RFID systems: anti-collision protocols and applications. Naeem Khademi Cyber-Physical Systems,

Similar documents
CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW)

Analysis and Simulation of RFID Anti-collision Algorithms

Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

Data Communications. Automatic Repeat Request Medium Access Control

Chapter 1 Basic concepts of wireless data networks (cont d)

An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification

Internet of Things (IoT)

Internet of Things (IoT)

Data Link Layer: Collisions

Influence of Managing the Number of Tag Bits Transmitted on the Query Tree RFID Collision Resolution Protocol

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Reader collisions take place when several neighbor readers try to interrogate the same tag at the same time, such that the neighbor readers interfere

Chapter 12 Multiple Access 12.1

The Medium Access Control Sublayer

Networking. Melissa Winstanley

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search

Comparison of Transmission Control Protocols Based on EPC C1G2 Standard

ECEN 5032 Data Networks Medium Access Control Sublayer

Packet multiple access and the Aloha protocol

COS 140: Foundations of Computer Science

Efficient Dual Bias Q-Algorithm and Optimum Weights for EPC Class 1 Generation 2 Protocol

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning*

Data Link Layer Technologies

Multiple Access. Data Communications and Networking

COMP/ELEC 429/556 Introduction to Computer Networks

CS 4453 Computer Networks Winter

Aloha and slotted aloha

Mobile Communications Chapter 3 : Media Access

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Improving RFID System To Read Tags Efficiently

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Performance of BFSA Based Anti-Collision Protocols for RFID Networks Supporting Identical Tags

Medium Access Control Sublayer Chapter 4

MULTIPLE ACCESS PROTOCOLS 2. 1

Link Layer and LANs. CMPS 4750/6750: Computer Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Splitting Algorithms

Multiple Access Links and Protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Data Link Layer: Overview, operations

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

COS 140: Foundations of Computer Science

Inventory Management using Passive RFID Tags: A Survey

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Advanced. Card. Systems. Ltd. by Eric Lee. June, Advanced Card Systems Ltd. Room 2910, The Center, 99 Queen's Road Central, Hong Kong.

Data and Computer Communications

COMPUTER NETWORK Model Test Paper

An Efficient Tag Identification Algorithm Based on Improved Collision Detection

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)

Simulated SA Throughput vs. p

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Multiple-access protocols

RECENTLY, the information exchange using wired and

CHAPTER 5 PROPAGATION DELAY

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Lecture 7: Flow & Media Access Control"

ISO/IEC , CSD, IEEE a. Embedded Systems Lab. Dept. of CSE, PNU

AN0512 Channel capacity in ranging applications

Chapter 3 MEDIA ACCESS CONTROL

ECE 4450:427/527 - Computer Networks Spring 2017

Random Assignment Protocols

COMMUNICATION NETWORKS NETW 501

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Chapter - 1 INTRODUCTION

The MAC layer in wireless networks

Authentication Technologies

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Ethernet. Introduction. CSE 3213 Fall 2011

Chapter 6 The Link Layer and LANs

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Level 1: Physical Level 2: Data link Level 3: Network Level 4: Transport

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

SL2 ICS50/SL2 ICS General description I CODE SLI-L/I CODE SLI-L HC. 1.1 Anticollision. 1.2 Contactless energy and data transfer

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

TSIN01 Information Networks Lecture 8

3201 Computer Networks (Final Exam) (Model Answer)

DESIGN AND DEVELOPMENT OF A STATE TRANSITION TABLE FOR THE EPCGLOBAL UHF CLASS1 GEN2 RFID STANDARD. Akram Kamrani

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Multiple Access Protocols

SCAN TM White Paper. Scanned Channel Assigned Networking: A Unique Approach to High Efficiency Bandwidth Management

GLOSSARY OF CELLUAR TERMS

Multiple Access Channels

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

Link Layer I: ALOHA, Time-, Frequency-, and Code Division. COS 463: Wireless Networks Lecture 4 Kyle Jamieson

UNIT IV -- TRANSPORT LAYER

NFC is the double click in the internet of the things

What is RFID, where is it being used and why? Security implications of RFID Why is it being used to secure passports? The methodology used to asses

Transcription:

RFID systems: anti-collision protocols and applications Naeem Khademi Cyber-Physical Systems, 12.11.2010

RFID Systems Radio-frequency identification (RFID) is a technology that uses communication via electromagnetic waves to exchange data between a terminal and an object such as a product, animal, or person for the purpose of identification and tracking Some tags can be read from several meters away and beyond the line of sight of the reader An RFID tag used for electronic toll collection

RFID Systems Involves interrogators (also known as readers), and tags (also known as labels) Three types of RFID tags: Passive RFID tags (no power source; require an external electromagnetic field to initiate a signal transmission) Active RFID tags (contain a battery and can transmit signals once an external source 'Interrogator' has been successfully identified) Battery Assisted Passive (BAP) RFID tags (require an external source to wake up but have significant higher forward link capability providing greater range)

RFID Systems (Performance) Desirable Application (reading protocol) Fast Energy efficient Problems Increasing number of tags Collisions due to the tags replying simultaneously to a reader Wasting bandwidth Wasting energy Increase in identification delay

RFID Systems (Anti-Collision Protocols) Collision Problem

RFID Systems (Anti-Collision Protocols)

RFID Systems (Anti-Collision Protocols) SDMA (Space Division Multiple Access) Separate the channel using directional antennas or multiple readers Price + Special antenna design FDMA (Frequency Division Multiple Access) tags transmitting in one of several predefined frequency channels Complex receiver at the reader CDMA (Code Division Multiple Access) tags multiply their ID with a pseudo-random sequence (PN) before transmission Price + Power hungry TDMA (Time Division Multiple Access) Reader-Talk-First (RTF) Tag-Talk-First (TTF)

RFID Systems (Anti-Collision Protocols) TDMA (Time Division Multiple Access) Reader-Talk-First (RTF) Tag-Talk-First (TTF) [ALSO] Aloha-based Tree-based

Aloha-based Protocols Aloha based Protocols Pure Aloha (PA) Slotted Aloha (SA) Framed Slotted Aloha (FSA) a) Basic framed slotted Aloha (BFSA) b) Dynamic framed slotted Aloha (DFSA) c) Enhanced Dynamic framed slotted Aloha (EDFSA)

Pure Aloha (PA) A tag responds with its ID randomly after being energized by a reader. Waits for the reader to reply with: i) ACK indicating its ID has been received correctly ii) a negative acknowledgment (NACK), meaning a collision has occurred Pure ALOHA protocol. Boxes indicate frames. Shaded boxes indicate frames which have collided. In Pure ALOHA, only about 18.4% of the time is used for successful transmissions

Pure Aloha (PA) PA with Muting: The number of tags is reduced after each successful tag response. Hence, muting has the effect of reducing the offered load to the reader after each successful identification PA with Slow Down: Instead of being muted, a tag can be instructed using a slow down command to reduce its rate of transmissions, hence decreasing the probability of collision PA with Fast Mode: A silence command is sent by the reader once it has detected the start of a tag transmission. This command has the effect of stopping other tags from transmitting. Tags are allowed to transmit again after the reader has sent an ACK command or until their waiting timer expires

Pure Aloha (PA) with Muting

Pure Aloha (PA) with Slow Down

Pure Aloha (PA) with Fast Mode

Pure Aloha (PA) with Fast Mode and Muting

Pure Aloha (PA) with Fast Mode and Slow Down

Slotted Aloha (SA) An improvement to the original ALOHA was Slotted ALOHA, which introduced discrete timeslots and increased the maximum throughput A station can send only at the beginning of a timeslot, and thus collisions are reduced If there is a collision, tags retransmit after a random delay. The collision occurs at slots boundary only, hence there are no partial collisions. The maximum throughput is approximately 0.368 frames per frametime, or 36.8%.

Slotted Aloha (SA) SA with Muting/Slow Down: The principle operation is similar to PA with muting/slow down, but operates in a slotted manner SA with Early End: If no transmission is detected at the beginning of a slot, the reader closes the slot early. Two commands are used: start-of-frame (SOF) and end-of frame (EOF) SA with Early End and Muting: The reader sends a mute command whenever it successfully identifies a tag SA with Slow Down and Early End: This combines slow down with the early end feature.

Slotted Aloha (SA) with Early End

Frame Slotted Aloha (FSA) FSA protocols mandates that each tag responds only once per frame Basic Frame Slotted Aloha (BFSA): the term basic refers to the frame size being fixed throughout the reading process Dynamic Frame Slotted Aloha (DFSA): FSA protocols with variable frame size. In each read round, the reader uses a tag estimation function to vary its frame size. The optimal frame size is one which promises the maximum system efficiency and minimum identification delay. Theoretically, the optimal frame size is equal to the number of tags No prior knowledge of the number of tags!

Basic Frame Slotted Aloha (BFSA) BFSA has four variants: 1) BFSA-non muting 2) BFSA-muting 3) BFSA-non-muting-early-end 4) BFSA-muting-early end

Dynamic Frame Slotted Aloha (DFSA) Choosing the right frame size is a crucial issue to determine the performance

Comparison of Aloha-based Protocols (Delay Pure/Slotted)

Comparison of Aloha-based Protocols (Energy Consumption - Pure/Slotted)

Comparison of Aloha-based Protocols (Delay - Framed Slotted)

Comparison of Aloha-based Protocols (Energy Consumption Frame Slotted)

Tree-based Protocols Tree based Protocols Tree Splitting (TS) Splitting responding tags into multiple subsets using a random number generator Query Tree (QT) storing tree construction information at the reader, and tags only need to have a prefix matching circuit Binary Search (BS) involves the reader transmitting a serial number to tags, which they then compare against their ID. Those tags with ID equal to or lower than the serial number respond Bitwise Arbitration (BTA) requesting tags to respond bit by bit from the most significant bit (MSB) to the least significant bit (LSB) of their ID

Tree Splitting Basic Tree Splitting (BTS) : the reader informs the tags about the last time-slot resulted in collision/single/no response

Basic Tree Splitting (BTS) Tree Splitting

Tree-based Protocols Tree based Protocols Tree Splitting (TS) Splitting responding tags into multiple subsets using a random number generator Query Tree (QT) storing tree construction information at the reader, and tags only need to have a prefix matching circuit Binary Search (BS) involves the reader transmitting a serial number to tags, which they then compare against their ID. Those tags with ID equal to or lower than the serial number respond Bitwise Arbitration (BTA) requesting tags to respond bit by bit from the most significant bit (MSB) to the least significant bit (LSB) of their ID

Query Tree (QT) Each tag has a prefix matching circuit. The reader transmits a query q, and tags with a matching prefix reply to the reader. Collision occurs when multiple tags have the same prefix. In this case, the reader forms a new query by appending q with a binary 0 or 1. The reader then repeats the reading process using the augmented query QT Algorithm

Query Tree (QT) Shortcutting: This extension reduces QT s identification delay by removing redundant queries. The reader transmits a query q, and if there was a collision, the reader appends q with 0 and 1, and pushes q0 and q1 onto the stack. The reader first transmits the query q0. If there was no response, the reader infers that at least two tags have the prefix q1. Thus, if the reader transmits q1, a collision will occur. Therefore, the reader removes the query q1 from the stack and pushes q10 and q11 onto the stack instead. QT-Shortcutting Algorithm

Tree-based Protocols Tree based Protocols Tree Splitting (TS) Splitting responding tags into multiple subsets using a random number generator Query Tree (QT) storing tree construction information at the reader, and tags only need to have a prefix matching circuit Binary Search (BS) involves the reader transmitting a serial number to tags, which they then compare against their ID. Those tags with ID equal to or lower than the serial number respond Bitwise Arbitration (BTA) requesting tags to respond bit by bit from the most significant bit (MSB) to the least significant bit (LSB) of their ID

Binary Search (BS)

Tree-based Protocols Tree based Protocols Tree Splitting (TS) Splitting responding tags into multiple subsets using a random number generator Query Tree (QT) storing tree construction information at the reader, and tags only need to have a prefix matching circuit Binary Search (BS) involves the reader transmitting a serial number to tags, which they then compare against their ID. Those tags with ID equal to or lower than the serial number respond Bitwise Arbitration (BTA) requesting tags to respond bit by bit from the most significant bit (MSB) to the least significant bit (LSB) of their ID

Bitwise Arbitration (BTA) Bit replies are synchronized, meaning multiple tags responses of the same bit value result in no collision. A collision is observed only if two tags respond with different bit values. Moreover, the reader has to specify the bit position it wants to read Bit query (BQ): A reader transmits a bit query q to tags. Tags with their prefix matching the query q respond with the bit that is adjacent to the requested prefix. Other tags deactivate themselves. If the reader receives a tag s bit response successfully, that bit is sent as the next query. However, if there is a collision, the reader uses bit zero as the next query.

RFID Applications A RFID system consists of three key components: RFID tag or transponder Reader/writer Application computer or processor Invented in 1948 --> Lab. experiments before 1950 --> Application trial in 1960 --> rapid growth in 1990s --> Total revenue of 5.6 B$ earned by RFID products in 2009

RFID Applications (e.g. Animal Management)

RFID Applications (e.g. Transportation and logistics)

RFID Applications (e.g. Asset management and retail sales)

The contactless chip found in British passports RFID Applications (e.g. Passports)

RFID Applications (e.g. Race Timing)

RFID Applications (e.g. Human Implants)

Thank You Questions?