摘要:
A system and method that facilitates the configuration and control of components of a radio frequency identification (RFID) system, taking into account how the RFID system components are associated with one or more physical locations within an environment in which the RFID system is deployed. The RFID system can be controlled by obtaining a representation of the physical space. Next, at least one region of interest is specified in the representation of the physical space. An interrogation zone is then specified in the representation of the physical space, in which the interrogation zone corresponds to the data reader. Next, at least one overlap region of the interrogation zone and the region of interest is specified. Information is then stored, including the representation, and the interest region, the interrogation zone, and/or the overlap region. Operation of the data reader is controlled as a function of the stored information.
摘要:
An architecture of an RFID system that facilitates the accessing of RFID tag data within an RFID environment. The architecture includes a plurality of RFID readers, each reader being operative to transmit a first RF signal for scanning at least one RFID tag disposed within an RF coverage region associated with the reader, and to receive at least one second RF signal including tag data in response to the scanning of the tag. The architecture further includes at least one host computer operative to execute at least one client application, and at least one controller/processor communicably coupled to the plurality of readers and the at least one host computer. The controller/processor is operative to control operation of the plurality of readers, to process the tag data received by the plurality of readers, and to provide the processed tag data to the at least one host computer for use by the at least one client application executing thereon.
摘要:
A system and method that facilitates the configuration and control of components of an RFID system, taking into account how the RFID system components are associated with one or more physical locations within an environment in which the RFID system is deployed. A user provides information specifying associations between the system components and the physical locations within the environment to obtain visual representations of configuration data generated therefrom with reference to a facility view, an RF coverage view, and a location view of the data. The facility view serves as a reference plane for placement and orientation of antennas associated with RFID readers, location benchmark tags, and the physical locations of interest. After each antenna is placed and oriented on the facility view, an estimate of the size and shape of the RF interrogation zone of each antenna is computed, and representations of the RF interrogation zones are provided on the facility view to obtain the RF coverage view of the data. Next, the user provides information specifying the physical locations of interest to obtain the location view of the data. A composite of the facility view, the coverage view, and the location view is then generated to obtain an enhanced visual understanding of how the system components and the physical locations exist within the system environment, and how the components and locations are associated with one another.
摘要:
A system and method of scheduling RFID tag interrogations by a plurality of RFID readers so as to mitigate the effects of interference within an RFID environment in which the readers are deployed, and to enhance the efficiency and reliability of the overall RFID system. The system includes a plurality of RFID receivers for receiving RFID tag data, a plurality of RFID tag interrogators for transmitting RF interrogation signals for interrogating RFID tags, and a controller for providing to at least one interrogator, at least one receiver, and at least one tag, a parameter associated with operational characteristics of the interrogator, the receiver, and the tag, respectively. The interrogator, the receiver, and the tag are operative, in response to receipt of the respective parameter, to modify its operational characteristics in accordance with the respective parameter, thereby avoiding interference at the receivers and the tags.
摘要:
A system and method for monitoring and characterizing various sources of RF interference within an RFID environment, and for adjusting the operational characteristics of an array of RFID readers within the system based on these interference characterizations. The system examines the received transmissions from readers in the network by controlling a calibration cycle or while they are operating as interrogators to determine interference parameters, and to verify the operation of the readers in the array. The system also examines outside sources of interference, and signal dependent interference. The interference characterization can also be estimated from a combination of calculations and co-monitoring.
摘要:
A system and method of determining locations of one or more RFID tags within an RFID environment. The system includes a plurality of RFID readers, each operative to transmit and receive RF signals for scanning a tag disposed within an RF coverage region associated with the reader, and for receiving tag data in response to the scanning of the tag. A plurality of sub-locations is determined within the environment, each corresponding to at least a portion of at least one of a plurality of RF coverage regions associated with the readers. The sub-locations are mapped to a plurality of predefined locations within the environment. A reader scans a tag, and receives tag scan data from the tag in response to the scanning of the tag. The tag scan data includes a tag identifier associated with the scanned tag. The tag scan data is mapped to the sub-locations based on the RF coverage region associated with the reader. The location of the scanned tag is then determined with reference to the predefined locations within the environment, based on the tag identifier included in the tag scan data, the mapping of the tag scan data to the sub-locations, and the mapping of the sub-locations to the predefined locations.
摘要:
An apparatus and method for selecting improved routing paths in an emulated LAN over an ATM network is disclosed. Such an apparatus and method are realized by having an editor associated with a distributed LAN emulation server selectively modify Routing Information Protocol (RIP) update messages according to information retrieved from an associated routing table. More particularly, the editor modifies RIP update messages so that they will more accurately reflect the position of the network router that broadcast the RIP update message, relative to the position of a network router associated with the distributed LAN emulation server, with respect to any given destination network.
摘要:
An integrated circuit (203) for use in processing streams of data generally and streams of packets in particular. The integrated circuit (203) includes a number of packet processors (307, 313, 303), a table look up engine (301), a queue management engine (305) and a buffer management engine (315). The packet processors (307, 313, 303) include a receive processor (421), a transmit processor (427) and a risc core processor (401), all of which are programmable. The receive processor (421) and the core processor (401) cooperate to receive and route packets being received and the core processor (401) and the transmit processor (427) cooperate to transmit packets. Routing is done by using information from the table look up engine (301) to determine a queue (215) in the queue management engine (305) which is to receive a descriptor (217) describing the received packet's payload.
摘要:
A method and apparatus are disclosed which permit multipoint trunking among a plurality of network devices connected by a trunk comprising at least two physical links. A trunk control message protocol (TCMP) is described which assures that message traffic may be delivered to the respective devices over the individual links of the trunk prior to inclusion of the respective links as active links in the trunk. The trunk acts as a single network port for each of the devices utilizing the trunk and is layered over a plurality of media access control (MAC) ports which interface to the respective links. The disclosed trunking technique and apparatus permit the bandwidth of the trunk to be increased in increments through the addition of links to the trunk.
摘要:
A live insertion and removal mechanism assures that a sub-assembly being inserted or removed from a live electronic assembly does not disrupt system power and buses and is protected against the negative affects of current surge. An active current control device and related circuitry, and a connector having a plurality of graduated pin lengths effect a controlled ramp-up and ramp-down of power to the sub-assembly inserted into and removed from the live electronic assembly. Additionally, means are provided for effectively disconnecting selected output drivers from signal and control paths to avoid damage to the drivers upon insertion or removal of the sub-assembly from the live assembly.