
|
Summary Inevitable: large number of readers May even be the most densely deployed networked device in a facility Standards based solutions to the infrastructure problems Key to large-scale deployments Leverage IETF expertise to develop solutions for Device operations and management Security & Authentication Communication protocol to/from readers |