1 / 17

IOT Technologies: Radio Frequency Identification (RFID)

NETW 1010. IOT Technologies: Radio Frequency Identification (RFID). Dr. Eng. Tallal Elshabrawy. Spring 2019. Radio Frequency Identification. Battery Lifetime. Years. RFID. Months. BLE. IEEE 802.15.4. Communication Range. Days. Kiliometers. Few Meters. Tens-Hundreds of Meters.

harolde
Télécharger la présentation

IOT Technologies: Radio Frequency Identification (RFID)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NETW 1010 IOT Technologies: Radio Frequency Identification (RFID) Dr. Eng. Tallal Elshabrawy Spring 2019

  2. Radio Frequency Identification Battery Lifetime Years RFID Months BLE IEEE 802.15.4 Communication Range Days Kiliometers Few Meters Tens-Hundreds of Meters

  3. Outline • Introduction • Physical Layer • Medium Access

  4. Frequencies & Reading Ranges

  5. UHF RFID Systems • EPCglobal Gen2 • Passive Tags • Backscatter Modulation • Dynamic Frame Slotted ALOHA (DFSA) • Up to 10m Read Distance

  6. Backscatter Modulation Tag Antenna Tag Transmission States • Absorb • Reflect Continuous Wave from Reader (868 -915 MHz) Modulating Signal (Typically 40 Kbps) Backscatter Modulated Signal

  7. Backscatter Communication in Action Continuous Wave Signal Leakage Signal RFID Reader RFID Tag Backscatter Signal Example of a Practical Backscatter Signal Rx Power at Tag Backscatter Rx Power at Reader

  8. RFID Backscatter FM0 Modulation 1 Binary 1 r,r a,a 1 (r,r) (a,a) 0 0 1 1 Binary 0 r,a a,r (r,a) (a,r) 0 0 1 Example r: reflect a: absorb

  9. RFID Backscatter FM0 Modelling Received Constellation Point when tag is in absorb state Received Constellation Point when tag is in reflect state Constellation Diagram sine axis Envelope Detection (r) cosine axis r1 (a) After removing leakage signal (r) (a)

  10. Electronic Product Code (EPC) Header - Tag version number EPC Manager - Manufacturer ID Object class - Manufacturer’s product ID Serial Number - Unit ID With 96 bit code, 268 million companies can each categorize 16 million different products where each product category contains up to 687 billion individual units

  11. Dynamic Frame Slotted ALOHA (DFSA) • Reading frame started by Query • Tag chooses random slot counter [0, ] • Timeslot starts by Query or QueryRep • Each timeslot, the tag decrements its counter by one. • Tag sends an RN16 message when slot counter reaches 0 • Reader replies with ACK. • Tag Sends its unique ID “EPC”.

  12. Tag Random or Pseudo-Random Number Generator (RN16) • Tags shall generate 16-bit random or pseudo-random numbers (RN16) • Alias Tag ID during DFSA medium access • Shorter IDs decrease the probability of collisions during DFSA medium access • Once RN16 is Acknowledged by the reader, the tag sends its unique EPC code

  13. DFSA Timeslot Types

  14. DFSA Performance Analysis (1) Probability that tags transmitting in a certain timeslot Number of tags Frame Length () Number of tags transmitting their RN16

  15. DFSA Performance Analysis (2) Maximize Slot Throughput ,i.e, The reader sets the frame length to be equal to the number of competing tags

  16. DFSA Performance Analysis (3) Maximum Slot Throughput For a large Tag population Maximum achievable throughput is 36.8% But How can the reader guess the Tag population to set the proper frame length?

  17. Tag Population Estimation • After each inventory round, the reader identifies • empty slots • successful slots • collision slots • Number of remaining tags could be estimated as • The reader then uses estimated in selecting the frame length for the next inventory round

More Related