23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

RFID Technology and Its Industrial Applications 9-3<br />

distance; normally, a larger antenna offers more area to capture electromagnetic energy from the reader<br />

and, hence, provides a greater <strong>communication</strong> distance. There are several kinds of antennas like rectangular<br />

planar spiral antenna, fractal antennas, microstrip patch antenna (monopole, dipole), etc.<br />

Different types of tags have different kinds of antennas, e.g., low frequency and high frequency tags<br />

usually have a coiled antenna that couples with the coiled antenna of the reader to form a magnetic field<br />

[RFGA06]. UHF tag antennas look more like old radio or television antennas because UHF frequency is<br />

more electric in nature [SWEE05]. Recent advanced in technology have even facilitated the deployment<br />

of printed antennas to achieve similar functionality like the traditional antennas. One possible way of<br />

printing antennas is to use silver conductive inks on plastic substrates or papers [TECS05]. The main<br />

advantage of printed antennas is that they are cheap.<br />

RFID Reader Antenna: Every RFID reader is equipped with one or more antennas. These antennas<br />

generate the required electromagnetic field to sense the RFID tags. There are many different kinds of<br />

antennas like linearly polarized, circularly polarized, or ferrite stick antennas. Several antennas can<br />

connect a single reader at the same time. There are different kinds of antennas that are equipped with<br />

standard readers, e.g., the IP3 Intellitag Portable Reader (UHF) [INTE06] comes with an integrated<br />

circular polarized antennas. The advantage of such antennas is that it can read tags in any orientation.<br />

9.2.4 rFID Middleware<br />

In general, the RFID middleware manages the readers and extracts electronic product code (EPC) data<br />

from the readers, performs tag data filtering, aggregating, and counting, and sends the data to the enterprise<br />

warehouse management <strong>systems</strong> (WMS), the backend database, and the information exchange<br />

broker [CHA07]. Figure 9.1 shows the relationship between tag, reader, RFID middleware, and backend<br />

database. An RFID middleware works within the organization, moving information (i.e., EPC data) from<br />

the RFID tag to the integration point of high-level supply-chain management <strong>systems</strong> through a series<br />

of data related services. From the architectural perspective, RFID middleware has four layers of functionality:<br />

reader API, data management, security, and integration management. The reader Application<br />

Programming Interface (API) provides upper layer the interface interacting with the reader. Meanwhile, it<br />

supports flexible interaction patterns (e.g., asynchronous subscription) and active “context-ware” strategy<br />

to sense the reader. The data management layer mainly deals with filtering redundant data, aggregating<br />

duplicate data, and routing data to appropriate destination based on the content. Integration layer provides<br />

data connectivity to legacy data source and supporting <strong>systems</strong> at different integration levels and, thus, can<br />

be further divided into three sublayers as specified in [LEAV05]: application integration, partner integration,<br />

and process integration. The application integration provides varieties of reliable connection mechanisms<br />

(e.g., messaging, adaptor, or the driver) that connect the RFID data with the existing enterprise<br />

<strong>systems</strong> such as Enterprise Resource Planning (ERP), or WMS. The partner integration enables the RFID<br />

middleware to share the RFID data with other RFID <strong>systems</strong> via other system <strong>communication</strong> components<br />

(e.g., the data exchange broker in Figure 9.2). The process integration provides capability to orchestrate<br />

the RFID-enabled business process. The security layer obtains input data from the data management<br />

layer and detects data tampering, which might occur either in the tag by wicked RFID reader during the<br />

transportation or in the backend internal database by malicious attacks. The overall architecture of RFID<br />

middleware and its related information <strong>systems</strong> in an organization are depicted in Figure 9.2.<br />

Backend database component stores the complete record of RFID items. It maintains the detailed<br />

item information as well as tag data, which has to be coherent with those read from the RFID. It is worth<br />

noting that the backend database is one of the data tampering sources, where malicious attacks might<br />

occur to change the nature of RFID item data by circumventing the protection of organization firewall.<br />

The WMS integrates mechanical and human activities with an information system to effectively manage<br />

warehouse business processes and direct warehouse activities. WMS automates receiving, put-away,<br />

picking, and shipping in warehouses and prompts workers to do inventory cycle counts. The RFID middleware<br />

employs the integration layer to allow real-time data transfer toward WMS. The data exchange<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!