IOT Technologies: Radio Frequency Identification (RFID)

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
1 S Digital Communication Systems Advanced Modulation and Random Access Techniques.
Overview of new technologies Jørgen Bach Andersen, Aalborg University, Denmark Sven Kuhn, Rasmus Krigslund, Troels B. Sørensen.
© 2008 The McGraw-Hill Companies 1 Understanding Wireless Networking.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof. Bob Kinicki.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
EPC Radio Frequency Identify Protocols Class1 Generation-2 UHF RFID 860 MHZ – 960 MHZ EPCglobal.
EMBEDDED RFID IN PRODUCT IDENTIFICATION Tommi Kallonen Jari Porras Lappeenranta University of Technology.
University of Kansas | School of Engineering Department of Electrical Engineering and Computer Science Milagros FigueroaApril Access Methods for.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
1 EPCglobal Training Suite. 2 Introduction Tag Protocol - UHF Class 1 Gen 2 Ultra High Frequency (UHF) Generation 2 (Generation 1 is deprecated) Class.
Presentation for CS 5910 – Network Security UCCS, Fall Semester 2010 Presented by Robin Kimzey & George Mudrak 1.
Can we get Wi-Fi connectivity for 15 µW? Bryce Kellogg.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
RFID passports How does is work? Step by step By: Einav Mimram.
Overview of RFID System Characteristics Operating Frequency Method of Coupling Transmission Range Data Storage Capacity Power Supply (Active, Passive)
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
Developing RFID Application In Supply Chain
Networked Systems Practicum Lecture 6 – RFID technology 1.
Issues in Integrated Circuit Design for UHF RFID Zhihua WANG,Xuguang SUN, Chun ZHANG,Yongming LI Institute of Microelectronics, Tsinghua University,Beijing,100084,P.R.China.
Wireless# Guide to Wireless Communications
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
EPCglobal Training Suite
1 RFID Technology and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
RFID Types Passive RFID – No batteries required – Weaker – Cheaper Active RFID – Battery powered – More complex – Expensive Three Main Types of Frequencies.
Modulation and Data Transfer February 21, References gy-Article.asp?ArtNum=2
1 RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
Spread Spectrum Techniques found in LPRF & GNSS Bluetooth – Dynamic Frequency Hopping – to avoid RF collisions ZigBee – Transformation of bit patterns.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
RFID TAG READER TAG READER Abdullah Al-Faifi ) ) ) ) )
© Tallal Elshabrawy Trellis Coded Modulation. © Tallal Elshabrawy Trellis Coded Modulation: Introduction Increases the constellation size compared to.
2. Data Link Layer: Medium Access Control. Scheduling.
Radio Frequency Identification composition - implementation – vision
3506-D WEST LAKE CENTER DRIVE,
Chapter 5 – Design of Passive Tag RFID Readers
The Data Link Layer Chapter
Mobile Computing CSE 40814/60814 Spring 2017.
CS434/534: Topics in Networked (Networking) Systems Mobile Networking System: Making Connections: Backscatter Geng Li Computer Science Department Yale.
Unit I: Introduction.
Chapter 7 – Aloha-Based Protocol
May 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Potential FCC Part Waiver and Opportunity.
Textbook Detection System With Radio-Frequency Identification
1) By using hamming code (even – parity), Show the correct binary number that transmitted by the sender if the receiver received binary number.
Interference on the RFID Interrogation Range
A Wireless LAN technologies IEEE
Bluetooth, RFID, Data Link Layer Switching
Chapter 10 – Integrating RFID Readers in Enterprise IT
RADIO FREQUENCY IDENTIFICATION
RFID & applications گردآوری: بیتا تدین
Radio Frequency Identification and Near Field Communication
Communication Networks NETW 501
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Bluetooth, RFID, Data Link Layer Switching
Chapter 9 - A Comparison of TTF and RTF UHF RFID Protocols
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

IOT Technologies: Radio Frequency Identification (RFID) NETW 1010 IOT Technologies: Radio Frequency Identification (RFID) Dr. Eng. Tallal Elshabrawy Spring 2019

Radio Frequency Identification Battery Lifetime Years RFID Months BLE IEEE 802.15.4 Communication Range Days Few Meters Tens-Hundreds of Meters Kiliometers

Outline Introduction Physical Layer Medium Access

Frequencies & Reading Ranges Frequency Range Frequencies Passive Read Distance Low Frequencies (LF) 120 - 140 KHz 10 – 20 cm High Frequencies (HF) 13.56 MHz < 1 meter Ultra-High Frequencies (UHF) 868 - 928 MHz <10 meters Microwave 2.45 & 5.8 GHz <30 meters

UHF RFID Systems EPCglobal Gen2 Passive Tags Backscatter Modulation Dynamic Frame Slotted ALOHA (DFSA) Up to 10m Read Distance

Backscatter Modulation Tag Antenna Continuous Wave from Reader (868 -915 MHz) Modulating Signal (Typically 40 Kbps) Backscatter Modulated Signal Tag Transmission States Absorb Reflect

Backscatter Communication in Action Continuous Wave Signal Leakage Signal RFID Reader RFID Tag Backscatter Signal 𝑃 𝑅 ∝ 𝑃 𝑇 × 𝐶 𝑑 𝑛 × 𝐶 𝑑 𝑛 Example of a Practical Backscatter Signal Rx Power at Tag Backscatter Rx Power at Reader

RFID Backscatter FM0 Modulation 1 Binary 1 r,r a,a 1 (r,r) (a,a) 1 1 Binary 0 r,a a,r (r,a) (a,r) 1 Example r: reflect a: absorb

RFID Backscatter FM0 Modelling Received Constellation Point when tag is in absorb state Received Constellation Point when tag is in reflect state Constellation Diagram sine axis Envelope Detection (r) cosine axis r1 (a) After removing leakage signal (r) (a)

Electronic Product Code (EPC) Header - Tag version number EPC Manager - Manufacturer ID Object class - Manufacturer’s product ID Serial Number - Unit ID With 96 bit code, 268 million companies can each categorize 16 million different products where each product category contains up to 687 billion individual units

Dynamic Frame Slotted ALOHA (DFSA) Reading frame started by Query Tag chooses random slot counter [0, 2 𝑄 −1 ] Timeslot starts by Query or QueryRep Each timeslot, the tag decrements its counter by one. Tag sends an RN16 message when slot counter reaches 0 Reader replies with ACK. Tag Sends its unique ID “EPC”.

Tag Random or Pseudo-Random Number Generator (RN16) Tags shall generate 16-bit random or pseudo-random numbers (RN16) Alias Tag ID during DFSA medium access Shorter IDs decrease the probability of collisions during DFSA medium access Once RN16 is Acknowledged by the reader, the tag sends its unique EPC code

DFSA Timeslot Types Empty Successful Collision Reader receives no RN16 messages. Reader can decode received RN16 message. Reader cannot detect received RN16 messages.

DFSA Performance Analysis (1) Probability that 𝑘 tags transmitting in a certain timeslot 𝑃 𝑘 = 𝑁 𝑘 ∗ 1 𝐿 𝑘 ∗ 1− 1 𝐿 𝑁−𝑘 Number of tags Number of tags transmitting their RN16 Frame Length ( 𝐿=2 𝑄 ) Empty Successful Collision 𝑃 𝐸 = 𝑃 0 = 1− 1 𝐿 𝑁 𝑃 𝑆 = 𝑃 1 =𝑁∗ 1 𝐿 ∗ 1− 1 𝐿 𝑁−1 𝑃 𝐶 =1− 𝑃 0 − 𝑃 1

DFSA Performance Analysis (2) Maximize Slot Throughput 𝜂 𝑠 𝜂 𝑠 = 𝑃 𝑆 = 𝑃 1 =𝑁∗ 1 𝐿 ∗ 1− 1 𝐿 𝑁−1 d𝜂 𝑠 d𝐿 =0 ⇒−𝑁∗ 1 𝐿 2 ∗ 1− 1 𝐿 𝑁−1 +𝑁∗ 1 𝐿 ∗ 𝑁−1 ∗ 1− 1 𝐿 𝑁−2 ∗ 1 𝐿 2 =0 ⇒− 1− 1 𝐿 + 1 𝐿 ∗ 𝑁−1 =0 ⇒ 𝑳=𝑵, i.e, The reader sets the frame length to be equal to the number of competing tags

DFSA Performance Analysis (3) Maximum Slot Throughput 𝜂 𝑆 𝜂 𝑆 = 1− 1 𝑁 𝑁−1 For a large Tag population 𝑁−1≈𝑁 𝜂 𝑆 = lim 𝑁→∞ 1− 1 𝑁 𝑁 = 1 𝑒 =0.368 Maximum achievable throughput is 36.8% But How can the reader guess the Tag population to set the proper frame length?

Tag Population Estimation After each inventory round, the reader identifies 𝑁 𝐸 empty slots 𝑁 𝑆 successful slots 𝑁 𝐶 collision slots Number of remaining tags could be estimated as 𝑁≈2 ×𝑁 𝐶 𝑁≈2.39× 𝑁 𝐶 The reader then uses estimated 𝑁 in selecting the frame length for the next inventory round