
7fef4eadbb328d2365bfe3f85db247d8.ppt
- Количество слайдов: 49
Chapter 6 Mobile, Wireless and Pervasive Computing Information Technology For Management 6 th Edition Turban, Leidner, Mc. Lean, Wetherbe Lecture Slides by L. Beaubien, Providence College John Wiley & Sons, Inc. Chapter 6 1
Mobile Computing l Wired networks- limitations for people on the move l Wireless mobile computing enable a real time communication between mobile device and internet l Mobile commerce is any e-commerce conducted in a wireless environment. l Drivers of m commerce ¡ Cell phones with internet access ¡ Declining prices ¡ Bandwidth Chapter 6 2
l Mobile banking (money transfer, balance inquery, paying bills, sale/purchase stocks) l Wireless electronic payment ¡ Micro payement (pay for taxi, vending machine, grages, restourants, public transportation) ¡ %5 in 2006 ¡ Billing can be made to customer’s bank account, credit card, or phone ¡ Mobile wallet stores credit card info Chapter 6 3
Interbusiness applications l The basic idea is to provide employees collaboration tools l Supporting traveling executives l Using SMS instead of email l Sales force automation l Job dispatch (assigning jobs to mobile employees (ex. truck drivers, maintenance workers) Chapter 6 4
L commerce l l l Position determining equipment Mobile positioning Center GPS uses satellites to determine users position GIS- relates latitute and longtitute to a map Some services ¡ Find nearest service ¡ Buddy finder ¡ Emergency assistance ¡ Integrating sensors, GPS, and wireless communication (onstar, cars with IP) ¡ Targeted advertisement ¡ Autonomous Land Vehicle Chapter 6 5
Wi-Fi l Wi-Fi is used to connect laptops, PDAs and cell phones to internet ¡ Available in cafes, hotels, hospitals, airports ¡ Hot spots ¡ First considered as a threat to cellular services ¡ Wi-Fi mesh Network (base stations exchange signals) ¡ Google talk relies on Wi-Fi instead of cell phone networks (VOIP) Chapter 6 6
Problems with Wi-Fi l Roaming – users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services l Security – because Wi-Fi uses radio waves, it is difficult to protect l Cost – commercial Wi-Fi services are low cost but not free and each service has its own fees and separate accounts for users to logon Chapter 6 7
Wi. Max l Worldwide Interoperability for Microwave Access, popularly known as Wi. Max ¡ An alternative to DSL and Cable ¡ Does not require a clear line of sight ¡ Wireless access range of up to 30 miles; ¡ Data transfer rate of 75 Mbps; ¡ Secure system that offers voice (VOIP) and video. Chapter 6 8
Introduction to RFID Programming University of Houston Bauer College of Business Spring 2007
Some links… l www. rfidjournal. com l www. computerworld. com l www. rfidusa. com l www. uh. edu/gartner
Auto-ID Technologies Barcode Systems Biometric Systems Auto-ID Smart Cards Optical Character Recognition (OCR) RFID
Definition l RFID (Radio Frequency Identification) is a technology used for electronic and wireless identification of objects, humans and animals
Mandates
Mandates
RFID System Architecture
Carrier Frequencies l What is frequency? ¡Refers to the property of radio waves used to transmit data
Carrier Frequency l RFID systems may use a particular frequency band depending on: ¡Application ¡Legislature ¡Cost considerations
Frequency Bands Frequency Band Characteristics Typical Applications Low 100 -500 k. Hz Short to medium read range, inexpensive, low reading speed Access control Animal/Human identification Inventory Control Medium 10 -15 MHz Short to medium read range Potentially inexpensive Medium reading speed Smart Cards High UHF: 850950 MHz Microwave: 2. 4 – 5. 8 GHz Long read range High reading speed Line of sight required (Microwave) Expensive Railroad car monitoring Toll collection systems (OGS)
Frequency and bandwidth l Frequency is of primary importance when determining data transfer rates (bandwidth) l The higher the frequency, the higher the data transfer rate
Range l Range – the working distance between a tag and a reader Range
Range and Power Levels l The range that can be achieved in an RFID system is determined by ¡The power available at the reader ¡The power available within the tag ¡The environmental conditions and structures
Material Propagation l The absorption rate for water and other non-conductive substances is lower by a factor of 100 000 at 100 k. Hz than it is at 1 GHz l LF systems are primarily used due to their high propagation of substances
Electromagnetic Interference l Electromagnetic Interference - Interference caused when the radio waves of one device distort the waves of another. l Cells phones, wireless computers and even robots in factories can produce radio waves that interfere with RFID tags. l EI is likely to be an issue for UHF systems
Tags Characteristics l Means by which transponder is powered l Data carrying options l Data read rates l Programming options l Physical forms l Costs
Active and Passive Tags l Active tags ¡Powered by an internal battery ¡Finite lifetime (because of battery) ¡Greater range ¡Better noise immunity ¡Higher data transmission rates
Active and Passive Tags l Passive tags ¡Operate without battery ¡Derive power from the field generate by the reader ¡Less expensive ¡Unlimited life ¡Require more powerful readers ¡Orientation sensitivity
Data Carrying Options l A tag can contain ¡An identifier l 1 bit – 128 bits ¡Portable data files l. Example: 64 K
Data Read Rate l Data read rate is linked to frequency ¡The higher the frequency, the higher the read rate
Data Programming Options l Read-only ¡Cheap l Write once read many l Read/write ¡Expensive
Why Use Read/Write Tags? l Greater flexibility ¡Customers may change requirements ¡Standards may change l Database dependence ¡Ownership issues ¡Lag times
Tag Physical Forms l Disk and Coins – can be attached to an item by a fastening screw
Tag Physical Forms l Keys or Key Fobs, Watches – access control
Smart Labels l A bar code can be printed on an RFID label
Tag Physical Forms l Glass Transponders can be implanted under skin
Readers
What’s so special about RFID? l Line of sight is not required l Longer read ranges l Faster: hundreds of items can be scanned in one read
RFID vs. Barcodes
Principles of Profitable RFID Use l Enterprise value of data collection ¡ Example: a big retailer working with a small supplier l The data collection process is relatively chaotic ¡ Example: Battlefield ¡ Making libraries chaotic l The exact configuration of goods must be maintained ¡ Example: Auto industry
Inventory tracking l RFID tag data capacity is big enough that any tag will have a unique code, while current bar codes are limited to a single type code for all instances of a particular product. l The uniqueness of RFID tags means that a product may be individually tracked as it moves from location to location, finally ending up in the consumer's hands. This may help companies to combat theft and other forms of product loss. l the visibility provided by RFID allows an accurate knowledge on the inventory level by eliminating the discrepancy between inventory record and physical inventory. ¡ In an academic study performed at Wal-Mart, RFID reduced Out of Stocks by 30 percent for products selling between 0. 1 and 15 units a day. l It has also been proposed to use RFID for POS store
Some applications l Transportation payments l High-frequency RFID tags are used in library tracking, pallet tracking, building access control, airline baggage tracking, and apparel and pharmaceutical items tracking. l High-frequency tags are widely used in identification badges, replacing earlier magnetic stripe cards. These badges need only be held within a certain distance of the reader to authenticate the holder. l UHF RFID tags are commonly used commercially in case, pallet, and shipping container tracking, and truck and trailer tracking in shipping yards. l Since the 1990 s RFID tags have been used in car keys. Without the correct RFID, the car will not start. The driver can open the doors and start the car with
A business example l The most notable business advantage to RFID is the ability for enabling quicker location of product and faster turn-around getting the product onto the shop floor for people to buy. l Take one business example: Items shipped to a store come in brown boxes. Big boxes, small boxes, and all of them brown boxes. l When pallets arrive at a store, they get placed in the store room waiting for the evening shift to come place the items onto the shop floor. l By using RFID, it’s possible to do something rather special. When an item is no longer on the shelf, an associate can use a mobile reader to find new stock in the back room without having to read the labels on all of those brown boxes. l In essence, the non line-of-site advantage of RFID significantly assists in locating products. Alternative techniques rely on additional labor and negate the sales advantage of ensuring the shelf is always full, but RFID reduces the burden on labor and provides a tangible, positive
RFID Growth l Several market research firms predict that ~2007 RFID market will reach ~$3 billion l The lowest cost of Gen 2 EPC inlay is offered by Smart. Code at a price of 5 cents apiece in volumes of 100 million or more
Standards l The manufacturer, distributor and retailer must all have systems that are compatible with one another. l This doesn’t just apply to back-end systems, but to the tags themselves if RFID is to be effective. l Some of the early compatibility issues were very fundamental — such as the frequency the tags operate on. l For the most part, the 869 to 915 MHz tags prevailed, but still left the hurdle of the actual tag content. l It became obvious that tag formats, just like barcode formats, needed standardization. l This was addressed through the Electronic Product Codes (EPCglobal), an industry body that sets these electronic standards.
Standards l However, having the frequency and tag format agree only buys so much if the air protocol to get the data isn’t established. l Until recently it was difficult to guarantee that a reader from one manufacturer would work with a tag from another, until the EPC Generation 2 air specification. l Now, both tag and reader vendors all signed up to make their equipment compatible l All manufacturers has cross compatible offerings.
Standards l While the EPC now has a standard adopted by the vendors in the US and Europe, there continue to be difficulties with international compatibility. Almost all of the participants in EPC are from the U. S. and Europe, while a significant portion of manufactured goods are no longer made in those member countries. l As respected as EPC may be, it would require a higher authority to mandate a world-wide standard. l That’s where the International Standards Organization (ISO) comes in. l The EPC Generation 2 specification was submitted to ISO and just recently it became an approved standard with the designation ISO/IEC 18000 to 6 C. l With ISO approval, it’s now possible to buy a compliant Reader and tag that works the world over.
Regulations l Europe faces significant problems with reader performance degradation in environments where high numbers of readers are used together. l This performance degradation issue originates from the fact that the EU has a more limited range of spectrum that’s legally assigned for RFID use compared to the USA.
Regulations l In North America, UHF can be used unlicensed for 902 – 928 MHz (± 13 MHz from the 915 MHz center frequency), but restrictions exist for transmission power. l In Europe, RFID and other low-power radio applications are regulated by ETSI recommendations EN 300 220 and EN 302 208, and ERO recommendation 70 03, allowing RFID operation with somewhat complex band restrictions from 865– 868 MHz. l Readers are required to monitor a channel before transmitting ("Listen Before Talk"); this requirement has led to some restrictions on performance, the resolution of which is a subject of current research. l The North American UHF standard is not accepted in France as it interferes with its military bands. l For China and Japan, there is no regulation for the use of UHF. Each application for UHF in these countries needs a site license, which needs to be applied for at the local
Privacy l Since the owner of an item will not necessarily be aware of the presence of a RFID tag and the tag can be read at a distance without the knowledge of the individual, it becomes possible to gather sensitive data about an individual without consent. (Ex. Scanning your home, medical records) l A number of products are available on the market in the US that will allow a concerned carrier of RFIDenabled cards to shield their data l Shielding is again a function of the frequency being used. ¡ Low-frequency tags, like those used in implantable devices for humans and pets, are relatively resistant to shielding, though thick metal foil will prevent most reads. ¡ High frequency tags (13. 56 MHz — smart cards and access badges) are more sensitive to shielding and are difficult to read when within a few centimetres of a metal
l Wireless sensor networks ¡Sensor (vibration, tempurture – ex. wildfire, etc) ¡Processor ¡Anthena (to nearest motes) Chapter 6 49
7fef4eadbb328d2365bfe3f85db247d8.ppt