Page 330 - Mechatronics for Safety, Security and Dependability in a New Era
P. 330

Ch64-I044963.fm  Page 314  Thursday, July 27, 2006  12:11 PM
            Ch64-I044963.fm
               314
               314    Page314  Thursday, July27, 2006  12:11PM
               Multiple  object  identification  with  RFID technology  has been  analysed  in  some  publications  (Lim &
               Mok  1998),  (Vogt  2002), but  focusing  only  on  Aloha  protocols  and  more  sophisticated  algorithms,
               such  as  ID  arbitration  and  code  division  multiple  access.  As  passive  RFID  systems  are  typically
               designed  for  extremely  low  cost  applications,  sophisticated  algorithms  and  more  efficient
               microprocessors  requiring  systems  are  not  applicable.  Therefore,  this  paper  focuses  on  simple
               protocols suitable  for identifying  low cost tags.


               PASSIVE RFID SYSTEM
               An  RFID  system  consists  of  tags,  readers,  and  an  application  host.  The  readers  communicate
               wirelessly  with  the  tags  to  obtain  the  information  stored  on  them.  The  data  sent  by  the  reader  is
               modulated  and  backscattered  from  a  number  of  tags.  The  cheapest  RFID  tags  with  the  largest
               commercial potential  are passive, harvesting  energy from the reader's  communication  signal to power
               up  their  operation  and  communication  with  the  reader  (Auto-ID  Labs  2001),  (Vogt  2002).  RFID
               communication  consists  of a number  of communication  cycles. Each  cycle  consists  of three  sections:
               first, the reader sends an activation field to the tags. Then, the reader  sends a command to the tags, and
               finally  it  sends  a  CW  field  that  the  tags  modulate  and  backscatter  back  to  the  reader.  The  reader's
               command  field  defines  the  content  of  the  tags'  replies.  Communication  bit  rates  are  70.18 kb/s  for
               forward  link and  140.35 kb/s for backward link (Auto-ID Labs 2001).


               ANTICOLLISION  ANALYSIS

               This  chapter  analyses  EPC  tree  algorithm  and  Aloha  protocols.  EPC  tree  algorithm  (Auto-ID  Labs
               2001)  is  chosen  according  to  its  wide  popularity.  Aloha  protocols  are  included  in  ISO  18000-6
               standard and also used by some RFID manufacturers  (Vogt 2002).


               EPC tree  algorithm

               EPC  tree  algorithm  defined  by  Auto-ID  labs  (Auto-ID  Labs  2001)  goes  through  all  possible  code
               combinations  as a binary tree. It optimises the number  of required time  slots  by ignoring those  leaves
               that  do not  respond  without  any  further  requests. Moreover,  any  collisions  between  replying  tags  do
               not  interfere  with  the  identification  procedure  as  the  reader  does  not  need  to  know  the  contents  of
               tags'  replies,  only  whether  any  replies  occur  or  not.  This  is  because  of  the  well-synchronized  reply
               window:  it  has  eight  slots and  each tag will modulate  the requested  3-bit  section  of its  identification
               code  to  one  slot.  Chose  of  the  slot  is  based  on  the  content  of  the  reply.  The  eight  slots  allow  each
               different  set  of  the  tree  bits  to  occupy  different  slots  (2  = 8).  The  actual  duration  of  the  total
               identification  procedure  of  a  number  of  tags  lies  between  the  maximum  and  minimum  curves,
               depending  on the  alignments  of the  identification  codes  of the  tags  in the  current  binary  tree.  These
               maximum  and  minimum  curves  are  presented  in  Figure  1.  64  bit  tag  identifiers  were  used  in
               calculations. The derivation  of these curves is presented  in publication  (Penttila et al. 2004).

                                                            ,
                      15                                 n   0,3
                      s                                  o  i  t
                   D     ,  10                           a   0,2
                   I  n                                  r
                                                         u
                   .  o  i
                   x  t  5                              T3 d  (ft s
                   a  a                                      0,1
                   M  r  u                               I Q D
                    d  0                                 .  n  0,0
                                                         i
                       0    20  40   60   80  100        M     0   20  40   60  80  100
                                40
                                     60
                                              100
                            20
                                                                            60
                                                                       40
                                                                   20
                                                                                80
                               Number of tags
                              Number of tags                          Number of tags
                                                                      Number of tags
                  Figure  1 Maximum (left)  and minimum (right) identification  duration with EPC tree algorithm
               Aloha family  protocols
   325   326   327   328   329   330   331   332   333   334   335