A Ubiquitous Information Technology Framework Using RFID to Support Students’ Learning J. Wey Chen, Professor Department of Information Management Southern Taiwan University of Technology peterchen@mail.stut.edu.tw Abstract RFID technology promises to change our world. The technology will enable the critical elements of mobility -- business activities, people, information, documents, and communications - to rethink for a more effective business process design. This paper focuses on the application of RFID in school settings and concludes with a ubiquitous IT framework proposal using RFID for educational applications which satisfies the need for a scalable, ready-to-use and easy implementation solution. 1. Introduction RFID stands for radio frequency identification. It is an auto-identification technology which uses radio waves to transmit information. RFID systems generally comprise of three main components, namely: tags, readers, and a data processing system. Like other auto-identification technologies, its underlying purpose is to allow computers to acquire identifying information about physical objects in the real world. 2. RFID school application scenario The RFID market is being driven by several implementation models, promising efficiencies in supply chain management, manufacturing logistics, and asset management and security[5]. Since it was introduced in the early 1990s, the RFID system has enjoyed tremendous growth of approximately a 40% compound annual growth rate (CAGR). Estimates of growth in the world’s RFID industry range from 23% - 35% annually, and the world market for RFID goods and services is projected to be at least $3 billion by 2008 [2]. Although the potential for viable RFID applications appears virtually limitless, security/access control and transportation are still the dominant applications in the RFID market in the current situation [4]. Security/access control, student attendance automation, library applications, parking control, payment systems, and object/personnel tracking can be of greater assistance with the administration and management of schools. 3. A total solution RFID framework The present school information processing situation is characterized by a growing number of applications that require access to various preexisting local data sources located in heterogeneous hardware and software environments. The crucial need for school IT personnel to have ready-to-use solutions that simplify and increase the speed of implementation and the ability to have user-friendly global information sharing environment serves as a foundation for us to design a scalable, hardwareindependent RFID solution. The generic framework, as shown in Figure 1, comprises of the following four layers [1, 3]: Hardware Layer Hardware Integration Layer Middleware Layer Integration Layer 3.1 Hardware layer This layer comprises of the RFID hardware like readers for capturing the data, antennas for providing a better range, tags that hold the RFID data of a product item, and sensors for external data capture. 3.2 Hardware integration layer This layer comprises of the software interfaces needed for interacting with the hardware and passing the data to the middleware layer. This separate integration layer for hardware makes the framework hardware independent. Figure 1. The generic RFID framework 3.3 Middleware layer This layer is the heart of the proposed RFID framework as it receives all the data read from the RFID hardware, validates & extracts intelligence out of the read data, and prepares it for usage in the target enterprise applications. The framework provides scalable and flexible re-usable components for enterprises to implement based on the specific needs. Six major tasks/functions to be performed at the middleware layer are: Event management Business Action Management Task Management and Scheduling Exception Handling Interface Management Authentication & Authorization 3.3.1 Event management Event management provides various reusable functions to validate and log the read data. Data Parsing: The data read by the Reader Adapter is parsed to gather the various data blocks from the RFID card/tag and to interpret the read elements. Data Validation: Cleansing and validating the incoming data is needed so that only valid application specific data is passed and the rest is filtered out. The compliance to EPC is also verified here. Queuing and Logging: An intermediate data structure to hold/queue-in data in memory and then filter out the application specific data by applying business rules. All the application relevant data is logged on to the persistent storage medium for future processing. Functions related to EPC-IS are taken care of here. 3.3.2 Business action management A centralized tool to configure the actions to be performed by the framework on the read data and the order in which it is to be performed. Orchestration of all the actions such as parsing, logging, business rules application, alerts handling in a logical sequence. 3.3.3 Task management and scheduling The application requirement is broken down into various tasks and each task is scheduled for execution. Administrative features for creation and execution of business processes from external systems are provided with a UI support Tasks can be scheduled as one-time or recurring with a specified frequency. 3.3.4 Exception handling The exception handling functionality caters to both systems errors as well as taking action on application alerts: All exceptions are trapped and handled following the standard framework approach. Application alerts management 3.3.5 Interface management Interfaces are built for communicating between different kinds of applications. Typically RFID applications have two kinds of interfaces: Interface that communicates between the RFID reader and the RFID application. This interface should initiate the tag/card connection and communicate/exchange data between the RFID application and the tag/card. Interface responsible to communicate between the RFID application and any other Enterprise application, other RFID applications or with the persistence data storage medium. 3.3.6 Security Authentication: Authentication is the process of verifying the genuineness of an entity. This involves verification of the identification parameters against the same stored in a persistence medium or on dynamic hash algorithms. Authenticating the RFID tag against a set of readers is made possible by matching the key stored for a reader and the tag key. Authorization: Authorization is finding out if the person/item once authenticated is permitted to access the resources that are available. User or System trying to access the resources once authenticated should be checked for the group to which it belongs and what subset of the resources the particular user/system could access. scalable and extensible solutions. Is independent of RFID hardware and the enterprise systems to be integrated. Provides re-usable components for interpreting, logging, and integrating the read RFID data. uitable for Electronic Product Code (EPC) compliance as well as proprietary implementations. Supports distributed deployments of RFID solutions. Provides for scheduling and repeated execution of routine tasks. 5. Conclusion Choosing and using a RFID requires detailed effort, from initial investigation and vendor selection through planning and implementing the conversion to ongoing maintenance and evaluation. As with any new technology, RFID is a risk. If you want to take advantage of this emerging RFID technology to help your school focus more on its educational missions and less on time-consuming tracking and clerical problems, a careful homework and study will make you calculate and recognize the potential risk. Although librarians everywhere are closely watching RFID technology, the lack of standards and best practice guidelines will present a serious issue and challenge for school IT systems. Hence, schools should be among the top entities putting pressure on the government and industry to develop standards, public policy, and best practice guidelines for their use. Research on the actual achievement of the promises of RFID and a more detailed understanding of effective implementation strategies also need to be undertaken. 3.4 Integration layer 6. References The objective of the integration layer is to provide features and options for integrating the RFID middleware components with a variety of backend enterprise applications. The integration layer manages data flow between the various RFID devices and the backend enterprise systems like, inventory management or Supply-chain management. Some of the standard mechanisms applied for integration are asynchronous messaging, Application Connectors and Web services. 4. Advantages of RFID framework The proposed generic application framework has the following characteristics when the school utilizes this system: The Modular and Layered architecture provides [1] Angeles, R. RFID technologies: supply-chain applications and implementation issues, Information System Management, Winter 2005. [2] Bien Perez, Scramble on to supply electronic tagging, South China Morning Post, May 18, 2004. [3] Build an Effective RFID Architecture. available at http://www.rfidjournal.com/article/articleview/781/1/82/ [4] Krebs, D., Michael J. Liard While Paper: Global Markets and Applications for Radio Frequency Identification Venture Development Corporation, 2001. [5] The Bridgefield Group. ERP/Supply chain Glossary, available at http://www.bridgefieldgroup.com/glos8.htm.