Data EPC Acquisition System Middleware Device Manager: DEPCAS MDM

Size: px
Start display at page:

Download "Data EPC Acquisition System Middleware Device Manager: DEPCAS MDM"

Transcription

1 Data EPC Acquisition System Middleware Device Manager: DEPCAS MDM I. Abad, C. Cerrada, J. A. Cerrada, R. Heradio 1 Software Engineering and Computer Systems Department. UNED: Distance Learning University of Spain. Madrid. Spain Abstract - One of the main purposes of RFID middleware is to manage and hide the broad range of device readers existing in acquisition RFID networks. There are two basic solutions to override. First is to define a specification that should be accomplished for every RFID reader inside a network. The second solution is to define an abstraction layer that can translate proprietary protocols and specific characteristics from a vendor to a general solution. In this paper we present the Middleware Device Manager in our proposal of RFID middleware called DEPCAS: Data EPC Acquisition System. Keywords: Radio Frequency Identification, RFIT: Radio Frequency Information System, DEPCAS: Data EPC Acquisition System, SCADA: Supervisory Control and Data Acquisition 1 Introduction Radio frequency identification (RFID) is one of today's most rapidly proliferating technologies for enterprises. Based on the promise of lower operating costs combined with more accurate product and asset information, organizations are introducing RFID technologies in different productive and organization areas: tracking, supply chain, optimize stock levels, enforce tighter security, people surveillance and industry regulations [1] are examples of these uses. As enterprises explore these potential benefits [2], many are realizing that scaling from a pilot program to a production scale deployment is not a trivial exercise. Without careful planning, it is possible to destabilize business operations as huge volumes of RFID messages generated at the edge of the enterprise flood toward the data center. Over time, this problem could get magnified as RFID tagging at the item level becomes mandated competence pressures. Most existing application and network infrastructures were not designed with RFID in mind. At the edge, if RFID infrastructure is deployed on general-purpose servers that require installation and ongoing support, manageability problems alone might render RFID cost-prohibitive. In addition, without a unified deployment model of centralized control and distributed enforcement, disconnected areas of RFID infrastructure will grow, creating a familiar set of application and data integration challenges. On the network side, RFID implementations will generate large amounts of new data that will fan in from the edge of an enterprise toward its data center core, placing further demands upon the existing network. To optimize the use of available network bandwidth and simplify the deployment of RFID technology, solutions are needed to collect and filter raw RFID tag data close to its source and subsequently to correlate, aggregate, and transform this data into meaningful business-level events. These events in turn should be acted upon locally, where appropriate, or securely routed and delivered to back-end inventory management, sales, and financial applications. It is this "intelligent information" that will enable RFID-ready applications to deliver on their promise of increased operational productivity. The fundamental requirements of this type of middleware are related to the management of infrastructure device readers, the processing information received from auto identification, the business needs to incorporate auto identification and sharing of information [3]. To address these requirements, software architectures that implement this type of middleware proposed a set of layers that specialize in solving different requirements. These layers are based primarily on the architecture proposed by EPCglobal organization[4], including the resolution of a protocol for reading between the middleware and the tag reading devices, called LLRP (Low Level Reader Protocol) and higher RP (Reader Protocol) according to the standards [5] [6], an event process from the reading of RFID tags [7], an assignment of semantic information to the object through an RFID identification 1 This research has been carried out under contract with the Spanish CICYT through the DPI project. It also belongs to the activities carried out in the fram of the Robocity2030-II excellence network of the CAM (ref. S2009/DPI- 1559)

2 service [8], and a service to receive or transmit information to business applications from the RFID middleware [9]. Primari/Uni v. Arkansas Rifidi Sensor Abstraction Layer Furthermore, the implementations include what is called generically device manager that allows the configuration and the management of every device incorporated to the RFID network. In this article we focus on this software component that is usually included in every RFID middleware and we present the alternative in which we are working for the development of our proposed architecture called DEPCAS (Data EPC Acquisition System). DEPCAS define software architecture for solving the RFID middleware based on system architecture for monitoring and control (SCADA) process. DEPCAS propose the scenario concept to generalize the process that can be performed from the acquisition of auto identification information. The processing of a scenario produces results that contain elements relevant to their semantic direct use in business applications. The graphical interface is called in DEPCAS GUV (Graphical User Viewer) and is designed to standardize access to the information managed in the middleware regardless of the scenario being driving. Henceforth this paper is structured as follows: Section 2 presents middleware device manager in existing proposals for middleware, which s are included and how they are integrated with other elements of the middleware, in Section 3 we presents the middleware device manager (MDM) defined in DEPCAS, in Section 4 we presents the MARC (Minimun Abstract Reader Commands) commands to manage different readers vendor inside a unique RFID network,, and finally the section 5 describes implementation prototype of RRTL (RFID Readers Topology Language) using MARC sentences developed in DEPCAS to solve MDM. 2 The RFID device management There are several existing RFID middleware implementations (Table 1): OSS RFID middleware as Fosstrak, Rifidi or Aspire, RFID middleware platforms as Sun Java System RFID software or WebSphere RFID system and RFID middleware proprietary as Detego RFID Suite Solution or OAT RFID Suite. Every of these solutions include a solution to infrastructure management with two main positions. One solution is to force the use of a specific protocol inside RFID reader s network while the other extreme is to accept any kind of reader and the middleware will provide bundle mechanism to uniform the devices. Table 1. RFID Middleware and Device Management Components Name Device Management AutoIDLabs Fosstrak LLRP Adaptor + HAL Adaptor Aspire Aspire Hardware Abstraction Layer Sun Micro Systems. RF-IT Solutions OAT Systems Sun Java RFID System v3.0 WebSphere RFID Detego OAT Foundation Suite RFID Execution Agent WebSphere RFID Device Infrastructure You-R Device Management OAT Device Manager The study of these different RFID Device Management components allows obtaining a set of characteristics that are implemented to solve it in the RFID middleware. Between these features we include: Device Agnostic. Configuration and parameterization of RFID devices. Topological RFID devices. Start-up Devices. Statistical and Report RFID devices data. Monitoring Devices in live operation Diagnosis of device in live operation LLRP implementation OSGi Technology These features and s define the operation of the middleware device manager in RFID middleware [10][11]. For example, Device Agnostic Feature is provided when middleware infrastructure acts as an integration point for RFID readers, printers, and other infrastructure devices, such as any sensors and actuators. RFID reader and printer manufacturers typically provide complex configuration options, proprietary interface languages, and communication protocols. If RFID Device Infrastructure eliminates the need for RFID integrators to be aware of these complexities and provides a device agnostic interface with which supported devices can be configured hiding the complexity. Other features are related to scope and technological implementation. Some of the middleware device manager support the EPC Global Network specification to connect with RFID Reader. The Low Level Reader Protocol standardizes a set of instructions to configure, send and receive reader information. In the technological side, several middleware device manager have used different software solutions. Between them, the OSGi Architecture is one of the most common specification framework used in our days. The OSGi specification enable components to hide their

3 implementation from others components while communicating through services. Next table shows the cross results between existing RFID middleware implementation and the device manager set of characteristics presented in this section (middleware logic manager) for auto-identification process, the GUV (graphical user viewer) or man-machine interface, and finally the EPCIS (EPC Information System) as software component to communicate with other systems. The main objectives of MDM are: Table 2. Middleware RFID/MDM Characteristics 2 FOSSTRACK RIFIDI ASPIRE SUN DETEGO OAT F.S. Manage the topology RFID reader s network. Agnostic management of different RFID vendors. Homogeneous process of different RFID tag reads. Support LLRP and ALE specification process. Provide configurable RFID network Hide operational environment Minimum tag management operations. Monitoring and controlling RFID readers.. Device Y N Y Y Y Y Y Agnostic Device Y Y Y N N Y Y Configuration Topological N N Y Y N Y Y Configuration Needs Y Y Y N N N N Programming Starting-up Device Statistical Data Y N Y N N Y Y from Device Monitoring Data N N N Y Y Y Y from Device Diagnosis Y N Y N Y N Y capabilities LLRP Implement. Y Y Y N N N N OSGi Technologies N Y Y N N N N 3 Middleware Device Manager in DEPCAS DEPCAS (EPC Data Acquisition System) is a proposed architecture for RFID middleware systems dedicated to data acquisition in real and heterogeneous environments. The scheme proposed is based on the supervisory and control systems known as SCADA (Supervisory Control and Data Acquisition). In this case, the remote terminal units in SCADA systems are replaced by the antenna-reader RFID systems to receive auto identification information. The communication networks are used to connect reader (communication via serial, Ethernet...) to the system Central acquisition software. The basic structure of DEPCAS is divided into four sub-systems: the MDM (middleware device manager) for the management of infrastructure, MLM 2 Y: Yes/ N: No To support these objectives the MDM definition includes the concept of Minimum Abstract Reader Commands (MARC) and the RFID Reader Topology Language (RRTL). The MARC allow to hide the particularities of every RFID reader vendor through a set of operations that are mapped to specific vendor API. The RRTP includes the description of RFID topologies including control and management of readers. The MDM core architecture prototype have been developed using TCP and HTTP for transporting reader protocol messages, while the message content can be either XML or Text. In addition, it support synchronous and asynchronous messaging (through the reader s protocol Notification Channels mechanisms). 4 Minimum Abstract Reader Commands (MARC) MARC is the minimum set of instructions that an RFID reader must supply to support the operational instructions inside a network. The set of MARC is closed and give an independent layer of RFID management. The implementation of MARC is related to RFID reader API and gives a dependent hardware layer. The commands included in MDM are described in Table 3: Table 3. MARC Commands MARC setantennasequence setautofalseoutput setautofalsepause setautomode setautostarttrigger setautostarttimer Operations Set an order sequence to read from multiple antennas installed in one reader mode to ignore tag reads mode to pause working Start/Stop autonomous reader s Activate the trigger sending s in reader autonomous Activate periodic timer reader

4 setautostoptimer setautostoptrigger setautotrueoutput setautotruepause setconnecttcp setnotifyaddress setnotifyformat setnotifytime setpassword setrun settagtype settime setusername in reader autonomuos Reset periodic timer reader in reader autonomous Reset the trigger sending s in reader autonomous mode to process tag reads mode to start reading process Establish a TCP connection Init a listening TCP port to instruct the reader to send notification messages Configure the format message to be used by the reader Establish the period that the reader notifier should use Identify the password reader access Start to execute a configuration reader mode Establish the expected tag type property Synchronize reader time Identify the user reader access The RRTL definition is supported by an XSD squeme and the results with XML files. An example of some RRTL commands is shown in figure 1: The MDM prototype includes MARC implementation for RFID reader ALIEN8780, FEIG2000, SKYWRAEM2 and we are working in MARC implementation for ThingMagic Mercury 4, Intermec IF61 and Impinj Speedway R RFID Reader Topology Language (RRTL) RFID Reader Topology Language (RRTL) is a language to define RFID network topologies that includes control and management of RFID devices. The language manages the process and filter of tag reads to uniform them to DEPCAS system. The RRTL command could be classified by their application: 1. Resource definition. 2. Time management. 3. Conditional configuration 4. Tag management 5. Device management 6. Control and flow configuration 7. Database management 8. Web service control 9. File management 10. Tag position and code management 11. Process synchronization 12. User commands There are a set of miscellaneous sentences that are related with different kind of operation like start/stop operation, locks, etc. Figure 1. RRTL Reader Command Example One simple topology with RRTL commands is shown in fig. 2: Figure 2. Topology example

5 The RRTL commands for XML data for FEIG configuration in this example is: <?xml version="1.0" encoding="utf-8"?> <system-spec xmlns:xsi=" xsi:nonamespaceschemalocation="rfid_loader_master_rrtl_esp.xsd"> <resource> <timer-job chain="test" name="alien_8780_0"> <time-span milliseconds="1000" / <timer-job chain="test" name="feig_lrua_2000_0"> <time-span milliseconds="1000" /> <timer-job chain="test" name="skyeware_m2_0"> <time-span milliseconds="1000" /> <file name="datafile" filename="c:/uned/mdm/datafile.mdm" append="true"newline-style="windows" /> </resource> <reader driver-class="mdmfeiglru2000setup" type-class="mdmfeiglru2000setup" name="feig_lrua_2000_0" organization="uned" campus="madrid / Univ.EDE" address="c/ Juan, MADRID" dept="issi" location="planta: 1, Desp: 112" use="test" auto-mode="true" auto-interval="1000" auto-chain="test" > <arg> </arg><arg>10001</arg><arg>feig</arg> <arg>password</arg> <property> <key="setnotifyaddress"/ <value="localhost:9002"/> </property> <property key="settagtype" value="*" trim="false" /> <property key="setnotifyformat" value="xml" /> <property key="settime" value="2008/12/31" /> <property key="setnotifytime" value="1"/> <property key="setantennasequence" value="1,0,0,0"/> <property key="setautomode" value="1"/> <property key="setpolling" value="500" /> <property> <key="setconnecttcp" value=" :1001"/> <property key="setusername" value="feig" /> <property key="setpassword" value="password" /> <property key="setrun" value="1"/> </reader> <chain name="test"> <poll generate-empty="false" reader="alien_8780_0" /> <poll generate-empty="false" reader="feig_lrua_2000" /> <poll generate-empty="false" reader="skyeware_m2_0" /> <purifier period="1000" reads="2" generateempty="false"/> <echo message="reading tag...id=${tagid}" /> <transfer resource="rmi to DBMonitor.java" forward-resource="localhost:3232"/> </chain> </system-spec> point (antennas, edge readers, reader, PLCs with RFID readers, etc.) or redundant reader points. This two main subject are covered in or solution of DEPCAS MDM, one with the use of MARC to hide device management or standardization protocols and topological questions with RRTL to express network configuration. About future works there are different issues to be resolved. First, we want to extend the MARC ality to new devices as Intermec IF61, Impinj Speedway R420 or Siemens RF6660A. Second there are other topological concepts to work in with RRTL as tag tables, conditional operations master/submaster and peer to peer network reader organizations, etc. 7 References [1] R. Russell, Manufacturing Execution Systems: Moving toi the next level, Pharmaceutical Technology, January 2004, pp [2] H. Ramamurthy, B.S. Prabhu, Rajit Gadh. ReWINS: A distributed multi-rf Sensor Control network for industrial automation, IEEE Wireless Telecommunications Symposium (WTS 2005), Pormona, California, [3] Xiaoyong Su, Chi-Cheng Chu, B. S. Prabhu, Rajit Gadh, On the creation of Automatic Identification and Data Capture infrastructure via RFID and other technologies The Internet of Things: from RFID to the Next-Generation Pervasive Networked Systems, Lu Yan, Yan Zhang, Laurence T. Yang, Huansheng Ning (eds.), Auerbach Publications, Taylor & Francis Group, 24 pp., [4] Brewer, A., Sloan, N. and Landers, T.L., Intelligent tracking in manufacturing. Journal of Intelligent Manufacturing. v10 i [5] C. Floerkemeier, C. Roduner, and M. Lampe, RFID Application Development with the Accada Middleware Platform. IEEE Systems Journal [6] Q.Z. Shenz, X. Li, S. Zealdally, Enabling next-generation RFID applications: Solutions and challenges. Computer, Col 41, Issue [7] M C. Bornhövd, T. Lin, S. Haller, and J. Schaper, Integrating Automatic Data Acquisition with Business Processes - Experiences with SAP s Auto-ID Infrastructure. In Proceedings of the 30st international conference on very large data bases (VLDB). Toronto, [8] Curtin, J. Kauffman, R.J., Riggins F.J., Making the MOST out of RFID Technology: a research agenda for the study of the adoption usage and impact of RFID, Springer Science+Business Media. Abril [9] N. Kefalakis, N. Leontiadis, J. Soldatos, D. Donsez, Middleware Building Blocks for Architecting RFID Systems, Mobile Lightweight Wireless Systems, Vol 13, pp August 2009 [10] Wells,A.: RFID Detail, IMPO Magazine, Advantage Businness Media. June 2009 [11] EPC Information Services (EPCIS), EPCGlobal, version 1.0.1, 2007 [12] J. Han, H. Gonzalez, X. Li, D. Klabjan. Warehousing and Mining Massive RFID Data Sets, ADMA 2006: Conclusions Regarding the development of MDM for RFID, there are two main focuses. One is to build an agnostic RFID device acquisition system in the same time it accomplish the existing standard proposals. The other one is how to manage topological RFID network questions like RFID levels reader

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics

More information

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda

More information

IBM WebSphere Premises Server

IBM WebSphere Premises Server Integrate sensor data to create new visibility and drive business process innovation IBM WebSphere Server Highlights Derive actionable insights that support Enable real-time location tracking business

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

TimePictra Release 10.0

TimePictra Release 10.0 DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

Automated Security System using ZigBee

Automated Security System using ZigBee IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School

More information

Design for Management Information System Based on Internet of Things

Design for Management Information System Based on Internet of Things Design for Management Information System Based on Internet of Things * School of Computer Science, Sichuan University of Science & Engineering, Zigong Sichuan 643000, PR China, [email protected] Abstract

More information

Introduction to RFID Middleware

Introduction to RFID Middleware Introduction to RFID Middleware John Soldatos, Nikos Kefalakis, Manolis Drakakis Athens Information Technology e-mail: {jsol, nkef, mdra}@ait.edu.gr Agenda RFID s operational benefits Need for RFID Middleware

More information

UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE

UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE Ha Quoc Trung 1 1 Department of Data Communication and Computer Network, School of Information and Telecommunication Technology,

More information

Fosstrak Free and Open-Source Software for Track and Trace

Fosstrak Free and Open-Source Software for Track and Trace C. Floerkemeier Fosstrak Free and Open-Source Software for Track and Trace Christian Floerkemeier Auto-ID Lab at MIT Mark Harrison Auto-ID Lab at Cambridge University Christof Roduner Auto-ID Lab Switzerland

More information

Working with Motorola RFID

Working with Motorola RFID APPFORUM Americas 2012 Working with Motorola RFID Andy Doorty Ι Alliance Manager Adithya Krishnamurthy Ι Solution Manager APPFORUM Americas 2012 RFID Product Overview RFID Architecture RFID API3 for.net

More information

Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010

Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010 Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010 RFID, GPS, sensor, and other auto-id technologies promise to revolutionize enterprise asset

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference

More information

Bar Code Printing Options for Zebra Printers with Oracle WMS and MSCA APPLICATION WHITE PAPER

Bar Code Printing Options for Zebra Printers with Oracle WMS and MSCA APPLICATION WHITE PAPER Bar Code Printing Options for Zebra Printers with Oracle WMS and MSCA APPLICATION WHITE PAPER Copyrights 2006 ZIH Corp. ZebraDesigner and all product names and numbers are Zebra trademarks and Zebra, and

More information

Component Based Rapid OPC Application Development Platform

Component Based Rapid OPC Application Development Platform Component Based Rapid OPC Application Development Platform Jouni Aro Prosys PMS Ltd, Tekniikantie 21 C, FIN-02150 Espoo, Finland Tel: +358 (0)9 2517 5401, Fax: +358 (0) 9 2517 5402, E-mail: [email protected],

More information

HARTING Auto-ID System Integration

HARTING Auto-ID System Integration HARTING Auto-ID System Integration HARTING integrated Auto-ID solutions Mobile Reader Business Application Framework Enterprise Service Bus Auto-ID Transponder Middleware Backend System Stationary Reader

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Classic Grid Architecture

Classic Grid Architecture Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes

More information

vsphere Client Hardware Health Monitoring VMware vsphere 4.1

vsphere Client Hardware Health Monitoring VMware vsphere 4.1 Technical Note vsphere Client Hardware Health Monitoring VMware vsphere 4.1 Purpose of This Document VMware vsphere provides health monitoring data for ESX hardware to support datacenter virtualization.

More information

WISE-4000 Series. WISE IoT Wireless I/O Modules

WISE-4000 Series. WISE IoT Wireless I/O Modules WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud

More information

Enterprise Architecture For Next Generation Telecommunication Service Providers CONTACT INFORMATION:

Enterprise Architecture For Next Generation Telecommunication Service Providers CONTACT INFORMATION: Enterprise Architecture For Next Generation Telecommunication Service Providers CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: [email protected] web: www.hsc.com PROPRIETARY NOTICE

More information

Wireless Communications for SCADA Systems Utilizing Mobile Nodes

Wireless Communications for SCADA Systems Utilizing Mobile Nodes , pp. 1-8 http://dx.doi.org/10.14257/ijsh.2013.7.5.01 Wireless Communications for SCADA Systems Utilizing Mobile Nodes Minkyu Choi Security Engineering Research Support Center, Daejon, Republic of Korea

More information

Android Application for Accessing KNX Devices via IP Connection

Android Application for Accessing KNX Devices via IP Connection Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,

More information

A Symptom Extraction and Classification Method for Self-Management

A Symptom Extraction and Classification Method for Self-Management LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation

More information

A Generic Database Web Service

A Generic Database Web Service A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey [email protected] Yanchao Wang and Swetha Desetty Georgia State University

More information

Technical Training Module ( 30 Days)

Technical Training Module ( 30 Days) Annexure - I Technical Training Module ( 30 Days) Section 1 : Programmable Logic Controller (PLC) 1. Introduction to Programmable Logic Controller - A Brief History, Need and advantages of PLC, PLC configuration,

More information

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Open Access Research and Design for Mobile Terminal-Based on Smart Home System Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Building Web-based Infrastructures for Smart Meters

Building Web-based Infrastructures for Smart Meters Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.

More information

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom. M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: [email protected] WHAT IS EURECOM A graduate school & research centre in communication

More information

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access

More information

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Solution Overview Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Cisco Unified Computing System and Cisco UCS Manager The Cisco Unified Computing System (UCS)

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7 No. 7, September-October 2008 Applications At Your Service Mahesh H. Dodani, IBM,

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION

More information

Team Quicken Loans: Mobile RFID Inventory Tracking System. Project Plan. Spring 2014

Team Quicken Loans: Mobile RFID Inventory Tracking System. Project Plan. Spring 2014 Team Quicken Loans: Mobile RFID Inventory Tracking System Project Plan Spring Michigan State University Student Team Josh Rasor Jacob Riesser Keyur Patel Quicken Loans Professional Team Jim Brzuch Patrick

More information

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO.

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO. EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES Peter R. Egli INDIGOO.COM 1/16 Contents 1. EAI versus SOA versus ESB 2. EAI 3. SOA 4. ESB 5. N-tier enterprise architecture

More information

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...

More information

Oracle Utilities Integration for Device Operations

Oracle Utilities Integration for Device Operations Oracle Utilities Integration for Device Operations Release Notes Oracle Utilities Meter Data Management v2.0.1.8 Oracle Utilities Operational Device Management v2.0.1 E36211-01 October 2012 Oracle Utilities

More information

Radiological Assessment Display and Control System

Radiological Assessment Display and Control System Features Fast, real-time data acquisition and control Highly reliable communication with remote terminal units Collecting, converting, integrating and analyzing data from all monitors Detecting, annunciating

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org [email protected]

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org [email protected] 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end

More information

Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation

Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed

More information

The Information Revolution for the Enterprise

The Information Revolution for the Enterprise Click Jon Butts to add IBM text Software Group Integration Manufacturing Industry [email protected] The Information Revolution for the Enterprise 2013 IBM Corporation Disclaimer IBM s statements regarding

More information

Hvor går RFID forskning og utvikling?

Hvor går RFID forskning og utvikling? Technology for a better society Enabling the Real Time Enterprise Hvor går RFID forskning og utvikling? Ovidiu Vermesan, SINTEF IKT og Edvin Holsæter, Telenor Iris Plan for presentasjonen RFID segmenter

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

A Zebra Technologies White Paper. Bar Code Printing from Oracle WMS and MSCA

A Zebra Technologies White Paper. Bar Code Printing from Oracle WMS and MSCA A Zebra Technologies White Paper Bar Code Printing from Oracle WMS and MSCA 2 A Zebra Technologies White Paper Executive Summary Bar code output from the Oracle E-Business Suite environment is traditionally

More information

TT-RFID platform - Introduction

TT-RFID platform - Introduction TT-RFID platform - Introduction Version 0.7 01/06/2011 INDEX 1. RFID PROTOCOL - MAIN FEATURES...1 2. COMMAND DISPLAY FOR THE RFID PROTOCOL...2 3. GUIDELINES FOR USING THE RFID PROTOCOL... 4 3.1. CONFIGURATION

More information

Integration Platforms Problems and Possibilities *

Integration Platforms Problems and Possibilities * BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 8, No 2 Sofia 2008 Integration Platforms Problems and Possibilities * Hristina Daskalova, Tatiana Atanassova Institute of Information

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

Radio Frequency Identification (RFID) An Overview

Radio Frequency Identification (RFID) An Overview Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify

More information

Why MCL-Bridge for SAP

Why MCL-Bridge for SAP Why MCL-Bridge for SAP Visualize mobilized SAP R/3 Realize MCL-Bridge for SAP Why MCL-Bridge for SAP Does SAP R/3 drive your shop-floor operations retail, warehouse, distribution, manufacturing, or transportation

More information

Living Requirements Document: Sniffit

Living Requirements Document: Sniffit Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps

More information

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i - Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging

More information

Find the Information That Matters. Visualize Your Data, Your Way. Scalable, Flexible, Global Enterprise Ready

Find the Information That Matters. Visualize Your Data, Your Way. Scalable, Flexible, Global Enterprise Ready Real-Time IoT Platform Solutions for Wireless Sensor Networks Find the Information That Matters ViZix is a scalable, secure, high-capacity platform for Internet of Things (IoT) business solutions that

More information

Sensor network infrastructure for intelligent building monitoring and management system

Sensor network infrastructure for intelligent building monitoring and management system Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor

More information

The Ubiquitous Web, UPnP and Smart Homes

The Ubiquitous Web, UPnP and Smart Homes The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 , pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and

More information

Open Enterprise Architectures for a Substation Password Management System

Open Enterprise Architectures for a Substation Password Management System CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (154) Conference on Power Systems http : //www.cigre.org Toronto, October 4-6, 2009 Open Enterprise Architectures for a Substation Password Management System

More information

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Abstract Strong identity management enforced with digital authentication mechanisms

More information

MD Link Integration. 2013 2015 MDI Solutions Limited

MD Link Integration. 2013 2015 MDI Solutions Limited MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY

More information

Overview to the Cisco Mobility Services Architecture

Overview to the Cisco Mobility Services Architecture Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.sis.pitt.edu/~spring Overview

More information

Easy configuration of NETCONF devices

Easy configuration of NETCONF devices Easy configuration of NETCONF devices David Alexa 1 Tomas Cejka 2 FIT, CTU in Prague CESNET, a.l.e. Czech Republic Czech Republic [email protected] [email protected] Abstract. It is necessary for developers

More information

Middleware support for the Internet of Things

Middleware support for the Internet of Things Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,

More information

Kepware Technologies Optimizing KEPServerEX V5 Projects

Kepware Technologies Optimizing KEPServerEX V5 Projects Kepware Technologies Optimizing KEPServerEX V5 Projects September, 2010 Ref. 50.16 Kepware Technologies Table of Contents 1. Overview... 1 2. Factors that Affect Communication Speed... 1 2.1 Defining Bandwidth...

More information

Quality Certificate for Kaspersky DDoS Prevention Software

Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General

More information

Skynax. Mobility Management System. System Manual

Skynax. Mobility Management System. System Manual Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of

More information

IBM Tivoli Directory Integrator

IBM Tivoli Directory Integrator IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,

More information

Cisco Active Network Abstraction 4.0

Cisco Active Network Abstraction 4.0 Cisco Active Network Abstraction 4.0 Product Overview Cisco Active Network Abstraction (ANA) is a flexible, vendor-neutral network resource management solution for a multitechnology, multiservice network

More information

Managing a Fibre Channel Storage Area Network

Managing a Fibre Channel Storage Area Network Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical

More information

Pervasive Software + NetSuite = Seamless Cloud Business Processes

Pervasive Software + NetSuite = Seamless Cloud Business Processes Pervasive Software + NetSuite = Seamless Cloud Business Processes Successful integration solution between cloudbased ERP and on-premise applications leveraging Pervasive integration software. Prepared

More information

EMC CENTERA VIRTUAL ARCHIVE

EMC CENTERA VIRTUAL ARCHIVE White Paper EMC CENTERA VIRTUAL ARCHIVE Planning and Configuration Guide Abstract This white paper provides best practices for using EMC Centera Virtual Archive in a customer environment. The guide starts

More information

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android About Us : We at Ensemble specialize in electronic design and manufacturing services for various industrial segments. We also offer student project guidance and training for final year projects in departments

More information

Best Practices: Extending Enterprise Applications to Mobile Devices

Best Practices: Extending Enterprise Applications to Mobile Devices Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations

More information

Home Gateway Enabling Evolution of Network Services

Home Gateway Enabling Evolution of Network Services Home Gateway Enabling Evolution of Network Services V Tomohiro Ishihara V Kiyoshi Sukegawa V Hirokazu Shimada (Manuscript received July 3, 2006) Broadband access services have spread rapidly and are now

More information

Getting Started with TraSer from Requirements to a Solution

Getting Started with TraSer from Requirements to a Solution Project no.: 033512 Project acronym: TraSer Project title: Identity-Based Tracking and Web-Services for SMEs Start date of project: 01.06.2006 Sixth Framework Programme IST Call 5 Fp6-2005-IST-5 ICT for

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information