JMX administration of RFID edge server

ABSTRACT

An RFID edge server using an application server allows for improvements in an RFID system.

CLAIM OF PRIORITY

This application claims priority to U.S. Provisional Application Ser.No. 60/710,243 entitled “RFID Edge Server” by Ashok Banjerjee, filedAug. 22, 2005 [Attorney Docket No. BEAS-01818U.S.0].

BACKGROUND OF INVENTION

The present invention relates to Radio Frequency Identification (RFID)technology. Radio Frequency Identification technology is becoming moreand more important, especially to manage supply chains.

Radio Frequency Identification technology can allow for the tracking ofobjects using RFID tags and RFID readers. RFID readers can interrogatethe RFID tags using radio waves. The RFID tag typically includes anantenna and a microchip that stores a response code. The majority ofRFID tags use a silicon microchip to store a unique serial number, suchas an electronic product code (EPC), and usually some additionalinformation. The reader can pass the response code to a computer systemto track the objects.

There are two main categories of RFID systems, passive and activesystems. Passive RFID tags do not have a transmitter but simply reflectback energy to the reader. Active tags have their own transmitter andpower source, such as a battery. Active RFID systems are typically usedfor a tracking large items since the active RFID tags are relativelyexpensive.

Because passive RFID tags do not use a power source and transmitter,they tend to be cheaper than the active RFID tags. Retailers andmanufacturers are adding the passive tags to items in the supply chain.RFID systems can significantly reduce the cost of managing inventory.

Passive RFID tags allow for the possibility of tracking of cartons ofmaterials as they enter and exit entry points of a warehouses andstores. As the passive RFID tags become cheaper, ultimately individualpackages can have their own RFID tags and thus the inventory can betracked very precisely. Additionally, since the RFID technology does notrely on line-of-sight operation, a shopping cart full of goods with RFIDtags can be scanned without requiring the goods to be removed from thecart.

In one embodiment, RFID tags can be used to implement an electronicproduct code (EPC). The EPC is a unique number used to identify specificobjects in the supply chain. EPC information services (EPCIS) can enableusers to exchange EPC related data with trading partners throughout theEPC network.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of an RFID system of one embodiment.

FIG. 2 is a diagram of an RFID edge server using non blocking 10 forreading RFID reader data.

FIG. 3 is a diagram illustrating the use of message filtering and eventboxcarring at the RFID edge server.

FIG. 4 is a diagram that illustrates the use of an archive to store andcreate a deployable unit of the RFID edge server itself to be deployedas an application and allow it to be quickly deployed into a standardweb server.

FIG. 5 is a diagram that illustrates an EPCIS server applicationarchive, which allows the EPCIS server application to be deployed in astandards compliant way quickly into a standard J2EE Application Server.

FIG. 6 is a diagram that illustrates the store and forward of messagesfrom the RFID edge server to a notification recipient.

FIG. 7 is a diagram that illustrates JMX administration at a RFID edgeserver.

FIG. 8 is a diagram that illustrates the use of in-process Javaconnector to connect the RFID edge server to legacy/3^(rd) partysoftware.

FIG. 9 is a diagram that illustrates an exemplary system of oneembodiment.

FIG. 10 is a diagram that illustrates an ALE processing engine.

FIG. 11 is a diagram that illustrates the EPC commissioning process.

FIG. 12 is a diagram that illustrates reader connectivity.

DETAILED DESCRIPTION

FIG. 1 illustrates a RFID system 100. RFID readers 102 and 104 can beused to interrogate RFID tags 106, 108 and 110. Data from the RFID tags,such as EPC codes, can be read by the RFID reader and provided to anRFID edge server 112. Typically, the RFID readers 102 and 104 areconstantly interrogating for responses from the RFID tags 106, 108 and110. The RFID edge server 112 can thus receive a large number ofduplicative responses. RFID edge server 112 can send event reports tothe central server 114. The central server 114 can include a EPCISserver 116 and enterprise application integration software 120.

The RFID edge server can be used to provide RFID reader management,filtering, commissioning, and connectivity. As disclosed below, in oneembodiment the RFID edge server 102 can include application server, suchas a J2EE application server. J2EE applications servers can run J2EEapplications. J2EE applications can be made up of components. A J2EEcomponent can be a self-contained functional software unit that isassembled into a J2EE application with its related classes and files andthat communicates with other components. The J2EE specification definesthe following J2EE components:

-   -   Application clients and applets are components that run on the        client.    -   Java Servlet and JavaServer Pages™ (JSP™) technology components        are web components that run on the server.    -   Enterprise JavaBeans™ (EJB™) components (enterprise beans) are        business components that run on the server.

J2EE components can be written in the Java programming language and canbe compiled in the same way as any program in the language. In oneembodiment, The difference between J2EE components and “standard” Javaclasses is that J2EE components are assembled into a J2EE application,are verified to be well formed and in compliance with the J2EEspecification, and are deployed to production, where they are run andmanaged by the J2EE server.

In one embodiment, the application server is the WebLogic Server™available from BEA Systems, Inc., of San Jose, Calif.

The application server can run a RFID edge server infrastructure itselfas a J2EE application. RFID edge server application can include J2EEcomponents and be packaged in an archive file such as a (Java Archive)JAR file or a Web Archive (WAR) file

The use of an application server at the RFID edge server can provide anumber of advantages. The application server components can include:

-   -   Java Messaging Server (JMS) to provide guaranteed message        delivery and once message processing    -   Security to prevent unauthorized access. The security module can        be able to plug into 3^(rd) party software and can utilize the        secured socket layer (SSL) protocol.    -   Administration to manage the RFID edge server. Administration        can include JMX administration and can be able to aggregate        views and configure the RFID edge server.    -   Web services to receive and respond to web service requests.

The RFID edge server can provide for RFID data filtering and businessrules. The RFID edge server can work with a variety of RFID readers.Applications can interact with an RFID edge server through anApplication-Level Events (ALE) interface. ALE can provide a way fordevelopers to define high-level events that are needed by specificcustomer enterprise applications. Enterprise applications receiveincoming data in formats designed for easy integration and can obtainRFID data without requiring programmers to interact directly with RFIDreaders or to perform any low-level real-time processing or scheduling.

FIG. 10 illustrates an ALE processing engine that can be run at anapplication server at an RFID edge server. FIG. 10 also shows common ALEfilters.

Application-Level Events (ALE) defines an interface through which anapplication could indicate exactly what information it wants from theraw stream of RFID reads. Through ALE, an application can specify anumber of things:

-   -   Which locations it wants to read from    -   What interval of time to accumulate data    -   How to filter the data    -   How to group the results    -   Whether to report currently visible tags or just additions or        deletions    -   Whether to report actual EPCs or just a count of the tags that        are read.

A request of this kind may be made in an on-demand mode, where the readsare performed in response to an application request, or as a standingrequest, where data is sent to the application periodically withoutfurther request.

An RFID application can make a high-level request for data through theALE interface, and the hardware or software on the other side of the ALEinterface fulfills the request. ALE shields applications from low-levelimplementation detail.

Another benefit for end users is that ALE facilitates sharing RFID dataamong many applications simultaneously. Different applications may makerequests through the ALE interface, without requiring those applicationsto have knowledge of each other. If two applications request data fromthe same reader, the implementation of ALE mediates those requests andmakes sure that each application receives the data it needs. Using ALEeach RFID can interact with a number of applications rather than be justa dedicated peripheral for a specific application.

The EPC Information Service (EPCIS) is a specification for a standardinterface for accessing EPC-related information. Because an ElectronicProduct Code (EPC) gives each object a unique serial number, eachindividual object can be tracked independently and fine-grainedreal-time information about each individual object can be collected,stored and acted upon. EPC Information Services are a way for supplychain partners to share and exchange information efficiently, because astandard interface allows trading partners to use the same functions ormethods for querying data across the supply chain, leading to reducedtimes integrating with partners if everyone uses the same interface,even though they may store the information in different types ofunderlying databases.

EPC Information Service is a technical specification for a datacommunication interface. EPC Information Services are designed tosupport both on-demand polling access and a ‘push’ model supportingstanding queries. Depending on how the security for each individualEPCIS implementation is configured, you might be granted the right todefine your own standing queries—or you might only have the option of‘subscribing’ to an existing query which was pre-defined by the owner orprovider of a particular EPCIS service. EPC-related Data can include:

-   -   1. timestamped event data collected throughout the lifecycle of        an object e.g. Observations (low-level tag readings),        Measurements (sensor data, e.g. temperature history),        Containment History, Higher-level Location History, Associations        with Business Transactions.    -   2. quasi-static attributed data defined at serial-level but not        continuously updated e.g. Date of Manufacture, Date of Expiry,        Custom Configuration etc.

The EPC Information Service lies at the top layer of the EPC Networktechnology stack. EPCIS can allow business logic to be mixed with read‘events’ coming from RFID readers. The layers underneath EPCIS (e.g.Filtering & Collection [ALE], Reader Protocol etc.) can be primarilyconcerned with simple triples of data (Reader, Tag EPC, timestamp).EPCIS allows for higher-level meanings to be stored or accessed,involving business processes and business transactions.

The EPC Information Service Specification can specify the standardinterfaces for:

-   -   Query (getting data from an EPCIS)    -   Capture (putting data into an EPCIS)

The EPCIS interface can be implemented as an EPCIS server. In terms ofimplementing an EPC Information Service, you can choose to either hostyour own EPCIS interface coupled to your existing databases for seriallevel data or subscribe to a technology solution provider hosting amanaged EPCIS service.

Trading partners may be able to find an EPCIS by using the Object NameService (ONS), doing a lookup based on the EPC of your products.Serial-level pointers can also be stored securely within registriescalled Discovery Services. Discovery Service registries can be updatedby each custodian on handover, with serial-level EPC lookup.

FIG. 11 shows an example of EPCIS commissioning as a J2EE applicationthat can run on an application server at an application server at anEPCIS server. Alternately, some of the EPCIS functions can be run at anapplication server at an RFID edge server.

FIG. 2 illustrates an example of a system 200 in which the RFID edgeserver 202 includes an application server 204 running an RFID edgeserver application 206. The RFID edge server application 206 can bewritten in a language such as Java. In one embodiment, the RFID edgeserver application 206 is written in Java, and the application server204 is J2EE compliant.

The RFID edge server 202 can have a TCP/IP socket for each of the RFIDreaders, or each active RFID readers. One way of connecting the RFIDedge server 202 with the RFID readers 208, 210 and 212 is to have adedicated thread for monitoring each socket. In one embodiment, thenumber of RFID readers, n, can be quite large. It is feasible for largewarehouses to have over a hundred RFID readers. For this reason, theRFID edge server 202 can be input/output (I/O) constrained. Each of theaccess threads needs to access a CPU and other Operating SystemResources which require a certain amount of setup for each accessthread. The switching between a large number of threads can limit thenumber of RFID readers that can be associated with an RFID edge server.

As shown in FIG. 2, in one embodiment, the RFID edge server 202 isassociated with multiple RFID readers 208, 210 and 212. RFID edge server202 can include an application server 204 to run applications, such asthe RFID edge server application 206. The RFID edge server 202 can haveTPC/IP socket connections 216, 218 and 220 with multiple RFID readers208, 210 and 212. The RFID edge server 202 can have fewer access threads214 for the RFID readers than there are socket connections.

Each data access thread can be used to service multiple sockets. In oneembodiment, at least some of the access threads 214 are written in anon-Java language. For example, the access thread 214 can be written incode that is native to the machine.

The operating system for the machine running the application server 204can be such that it will provide TPC/IP socket information to accessthread 214 which can then be provided to the application server 204 foruse by the RFID edge server application 206. Alternately, the operationfor the machine can allow the application server 204 to obtain the lowlevel control of the TPC/IP sockets using the access thread 214.

In one embodiment, the RFID readers 208, 210 and 214 are connected tothe RFID edge server 202 through the local network 222. The TPC/IPprotocol can be used for interconnecting between the RFID edge server202 and RFID readers 208, 210 and 212.

In one embodiment, the system can use sockets which are serviced bymultiplexed reader/accessor threads. Muxer sockets can supportasynchronous network I/O for the upper protocol layers via a completionbased contract. In one embodiment, Protocol layers can implementMuxableSocket as a completion callback and register it with the muxers(via SocketMuxer.register). It can then issue asynchronous read requeststo the muxers (via SocketMuxer.read). Under the covers, muxers canperform the network input operations either asynchronously (for OS whichsupports asynchronous I/O, e.g. I/O completion port on Win2K), or in anon-blocking fashion (for OS which supports non-blocking I/O, e.g.select/poll on Unix platforms, or the JDK 1.4 non-blocking I/O API,which is modeled closely after the select API), or synchronously withpolling. To avoid undue copying, data can be read into protocol layers'buffer directly). When the read operation is completed, the muxer cannotify the protocol layer via the completion callback(MuxableSocket.dispatch). In the event of any network errors or end offile or timeout reached for the socket, the muxer can notify theprotocol layer via an error handler(MuxableSocket.hasException/endOfStream).

In one embodiment the number of access threads used is fixed. The numberof or, default number of, access threads can be proportional to thenumber of CPUs of the machine running the RFID edge server. In oneexemplary embodiment, there are two access threads per CPU to access thesockets of the RFID readers.

FIG. 3 illustrates a RFID edge server 302 used to associate withmultiple RFID readers 304, 306 and 308 at a location. The RFID edgeserver 302 can include an application server 310 which can be adapted tofilter communications from the readers 304, 306 and 308 and to boxcarevent reports 312 to a central server 314.

In one embodiment, the RFID edge server 302 can have a RFID edge serverapplication running 316 which can include message filtering 318 andboxcar code 320. In one embodiment, messages are received by the RFIDedge server. The RFID edge server application 316 can filter awayduplicate or otherwise unnecessary reports. In one embodiment, thereports can be boxcarred, that is multiple event reports can be combinedtogether into a single message from the RFID edge server 302 to thecentral server 314. This can reduce the amount of traffic between theRFID edge server 302 and the central server 314, and thus increase thenumber of RFID edge servers that can interact with the central server314. The boxcarred reports can include data from messages provided bythe RFID readers 304, 306 and 308. The central server 314 can unboxcarthe messages. A boxcarring protocol at the RFID edge servers and at thecentral servers that ensures the correct boxcarring and unboxcarring ofthe messages.

One embodiment of the present invention is a method wherein at the RFIDedge server 302, messages are received from RFID readers 304, 306 and308. The messages are filtered at the RFID edge server 302. Eventreports can be boxcarred, which can include the data from the messagesand sent to the central server 314.

A computer readable media including code adapted to do the above methodcan also be used. This code can be part of the RFID edge serverapplication 316 running on the application server 312 of the RFID edgeserver 302.

An RFID edge server 402 can be associated with multiple RFID readers404, 406 and 408. The RFID edge server 402 can include an applicationserver 410 adapted to receive an RFID software package as an archivefile 412. The application server 410 can open an archive file 412 toinstall the RFID software 414 into the application server 410. In oneembodiment, the archive file is a J2EE standard archive file, such as aJAR file (Java Archive).

The Java™ Archive (JAR) file format can enable the bundling of multiplefiles into a single archive file. Typically, a JAR file will contain theclass files and auxiliary resources associated with applets andapplications. The JAR file format can provide many benefits:

-   -   Security: The contents of a JAR file can be signed. Users who        recognize your signature can then optionally grant your software        security privileges it wouldn't otherwise have.    -   Decreased download time: If an applet is bundled in a JAR file,        the applet's class files and associated resources can be        downloaded to a browser in a single HTTP transaction without the        need for opening a new connection for each file.    -   Compression: The JAR format allows you to compress your files        for efficient storage.    -   Packaging for extensions: The extensions framework provides a        means by which you can add functionality to the Java core        platform, and the JAR file format defines the packaging for        extensions.    -   Package Sealing: Packages stored in JAR files can be optionally        sealed so that the package can enforce version consistency.        Sealing a package within a JAR file means that all classes        defined in that package must be found in the same JAR file.    -   Package Versioning: A JAR file can hold data about the files it        contains, such as vendor and version information.    -   Portability: The mechanism for handling JAR files is a standard        part of the Java platform's core API.

The RFID edge server application archive 412 can be provided from awebsite which can be downloaded into the application server 410 of theRFID edge server 402. The archive file can include large number of otherfiles, such as classes and binaries needed to run an RFID edge serverapplication. The RFID edge server archive 412 can make it easier toobtain and maintain the RFID software 414.

One embodiment of the present invention is a method wherein at the RFIDedge server 402, RFID software packaged in an archive file 412 isreceived. At the RFID edge server 402, the archive file can be opened toinstall the RFID software 414 into the application server 410. Acomputer readable medium implementing this method can also be used.

FIG. 5 illustrates an example in which EPCIS server 502 includes anapplication server 504 set up to receive an EPCIS software package as anarchive file 506 and to open archive file to install the EPCIS software508 into the application server 504. The EPCIS archive file can be astandard archive file such as a JAR file. The use of an EPCIS serverapplication archive 506 can make it easier to obtain and maintain theEPCIS software 508.

On embodiment of the present invention is a method including at an EPCISserver 502, receiving EPCIS software packaged into an archive file 506,and opening the archive file 506 to install the EPCIS software 508 intothe application server 504. Additionally, the present invention cancomprise a computer readable medium including code adapted to do thesteps of the method.

FIG. 6 illustrates an example of an RFID edge server 602 is associatedwith a multiple RFID readers 604, 606 and 608. The RFID edge server 602can include an application server 610 adapted to do store-and-forwardmessaging to a central server 612. A store-and-forward messaging unitcan maintain copies of messages sent to the central server 216 untilconformation of the messages is received from the central server 612

Additionally, store and forward messaging can operate in as part of atransaction in which case the message is stored after forwarding untilany transaction including the message completes. In one embodiment, thetransactional messaging uses a two-phase commit, such as with XAmessaging, to ensure that either all updates are done or all the updatesare rolled back.

In one embodiment, store and forward messaging is implemented using aJMS server 614. In one embodiment, the JMS server operates in atransactional manner and transactions involving the messages can berolledback.

The Java Message Service is a Java API that allows applications tocreate, send, receive, and read messages. The JMS API defines a commonset of interfaces and associated semantics that allow programs writtenin the Java programming language to communicate with other messagingimplementations.

The JMS API enables communication that is not only loosely coupled butalso

-   -   Asynchronous. A JMS provider can deliver messages to a client as        they arrive; a client does not have to request messages in order        to receive them.    -   Reliable. The JMS API can ensure that a message is delivered        once and only once. Lower levels of reliability are available        for applications that can afford to miss messages or to receive        duplicate messages.

In one embodiment, a message, such as message A, is sent to the centralserver 216 and the RFID edge server 602 maintains a copy of message Auntil an acknowledgment from the central server 216, or a determinationthat a transaction including the Message A is completed.

In one embodiment of the present invention a method wherein a RFID edgeserver 602 receives data from multiple RFED readers 604, 606 and 608. Atthe RFID reader 602, store and forwarding of messages including at leastsome of the data is done to the central server 612. A computer readablemedium implementing such a method can be used.

FIG. 7 illustrates an RFID edge server application server 702 associatewith multiple RFID readers 704, 706 and 708. The RFID edge server 702can include an application server which is adapted to use JMXadministration 712, or some other J2EE standards-based administration.

The JMX administration 712 can be used to manage resources related tothe RFID edge server. Java Management Extensions (JMX) can use managedbeans, or MBeans. An MBean is a managed Java object, similar to aJavaBean™, that follows the design patterns set forth in theinstrumentation level of the JMX specification. An MBean can represent adevice, an application, or any resource that needs to be managed. MBeansexpose a management interface: a set of readable and/or writableattributes and a set of invokable operations, along with aself-description. The management interface does not change throughoutthe life of an MBean instance. MBeans can also emit notifications whencertain defined events occur.

The JMX administration 712 can use MBeans to set configuration for theRFID edge server. An administration server at the RFID edge server 702can be used to set the configuration of the RFID edge server. Theadministration server can be run on the application server. Anadministration console can be used to manage the RFID edge server 702.The administration console can include a graphical interface fordetermining and setting the state and configuration of the RFID edgeserver.

The RFID edge server of claim 1, wherein the JMX administration can beused to manage the connections with the multiple RFID readers. The JMXadministration can be used to manage the RFID edge server remotely.

FIG. 8 shows one embodiment of the present invention which an RFID edgeserver 802 is used to associate with multiple RFID readers 804, 806 and808. RFID edge server 802 includes an application server 810 using aJava connector 812. The Java connector can be used to communicate withERP software 814.

The J2EE Connector (Java connector) architecture defines a standardarchitecture for connecting the J2EE platform to heterogeneous(Enterprise Information Systems) EIS systems. Examples of EIS systemsinclude ERP, mainframe transaction processing, database systems, andlegacy applications not written in the Java programming language. TheJ2EE Connector (Java connector) architecture defines a set of scalable,secure, and transactional mechanisms to enable the integration of EISswith application servers and enterprise applications.

The J2EE Connector architecture enables an EIS vendor to provide astandard resource adapter for its EIS. The resource adapter plugs intoan application server, providing connectivity between the EIS, theapplication server, and the enterprise application. An EIS vendor needsto provide just one standard resource adapter which has the capabilityto plug in to any application server that supports the J2EE Connectorarchitecture.

Multiple resource adapters (that is, one resource adapter per type ofEIS) are pluggable into an application server. This capability enablesapplication components deployed on the application server to access theunderlying EIS systems.

The Java connector 812 can connect to ERP software at another location.RFID edge server also communicates with an EPCIS server.

Device management functions of the RFID edge server can include HealthMonitoring & Diagnostics, Fault Management, Tag Activity Monitoring,Performance Analysis, Analytics to determine underperforming components,Maintenance & Upgrades, Version Control, Firmware & Software upgrades,Provisioning & Configuration, and Web based configuration.

FIG. 9 shows an exemplary system of one embodiment. An applicationserver at a distribution center can run application(s) including an ALEdefinition interface, A device management GUI and workflows to convertALE events to EPCIS specific events that can be published to an EPCISrepository. A data center can include integration software to integratewith ERP software and provide data to web sites which can use a portalproduct.

FIG. 12 illustrates the use of reader connectivity software that can berun at an application server at an RFID edge server. A number ofdifferent reader protocols can be supported which can allow a singleRFID edge server interact with multiple different types of RFID readers.

The use of the systems of the present invention can have a number ofadvantages.

1) Scalability—RFID systems can have hundreds of RFID readers eachreading data hundreds of times a second. This can cause CPU utilization,network bandwidth, and/or data repository constraints. A number offeatures can help this problem including: Thread Multiplexing,“Non-blocking” IO, Eliminating duplicates through ALE, “Boxcarring”packets and Handling data storage at the Enterprise ApplicationIntegration (EAI) layer.

2) Availability—Availability of the system can be improved by reducingdependency on the database at the edge and ensuring availability ofintegration/server layer. In one embodiment, a file system and not adatabase is used at the RFID edge server. A database can be used at anintegration layer, such as at a central server. Load balancers can beused as well as high-availability messaging through clustered JMSservers. A clustered database can be used to back” theintegration/server layer.

3) Security—Administration should be secure to prevent readers frombeing turned off and items being stolen. The administrative interfacecan be protected by authentication, authorization, audit, andpotentially over SSL (Secure Socket Layer). This SSL “handshake” can bevery CPU intensive. Alternately, the entire stack (reader/edge/server)can be wrapped in a firewall to enable perimeter authorization. The RFIDsystem security can be plugable to 3^(rd) party security providers.

4) Interoperability—Interoperability can include interoperability withpackaged applications and with readers, Support for standards-based JCAAdapters. Reader abstraction layer at the edge that readily facilitatesdevice drivers additions and updates.

5) Integration Layer—The Global view is difficult to support due todifferent readers and “edge-server” formats. Complex event compositionis costly and not suitable at CPU intensive edge (transformation andduplicate elimination). The RFID edge-server need not be designed tointegrate with other components of an integrated software platform. Aunifying EAI layer can be used to compose and correlate events fromdifferent sets of RFID infrastructure. Clustered integration servers canbe used to absorb the load of complex event composition. The EAI productcan be fully integrated with Business Process Management (BPM) andPortal.

6) Administration—Different administration consoles from differentcomponents can prevent a centralized administration. RFID components canintegrate with existing management vendors (HP Openview, Tivoli) and cansupport protocols like SNMP & JMX.

7) Messaging—Once RFID becomes mission critical there can be a need toensure messages are sent once and only once. The JMX embodiment cansupport “exactly once” semantics. Transaction can guarantee on messageenqueue & dequeue. The RFID edge server can provide asynchronous JMSsupport.

One embodiment may be implemented using a conventional general purposeor a specialized digital computer or microprocessor(s) programmedaccording to the teachings of the present disclosure, as will beapparent to those skilled in the computer art. Appropriate softwarecoding can readily be prepared by skilled programmers based on theteachings of the present disclosure, as will be apparent to thoseskilled in the software art. The invention may also be implemented bythe preparation of integrated circuits or by interconnecting anappropriate network of conventional component circuits, as will bereadily apparent to those skilled in the art.

One embodiment includes a computer program product which is a storagemedium (media) having instructions stored thereon/in which can be usedto program a computer to perform any of the features presented herein.The storage medium can include, but is not limited to, any type of diskincluding floppy disks, optical discs, DVD, CD-ROMs, micro drive, andmagneto-optical disks, ROMs, Rams, EPROM's, EPROM's, Drams, Rams, flashmemory devices, magnetic or optical cards, Nano systems (includingmolecular memory ICs), or any type of media or device suitable forstoring instructions and/or data.

Stored on any one of the computer readable medium (media), the presentinvention includes software for controlling both the hardware of thegeneral purpose/specialized computer or microprocessor, and for enablingthe computer or microprocessor to interact with a human user or othermechanism utilizing the results of the present invention. Such softwaremay include, but is not limited to, device drivers, operating systems,execution environments/containers, and user applications.

The foregoing description of preferred embodiments of the presentinvention has been provided for the purposes of illustration anddescription. It is not intended to be exhaustive or to limit theinvention to the precise forms disclosed. Many modifications andvariations will be apparent to one of ordinary skill in the relevantarts. For example, steps performed in the embodiments of the inventiondisclosed can be performed in alternate orders, certain steps can beomitted, and additional steps can be added. The embodiments were chosenand described in order to best explain the principles of the inventionand its practical application, thereby enabling others skilled in theart to understand the invention for various embodiments and with variousmodifications that are suited to the particular use contemplated. It isintended that the scope of the invention be defined by the claims andtheir equivalents.

1. An RFID edge server to associate with multiple RFID readers at alocation, the RFID edge server including an application server which isadapted to use JMX administration.
 2. The RFID edge server of claim 1,wherein the JMX administration can be used to manage resources relatedto the RFID edge server.
 3. The RFID edge server of claim 1, wherein theJMX administration uses MBeans to set configuration for the RFID edgeserver.
 4. The RFID edge server of claim 1, wherein an administrationserver at the RFID edge server can be used to set the configuration ofthe RFID edge server.
 5. The RFID edge server of claim 4, wherein anadministration console can be used to manage the RFID edge server. 6.The RFID edge server of claim 1, wherein the JMX administration can beused to manage the connections with the multiple RFID readers.
 7. TheRFID edge server of claim 1, wherein the JMX administration can be usedto manage the RFID edge server remotely.
 8. A method comprising: at anRFID edge server, associating the RFID edge server with multiple RFIDreaders; and administering the RFID edge server using JMXadministration.
 9. The method of claim 8, wherein the JMX administrationcan be used to manage resources related to the RFID edge server.
 10. Themethod of claim 8, wherein the JMX administration uses MBeans to setconfiguration for the RFID edge server.
 11. The method of claim 8,wherein an administration server at the RFID edge server can be used toset the configuration of the RFID edge server.
 12. The method of claim11, wherein an administration console can be used to manage the RFIDedge server.
 13. The method of claim 8, wherein the JMX administrationcan be used to manage the connections with the multiple RFID readers.14. The method of claim 8, wherein the JMX administration can be used tomanage the RFID edge server remotely.
 15. An RFID edge server toassociate with multiple RFID readers at a location, the RFID edge serverincluding an application server which is adapted to use J2EEstandards-based administration.
 16. The RFID edge server of claim 15,wherein the J2EE standards-based administration is JMX administration.17. The RFID edge server of claim 15, wherein the J2EE standards-basedadministration can be used to manage resources related to the RFID edgeserver.
 18. The RFID edge server of claim 15, wherein the J2EEstandards-based administration uses MBeans to set configuration for theRFID edge server.
 19. The RFID edge server of claim 15, wherein anadministration server at the RFID edge server can be used to set theconfiguration of the RFID edge server.
 20. The RFID edge server of claim19, wherein an administration console can be used to manage the RFIDedge server.
 21. The RFID edge server of claim 15, wherein the J2EEstandards-based administration can be used to manage the connectionswith the multiple RFID readers.
 22. The RFID edge server of claim 15,wherein the J2EE standards-based administration can be used to managethe RFID edge server remotely.