Professional Documents
Culture Documents
net/publication/46388704_Automated_data_captur
e_technologies_-_RFID
Descriptive Questions
Q2 10 marks each
1
Illustrate the working of Schematic of RFID tag with a neat diagram
What is RFID
i.An RFID reader (also called transceiver) with an antenna and a transceiver,
ii.A transponder (Also called a tag) that includes an antenna and a chip)
RFID Building Blocks:
Tags: A tag is the data carrier and normally contains the ID number, and unique EPC
code programmed into the Tag
Tag Antenna: The tag antenna is connected to the chip in tag. It could be wire or
printed using conductive ink.
Savant: This is normally a middleware that interacts with the readers, and
communicate with External databases.
A simplified block schematic of an RFID tag (also called transponder) is shown in the
diagram below. Various components of the tag are as shown. Normally, the antenna
is external to the tag chip, and large in size.
i. The reader continuously emits RF carrier signals, and keeps observing the
received RF signals for data.
ii. The presence of a tag (for our discussion, we consider only passive tag)
modulates the rf field, and the same is detected by the reader.
iii. The passive tag absorbs a small portion of the energy emitted by the reader,
and starts sending modulated information when sufficient energy is acquired
from the rf field generated by the reader. Note that the data modulation
(modulation for 0s and 1s) is accomplished by either direct modulation or FSK
or Phase modulation.
iv. The reader demodulates the signals received from the tag antenna, and
decodes the same for further processing.
2
With a neat diagram briefly describe the Scene analysis and proximity method of
localization technique.
Proximity Method
Proximity method [6] can detect object entering a certain area at low cost. The
method is also considered as a robust method to track object against
electromagnetic noise, especially indoors. An interesting or tracking object will be
located once a base station can sense signal from such object which means it has
been in an area covered by such base station. Therefore, we can locate object
proximately, illustrated in figure1 (a). However, proximity method cannot estimate
exact coordination of any objects but the area the objects locate in. Vision & Media
Computing Lab. of Nara institute [7] is a sample of tracking systems using proximity
method by using IR sensors, RF tags, and etc.
(an object is in the circle area but cannot know the exact coordination)(fig content)
Example :
Let’s take a real-time example of “Twitter Analysis” and see how it can be modelled
in Apache Storm. The following diagram depicts the structure.
The input for the “Twitter Analysis” comes from Twitter Streaming API. Spout will
read the tweets of the users using Twitter Streaming API and output as a stream of
tuples. A single tuple from the spout will have a twitter username and a single
tweet as comma separated values. Then, this steam of tuples will be forwarded to
the Bolt and the Bolt will split the tweet into individual word, calculate the word
count, and persist the information to a configured datasource. Now, we can easily
get the result by querying the datasource.
4 Illustrate how Energy-efficiency in MAC protocols is maintained. Highlight preamble
sampling protocol.
5
Illustrate the working of RFID middleware architecture. Give its importance
RFID middleware
The middleware refers broadly to software or devices that connect RFID readers
and the data they collect, to enterprise information systems. RFID middleware helps
making sense of RFID tag reads, applies filtering, formatting and logic to tag data
captured by a reader, and provides this processed data to back-end applications
Importance:
RFID middleware serves in managing the flow of data between tag readers and
enterprise applications, and is responsible for the quality, and therefore usability of
the information. It provides readers connectivity, context-based filtering and
routing, and enterprise / B2B integration.All of these middleware designs aim at
providing a scalable solution for gathering, filtering, and providing clean RFID data
to the end-user.
When designing a RFID middleware solution, the following issues need to be
considered:
● Reader Interface
● Data Processor and Storage
● Application Interface
● Middleware Management
Architecture:
RFID middleware has four layers of functionality: reader API, data management,
security, and integration management.
RFID middleware has four layers of functionality: reader API, data management,
security, and integration manage-ment. The reader API provides the upper layer of
the interface interacting with the reader. Mean-while, it supports exible
interaction patterns (e.g., asynchronous subscription) and an active “context-ware”
strategy to sense the reader. The data management layer mainly deals with ltering
redundant data, aggregating duplicate data, and routing data to appropriate
destination based on the content. The integration layer provides data connectivity
to legacy data source and supporting systems at different integration levels and
thus can be further divided into three sub-layers as specied in Leaver (2005):
application integra-tion, partner integration, and process integration. The
application integration provides varieties of reliable connection mechanisms (e.g.,
messaging, adaptor, or the driver) that connect the RFID data with existing
enterprise systems such as ERP or WMS. The partner integration enables the RFID
middleware to share the RFID data with other RFID systems via other system
communication components (e.g., the Data Exchange Broker in Figure 3). The
process integration provides capability to orchestrate the RFID-enabled business
process. The security layer obtains input data from the data management layer,
and detects data tampering which might occur either in the tag by a wicked RFID
reader during the transportation or in the backend internal database by malicious
attacks. The overall architecture of RFID middle-ware and its related information
systems in an organization are depicted in Figure 3.The backend DB component
stores the com-plete record of RFID items. It maintains the detailed item
information as well as tag data, which has to be coherent with those read from
the RFID.the data-tampering sources where malicious attacks might occur to
change the nature of RFID item data by circumventing the protection of an
organization’s rewall. The WMS integrates mechanical and human activities with an
information system to effectively manage warehouse business processes and direct
ware-house activities. The WMS automates receiving, put-away, picking, and
shipping in warehouses, and prompts workers to do inventory cycle counts. The
RFID middleware employs the integration layer to allow real-time data transfer
towards the WMS. The data exchange broker is employed in this architecture to
share, query, and update the public data structure and schema of RFID tag data by
exchanging XML documents. Any update of the data structure will be reected and
propagate to all involved RFID data items stored in the backend database. From
the standardization view.It enables users to exchange RFID-related data with
trading partners through the Internet. From the implementation angle, it might be
a virtual Web services consumer and provider running as peers in the distributed
logistics network
6
Classify the tag classes with a neat table and explain the capabilities of each tag.
Passive Tags
completely rely on the energy provided by the reader’s magnetic eld to transmit
the radio signal to and from the reader. It does not have a battery. As a result,
the read range varies depending upon the reader used (Lyngsoe, n.d.). A
maximum distance of 15 meters (or 50 feet) can be achieved with a strong
reader antennae and RF-friendly environment
7
With a neat diagram. briefly highlight the RFID Middleware and its Components.
RFID middleware components
RFID middleware is generally composed of four major layers:
● Reader Interface
● Data Processor and Storage
● Application Interface
● Middleware Management
Application interface
The application interface provides the application with an API to access,
communicate, and configure the RFID middleware.
Middleware management
The middleware management layer helps managing the configuration of the RFID
middleware, and provides the following capabilities:
1. Confirmable
2. Non-Confirmable
3. Piggyback
4. Separate
1. Confirmable
● This type of message defines reliable communication and message
passing
● For each connection message acknowledgement is received making
sure that the message at the receivers end
2. Non -Confirmable
● This type of node provides unreliable communication as there are no
ACK on message passing hence reception is not assured
● So this kind of message is used when the loss of packets or message is
sustainable
3. Piggyback
● This mechanism is advance confirmable messages and is used in
request response model.
● When a query or request is sent to server in a client server
communication server sends the response to the query within the
acknowledgement message itself.
● The Acknowledgement message itself contains the response as well
4. Separate
● In this the ACK message and the response message are sent separately.
● When a query/request is sent to the server in client server communication
On reception of connection message server sends the ACK first making sure
Request is received and ACK is sent first the response to the query is sent
after the acknowledgement message.
● Response might be delayed by the server.
11 Discuss in detail the design and working of Mobile IP (MIP) - IETF
communication protocol - IEEE 802.11 - along with its issues.(done)
12
Explain the need of MIP along with its working.
The prefix of the IP address identifies the network to which the host belongs. The
suffix of the IP address identifies the particular host in the corresponding network.
Changing the IP address each time the host enters a new network. This attempt was
not as successful as it has several drawbacks. Every time the computer enters a new
network it has to reboot. We have to keep revising the DNS table to let every host
on the internet have knowledge about changes. Each time we have to change the
configuration files. If the host moves to another network in-between the
transmission of data, the data exchange would be interrupted.
This solution is more feasible here, a host will have two addresses:
1. An original address which would identify the host in the home network.
2. A temporary address (care-of address) that would identify the host in the
foreign network. The care-of address will keep on changing whenever the
host will move to a new network.
The second solution contributes to the design of Mobile IP. It allows a host to move
to another network by maintaining its original IP address and still is able to
communicate with the remote hosts over the internet.
What is MIP?
Mobile IP or MIP is an Internet Engineering Task Force (IETF) RFC 2002, De-Facto
standard communication protocol. It is created by extending Internet Protocol, IP.
The Mobile IP allows mobile device users to move from one network to another
while maintaining the same permanent IP address.
The components of the Mobile IP and the relationship among them are specified in
the following image:
Mobile Node
The Mobile Node is a device or a user or a router that can frequently change their
network positions without changing its original IP address.
Care of Address
The Care of Address or COA is used to define the mobile node's current position or
user.
Corresponding Node
The partner nodes which are used for communication with mobile nodes are called
corresponding nodes.
Foreign Network
Any network other than the home network or the networks on which mobile nodes
have a registered IP is called a foreign network.
Home Network
The home network is the base station network to which the mobile node originally
belongs to.
Working of Mobile IP
1. Agent Discovery
During the agent discovery phase the HA and FA advertise their services on the
network by using the ICMP router discovery protocol (IROP).
Mobile IP defines two methods: agent advertisement and agent solicitation which
are in fact router discovery methods plus extensions.
2. Registration
The main purpose of the registration is to inform the home agent of the current
location for correct forwarding of packets.
Registration can be done in two ways depending on the location of the COA.
● If the COA is at the FA, the MN sends its registration request containing the
COA to the FA which is forwarding the request to the HA. The HA now set up
a mobility binding containing the mobile node's home IP address and the
current COA.
Additionally, the mobility biding contains the lifetime of the registration which is
negotiated during the registration process. Registration expires automatically after
the lifetime and is deleted; so a mobile node should register before expiration.
After setting up the mobility binding, the HA send a reply message back to the FA
which forwards it to the MN.
● If the COA is co-located, registration can be very simpler. The mobile node
may send the request directly to the HA and vice versa. This by the way is
also the registration procedure for MNs returning to their home network.
3. Tunneling
A tunnel is used to establish a virtual pipe for data packets between a tunnel entry
and a tunnel endpoint. Packets which are entering in a tunnel are forwarded inside
the tunnel and leave the tunnel unchanged. Tunneling, i.e., sending a packet
through a tunnel is achieved with the help of encapsulation.
Tunneling is also known as "port forwarding" is the transmission and data intended
for use only within a private, usually corporate network through a public network.
13
What do you mean by Resource in the REST framework? What are the tools used
for creating RESTful web services?
Resources – The first key element is the resource itself. Let assume that a web
application on a server has records of several employees. Let’s assume the URL of
the web application is http://demo.guru99.com. Now in order to access an
employee record resource via REST services, one can issue the command
Restful Methods
Let’s assume that we have a RESTful web service is defined at the location.
http://demo.guru99.com/employee . When the client makes any request to this
web service, it can specify any of the normal HTTP verbs of GET, POST, DELETE and
PUT. Below is what would happen If the respective verbs were sent by the client.
1. POST – This would be used to create a new employee using the RESTful web
service
2. GET – This would be used to get a list of all employee using the RESTful web
service
3. PUT – This would be used to update all employee using the RESTful web
service
4. DELETE – This would be used to delete all employee using the RESTful
services
2. Stateless
The concept of stateless means that it’s up to the client to ensure that all the
required information is provided to the server. This is required so that server can
process the response appropriately. The server should not maintain any sort of
information between requests from the client
3. Cache
The Cache concept is to help with the problem of stateless which was described in
the last point. Since each server client request is independent in nature, sometimes
the client might ask the server for the same request again. This is even though it
had already asked for it in the past. This request will go to the server, and the server
will give a response. This increases the traffic across the network. The cache is a
concept implemented on the client to store requests which have already been sent
to the server. So if the same request is given by the client, instead of going to the
server, it would go to the cache and get the required information. This saves the
amount of to and fro network traffic from the client to the server.
4. Layered System
The concept of a layered system is that any additional layer such as a middleware
layer can be inserted between the client and the actual server hosting the RESTFul
web service (The middleware layer is where all the business logic is created.
14
Explain the working of Network layer handoff in MIP and discuss the working of
passive and active scanning in the same.
Handoff management is the process by which a mobile node keeps its connection
active when it moves from one access point to another. There are three stages in a
handoff process. First, the initiation of handoff is triggered by either the mobile
device, or a network agent, or the changing network conditions. The second stage is
for a new connection generation, where the network must find new resources for
the handoff connection and perform any additional routing operations. Finally,
data-flow control needs to maintain the delivery of the data from the old
connection path to the new connection path according to the agreed-upon QoS
guarantees. Depending on the movement of the mobile device, it may undergo
various types of handoff. In a broad sense, handoffs may be of two types: (i)
intra-system handoff (horizontal handoff) and (ii) inter-system handoff (vertical
handoff). Handoffs in homogeneous networks are referred to as intra-system
handoffs. This type of handoff occurs when the signal strength of the serving BS
goes below a certain threshold value. An inter-system handoff between
heterogeneous networks may arise in the following scenarios (Mohanty, 2006) - (i)
when a user moves out of the serving network and enters an overlying network, (ii)
when a user connected to a network chooses to handoff to an underlying or
overlaid network for his/her service requirements, (iii) when the overall load on the
network is required to be distributed among different systems.
Agent discovery: An MN is able to detect whether it has moved into a new subnet
by two methods – agent advertisement and agent solicitation. In the agent
advertisement method, FAs and HAs advertise their presence periodically using
agent advertisement messages. These advertisement messages can be seen as
beacon broadcasts into the subnets. An MN in a subnet can receive agent
advertisements. If no agent advertisement messages are found or the inter-arrival
time is too high, the MN may send agent solicitations. After the step of agent
advertisement or solicitation, the MN receives a CoA. The CoA may be either an FA
or a co-located CoA (Perkins, 2008). A co-located CoA is found by using Dynamic
Host Configuration Protocol (DHCP) or Point-to-Point Protocol (PPP).
Registration: After the MN receives its CoA, it registers it with the HA. The main
objective of the registration is to inform the HA about the current location of MN.
The registration may be done in two ways depending on the location of the CoA. If
the CoA is the FA, the MN sends its registration request to the FA which in turn
forwards it to the HA. If the CoA is co-located, the MN may send the request
directly to the HA.
Routing and tunneling: When a CN sends an IP packet to the MN, the packet is
intercepted by the HA. The HA encapsulates the packet and tunnels it to the MN’s
CoA. With FA CoA, the encapsulated packet reaches the FA serving the MN. The FA
decapsulates the packet and forwards it to the MN. With co-located CoA, the
encapsulated packets reach the MN, which decapsulates them. In Figure 1, the
tunneling (step b) ends at the MN instead of at the FA.
working of passive and active scanning in the same.
In Passive Scanning, WLAN station moves to each channel as per channel list and
waits for beacon frames. These frames are buffered and are used to decode and
extract information about BSSs.
This passive scanning will save battery power as it does not need to transmit. As
shown in the fig-1 WLAN client receives beacon frames from three access points
and hence it will declare that it has found only three BSSs.
Station plan active role in Active Scanning. On each of the channels. probe request
frames are used to obtain responses from the network of choice. In active scanning
station finds out network rather than waiting for network to announce its
availability to all the stations.
15
Design an IOT based application for an air pollution monitoring system. Draw
block diagram with the required sensors and the IOT platform. Also suggest the
type of communication protocol with the justification.
Components
1) Arduino UNO:- Arduino Uno is a microcontroller board based on the
ATmega328P
2) MQ135 sensor:- The MQ135 sensor can sense NH3, NOx, alcohol, Benzene,
smoke, CO2 and some other gases. It gives the output in form of voltage levels.
3) WIFI Module (ESP8266):- The ESP8266 is a low-cost Wi-Fi chip with full TCP/IP
stack and MCU (microcontroller unit) capability
4) Buzzer:- A Buzzer or beeper is an audio signaling device Whenever the air
pollution goes above the threshold level the Buzzer starts beeping indicating
Danger.
5) LCD (Liquid Crystal Display):- This is a basic (16x2) 16 character by 2 line display.
Black text on Green background. It is used to indicate the Air and Humidity in PPM.
Fig. 6 shows LCD (16x2)
6) GSM Module:- GSM Module is used to establish communication between a
computer and a GSM system.
7) LPG Sensor:- MQ-6 sensor is a simple-to-use liquefied petroleum gas (LPG)
sensor, suitable for sensing LPG (composed of mostly propane and butane)
concentrations in the air.
8) Temperature Sensor:- The LM35 is precision integrated-circuit temperature
sensor, whose output voltage is linearly proportional to the Celsius (Centigrade)
temperature.
9) Humidity Sensor:- The humidity sensor is of cap
https://dzone.com/articles/coap-protocol-step-by-step-guide
https://drive.google.com/drive/folders/1RztcOXLyiW3BTvfLEpbtVk0h7Yg0AwAJ
MODULE 4(done above)
17
Discuss in detail the design and working of Mobile IP (MIP) - IETF
What is Mobile IP?
Mobile IP or MIP is an Internet Engineering Task Force (IETF) RFC 2002, De-Facto
standard communication protocol. It is created by extending Internet Protocol, IP.
The Mobile IP allows mobile device users to move from one network to another
while maintaining the same permanent IP address.
The components of the Mobile IP and the relationship among them are specified in
the following image:
This is the architecture of Mobile IP technology. It consists of the following
components:
Working of Mobile IP
The working of Mobile IP can be described in 3 phases:
Agent Discovery
In the Agent Discovery phase, the mobile nodes discover their Foreign and Home
Agents. The Home Agent and Foreign Agent advertise their services on the network
using the ICMP Router Discovery Protocol (IRDP).
Registration
The registration phase is responsible for informing the current location of the home
agent and foreign agent for the correct forwarding of packets.
Tunneling
This phase is used to establish a virtual connection as a pipe for moving the data
packets between a tunnel entry and a tunnel endpoint.
IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and
specifications of wireless LANs (WLANs). WiFi or WLAN uses high-frequency radio
waves instead of cables for connecting the devices in LAN. Users connected by
WLANs can move around within the area of network coverage.
19
Explain 10 most emerging technologies in IoT
https://www.mhlnews.com/technology-automation/article/22051554/top-10-emer
ging-iot-technologies-you-need-to-know
1. IoT Security. Security technologies will be required to protect IoT devices and
platforms from both information attacks and physical tampering, to encrypt their
communications, and to address new challenges such as impersonating "things" or
denial-of-sleep attacks that drain batteries.
2. IoT Analytics. IoT business models will exploit the information collected by
"things" in many ways, which will demand new analytic tools and algorithms. As
data volumes increase over the next five years, the needs of the IoT may diverge
further from traditional analytics
6. IoT Processors. The processors and architectures used by IoT devices define
many of their capabilities, such as whether they are capable of strong security and
encryption, power consumption, whether they are sophisticated enough to support
an operating system, updatable firmware, and embedded device management
agents.
7. IoT Operating Systems. Traditional operating systems such as Windows and iOS
were not designed for IoT applications. They consume too much power, need fast
processors, and in some cases, lack features such as guaranteed real-time response.
They also have too large a memory footprint for small devices and may not support
the chips that IoT developers use. Consequently, a wide range of IoT-specific
operating systems has been developed to suit many different hardware footprints
and feature needs.
8. Event Stream Processing. Some IoT applications will generate extremely high
data rates that must be analyzed in real time. Systems creating tens of thousands of
events per second are common, and millions of events per second can occur in
some situations. To address such requirements, distributed stream computing
platforms have emerged that can process very high-rate data streams and perform
tasks such as real-time analytics and pattern identification.
10. IoT Standards and Ecosystems. Standards and their associated application
programming interfaces (APIs) will be essential because IoT devices will need to
interoperate and communicate, and many IoT business models will rely on sharing
data between multiple devices and organizations.
20
Describe in detail about the four common methods for measuring distance
estimation technique with a diagram and its formula.
21
Explain the Types of Wireless Sensor Network?
WSN is a wireless network that consists of base stations and numbers of nodes
(wireless sensors). These networks are used to monitor physical or environmental
conditions like sound, pressure, temperature, and cooperatively pass data through
the network to the main location as shown in the figure.
Depending on the environment, the types of networks are decided so that those
can be deployed underwater, underground, on land, and so on. Different types of
WSNs include:
1. Terrestrial WSNs
2. Underground WSNs
3. Underwater WSNs
4. Multimedia WSNs
5. Mobile WSNs
3. Underwater Wireless Sensor Networks: About more than 70% of the earth’s
planet is occupied with water. These networks contain several sensor nodes and
vehicles deployed underwater. Autonomous underwater devices and vehicles are
used to collect data from these sensor nodes.
These networks contain low-cost sensor nodes equipped with cameras and
microphones. These sensory nodes of Multimedia WSNs are interconnected
together over a wireless connection for data retrieval, data compression, and
correlation.
Mobile wireless sensor networks are way more versatile than static sensor
networks. The benefits of Mobile WSNs over Static WSNs include better and
improved coverage, superior channel capacity, better energy efficiency, and so on.
22
Explain the working principle of UHF RFID System
How does a UHF RFID System Work?
The RFID reader emits radio waves of specific frequencies through RFID antennas.
The waves "give energy" to the tags so that they can communicate by emitting a
unique ID. They do not need batteries and can be used for many years. The reader
processes the data so that we can integrate them into our application and give
them meaning. The typical reading range is 0-12 meters. Gen2 UHF RFID systems
consist of: readers, antennas, printers, and RFID tags or labels. In this article I will
define with a brief explanation each of the main elements when implementing an
RFID project.
RFID ANTENNAS
RFID Antennas are responsible for emitting and receiving waves that allow us to
detect RFID chips. When an RFID chip crosses the antenna field, it is activated and
emits a signal. The antennas create different wave fields and cover different
distances.
Antenna Type: Circular polarization antennas work best in environments where the
orientation of the tag varies.
Overcast angle and gain: Using antennas with gains of between 8.5-10 dbi or more,
will allow us to emit more power and obtain a higher reading ratio.
RFID READERS
There are multiple types of readers; Fixed RFID, portable rfid readers, rfid readers
for Smartphone and USB readers. To read a high density of tags or requirements of
100% accuracy in detection, the best fixed RFID readers are: Impinj R420,
ThingMagic M6e, Zebra FX9500.
Reading area: Fixed readers serve mainly to cover a specific area: one point by a
doorway, a machine, on a conveyor belt, in a crate, etc.
Ratio of reading: the emission power and reading capacity requirements are
determined by the number of tags to detect in a specific time.
The type of rfid reader: many times the question is whether to use a fixed reader or
a portable reader.
USB Readers: These readers give excellent results when we need to record or read
very few tags at different points during the manufacturing processes or for
validation of documents in offices. Two clear examples are the Nordic Stix and the
ThingMagic USB Reader.
The essential factors are: size, orientation, reading angle, area the are located and
the type of chip.
Size: the size of the chip is a very important factor, for the simple reason that the
more antenna the RFID tag, has the better the sensitivity and the detection
Orientation and reading angle: If we have circular antennas we do not have to
worry about much about orientation.
Integrate Circuit (IC): These are the internal chips of the RFID tag.
Location area: it is very important to take into account where the applied tag will go
so that the rfid solution is successful and meets the necessary reading ranges.
The use of UHF technology spans many markets; including retail, healthcare, life
science, pharmaceutical, anti-counterfeiting, transportation, and manufacturing.
Working principle
UHF tags working is based on the electromagnetic coupling ( far field coupling)
Consider in UHF, the distance between the reader and the tag is few meters so
coupling between the reader and coil will be the far field coupling. RFID reader
continuously sends the waves at a particular frequency towards the tag. In
response, the tag is sending weak signal to RFID reader. This week signal will be
sent back to RFID reader which is known as back scattered signal. The Intensity of
the back scattered signal is depending upon the load matching across the coil. By
changing the condition of load we can change intensity of back scattered signal. If
we can change the condition of data that is stored in RFID tag then data can be
send back to RFID reader. In far field coupling RFID and tag is few so initial stage
signal send by reader should be strong.
23
Explain the impact of RFID Technology in SCM and Logistic Application.
https://www.peerbits.com/blog/rfid-applications-in-supply-chain-management-and
-logistics.html
Integration
RFID tags allow organizations to capture data for goods in transit and share it with
other supply chain partners effortlessly. That is why RFID is a worthy investment for
businesses that want to expand their reach and clientele.
Operations
Purchasing
Manufacturing the goods without raw materials is a tough nut to crack. That’s what
makes purchasing essential for the supply chain process. Implementation of RFID
technology into your supply chain management gives you real-time visibility over
semi-finished materials and in-stock raw materials.
Distribution
Imagine that in the severe weather near your suppliers. Have they passed through
the zone of danger, or do you need to come up with a contingency plan?
The word logistics means the coordination and movement of goods from one place
to another.
For transport companies, it’s crucial to control quality, manage budget and achieve
agreed-upon service levels. And good logistics make this possible, whether it’s the
distribution of finished goods to warehouses, supplying raw materials to
manufacturers, or distribution of individual items to consumers.
Supply chain management and logistics are considered as the most fertile field as
far as the applications of RFID is concerned.
RFID in the supply chain plays a major role in enhancing the visibility right from the
point of manufacturing, via supply chain, and most significantly from the back room
to the floor, and ultimately to the exit door.
Inventory management
● Inventory management is an important element of supply chain
management. It includes various aspects like monitoring, administering,
controlling, storing, and ultimately using the materials for the sale of a
product.
● Inaccuracy in inventory management is inevitable and is prevalent in many
industries.
● The inaccuracy is nothing but the mismatch between the inventory records
and the actual amount of product available for the sale.
● RFID technology can provide numerous benefits to improve the inventory
management system. RFID tags have the capability to read through an item.
● Moreover, the person can scan several items at a time. These properties of
RFID help to speed up the inventory management process and reduces
human errors thus rendering a high inventory accuracy.
Warehouse management
● Warehouses are simply storage area where you store different products
received from the suppliers. These products are then distributed to the
customers.
● Recently, RFID has emerged as a technology that supports warehouse
management system for simpler supply chain and greater product
intelligibility.
● With RFID technology you can automate important tasks which take place
during receiving and shipping processes.
● RFID also increases efficiency of identification and validation activities along
with reducing human errors.
● RFID ensures identification of products at an instant and greater control over
items in the warehouse.
● Due to this the supply chains now have a greater information flow as
compared to the material flow. This further reduces currency cost.
● Peerbits have developed a solution for warehouse management system using
RFID technology. Click on the below video to see how it works.
Retail sector
● RFID technology has already started to revolutionize the retail sector.
Wal-Mart a behemoth in retail sector is experimenting with the passive RFID
tags of passive types to meet high consumer demand.
● RFID increases the product visibility in the retail inventory that helps in better
inventory control and improved customer satisfaction.
● This is highly relevant in larger stores that have facilities for customers
searching for their chosen products online and the store has the current
stock available for sale.
Asset Tracking:
Static or in-motion assets tracking or locating, like a healthcare facility, wheelchairs
or IV pumps in, laptops in a corporation and servers in a data center, was not so easy
task.
People Tracking:
People tracking system are used just as asset tracking system. Hospitals and jails are
most general tracking required places.
Hospital uses RFID tags for tracking their special patients. In emergency patient and
other essential equipment can easily track. It will be mainly very useful in mental
care hospitals where doctors can track each and every activity of the patient.
Document tracking:
This is most common problem. Availability of large amount of data and documents
brings lots of problem in document management system. An RFID document-tracking
system saves time and money by substantially reducing:
RFID Readers
RFID readers send radio waves to the RFID tags to enquire about their data
contents. The tags then respond by sending back the requested data. The
readers may have some processing and storage capabilities. The reader is
linked via the RFID middleware with the backend database to do any other
computationally intensive data processing. There are two different types of
RFID readers
Classification
RFID readers can be classied using two different schemes. First, the readers can
be classied based on their location as handheld readers and xed readers.
Second, the tags can be classied based upon the frequency in which they
operatesingle frequency and multi-frequency
• Fixed RFID Readers are xed at one loca-tion (e.g., choke point). In a supply
chain and warehouse scenario, the preferred location of a reader can be along
the conveyor belt, dock door antennae or portals, depalletiza-tion stations, or
any other mobile location.
• Portable or Handheld RFID Readers are designed for Mobile Mount
Applications, for example, vehicles in a warehouse or to be carried by
inventory personnel, and so forth.
RFID Tag
RFID tags are small devices consists of an electronic microchip embedded inside and
an antenna. The microchip has the unique identification number of the RFID tag.
Types of Tags
Passive Tags: Does not have a power source, uses power from the reader to operate.
Battery Assisted Passive Tags: Logic circuit chip uses battery power. Need RF signals
from the reader to activate and function.
Active Tags: Uses a power source like battery, does not require power from
source/reader.
RFID Middleware
RFID middleware
The middleware refers broadly to software or devices that connect RFID
readers and the data they collect, to enterprise information systems. RFID
middleware helps making sense of RFID tag reads, applies filtering, formatting
and logic to tag data captured by a reader, and provides this processed data to
back-end applications
Importance:
RFID middleware serves in managing the flow of data between tag readers and
enterprise applications, and is responsible for the quality, and therefore
usability of the information. It provides readers connectivity, context-based
filtering and routing, and enterprise / B2B integration.All of these middleware
designs aim at providing a scalable solution for gathering, filtering, and
providing clean RFID data to the end-user.
3 List and explain the components of RFID
RFID technology consists of four components such as RFID tags, antenna, RFID
receiver (transceiver) and software.
1. RFID Tag
RFID tags are small devices consists of an electronic microchip embedded inside and
an antenna. The microchip has the unique identification number of the RFID tag.
Types of Tags
Passive Tags: Does not have a power source, uses power from the reader to operate.
Battery Assisted Passive Tags: Logic circuit chip uses battery power. Need RF signals
from the reader to activate and function.
Active Tags: Uses a power source like battery, does not require power from
source/reader.
2. Antenna
RFID antennas are designed to operate at a specific frequency for each applications
in which it operates. These antennas are often mounted on the RFID reader and
easily accessible for tags to tap on it.
3. RFID Reader
RFID reader is one of the significant hardware component in the RFID system which
read information from the RFID devices/tags and connected to the network to
transfer the information to the database.
4. Software
RFID technology uses specific software depends on service providers. This software
controls the RFID reader, initiate scan and retrieve information from the tags and
stores the information to a local computer or send to the cloud storage.
a. Chef Case
Chef Workstation is the location where users interact with Chef. With Chef
Workstation, users
can author and test cookbooks using tools such as Test Kitchen and interact
with the Chef Infra
Server using the Knife and chef command line tools.
Chef Workstation is the location where users interact with Chef. With Chef
Workstation, users
can author and test cookbooks using tools such as Test Kitchen and interact with the
Chef Infra
Server using the Knife and chef command line tools.
Chef Infra Client nodes are the machines that are managed by Chef. The Chef Infra
Client is
installed on each node and is used to configure the node to its desired state.
Chef Infra Server acts as a hub for configuration data. Chef Infra Server stores
cookbooks,
the policies that are applied to nodes, and metadata that describes each registered
node that
is being managed by Chef. Nodes use the Chef Infra Client to ask the Chef Infra Server
for
configuration details, such as recipes, templates, and file distributions.
Puppet
Puppet is a Configuration Management tool that is used for deploying,
configuring and
managing servers. It performs the following functions :
o Defining distinct configurations for each and every host, and continuously
checking and
confirming whether the required configuration is in place and is not altered (if
altered
Puppet will revert back to the required configuration) on the host.
o Dynamic scaling-up and scaling-down of machines.
o Providing control over all your configured machines, so a centralized
(master-server or
repo-based) change gets propagated to all, automatically.
Puppet uses a Master Slave architecture in which the Master and Slave
communicate through a
secure encrypted channel with the help of SSL.
5 List and explain all three different localization techniques with a neat
diagram.
6 Describe the mobility and handover management systems in short.
Mobility Managment
With the convergence of the Internet and wireless mobile communications and
with the rapid growth in the number of mobile subscribers, mobility management
emerges as one of the most important and challenging problems for wireless
mobile communication over the Internet. Mobility management enables the
serving networks to locate a mobile subscriber’s point of attachment for
delivering data packets (i.e. location management), and maintain a mobile
subscriber’s connection as it continues to change its point of attachment (i.e.
handoff management). The issues and functionalities of these activities are
discussed in this section.
Handoff Management
Hand-off (or handover) management for maintaining connection with mobile
terminals is a three-stage process. The first stage involves initiation of identifying the
need for hand-off, and at the second stage new resources for the hand-off
connection must be found and any additional routing operations must be performed.
Under the network-controlled hand-off (NCHO), or mobile-assisted hand off (MAHO),
the network takes control of the procedure while the mobile terminal does the job
for the mobile-controlled hand-off (MCHO). The final stage is data-flow control,
where the delivery of the data from the old connection path to the new connection
path is maintained according to agreed-upon service guarantees. The hand-off
management operations are presented in
7 What does NETCONF-YANG mean, explain the device
managements of the same.
Here, 4 fundamental components of IoT system, which tells us how IoT works.
i. Sensors/Devices
First, sensors or devices help in collecting very minute data from the surrounding
environment. All of this collected data can have various degrees of complexities
ranging from a simple temperature monitoring sensor or a complex full video feed.
A device can have multiple sensors that can bundle together to do more than just
sense things. For example, our phone is a device that has multiple sensors such as
GPS, accelerometer, camera but our phone does not simply sense things.
ii. Connectivity
Next, that collected data is sent to a cloud infrastructure but it needs a medium for
transport.
Once the data is collected and it gets to the cloud, the software performs processing
on the acquired data.
This can range from something very simple, such as checking that the temperature
reading on devices such as AC or heaters is within an acceptable range. It can
sometimes also be very complex, such as identifying objects (such as intruders in
your house) using computer vision on video.
But there might be a situation when a user interaction is required, example- what if
when the temperature is too high or if there is an intruder in your house? That’s
where the user comes into the picture.
Next, the information made available to the end-user in some way. This can achieve
by triggering alarms on their phones or notifying through texts or emails.
Also, a user sometimes might also have an interface through which they can actively
check in on their IOT system. For example, a user has a camera installed in his house,
he might want to check the video recordings and all the feeds through a web server.
However, it’s not always this easy and a one-way street. Depending on the IoT
application and complexity of the system, the user may also be able to perform an
action that may backfire and affect the system.
For example, if a user detects some changes in the refrigerator, the user can remotely
adjust the temperature via their phone.
the radio waves without any loss. Let be the maximum power received by
In general, the directivity and effective aperture area for any antenna is
related as
Propagation, also known as Friss free space equation. The factor (λ/4πr)2
is called free space path loss which indicates the loss of the signal. Path