Date post: | 11-Jan-2016 |
Category: |
Documents |
Upload: | dorothy-eaton |
View: | 213 times |
Download: | 0 times |
Developing RFID Application In Supply Chain
Batbold Toiruul
Supervisor Prof. Kyung-Oh Lee
Database lab., Department of Computer Science Sunmoon University, Korea, 2005
2005/05/21 A Study of developing RFID application
2
Introduction
• Radio Frequency Identification
• Three parts to an RFID implementation:• Tag (chip and antenna)• Reader• Database & software
• Auto-ID (Automatic Identification)• EPCglobal Network
2005/05/21 A Study of developing RFID application
3
Example of Tags&Readers
2005/05/21 A Study of developing RFID application
4
How Does work RFID
Reader Antenna
Reader broadcasts signal through antenna
Transponder
Transponder receives signal
Computer System
Reader sends info/data to computer system for logging and processing
Transponder is charged with enough energy to send back an identifying response
2005/05/21 A Study of developing RFID application
5
RFID Reader
RFID Technology
Each product has tag:• Passive tag, unique identifier number• Range (Up to 3-5m, usually less)• Energy from reader
RFID reader :Use radio frequency and transmit ID string over serial port to PC (13,56 MHz and 915 MHz).
PC: Middleware software (appl.. and standard Savant) and connect to DB and EPCglobal network
RFID benefits:More information
- Individual item data & tracking
No contact No line of sight MillisecondsSimultaneous read of multiple items
2005/05/21 A Study of developing RFID application
6
EPCglobal Network
queries points to updatesprovides data to
BusinessTransactions
Reader
EPC Information Service
ONS (Cache)
EnterpriseApplication(s)
InternalDatabase
Additional data
filtered eventData
(optional)
Middleware software
Company A
event data
ONS
EnterpriseApplication(s)
InternalDatabase
Company B
EPC access registery
Object Name Service • Static ONS• Dynamic ONS
2005/05/21 A Study of developing RFID application
7
Typical Supply Chain
2005/05/21 A Study of developing RFID application
8
RFID privacy
• Eavesdropping– Very efficient to eavesdrop wirelessly at a high rate.
• Traffic analysis– It is possible to track people’s movements, social interactions,
and financial transactions by correlating data from multiple tag reader locations.
• Spoofing– Deceiving the system into thinking that a product is still on the
shelf or that it has a lower price than it actually does.
• Denial of service– Disrupting supply chains by disabling many tags at once.
2005/05/21 A Study of developing RFID application
9
The Purpose
• Make RFID application software for the supply chain system
• All information of products is stored on the database
• Once product registered by reader then every action is automatically
• Read products with tag by reader then show information of products from database
2005/05/21 A Study of developing RFID application
10
System Overview
Farmer
Input data ItemBox
Palleteshipment
Database
1
All informationof data is stored on DB
Read by Reader
Show some information of products
Retrieve all information of products
Distribution center
RetailStore
2
3
4
6
5
All products of farmer is read by reader
After shipment products are arrive at the retailstore
and read by reader
Aggregation center
database server
2005/05/21 A Study of developing RFID application
11
Aggregation center<<sub-system>>
Aggregation Center
write tags
receiveproduce
affix tags
place order
distributionshipper
create shipment
viewinventory
track order
pay producer
bill distributor
query tag
ship
distributor
producer
aggregationclerk
scan
receive payment
track shipment
Shelveproduce
mover
Inventorymanagement
Order management
View item
2005/05/21 A Study of developing RFID application
12
Implementation(1/4)
• PicoTag™ Tag – ISO 15693 Standard – Passive tag and 2kb of non-volatile read/write memory– Up to 1.5 m (gate antenna), 70 cm (single antenna)– 64 bits (unique serial number)
• M300-2G Reader– 12V to 15V power supply– Host interfaces RS232– Radio frequency 13.56 MHz
2005/05/21 A Study of developing RFID application
13
Implementation(2/4)
• Visual C++• Ms-SQL, ODBC, RS232, TCP/IP
Tag
Coupler
Host PC
Antenna
Tag Tag
Data
SQL Server
Database Server on the internet
ODBC
RS232
2005/05/21 A Study of developing RFID application
14
Implementation(3/4)
Input Data
Storage
Output Data
DataBase
Reading tag by reader
Reading tag by reader
In products
Go to Distribution center
Out Product
In/Out DatePrimary Key (Tag Code)Product nameProducerIn MoneyOut Money
Name of CompanyID of employee of CompanyNumber of Distribution centerCost of track
Product typeProduct name Counted NumberQuantityUnit price The place of origin Producer ID (Farmer)Storage life Tag Code
Aggregation center:
2005/05/21 A Study of developing RFID application
15
Implementation(4/4)
• Producer section: producers all
information
• Producer is only add/deleted to/from database on this application or Web site
• Also Product section has as same data of storage section.
manager
Product
Producer
Search
DataBase
2005/05/21 A Study of developing RFID application
16
2005/05/21 A Study of developing RFID application
17
2005/05/21 A Study of developing RFID application
18
Results:
2005/05/21 A Study of developing RFID application
19
Results:
2005/05/21 A Study of developing RFID application
20
Conclusions
• Developed the application software for the supply chain
• All information of products is stored on the global database
• Each subsystem can see more information of Individual item data & tracking on the application interface from global database
• RFID benefits:– No line of sight – Miliseconds– Simultaneous read of multiple items
Thank youThank you