abhisam RFID Discover the power of e-learning!

Similar documents
RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas

Root Beer Game in Progress

Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER

Basics of EPC. Training

RFID and the Internet of Things

RAIN Radio Protocol. December 2015

data sheet RFID IN ORACLE 11i10 E-BUSINESS SUITE Oracle Warehouse Management with Application Server 10g

RFID Tags and Readers

RFID and Privacy Impact Assessment (PIA)

Outbound Delivery Using RFID in Sap System

Introduction to RFID

The Application used RFID in Third Party Logistics

Module 7 Evaluation and Selection

Smart&Secure: Merchandise Tag. RFID for Retail. RFID Applications in Retail. Page 1

The Role of RFID in the IDENTIFICATION of Things

An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises

AN APPLICATION OF RFID IN MONITORING AGRICULTURAL MATERIAL PRODUCTS

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007

Welcome! NDIA RFID Seminar November 4, Overview of RFID. Productivity by RFID Pete Cipriani. Copyright 2005 Productivity By RFID

Company LOGO RFID and Track & Trace System

The RAIN RFID Market Raghu Das, CEO, IDTechEx

EPC Primer. JAG. Nov Texas Instruments proprietary information 1

A Secured Mutual Authentication Protocol For RFID System

The Role of RFID in the IDENTIFICATION of Things

RFID - Making It So...With Some Help From the University of Florida 1

Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development

Implementation and Application of RFID EPC Information Service for Forward and Reverse Logistics

RFID and Your Supply Chain

RFID Middleware as a Service Enabling Small and Medium-sized Enterprises to Participate in the EPC Network

RFID, Identification & Wireless Systems for the Middle East & North Africa

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

The Full Range for RFID

ISO/IEC SC31 & GS1/EPCglobal. ETSI, 3 December 2007 Henri Barthel, GS1 Global Office

ITU-T. JCA-NID Joint Coordination Activity on Network aspects of Identification Systems

Cyber-physical systems for processes and organisation NEO SKILLS PORTFOLIO

WEBER. RFID Journal Live! Europe. Oct 18th, 2011

RFID Privacy Protection

ENCODING, PRINTING & VALIDATING RFID TAGS WITH PORTALTRACK

Software review Auto-ID technology in retail and its potential application in marketing Received: 25th January, 2004

Will RFID Change Inventory Assumptions? Perhaps in a few years when prices are lower and the technology is more common. Technology

Privacy Challenges in RFID

Near Field Communication in the real world part II. Using the right NFC tag type for the right NFC application. Innovision Research & Technology plc

PERFORMANCE ENHANCEMENT OF THE EPCGLOBAL NETWORK BY AGGREGATING DATA AT THE EPCIS

WEBINAR SERIES #4 EPC/RFID STANDARDS AND RFID STUFF YOU NEED TO KNOW

EPC/RFID Advanced Infrastructure Implementation. Student s Handbook

CHOOSING THE RIGHT RFID TECH FOR MANUFACTURING

Chapter 17 Radio Frequency Identification (RFID)

RFID Middleware. John DiPalo. Vice President of Technical Sales Acsis Inc. November 8,

RFID Tags and Privacy. Dan Bailey, RSA Laboratories August 26, 2004

IntelliSense RFID Workshop

White paper. ABCs of RFID: Understanding and using radio frequency identification

The Business of RFID Worldwide.

Identification & Traceability Solutions for the Industry

FDA, Counterfeit, and RFID Technology

Lessons from the neighbor's field EPCglobal middleware for supply chains

How to start an RFID project. Anja Olbertz, GS1 Germany Uwe Quiede, TAILORIT GmbH

Key Considerations for an RFID Implementation. Mark Roberti Founder & Editor, RFID Journal

The True Cost of Radio Frequency Identification (RFID)

Introduction Figure 1:

Starting an RFID project

EPC in Action - The GS1 EPCglobal Transport and Logistics RFID Pilot

An overview of EPC technology Frederic Thiesse Institute of Technology Management (ITEM-HSG), University of St Gallen, St Gallen, Switzerland, and

Letter Report: An RFID-enabled Warehouse at DRDC Valcartier

RFID Technology and Its Impact on the Supply Chain

Ref:

Grab More Business Fast with Quick Response Codes

The access control system of the Vatican City State

Digitally Connected RAIN Embedded Solutions for IoT Eric Wood, VP Product Management, Printed Electronics

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of


WHY RFID FOR LIBRARIES

Coil on Module. Packaging innovation for egov documents.

Building Radio frequency IDentification solutions for the Global Environment. BRIDGE Webinar 5 March 2008 WP 12 Training

Radio Frequency Identification (RFID) Technology at Dell Computer Corporation

Chip versus chipless for RFID applications

RFID for Manufacturing: Critical Success Factors.

DESIGN AND REALIZATION OF VEHICLE INTELLIGENT MANAGEMENT SYSTEM

RETAIL ITEM INTELLIGENCE

DEVELOPMENT OF RFID-BASED FLOW EXAMINATION SYSTEM

Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches

IN HEALTHCARE BENEFITS, LIMITATIONS, TIONS, RECOMMENDATIONS. A HIBCC White Paper HEALTH INDUSTRY BUSINESS COMMUNICATION TIONS COUNCIL

Technology Development in Reusable Packaging Systems

Ubiquitous Computing in Business Processes Part II

Passengers Rights Boarding pass using Radio frequency identification

Introducing Smart Shelf

RFID For Libraries. A comparison of High Frequency (HF) and Ultra High Frequency (UHF) Options. Alan Butters WHITE PAPER. Principal Consultant Sybis

UHF-RFID solutions for logistics units management in the food supply chain

Summary. CAEN group overview. CAEN RFID products. Cold Chain Case Histories

The use of AVL integrated with RFID for the transportation of fractioned cargo

Security challenges for RFID key applications

RFID. About Stephanie Handy. Technical Services & Research Librarian Northrop Grumman Electronic Systems. Freelance Editorial Consultant

Development of Non-stop Automated Gate System

Applications of Fast-Moving RFID Tags in High-speed Railway Systems

9/17/12. Learning Objectives. Chapter 8. Supply Network. Your Warehouse? Supply Chain for Apple s iphone. Benefits and Problems with Supply Chains

Airplane parts tracking using RFID in Airports

Comparative Method for Indirect Sensitivity Measurement of UHF RFID Reader with Respect to Interoperability and Conformance Requirements

«Basics of EPC» Student s Handbook

Laboratory Management Based on Internet of Things. Jianming Huang

EMV Terminology Guide

RFIDPlanner A Coverage Planning Tool for RFID Networks

Transcription:

RFID Introduction : Radio Frequency Identification Technology (RFID in short) is the hottest new technology today, with applications ranging from car parking systems to hospitals and supply chain management. Mandates by some large retailers like Wal- Mart and other big and influential organizations like the US DoD have driven the rapid adoption of this technology, by a variety of suppliers. It is estimated that, there are today now about 3 billion RFID tags already produced this year. The number is going to go up exponentially and it is expected that 31 billion tags will be in operation by the beginning of the year 2010. This is one of the few technology areas which will have rapid adoption and usage in almost all businesses, one way or the other. However, rapid adoption of the technology does not mean that it is widely understood. The number of professionals who would be required to know something about this technology, vis a vis the number who actually do, is very small. This is in no small measure due to the multiplicity of vendors who tout their own technology as THE real technology. The lack of standards is another problem. There are standards of course, but their development lags behind the technology, as well as the implementation, causing lots of confusion amongst RFID implementers, as well as users of the technology. The Course : A cursory search on the internet will reveal that most courses on RFID technology are either by vendors (or by their agents, which is the same), are classroom based or web based. The courses are by themselves divided into several different types, with no course big enough to give an overall picture, without being too complicated. To bridge this gap, Abhisam has come out with a comprehensive RFID course, that aims to cover the entire gamut of the technology, right from Basic concepts to Security and Privacy issues related to RFID. The course covers six areas a) Basic Concepts b) RFID Physics c) Practical RFID systems d) Middleware and standards e) RFID applications f) Security & Privacy issues The entire course is designed in an easy to understand manner with text, graphics and animations and without any complicated stuff. At the end, the learner can take a self assessment test (with scoring). A glossary is also included. On top of all this, since the course is CD based, it means that a) the learner retains the CD unlike a web based course b) the learner learns at her own pace, without following any set times c) there is no travel involved with accompanying cost or hassles d) low overall cost of learning, but a richer experience Additionally, since Abhisam is not an RFID vendor, we give you a very generic picture of the technology, without any bias towards any one vendor or standard.

TABLE OF CONTENTS BASIC CONCEPTS 1. Introduction to RFID 2. A modern history of RFID 3. An Attractive technology 4. Automatic Identification 5. Bar Codes-1 6. Bar Codes-2 7. Bar Codes-3 8. Matrix Bar Code 9. Use of Automatic Identification 10. What does a bar code reveal? 11. Do bar codes follow any standards? 12. How is a UPC bar Code made up? 13. What is a tag? 14. Active, Passive & Semi-Passive Tags 15. More RFID tags 16. What does an RFID reader read? 17. How is an RFID tag different from a bar code?-1 18. How is an RFID tag different from a bar code?-2 19. How is an RFID tag different from a bar code?-3 20. RFID systems 21. Some Advantages of RFID over bar codes 22. Bar Code reader for a moving conveyor 23. RFID reader for a moving conveyor 24. Anti Counterfeiting-1 25. Anti Counterfeiting-2 26. Further advantages 27. Disadvantages of RFID 28. Summary of Basic Concepts RFID PHYSICS 1. RFID Physics- Module Outline 2. What are Waves? 3. Development of a wave-1 4. Development of a wave-2 5. Parts of a wave 6. Electricity & Magnetism 7. A practical experiment 8. Amperes law & Biot Savart's Law 9. Maxwell's findings 10. Electromagnetic Waves 11. The Electromagnetic Spectrum 12. An electromagnetic wave 13. A transformer 14. Basic Radio Communication 15. A radio communication system-1 16. A radio communication system-2 17. Antennas 18. Half wave dipole 19. Magnetic & Electric fields around antennas

20. Near field & Far field 21. What is Resonance? 22. A basic radio tuner 23. How does a Radio receiver work? 24. Modulation 25. Frequency Modulation 26. Digital Modulation 27. An example of Digital modulation 28. Amplitude Shift Keying 29. Frequency Shift Keying 30. Data transmission by radio RFID SYSTEMS 1. Practical RFID systems 2. RFID Tags 3. A practical RFID system 4. RFID Tags 5. Physical Construction 6. Smart label tags 7. Plastic encased tags 8. Tag Generations & Classes 9. Classification of RFID systems 10. Tag frequencies 11. Countries & Tag frequencies 12. Countries & Tag frequencies 13. Selection of frequencies 14. RFID Readers 15. RFID Antennas 16. RFID Antennas 17. Near Field & Far field readers 18. Near Field reader 19. Far Field reader 20. Antenna coverage area 21. Electronic Article Surveillance (EAS) 22. Electronic Article Surveillance (EAS) 23. Working of an EAS reader 24. Contactless Smart Cards 25. How do Near Field systems work? 26. Data transfer in Near field systems 27. Data transfer using Load modulation 28. What is backscatter?-1 29. What is backscatter?-2 30. Data transfer using backscatter 31. Collisions 32. Space, Frequency & Time domain anti collision 33. Singulation 34. Tree Walking protocol 35. ALOHA 36. Slotted ALOHA 37. Summary

MIDDLEWARE AND STANDARDS 1. What is Middleware? 2. Need for Middleware-1 3. Need for Middleware-2 4. Need for Middleware-3 5. Functions of Middleware 6. What is a Savant? 7. Middleware Architecture-1 8. Middleware Architecture-2 9. EPCglobal 10. Electronic Product Code 11. What is EPCIS? 12. Object Naming Service 13. What is an EPC tag? 14. How will the system work? 15. Summary 16. Standards in RFID 17. The Air Interface Protocol 18. Standards in RFID 19. Standards laid by ISO 20. Summary RFID APPLICATIONS 1. RFID applications 2. Pharma Supply Chain-1 3. Pharma Supply Chain-2 4. Container tracking in a yard-1 5. Container tracking in a yard-2 6. Hospital patient identification & tracking-1 7. Hospital patient identification & tracking-2 8. Airline baggage handling-1 9. Airline baggage handling-2 10. Airline baggage handling-3 11. Summary of Applications RFID SECURITY & PRIVACY 1. Security Issues in RFID-1 2. Security Issues in RFID-2 3. Security Issues in RFID-3 4. Security Issues in RFID-4 5. Eavesdropping 6. Summary of RFID Security 7. Privacy Issues in RFID 8. Example of Privacy invasion 9. Privacy protection 10. Use of a blocker tag 11. Blocker tag disadvantages 12. Killing Tags 13. Faraday Cage 14. Tracking with RFID 15. Summary of Privacy Issues 16. Conclusion

YOU HAVE SEEN HOW COMPREHENSIVE AND DETAILED THE COURSE IS. ORDERING INFORMATION PRICING $399 US (plus shipping) 1. Please send your orders to mail@abhisam.com.you may directly buy online on our website at www.abhisam.com/rfid.htm 2. Alternatively you may buy from our partners www.bin95.com or www.automation.com CONTACT US : Abhisam Software 8345 NW 66TH ST #9035 MIAMI FL 33166-2626 USA Phone : (407) 965-1387