|
发表于 2007-2-2 12:50:35
|
显示全部楼层
Frequently Asked Questions2
Q: What is the Internet of Things?
A: The Internet of Things refers to a future vision of a network in which
every physical object is identified by an RFID tag and networked together
—hence the Internet of Things. Every item, from the most mundane box
of soap powder to a train, would have a tag that identified it and transmitted
information about it over a network. A related concept is that of
ubiquitous computing (or ubicomp), in which every item has a minute
computer and is continually transmitting information over a computing
network. Japan and Korea, along with the Auto-ID Center at MIT, have
been leaders in espousing this future vision. Korea is working on a controlled
pilot involving the creation of a ubiquitous computing environment
in an entire city.
Q: How do I prevent my backend system from receiving events from an
intruding reader or middleware?
A: Always authenticate the source of the event generator before taking any
action on the backend system.
Q: How do I prevent my backend systems from counterfeit tags?
A: This must be handled on a case-by-case basis. Putting checks in the
backend that a single tag cannot read or if a tag reaches the end of its usefulness
(e.g., a RFID tagged item being checked out from a retail store)
do not acknowledge it again at the backend system.
Q: As an architect, what is the most important thing that I should be concerned
about while designing backend systems?
A: No single RFID event can be considered authentic unless it follows a pattern;
therefore, an event pattern analysis is needed to isolate events of
“interest.” Also, do not assume that every RFID reader will successfully
read the tag. Always think about when to delete the event of interest,
because all meaningful information has an age when it needs to be
removed from an active database. |
|