At every turn, networks must handle additional traffic from new sources. One of the latest and soon-to-rise sources of increased network traffic arises from the implementation of radio frequency identification , which is being used for needs such as supply-chain management, tracking airport baggage and prescription medication shipments. These examples alone suggest a growing volume of TCP/IP network traffic and data.While conventional RFID readers were essentially data radios, today’s enterprise-grade RFID tag readers – created specifically for electronic product code (EPC) usage – have been designed to be full-fledged network devices that can support mission-critical operations. In addition to managing a dynamic population of tags, then routing data into networks, databases and business applications, these RFID readers have to speak TCP/IP natively and fully support standard network technologies such as DHCP, User Datagram Protocol (UDP)/IP over Ethernet, 802.11x, HTTP, SNMP and remote upgrades.This design lets RFID be widely deployed in an economical, scalable, secure and manageable manner on WANs and LANs, even with the two-way demands of RFID data for networks and changes to RFID tags emanating from within the network. Driven by speedy network processors and advanced software, RFID readers provide the same load balancing, QoS and security found in high-end IP routers. A tag reader will facilitate advanced applications by acting as a gateway between an IP network and tags that provide read-write data storage, on-board sensors and other features. The network gateway functionality of RFID readers becomes even more critical in light of the channel-sharing, data-exchange and air-interface protocols required to accommodate two-way TCP/IP traffic. Before exchanging information with a tag, a networked reader searches for and retrieves the ID of each tag in its read zone. This discovery process produces a list of IDs, which then must be made available to an external software system such as a warehouse management system that resides on a remote networked server.When the warehouse management system wishes to read, write and update data on the tag, it routes the updated data back to the tag via the reader through which the tag was orignally read. This is analogous to an IP routing procedure in which a reader forwards an encapsulated data packet to a specific tag. The scenario is clearer in the case of sensor or actuator tags, which typically contain a miniature battery and are used for applications such as time-temperature monitoring of perishable goods in the supply chain.First, the same networked discovery process applies in the case of sensor tags. Then, bidirectional communication occurs between the tag and software residing on a networked server. In some cases, such as time-critical movement of tagged packages on a conveyor belt, the reader might be given authority to act quickly on a networked server’s behalf. This can be accomplished by running specialized software on the reader, or by implementing and populating a policy-based decision-making mechanism, mimicking those employed by high-end IP routers.The new RFID readers are designed to provide the functionality of a gateway for large networks. RF interfaces to the tags reside on one side of a reader, with a database server and a TCP/IP network interface on the other side, fully equipped to be part of a networked-distributed data aggregation and analysis system.Wasserman is vice president of development for ThingMagic, serves on the IETF Steering Group and is a member of the Board of Trustees of the Internet Society. She can be reached at margaret@thingmagic.com. Related content feature What is a network router? How AI networking driving its evolution Network technology has evolved, especially since the arrival of artificial intelligence (AI), and the role and the value of the router has grown significantly, By Keith Shaw and Dan Muse Aug 13, 2024 8 mins Routers Virtualization WAN analysis BGP: What is border gateway protocol, and how does it work? BGP is how the autonomous networks that make up the internet share routing information to find the best route for IP traffic. CISA describes BGP as 'the most important part of the internet you’ve probably never heard of.' By Keith Shaw May 17, 2024 11 mins Routers Internet Network Security news analysis Cisco buys Internet BGP monitoring firm Code BGP Cisco ThousandEyes gains Code BGP’s real-time detection of BGP hijacking, route leaks and other BGP performance and security issues. By Michael Cooney Aug 01, 2023 3 mins Routers Cisco Systems Internet news analysis Extreme moves cloud-based network management to the edge New releases include the ExtremeCloud Edge cloud management system, a power-efficient Wi-Fi 6E access point, and additions to Extreme’s Universal Switch series. By Michael Cooney May 10, 2023 3 mins Routers Network Switches Network Management Software PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe