Interference on the RFID Interrogation Range

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
THE READER COLLISION PROBLEM IN RFID SYSTEMS Kin Seong Leong Auto-ID Adelaide School of Electrical & Electronic Engineering University of Adelaide.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Conducted and Wireless Media (Part II) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 7, Tuesday 2/21/2007)
Introduction to Wireless Communication. History of wireless communication Guglielmo Marconi invented the wireless telegraph in 1896 Communication by encoding.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Chapter 11 - Reducing Interference in RFID Reader Networks
Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.
EPCglobal Training Suite
Experimental results and EMC considerations on RFID location systems University "Stefan cel Mare" Suceava - Romania Faculty of Electrical Engineering and.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
S MART A NTENNA B.GANGADHAR 08QF1A1209. ABSTRACT One of the most rapidly developing areas of communications is “Smart Antenna” systems. This paper deals.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Kin Seong Leong Auto-ID Adelaide
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Dense Reader: Theory, Details & Experience Kevin Powell Symbol Technologies.
Doc.: IEEE Submission May 2008 Mike McInnis (The Boeing Company)Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
The Design of Smart RFID Tag System for Food Poisoning Index Monitoring Chang Won Lee 1.1, Nghia Truong Van 1, Kyung Kwon Jung 2, Joo Woong Kim 1, Woo.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Intelligent parking system based on RFID
Media Access Methods MAC Functionality CSMA/CA with ACK
Multiple Access Methods
Microwave Communication Project
CT301 lecture7 10/29/2015 Lect 7 NET301.
Outline What is Wireless LAN Wireless Transmission Types
March 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: VEHICULAR APPLICATIONS AND ISSUES FOR 15.7.
Unit I: Introduction.
Data link layer divided into two functionality-oriented sublayers
The University of Adelaide, School of Computer Science
May 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Potential FCC Part Waiver and Opportunity.
Radio Frequency Identification (RFID)
Wireless LANs Wireless proliferating rapidly.
Chapter 12 Multiple Access
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
SMART ANTENNA.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Ultra-Wideband - John Burnette -.
Channel Allocation (MAC)
Fundamentals of Cellular and Wireless Networks
Fundamentals of Cellular and Wireless Networks
RADIO FREQUENCY IDENTIFICATION
Mobile Communications Chapter 3 : Media Access
17 November 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Near Field Ranging Algorithm] Date.
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
doc.: IEEE <doc#>
Communication Systems.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
CT301 lecture7 10/29/2015 Lect 7 NET301.
basics Richard Dunn CSE July 2, 2003.
Chapter 13 Multiple Access
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 13 Multiple Access
ETSI update on Radio Frequency Identification
Cellular Telephone Networks
Conducted and Wireless Media (Part II)
Multiple Access Methods
SMART ANTENNA.
IOT Technologies: Radio Frequency Identification (RFID)
Wireless LAN Protocols
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Interference on the RFID Interrogation Range 최신 유비쿼터스 기술 기반 원전 유지보수 도구 프로토타입 개발 및 검증 Interference on the RFID Interrogation Range Korea Advanced Institute of Science and Technology Seung Min Lee 19 MAY 2008

CONTENTS Introduction Definitions and Solutions of Interference Tag-tag collision Tag-reader collision Reader-reader collision Summary & Conclusion References

INTRODUCTION To introduce RFID system in Nuclear Power Plant, lots of RFID tags are needed. ex) about 120,000 RFID tags for inventory management. To construct simple RFID system, an amount of readers are needed. To construct USN environment as well as simple RFID system, many fixed and mobile readers are needed. Deploying RFID systems on large scale (=dense mode) results in an unwanted effect, interference. As multiple readers and tags may exist in a working environment and communicate over shared wireless channels, frequency interferences would happen.

DEFINITIONs and SOLUTIONs of COLLISION 1) TAG-TAG COLLISION It occurs when multiple tags respond to the same reader simultaneously. Due to multiple signals arriving at the same time, the reader may not be able to detect any tag.

DEFINITIONs and SOLUTIONs of COLLISION ALOHA algorithm ISO/IEC 18000-6, air interface at 860MHz-960MHz EPCglobal Class-1 Generation-2 UHF Protocol at 860MHz-960MHz Fig1. IDs collection sequence of RFID using ALOHA

DEFINITIONs and SOLUTIONs of COLLISION 2) READER-TAG COLLISION It occurs when the signal from a neighboring reader interferes with tag responses being received at another reader. Passive tag has no battery and no right to choice frequency received from reader , and interference would happen even if two readers send different frequency. TAG READER R2 Read Range R1 Read Range R2 R1 T2 T1 T3 Fig2. Reader-to-tag interference in UHF RFID system

DEFINITIONs and SOLUTIONs of COLLISION transmitted wave is very strong and has a great interrogation range compared with back-scattered wave. (reciprocity) In fixed RFID system, there is no problem of interference if tags are included in only one reader`s interrogation range. But in mobile RFID system, this is not easy to be solved . the reader-tag collision problem is mitigated by allowing Frequency Hopping in the UHF band or by Time Division Multiple Access. reader tag Transmitted wave Back-scattered wave Fig3. Reciprocity

DEFINITIONs and SOLUTIONs of COLLISION 3) READER-READER COLLISION It occurs if an interfering reader transmit a signal to a tag when a continuous wave signal from the desired reader is converted into backscattered signal from the tag and transmitted to the desired reader again. Due to reciprocity, this type of interference can happen even if the interrogation range of the two readers has no intersection. In this situation, the tag might be unable to respond to any reader at all. CCI (Co Channel Interference) & ACI(Adjacent Channel Interference) Fig4. Reader-to-reader interference in UHF RFID system

DEFINITIONs and SOLUTIONs of COLLISION SIR (Signal to Interference Ratio) IRRR (Interrogation Range Reduction Ratio)

DEFINITIONs and SOLUTIONs of COLLISION Frequency Hopping Fig5. IRRR in the multiple reader envirionment Channel bandwidth : 500kHz

DEFINITIONs and SOLUTIONs of COLLISION Path loss Free Space Path Loss Terrestrial Pass Loss d : separation distance d0 : reference distance (=1m) n : value that depends on the surroundings and building type Result on minimum distance for Interfering Reader to interfere with the tag reply. Table 1. The effect of tag distance on multi-reader interference n : 3.5 d0: 1m

DEFINITIONs and SOLUTIONs of COLLISION LBT (Listen Before Talk) Reader must “listen” and confirm that a particular channel is not occupied before it can use that particular channel to interrogate any tag. LBT will effectively shut down many of the channels, thought those channels might have been, in the absence of the LBT provision, freely available for interrogation between readers and tags.

SUMMARY and CONCLUSION Fixed RFID system (invetory system, smart box, logistics) Interference between tag and tag solved by ALOHA algorithm that is already placed on sale. Interference between multi-reader and tag able to be solved by methods of path loss, frequency hopping and TDMA. no clear solution yet. Interference between reader and reader able to be solved by path loss and LBT not yet clear. Smart tool box Inventory system Mobile RFID system ( USN, RTLS) Real Time Location System To integrate these contents with real environment that will be constructed.

REFERENCES S.Jain, S.R.Das, “Collision Avoidance in a Dense RFID Network”, WiNTECH, 2006 B.Zhen, M.Kobayashi, M.Shimizu, “ Framed ALOHA for Multiple RFID Objects Identification”, Transactions on Information and Communication Engineers, 2005 D.Y.Kim et al., “Effect of Reader Interference on the RFID Interrogation Range”, Proceedings of the 37th European Microwave Conference, 2007 K.S.Leong et al., “The Reader Collision Problem In RFID Systems”, Proceedings of IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technology for Wireless communications, 2005