+ All Categories
Home > Documents > Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database...

Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database...

Date post: 11-Jan-2016
Category:
Upload: dorothy-eaton
View: 213 times
Download: 0 times
Share this document with a friend
Popular Tags:
21
Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University, Korea, 2005
Transcript
Page 1: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

Developing RFID Application In Supply Chain

Batbold Toiruul

Supervisor Prof. Kyung-Oh Lee

Database lab., Department of Computer Science Sunmoon University, Korea, 2005

Page 2: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

2

Introduction

• Radio Frequency Identification

• Three parts to an RFID implementation:• Tag (chip and antenna)• Reader• Database & software

• Auto-ID (Automatic Identification)• EPCglobal Network

Page 3: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

3

Example of Tags&Readers

Page 4: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

4

How Does work RFID

Reader Antenna

Reader broadcasts signal through antenna

Transponder

Transponder receives signal

Computer System

Reader sends info/data to computer system for logging and processing

Transponder is charged with enough energy to send back an identifying response

Page 5: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

5

RFID Reader

RFID Technology

Each product has tag:• Passive tag, unique identifier number• Range (Up to 3-5m, usually less)• Energy from reader

RFID reader :Use radio frequency and transmit ID string over serial port to PC (13,56 MHz and 915 MHz).

PC: Middleware software (appl.. and standard Savant) and connect to DB and EPCglobal network

RFID benefits:More information

- Individual item data & tracking

No contact No line of sight MillisecondsSimultaneous read of multiple items

Page 6: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

6

EPCglobal Network

queries points to updatesprovides data to

BusinessTransactions

Reader

EPC Information Service

ONS (Cache)

EnterpriseApplication(s)

InternalDatabase

Additional data

filtered eventData

(optional)

Middleware software

Company A

event data

ONS

EnterpriseApplication(s)

InternalDatabase

Company B

EPC access registery

Object Name Service • Static ONS• Dynamic ONS

Page 7: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

7

Typical Supply Chain

Page 8: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

8

RFID privacy

• Eavesdropping– Very efficient to eavesdrop wirelessly at a high rate.

• Traffic analysis– It is possible to track people’s movements, social interactions,

and financial transactions by correlating data from multiple tag reader locations.

• Spoofing– Deceiving the system into thinking that a product is still on the

shelf or that it has a lower price than it actually does.

• Denial of service– Disrupting supply chains by disabling many tags at once.

Page 9: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

9

The Purpose

• Make RFID application software for the supply chain system

• All information of products is stored on the database

• Once product registered by reader then every action is automatically

• Read products with tag by reader then show information of products from database

Page 10: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

10

System Overview

Farmer

Input data ItemBox

Palleteshipment

Database

1

All informationof data is stored on DB

Read by Reader

Show some information of products

Retrieve all information of products

Distribution center

RetailStore

2

3

4

6

5

All products of farmer is read by reader

After shipment products are arrive at the retailstore

and read by reader

Aggregation center

database server

Page 11: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

11

Aggregation center<<sub-system>>

Aggregation Center

write tags

receiveproduce

affix tags

place order

distributionshipper

create shipment

viewinventory

track order

pay producer

bill distributor

query tag

ship

distributor

producer

aggregationclerk

scan

receive payment

track shipment

Shelveproduce

mover

Inventorymanagement

Order management

View item

Page 12: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

12

Implementation(1/4)

• PicoTag™ Tag – ISO 15693 Standard – Passive tag and 2kb of non-volatile read/write memory– Up to 1.5 m (gate antenna), 70 cm (single antenna)– 64 bits (unique serial number)

• M300-2G Reader– 12V to 15V power supply– Host interfaces RS232– Radio frequency 13.56 MHz

Page 13: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

13

Implementation(2/4)

• Visual C++• Ms-SQL, ODBC, RS232, TCP/IP

Tag

Coupler

Host PC

Antenna

Tag Tag

Data

SQL Server

Database Server on the internet

ODBC

RS232

Page 14: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

14

Implementation(3/4)

Input Data

Storage

Output Data

DataBase

Reading tag by reader

Reading tag by reader

In products

Go to Distribution center

Out Product

In/Out DatePrimary Key (Tag Code)Product nameProducerIn MoneyOut Money

Name of CompanyID of employee of CompanyNumber of Distribution centerCost of track

Product typeProduct name Counted NumberQuantityUnit price The place of origin Producer ID (Farmer)Storage life Tag Code

Aggregation center:

Page 15: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

15

Implementation(4/4)

• Producer section: producers all

information

• Producer is only add/deleted to/from database on this application or Web site

• Also Product section has as same data of storage section.

manager

Product

Producer

Search

DataBase

Page 16: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

16

Page 17: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

17

Page 18: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

18

Results:

Page 19: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

19

Results:

Page 20: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

2005/05/21 A Study of developing RFID application

20

Conclusions

• Developed the application software for the supply chain

• All information of products is stored on the global database

• Each subsystem can see more information of Individual item data & tracking on the application interface from global database

• RFID benefits:– No line of sight – Miliseconds– Simultaneous read of multiple items

Page 21: Developing RFID Application In Supply Chain Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University,

Thank youThank you


Recommended