Data EPC Acquisition System Middleware Device Manager: DEPCAS MDM
|
|
|
- Irene Bryan
- 10 years ago
- Views:
Transcription
1 Data EPC Acquisition System Middleware Device Manager: DEPCAS MDM I. Abad, C. Cerrada, J. A. Cerrada, R. Heradio 1 Software Engineering and Computer Systems Department. UNED: Distance Learning University of Spain. Madrid. Spain Abstract - One of the main purposes of RFID middleware is to manage and hide the broad range of device readers existing in acquisition RFID networks. There are two basic solutions to override. First is to define a specification that should be accomplished for every RFID reader inside a network. The second solution is to define an abstraction layer that can translate proprietary protocols and specific characteristics from a vendor to a general solution. In this paper we present the Middleware Device Manager in our proposal of RFID middleware called DEPCAS: Data EPC Acquisition System. Keywords: Radio Frequency Identification, RFIT: Radio Frequency Information System, DEPCAS: Data EPC Acquisition System, SCADA: Supervisory Control and Data Acquisition 1 Introduction Radio frequency identification (RFID) is one of today's most rapidly proliferating technologies for enterprises. Based on the promise of lower operating costs combined with more accurate product and asset information, organizations are introducing RFID technologies in different productive and organization areas: tracking, supply chain, optimize stock levels, enforce tighter security, people surveillance and industry regulations [1] are examples of these uses. As enterprises explore these potential benefits [2], many are realizing that scaling from a pilot program to a production scale deployment is not a trivial exercise. Without careful planning, it is possible to destabilize business operations as huge volumes of RFID messages generated at the edge of the enterprise flood toward the data center. Over time, this problem could get magnified as RFID tagging at the item level becomes mandated competence pressures. Most existing application and network infrastructures were not designed with RFID in mind. At the edge, if RFID infrastructure is deployed on general-purpose servers that require installation and ongoing support, manageability problems alone might render RFID cost-prohibitive. In addition, without a unified deployment model of centralized control and distributed enforcement, disconnected areas of RFID infrastructure will grow, creating a familiar set of application and data integration challenges. On the network side, RFID implementations will generate large amounts of new data that will fan in from the edge of an enterprise toward its data center core, placing further demands upon the existing network. To optimize the use of available network bandwidth and simplify the deployment of RFID technology, solutions are needed to collect and filter raw RFID tag data close to its source and subsequently to correlate, aggregate, and transform this data into meaningful business-level events. These events in turn should be acted upon locally, where appropriate, or securely routed and delivered to back-end inventory management, sales, and financial applications. It is this "intelligent information" that will enable RFID-ready applications to deliver on their promise of increased operational productivity. The fundamental requirements of this type of middleware are related to the management of infrastructure device readers, the processing information received from auto identification, the business needs to incorporate auto identification and sharing of information [3]. To address these requirements, software architectures that implement this type of middleware proposed a set of layers that specialize in solving different requirements. These layers are based primarily on the architecture proposed by EPCglobal organization[4], including the resolution of a protocol for reading between the middleware and the tag reading devices, called LLRP (Low Level Reader Protocol) and higher RP (Reader Protocol) according to the standards [5] [6], an event process from the reading of RFID tags [7], an assignment of semantic information to the object through an RFID identification 1 This research has been carried out under contract with the Spanish CICYT through the DPI project. It also belongs to the activities carried out in the fram of the Robocity2030-II excellence network of the CAM (ref. S2009/DPI- 1559)
2 service [8], and a service to receive or transmit information to business applications from the RFID middleware [9]. Primari/Uni v. Arkansas Rifidi Sensor Abstraction Layer Furthermore, the implementations include what is called generically device manager that allows the configuration and the management of every device incorporated to the RFID network. In this article we focus on this software component that is usually included in every RFID middleware and we present the alternative in which we are working for the development of our proposed architecture called DEPCAS (Data EPC Acquisition System). DEPCAS define software architecture for solving the RFID middleware based on system architecture for monitoring and control (SCADA) process. DEPCAS propose the scenario concept to generalize the process that can be performed from the acquisition of auto identification information. The processing of a scenario produces results that contain elements relevant to their semantic direct use in business applications. The graphical interface is called in DEPCAS GUV (Graphical User Viewer) and is designed to standardize access to the information managed in the middleware regardless of the scenario being driving. Henceforth this paper is structured as follows: Section 2 presents middleware device manager in existing proposals for middleware, which s are included and how they are integrated with other elements of the middleware, in Section 3 we presents the middleware device manager (MDM) defined in DEPCAS, in Section 4 we presents the MARC (Minimun Abstract Reader Commands) commands to manage different readers vendor inside a unique RFID network,, and finally the section 5 describes implementation prototype of RRTL (RFID Readers Topology Language) using MARC sentences developed in DEPCAS to solve MDM. 2 The RFID device management There are several existing RFID middleware implementations (Table 1): OSS RFID middleware as Fosstrak, Rifidi or Aspire, RFID middleware platforms as Sun Java System RFID software or WebSphere RFID system and RFID middleware proprietary as Detego RFID Suite Solution or OAT RFID Suite. Every of these solutions include a solution to infrastructure management with two main positions. One solution is to force the use of a specific protocol inside RFID reader s network while the other extreme is to accept any kind of reader and the middleware will provide bundle mechanism to uniform the devices. Table 1. RFID Middleware and Device Management Components Name Device Management AutoIDLabs Fosstrak LLRP Adaptor + HAL Adaptor Aspire Aspire Hardware Abstraction Layer Sun Micro Systems. RF-IT Solutions OAT Systems Sun Java RFID System v3.0 WebSphere RFID Detego OAT Foundation Suite RFID Execution Agent WebSphere RFID Device Infrastructure You-R Device Management OAT Device Manager The study of these different RFID Device Management components allows obtaining a set of characteristics that are implemented to solve it in the RFID middleware. Between these features we include: Device Agnostic. Configuration and parameterization of RFID devices. Topological RFID devices. Start-up Devices. Statistical and Report RFID devices data. Monitoring Devices in live operation Diagnosis of device in live operation LLRP implementation OSGi Technology These features and s define the operation of the middleware device manager in RFID middleware [10][11]. For example, Device Agnostic Feature is provided when middleware infrastructure acts as an integration point for RFID readers, printers, and other infrastructure devices, such as any sensors and actuators. RFID reader and printer manufacturers typically provide complex configuration options, proprietary interface languages, and communication protocols. If RFID Device Infrastructure eliminates the need for RFID integrators to be aware of these complexities and provides a device agnostic interface with which supported devices can be configured hiding the complexity. Other features are related to scope and technological implementation. Some of the middleware device manager support the EPC Global Network specification to connect with RFID Reader. The Low Level Reader Protocol standardizes a set of instructions to configure, send and receive reader information. In the technological side, several middleware device manager have used different software solutions. Between them, the OSGi Architecture is one of the most common specification framework used in our days. The OSGi specification enable components to hide their
3 implementation from others components while communicating through services. Next table shows the cross results between existing RFID middleware implementation and the device manager set of characteristics presented in this section (middleware logic manager) for auto-identification process, the GUV (graphical user viewer) or man-machine interface, and finally the EPCIS (EPC Information System) as software component to communicate with other systems. The main objectives of MDM are: Table 2. Middleware RFID/MDM Characteristics 2 FOSSTRACK RIFIDI ASPIRE SUN DETEGO OAT F.S. Manage the topology RFID reader s network. Agnostic management of different RFID vendors. Homogeneous process of different RFID tag reads. Support LLRP and ALE specification process. Provide configurable RFID network Hide operational environment Minimum tag management operations. Monitoring and controlling RFID readers.. Device Y N Y Y Y Y Y Agnostic Device Y Y Y N N Y Y Configuration Topological N N Y Y N Y Y Configuration Needs Y Y Y N N N N Programming Starting-up Device Statistical Data Y N Y N N Y Y from Device Monitoring Data N N N Y Y Y Y from Device Diagnosis Y N Y N Y N Y capabilities LLRP Implement. Y Y Y N N N N OSGi Technologies N Y Y N N N N 3 Middleware Device Manager in DEPCAS DEPCAS (EPC Data Acquisition System) is a proposed architecture for RFID middleware systems dedicated to data acquisition in real and heterogeneous environments. The scheme proposed is based on the supervisory and control systems known as SCADA (Supervisory Control and Data Acquisition). In this case, the remote terminal units in SCADA systems are replaced by the antenna-reader RFID systems to receive auto identification information. The communication networks are used to connect reader (communication via serial, Ethernet...) to the system Central acquisition software. The basic structure of DEPCAS is divided into four sub-systems: the MDM (middleware device manager) for the management of infrastructure, MLM 2 Y: Yes/ N: No To support these objectives the MDM definition includes the concept of Minimum Abstract Reader Commands (MARC) and the RFID Reader Topology Language (RRTL). The MARC allow to hide the particularities of every RFID reader vendor through a set of operations that are mapped to specific vendor API. The RRTP includes the description of RFID topologies including control and management of readers. The MDM core architecture prototype have been developed using TCP and HTTP for transporting reader protocol messages, while the message content can be either XML or Text. In addition, it support synchronous and asynchronous messaging (through the reader s protocol Notification Channels mechanisms). 4 Minimum Abstract Reader Commands (MARC) MARC is the minimum set of instructions that an RFID reader must supply to support the operational instructions inside a network. The set of MARC is closed and give an independent layer of RFID management. The implementation of MARC is related to RFID reader API and gives a dependent hardware layer. The commands included in MDM are described in Table 3: Table 3. MARC Commands MARC setantennasequence setautofalseoutput setautofalsepause setautomode setautostarttrigger setautostarttimer Operations Set an order sequence to read from multiple antennas installed in one reader mode to ignore tag reads mode to pause working Start/Stop autonomous reader s Activate the trigger sending s in reader autonomous Activate periodic timer reader
4 setautostoptimer setautostoptrigger setautotrueoutput setautotruepause setconnecttcp setnotifyaddress setnotifyformat setnotifytime setpassword setrun settagtype settime setusername in reader autonomuos Reset periodic timer reader in reader autonomous Reset the trigger sending s in reader autonomous mode to process tag reads mode to start reading process Establish a TCP connection Init a listening TCP port to instruct the reader to send notification messages Configure the format message to be used by the reader Establish the period that the reader notifier should use Identify the password reader access Start to execute a configuration reader mode Establish the expected tag type property Synchronize reader time Identify the user reader access The RRTL definition is supported by an XSD squeme and the results with XML files. An example of some RRTL commands is shown in figure 1: The MDM prototype includes MARC implementation for RFID reader ALIEN8780, FEIG2000, SKYWRAEM2 and we are working in MARC implementation for ThingMagic Mercury 4, Intermec IF61 and Impinj Speedway R RFID Reader Topology Language (RRTL) RFID Reader Topology Language (RRTL) is a language to define RFID network topologies that includes control and management of RFID devices. The language manages the process and filter of tag reads to uniform them to DEPCAS system. The RRTL command could be classified by their application: 1. Resource definition. 2. Time management. 3. Conditional configuration 4. Tag management 5. Device management 6. Control and flow configuration 7. Database management 8. Web service control 9. File management 10. Tag position and code management 11. Process synchronization 12. User commands There are a set of miscellaneous sentences that are related with different kind of operation like start/stop operation, locks, etc. Figure 1. RRTL Reader Command Example One simple topology with RRTL commands is shown in fig. 2: Figure 2. Topology example
5 The RRTL commands for XML data for FEIG configuration in this example is: <?xml version="1.0" encoding="utf-8"?> <system-spec xmlns:xsi=" xsi:nonamespaceschemalocation="rfid_loader_master_rrtl_esp.xsd"> <resource> <timer-job chain="test" name="alien_8780_0"> <time-span milliseconds="1000" / <timer-job chain="test" name="feig_lrua_2000_0"> <time-span milliseconds="1000" /> <timer-job chain="test" name="skyeware_m2_0"> <time-span milliseconds="1000" /> <file name="datafile" filename="c:/uned/mdm/datafile.mdm" append="true"newline-style="windows" /> </resource> <reader driver-class="mdmfeiglru2000setup" type-class="mdmfeiglru2000setup" name="feig_lrua_2000_0" organization="uned" campus="madrid / Univ.EDE" address="c/ Juan, MADRID" dept="issi" location="planta: 1, Desp: 112" use="test" auto-mode="true" auto-interval="1000" auto-chain="test" > <arg> </arg><arg>10001</arg><arg>feig</arg> <arg>password</arg> <property> <key="setnotifyaddress"/ <value="localhost:9002"/> </property> <property key="settagtype" value="*" trim="false" /> <property key="setnotifyformat" value="xml" /> <property key="settime" value="2008/12/31" /> <property key="setnotifytime" value="1"/> <property key="setantennasequence" value="1,0,0,0"/> <property key="setautomode" value="1"/> <property key="setpolling" value="500" /> <property> <key="setconnecttcp" value=" :1001"/> <property key="setusername" value="feig" /> <property key="setpassword" value="password" /> <property key="setrun" value="1"/> </reader> <chain name="test"> <poll generate-empty="false" reader="alien_8780_0" /> <poll generate-empty="false" reader="feig_lrua_2000" /> <poll generate-empty="false" reader="skyeware_m2_0" /> <purifier period="1000" reads="2" generateempty="false"/> <echo message="reading tag...id=${tagid}" /> <transfer resource="rmi to DBMonitor.java" forward-resource="localhost:3232"/> </chain> </system-spec> point (antennas, edge readers, reader, PLCs with RFID readers, etc.) or redundant reader points. This two main subject are covered in or solution of DEPCAS MDM, one with the use of MARC to hide device management or standardization protocols and topological questions with RRTL to express network configuration. About future works there are different issues to be resolved. First, we want to extend the MARC ality to new devices as Intermec IF61, Impinj Speedway R420 or Siemens RF6660A. Second there are other topological concepts to work in with RRTL as tag tables, conditional operations master/submaster and peer to peer network reader organizations, etc. 7 References [1] R. Russell, Manufacturing Execution Systems: Moving toi the next level, Pharmaceutical Technology, January 2004, pp [2] H. Ramamurthy, B.S. Prabhu, Rajit Gadh. ReWINS: A distributed multi-rf Sensor Control network for industrial automation, IEEE Wireless Telecommunications Symposium (WTS 2005), Pormona, California, [3] Xiaoyong Su, Chi-Cheng Chu, B. S. Prabhu, Rajit Gadh, On the creation of Automatic Identification and Data Capture infrastructure via RFID and other technologies The Internet of Things: from RFID to the Next-Generation Pervasive Networked Systems, Lu Yan, Yan Zhang, Laurence T. Yang, Huansheng Ning (eds.), Auerbach Publications, Taylor & Francis Group, 24 pp., [4] Brewer, A., Sloan, N. and Landers, T.L., Intelligent tracking in manufacturing. Journal of Intelligent Manufacturing. v10 i [5] C. Floerkemeier, C. Roduner, and M. Lampe, RFID Application Development with the Accada Middleware Platform. IEEE Systems Journal [6] Q.Z. Shenz, X. Li, S. Zealdally, Enabling next-generation RFID applications: Solutions and challenges. Computer, Col 41, Issue [7] M C. Bornhövd, T. Lin, S. Haller, and J. Schaper, Integrating Automatic Data Acquisition with Business Processes - Experiences with SAP s Auto-ID Infrastructure. In Proceedings of the 30st international conference on very large data bases (VLDB). Toronto, [8] Curtin, J. Kauffman, R.J., Riggins F.J., Making the MOST out of RFID Technology: a research agenda for the study of the adoption usage and impact of RFID, Springer Science+Business Media. Abril [9] N. Kefalakis, N. Leontiadis, J. Soldatos, D. Donsez, Middleware Building Blocks for Architecting RFID Systems, Mobile Lightweight Wireless Systems, Vol 13, pp August 2009 [10] Wells,A.: RFID Detail, IMPO Magazine, Advantage Businness Media. June 2009 [11] EPC Information Services (EPCIS), EPCGlobal, version 1.0.1, 2007 [12] J. Han, H. Gonzalez, X. Li, D. Klabjan. Warehousing and Mining Massive RFID Data Sets, ADMA 2006: Conclusions Regarding the development of MDM for RFID, there are two main focuses. One is to build an agnostic RFID device acquisition system in the same time it accomplish the existing standard proposals. The other one is how to manage topological RFID network questions like RFID levels reader
An Intelligent Middleware Platform and Framework for RFID Reverse Logistics
International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics
RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY
RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda
IBM WebSphere Premises Server
Integrate sensor data to create new visibility and drive business process innovation IBM WebSphere Server Highlights Derive actionable insights that support Enable real-time location tracking business
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
TimePictra Release 10.0
DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features
Remote Monitoring and Controlling System Based on ZigBee Networks
Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr
Automated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
Design for Management Information System Based on Internet of Things
Design for Management Information System Based on Internet of Things * School of Computer Science, Sichuan University of Science & Engineering, Zigong Sichuan 643000, PR China, [email protected] Abstract
Introduction to RFID Middleware
Introduction to RFID Middleware John Soldatos, Nikos Kefalakis, Manolis Drakakis Athens Information Technology e-mail: {jsol, nkef, mdra}@ait.edu.gr Agenda RFID s operational benefits Need for RFID Middleware
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE Ha Quoc Trung 1 1 Department of Data Communication and Computer Network, School of Information and Telecommunication Technology,
Fosstrak Free and Open-Source Software for Track and Trace
C. Floerkemeier Fosstrak Free and Open-Source Software for Track and Trace Christian Floerkemeier Auto-ID Lab at MIT Mark Harrison Auto-ID Lab at Cambridge University Christof Roduner Auto-ID Lab Switzerland
Working with Motorola RFID
APPFORUM Americas 2012 Working with Motorola RFID Andy Doorty Ι Alliance Manager Adithya Krishnamurthy Ι Solution Manager APPFORUM Americas 2012 RFID Product Overview RFID Architecture RFID API3 for.net
Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010
Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010 RFID, GPS, sensor, and other auto-id technologies promise to revolutionize enterprise asset
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title
RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference
Bar Code Printing Options for Zebra Printers with Oracle WMS and MSCA APPLICATION WHITE PAPER
Bar Code Printing Options for Zebra Printers with Oracle WMS and MSCA APPLICATION WHITE PAPER Copyrights 2006 ZIH Corp. ZebraDesigner and all product names and numbers are Zebra trademarks and Zebra, and
Component Based Rapid OPC Application Development Platform
Component Based Rapid OPC Application Development Platform Jouni Aro Prosys PMS Ltd, Tekniikantie 21 C, FIN-02150 Espoo, Finland Tel: +358 (0)9 2517 5401, Fax: +358 (0) 9 2517 5402, E-mail: [email protected],
HARTING Auto-ID System Integration
HARTING Auto-ID System Integration HARTING integrated Auto-ID solutions Mobile Reader Business Application Framework Enterprise Service Bus Auto-ID Transponder Middleware Backend System Stationary Reader
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Classic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
vsphere Client Hardware Health Monitoring VMware vsphere 4.1
Technical Note vsphere Client Hardware Health Monitoring VMware vsphere 4.1 Purpose of This Document VMware vsphere provides health monitoring data for ESX hardware to support datacenter virtualization.
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
Enterprise Architecture For Next Generation Telecommunication Service Providers CONTACT INFORMATION:
Enterprise Architecture For Next Generation Telecommunication Service Providers CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: [email protected] web: www.hsc.com PROPRIETARY NOTICE
Wireless Communications for SCADA Systems Utilizing Mobile Nodes
, pp. 1-8 http://dx.doi.org/10.14257/ijsh.2013.7.5.01 Wireless Communications for SCADA Systems Utilizing Mobile Nodes Minkyu Choi Security Engineering Research Support Center, Daejon, Republic of Korea
Android Application for Accessing KNX Devices via IP Connection
Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,
A Symptom Extraction and Classification Method for Self-Management
LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation
A Generic Database Web Service
A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey [email protected] Yanchao Wang and Swetha Desetty Georgia State University
Technical Training Module ( 30 Days)
Annexure - I Technical Training Module ( 30 Days) Section 1 : Programmable Logic Controller (PLC) 1. Introduction to Programmable Logic Controller - A Brief History, Need and advantages of PLC, PLC configuration,
Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
Building Web-based Infrastructures for Smart Meters
Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.
M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.
M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: [email protected] WHAT IS EURECOM A graduate school & research centre in communication
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows
Solution Overview Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Cisco Unified Computing System and Cisco UCS Manager The Cisco Unified Computing System (UCS)
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7 No. 7, September-October 2008 Applications At Your Service Mahesh H. Dodani, IBM,
Delegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN
Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION
Team Quicken Loans: Mobile RFID Inventory Tracking System. Project Plan. Spring 2014
Team Quicken Loans: Mobile RFID Inventory Tracking System Project Plan Spring Michigan State University Student Team Josh Rasor Jacob Riesser Keyur Patel Quicken Loans Professional Team Jim Brzuch Patrick
EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO.
EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES Peter R. Egli INDIGOO.COM 1/16 Contents 1. EAI versus SOA versus ESB 2. EAI 3. SOA 4. ESB 5. N-tier enterprise architecture
W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier
W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...
Oracle Utilities Integration for Device Operations
Oracle Utilities Integration for Device Operations Release Notes Oracle Utilities Meter Data Management v2.0.1.8 Oracle Utilities Operational Device Management v2.0.1 E36211-01 October 2012 Oracle Utilities
Radiological Assessment Display and Control System
Features Fast, real-time data acquisition and control Highly reliable communication with remote terminal units Collecting, converting, integrating and analyzing data from all monitors Detecting, annunciating
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org [email protected]
OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org [email protected] 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end
Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation
Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed
The Information Revolution for the Enterprise
Click Jon Butts to add IBM text Software Group Integration Manufacturing Industry [email protected] The Information Revolution for the Enterprise 2013 IBM Corporation Disclaimer IBM s statements regarding
Hvor går RFID forskning og utvikling?
Technology for a better society Enabling the Real Time Enterprise Hvor går RFID forskning og utvikling? Ovidiu Vermesan, SINTEF IKT og Edvin Holsæter, Telenor Iris Plan for presentasjonen RFID segmenter
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
A Zebra Technologies White Paper. Bar Code Printing from Oracle WMS and MSCA
A Zebra Technologies White Paper Bar Code Printing from Oracle WMS and MSCA 2 A Zebra Technologies White Paper Executive Summary Bar code output from the Oracle E-Business Suite environment is traditionally
TT-RFID platform - Introduction
TT-RFID platform - Introduction Version 0.7 01/06/2011 INDEX 1. RFID PROTOCOL - MAIN FEATURES...1 2. COMMAND DISPLAY FOR THE RFID PROTOCOL...2 3. GUIDELINES FOR USING THE RFID PROTOCOL... 4 3.1. CONFIGURATION
Integration Platforms Problems and Possibilities *
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 8, No 2 Sofia 2008 Integration Platforms Problems and Possibilities * Hristina Daskalova, Tatiana Atanassova Institute of Information
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
Why MCL-Bridge for SAP
Why MCL-Bridge for SAP Visualize mobilized SAP R/3 Realize MCL-Bridge for SAP Why MCL-Bridge for SAP Does SAP R/3 drive your shop-floor operations retail, warehouse, distribution, manufacturing, or transportation
Living Requirements Document: Sniffit
Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps
Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -
Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging
Find the Information That Matters. Visualize Your Data, Your Way. Scalable, Flexible, Global Enterprise Ready
Real-Time IoT Platform Solutions for Wireless Sensor Networks Find the Information That Matters ViZix is a scalable, secure, high-capacity platform for Internet of Things (IoT) business solutions that
Sensor network infrastructure for intelligent building monitoring and management system
Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor
The Ubiquitous Web, UPnP and Smart Homes
The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1
, pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and
Open Enterprise Architectures for a Substation Password Management System
CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (154) Conference on Power Systems http : //www.cigre.org Toronto, October 4-6, 2009 Open Enterprise Architectures for a Substation Password Management System
Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)
Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Abstract Strong identity management enforced with digital authentication mechanisms
MD Link Integration. 2013 2015 MDI Solutions Limited
MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY
Overview to the Cisco Mobility Services Architecture
Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly
E-Business Technologies for the Future
E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.sis.pitt.edu/~spring Overview
Easy configuration of NETCONF devices
Easy configuration of NETCONF devices David Alexa 1 Tomas Cejka 2 FIT, CTU in Prague CESNET, a.l.e. Czech Republic Czech Republic [email protected] [email protected] Abstract. It is necessary for developers
Middleware support for the Internet of Things
Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,
Kepware Technologies Optimizing KEPServerEX V5 Projects
Kepware Technologies Optimizing KEPServerEX V5 Projects September, 2010 Ref. 50.16 Kepware Technologies Table of Contents 1. Overview... 1 2. Factors that Affect Communication Speed... 1 2.1 Defining Bandwidth...
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
Skynax. Mobility Management System. System Manual
Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of
IBM Tivoli Directory Integrator
IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,
Cisco Active Network Abstraction 4.0
Cisco Active Network Abstraction 4.0 Product Overview Cisco Active Network Abstraction (ANA) is a flexible, vendor-neutral network resource management solution for a multitechnology, multiservice network
Managing a Fibre Channel Storage Area Network
Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical
Pervasive Software + NetSuite = Seamless Cloud Business Processes
Pervasive Software + NetSuite = Seamless Cloud Business Processes Successful integration solution between cloudbased ERP and on-premise applications leveraging Pervasive integration software. Prepared
EMC CENTERA VIRTUAL ARCHIVE
White Paper EMC CENTERA VIRTUAL ARCHIVE Planning and Configuration Guide Abstract This white paper provides best practices for using EMC Centera Virtual Archive in a customer environment. The guide starts
IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android
About Us : We at Ensemble specialize in electronic design and manufacturing services for various industrial segments. We also offer student project guidance and training for final year projects in departments
Best Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
Home Gateway Enabling Evolution of Network Services
Home Gateway Enabling Evolution of Network Services V Tomohiro Ishihara V Kiyoshi Sukegawa V Hirokazu Shimada (Manuscript received July 3, 2006) Broadband access services have spread rapidly and are now
Getting Started with TraSer from Requirements to a Solution
Project no.: 033512 Project acronym: TraSer Project title: Identity-Based Tracking and Web-Services for SMEs Start date of project: 01.06.2006 Sixth Framework Programme IST Call 5 Fp6-2005-IST-5 ICT for
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
