Presentation is loading. Please wait.

Presentation is loading. Please wait.

Developing RFID Application In Supply Chain

Similar presentations


Presentation on theme: "Developing RFID Application In Supply Chain"— Presentation transcript:

1 Developing RFID Application In Supply Chain
Batbold Toiruul Supervisor Prof. Kyung-Oh Lee Database lab., Department of Computer Science Sunmoon University, Korea, 2005

2 A Study of developing RFID application
Introduction Radio Frequency Identification Three parts to an RFID implementation: Tag (chip and antenna) Reader Database & software Auto-ID (Automatic Identification) EPCglobal Network 2005/05/21 A Study of developing RFID application

3 Example of Tags&Readers
2005/05/21 A Study of developing RFID application

4 A Study of developing RFID application
How Does work RFID Reader Reader broadcasts signal through antenna Antenna Transponder is charged with enough energy to send back an identifying response Transponder Transponder receives signal Computer System Reader sends info/data to computer system for logging and processing 2005/05/21 A Study of developing RFID application

5 A Study of developing RFID application
RFID Technology Each product has tag: Passive tag, unique identifier number Range (Up to 3-5m, usually less) Energy from reader RFID reader : Use radio frequency and transmit ID string over serial port to PC (13,56 MHz and 915 MHz). PC: Middleware software (appl.. and standard Savant) and connect to DB and EPCglobal network RFID benefits: More information - Individual item data & tracking No contact No line of sight Milliseconds Simultaneous read of multiple items 2005/05/21 A Study of developing RFID application

6 A Study of developing RFID application
EPCglobal Network Object Name Service Static ONS Dynamic ONS 2005/05/21 A Study of developing RFID application

7 A Study of developing RFID application
Typical Supply Chain 2005/05/21 A Study of developing RFID application

8 A Study of developing RFID application
RFID privacy Eavesdropping Very efficient to eavesdrop wirelessly at a high rate. Traffic analysis It is possible to track people’s movements, social interactions, and financial transactions by correlating data from multiple tag reader locations. Spoofing Deceiving the system into thinking that a product is still on the shelf or that it has a lower price than it actually does. Denial of service Disrupting supply chains by disabling many tags at once. 2005/05/21 A Study of developing RFID application

9 A Study of developing RFID application
The Purpose Make RFID application software for the supply chain system All information of products is stored on the database Once product registered by reader then every action is automatically Read products with tag by reader then show information of products from database 2005/05/21 A Study of developing RFID application

10 A Study of developing RFID application
System Overview 2005/05/21 A Study of developing RFID application

11 Aggregation center mover aggregation clerk distributor distribution
<<sub-system>> Aggregation Center write tags receive produce affix tags place order distribution shipper create shipment view inventory track order pay producer bill distributor query tag ship distributor aggregation clerk scan receive payment track shipment Shelve mover Inventory management Order management View item 2005/05/21 A Study of developing RFID application

12 A Study of developing RFID application
Implementation(1/4) PicoTag™ Tag ISO Standard Passive tag and 2kb of non-volatile read/write memory Up to 1.5 m (gate antenna), 70 cm (single antenna) 64 bits (unique serial number) M300-2G Reader 12V to 15V power supply Host interfaces RS232 Radio frequency MHz 2005/05/21 A Study of developing RFID application

13 A Study of developing RFID application
Implementation(2/4) Visual C++ Ms-SQL, ODBC, RS232, TCP/IP 2005/05/21 A Study of developing RFID application

14 A Study of developing RFID application
Implementation(3/4) Aggregation center: In/Out Date Primary Key (Tag Code) Product name Producer In Money Out Money Product type Product name Counted Number Quantity Unit price The place of origin Producer ID (Farmer) Storage life Tag Code Name of Company ID of employee of Company Number of Distribution center Cost of track 2005/05/21 A Study of developing RFID application

15 A Study of developing RFID application
Implementation(4/4) Producer section: producers all information Producer is only add/deleted to/from database on this application or Web site Also Product section has as same data of storage section. 2005/05/21 A Study of developing RFID application

16 A Study of developing RFID application
2005/05/21 A Study of developing RFID application

17 A Study of developing RFID application
2005/05/21 A Study of developing RFID application

18 A Study of developing RFID application
Results: 2005/05/21 A Study of developing RFID application

19 A Study of developing RFID application
Results: 2005/05/21 A Study of developing RFID application

20 A Study of developing RFID application
Conclusions Developed the application software for the supply chain All information of products is stored on the global database Each subsystem can see more information of Individual item data & tracking on the application interface from global database RFID benefits: No line of sight Miliseconds Simultaneous read of multiple items 2005/05/21 A Study of developing RFID application

21 Thank you


Download ppt "Developing RFID Application In Supply Chain"

Similar presentations


Ads by Google