PHYSICS, NETWORKS AND STANDARDS IN RFID - PowerPoint PPT Presentation

1 / 55
About This Presentation
Title:

PHYSICS, NETWORKS AND STANDARDS IN RFID

Description:

PHYSICS, NETWORKS AND STANDARDS IN RFID – PowerPoint PPT presentation

Number of Views:66
Avg rating:3.0/5.0
Slides: 56
Provided by: autoidlab
Category:

less

Transcript and Presenter's Notes

Title: PHYSICS, NETWORKS AND STANDARDS IN RFID


1
  • PHYSICS, NETWORKS AND STANDARDS IN RFID

Peter H. Cole Professor of RFID Systems at the
University of Adelaide and Director of the
Auto-ID Laboratory _at_ Adelaide
2
  • PART 1
  • INTRODUCTION

3
Outline
  • Introduction
  • General RFID concepts
  • Electromagnetic Fields and propagation
  • Design issues in RFID systems
  • Electromagnetic coupling in the far field
  • Electromagnetic coupling in the near field
  • Coupling volume theory
  • Auto-ID and EPCglobal concepts
  • Protocols in RFID reading
  • Problems of small tags

4
  • Good news
  • Presentation ist stark reduziert

5
Tag reading
The black spot
With passive tags a very weak reply is obtained
Some application illustrations will be given
shortly
6
Traffic Monitoring
7
Waste Collection
8
EAS Gates
9
Tags use electromagnetic fields
  • Coupling is via electromagnetic fields
  • There is little margin for poor performance
  • We must understand their properties

10
  • PART 2
  • ELECTROMAGNETIC FIELDS AND PROPAGATION

11
Laws in differential form
Vortex
Source
12
Laws in empty space
Vortex
Source
13
Electromagnetic propagation
Electric and magnetic fields orthogonal,
proportional and in time phase.
14
Electromagnetic waves
  • They propagate with the velocity of light
  • (Light is an electromagnetic wave)
  • Velocity c is 300,000,000 m/s
  • Wavelength - frequency relation is c fl
  • Propagation constant b 2p/l
  • But not all electromagnetic fields are
    propagating waves some are just local energy
    storage fields

15
Fields of a Magnetic Dipole(oh dear)
16
The radian sphere
  • At br 1, r l/2p, and
  • The phase factor e-jbr is one radian
  • Inside this sphere the near field predominates
  • Outside this sphere the far field predominates

17
Boundary Condition electric field
18
Boundary Condition magnetic field
19
Microelectronic backscatter
  • Concept can be applied from 10 MHz to 10,000 MHz
  • Low propagation loss points to coupling using the
    far field
  • Low power consumption requires a low frequency
    microcircuit
  • Reply is by modulation of the interrogation
    frequency

20
Planar printed coil
21
Ferrite cored solenoid
22
Electric field bow tie
23
Electric field box structure
24
  • PART 4
  • ELECTROMAGNETIC COUPLING IN THE FAR FIELD

25
Far field coupling theory 1
26
Far field coupling theory 2
27
Far field coupling theory 3
28
  • PART 5
  • ELECTROMAGNETIC COUPLING IN THE NEAR FIELD

29
Near field coupling 3
  • In the near field we just have coupled coils

30
Near field coupling 4
Simple result for weakly coupled coils
31
Coupling volume theory 1
  • Coefficient of coupling k depends on the coil
    sizes and positions
  • Quality factor depends on materials
  • We want to separate these effects
  • We want to obtain for k2 a product of factors
    depending separately on the interrogator coil
    geometry and the tag coil geometry
  • The power-like measure driving field is the
    reactive power density per unit volume at the tag
    position

32
Coupling volume theory 2
33
Coupling volume theory 3
34
Coupling volume theory 5
35
Coupling volume theory 7
36
Significant conclusions
  • Coupling volumes for well shaped planar electric
    and magnetic field labels are size dependent and
    similar
  • Radiation quality factors for both types of label
    formed within a square of side L are size
    dependent and similar
  • These are calculated results for sensibly shaped
    antennas

37
  • PART 8
  • RFID PROTOCOLS

38
What is a protocol?
  • Signalling waveforms
  • Command set
  • Operating procedure
  • A back end interface
  • whereby the identities of a population of tags
    in the field of a reader may be determined, and
    the population otherwise managed.

39
Protocols the major divide
  • Tree walking
  • More forward link signalling
  • Prolonged periods of interrupted signalling
  • Partial information of tag population remains
    relevant
  • Adaptive round (terminating aloha)
  • Less forward link signalling
  • Long periods of un-modulated reader carrier
  • Reader signalling is less
  • No information from one response about others

40
Tree scanning concepts
41
Adaptive round concepts 2
  • What we saw was the Class 1 Generation 1 HF
    protocol
  • Adaptive round concept now appears in may places
  • Next protocol is a complex example of an adaptive
    round

42
  • PART 9
  • C1G2 PROTOCOL

43
The C1G2 protocol
  • Labels have an adjustable probability of replying
    on each query or repeated query
  • Probability is adjusted to about a third
  • Empty slots, singly occupied slots and multiply
    occupied slots are roughly equi-probable
  • A wide range of forward and reverse signalling
    parameters are defined
  • Some of them allow for narrow band reply
    signalling well separated from the interrogation
    carrier

44
C1G2 Features
  • Tag must be able to communicate from 860 MHz to
    960 MHz
  • Tags must understand 3 different modulation
    schemes
  • Double Sideband Amplitude Shift Keying DSB-ASK
  • Single Sideband Amplitude Shift Keying SSB-ASK
  • Phase Reversal Amplitude Shift Keying PR-ASK
  • Coding is by Pulse Interval Encoding (PIE)
  • TgtR data rates 40, 80, 160, 320 and 640 kbits
  • Selection
  • Access Kill Passwords
  • EPC up to 256 bits
  • Dense reader channelised signalling

45
Three basic Operations
  • Select.
  • The operation of choosing a tag population for
    inventory and access.
  • A Select command may be applied successively to
    select a particular tag population based on
    user-specified criteria.
  • Inventory.
  • The operation of identifying tags.
  • An interrogator begins an inventory round by
    transmitting a Query command in one of four
    sessions. One or more tags may reply.
  • The interrogator detects a single tag reply and
    requests the PC, UII, and CRC-16 from the tag.
  • Inventory comprises multiple commands.
  • An inventory round operates in one and only one
    session at a time.
  • Access.
  • The operation of communicating with (reading from
    and/or writing to) a tag.
  • An individual tag must be uniquely identified
    prior to access.
  • Access comprises multiple commands, some of which
    employ one-time-pad based cover-coding of the
    RgtT link.

46
Selecting
  • The selection process employs a single command,
    Select, which an interrogator may apply
    successively to select a particular tag
    population based on user-defined criteria,
    enabling union (U), intersection (n), and
    negation () based tag partitioning.
  • Interrogators perform n and U operations by
    issuing successive Select commands. Select can
    assert or de-assert a tags SL flag, or it can
    set a tags inventoried flag to either A or B in
    any one of the four sessions.

47
Inventory
  • Reader Talks First
  • Sets up communication parameters, defines a round
  • Round Size (Q value), slots are numbered from 0
    to 2Q-1
  • Tags select a slot within a round to offer a
    reply
  • Tag States
  • Ready
  • Arbitrate
  • Reply
  • Acknowledge
  • Open
  • Secured
  • Killed

48
Replies
49
Access and Kill Passwords
  • Kill password
  • 32-bit value stored in Reserved memory
  • Default (unprogrammed) value is zero.
  • An interrogator uses a tags kill password once,
    to kill the tag and render it silent thereafter.
  • Access password
  • 32-bit value stored in Reserved memory.
  • Default (unprogrammed) value is zero.
  • Tags with a nonzero access password shall require
    an interrogator to issue this password before
    transitioning to the secured state.

50
(No Transcript)
51
(No Transcript)
52
  • PART 15
  • CONCLUSIONS

53
What to take away 1
  • Simplicity of passive RFID for identity
  • The weakness of the label reply
  • Electric and magnetic field concept
  • Source and vortex concepts
  • Frequency wave length relation c fl
  • Near and far field concepts
  • Radian sphere size and significance
  • Boundary conditions near metal

54
What to take away 2
  • Varieties of fast reading protocol
  • EPCglobal networking concepts
  • Standardised EPC
  • Standardised readers, tags and protocols
  • Standardised communication between roles
  • Problems of small tags
  • Only retain sensitivity with high Q

55
  • Questions?
Write a Comment
User Comments (0)
About PowerShow.com