (Zigbee), etc] for Data Backhaul in Sensor Applications Principle 4: Use IEEE 802.11 Active Tags for RFID Principle 5: Develop a 850-960MHz Passive Tag Standard for Portal or Reader Point Passive Tag RFID WAG Principles RED – Work in Progress; BLACK – Work Accomplished

  29. Principle 6: Frequency Management/ Wireless Network Operations will do a baseline scan before a wireless application deployment. Principle 7: Allow for Confinement of the Passive Tag Reader Energies to Confined Handheld Readers, Portals, Faraday Cages, and Gateways Principle 8: Transition of 915MHz Serial Cable Replacements to Zigbee or 802.11. Principle 9: Use of IEEE 802.11a/b Ethernet Extensions for Autonomous Wireless Devices [AWDs or Automated Guided Vehicle (AGV)] Using Secure Mobile Communications Methods WAG Principles (Contd) RED – Work in Progress; BLACK – Work Accomplished

  30. Principle 10: An Enterprise Wireless Management Council be Established to Determine Spectrum Policy Principle 11: An Enterprise Wireless Technical Council be Established to Advise the Spectrum Management Council Principle 12: Maintain Railroad Charts for Wireless Technologies Futures WAG Principles (Contd) RED – Work in Progress; BLACK – Work Accomplished

  31. WAG 2007 UNLICENSED WIRELESS STANDARDS EFFORT (RFID + Other Wireless Applications)

  32. Active Tags Real Time Location Service (RTLS) Active Tags Network Connected Devices Passive tag for airplane Line Replaceable Units (LRUs) Passive tag for receiving supply chain parts Boeing Worldwide Wireless Requirements 2.4GHz 5GHz EPCGlobal (Japan, Europe, US) Boeing Directions

  33. Traditional Active and Passive Tag Roles Transportation/Supply/Theater Depots/TDCs Manufacturers/Suppliers Customers Distribution Centers/Depots POEs/PODs PASSIVE PASSIVE ACTIVE ACTIVE PASSIVE PASSIVE

  34. Actual Active and Passive Tag Roles Transportation/Supply/Theater Depots/TDCs Manufacturers/Suppliers Customers Distribution Centers/Depots POEs/PODs ACTIVE PASSIVE PASSIVE

  35. Principles and Architecture Published in 2005 Preserve 2.4GHz for WLANs Preserve 5.15GHz for WLANs Late 2006 to Present – Standards for Other Unlicensed Frequencies 125KHz 13.56MHz 433MHz *860MHz (Europe) *902MHz (US and others) *960MHz (Japan) 1.9GHz 3.1-10.6GHz (UWB) 3.65GHz 2.4GHz (other than WLAN) 5.15GHz (other than WLAN) Boeing’s Wireless Applications Group (WAG) Candidates for Global Passive Tag RFID Standards Development Organization (SDO)

  36. 902-928MHz Testing in the Boeing Facilities CLEAN ROOM TESTING OF 902-928MHz FACTORY TESTING OF 902-928MHz

  37. Devices interfere with each other (8 different devices tested) Need for 902-928MHz radio and media access standards Need for global radio and media access standards for passive tag RFID Need for Boeing global access of all unlicensed frequencies Aircraft move worldwide Boeing military products move worldwide Need standards for all unlicensed radios and media access 902-928MHz Testing Conclusions

  38. Do nothing for a many billion $ industry IEEE 802.15.4 for Passive Tag RFID Mike McInnis from Boeing leading RFID Study Group in 802.15 IEEE 802 for 902-928MHz Contention-Based Protocol IEEE 802 for all unlicensed frequencies Contention-Based Protocol IEEE 19XX for all unlicensed frequencies IEEE Possibilities

More Related