SlideShare a Scribd company logo
1 of 28
Simulation of RFID System
using OMNeT++
Presented by: Paula Hanna
ID#: 25-2029
Supervised by: Dr. Mohamed Ashour
 Too much time wasted in
queues
 Scanning time is too slow
2
Wasted Time
 Effort and time wasted in
inventories
Wasted Effort
3
Outline
1. Introduction to RFID
2. System Components
3. Mechanism of the System
4. Aim of the Project
5. Project Tools
6. Implementation Steps
7. Demo Simulation
8. Conclusion & Future Work
4
Introduction to RFID
• Radio Frequency Identification (RFID) is an automatic identification
technology.
• Advantages: identification of several objects at same time, non line
of sight, long distances, tags carrying more data.
• More practical than traditional bar-codes.
• Frequency range is from 860 to 960 MHz .
5
System Components
1. Tag (microchip and antenna) 2. Reader (antenna)
6
Mechanism of the System
• Reader is the main source of power.
• Reader emits a field of EMW.
• EMW power the chip of Tag.
• Tag replies with its identification number.
Tag
Tag
Tag
Tag
Tag
Reader
Tag
Tag
Tag
7
Managing Tag Population
Reader manages Tag population
through:
Choosing one or more Tags.
Identifying individual Tags.
Communication with an identified Tag.
Select
Inventory
Access
8
Aim of the Project
• Enhance an existing RFID model.
-Network of Reader and Tags
-Reader and Tag as one entity
-No layering
• Cross-layer RFID model.
9
Project Tools
1. OMNeT++
• Component based C++
simulation library
• Eclipse-based IDE
• GUI support
2. MiXiM
• OMNeT++ modeling
framework
• Having ready models
10
Implementation Steps
RFID model topology
RFID Network
Reader TagsConnection
Manager
App NICNetworkNIC AppNetwork
MAC PHY PHY MACAnalogue
Model
Decider
11
NED Files
• Network Description
• Code converted to GUI
• Network Module Simple
• Parameters
• Gates
• Connections
12
RFID Network
• One Reader Node
• Number of Tag Nodes
• Connection Manager:
Managing connection between nodes
of same channel.
13
Reader and Tag Nodes
• Application Layer Module
• Network Layer Module
• NIC Module
14
NIC Module
NIC Module
MAC
• RFReaderMac:
Sending logical commands by
reader.
• RFTagMac:
Receiving logical commands by
tags and sending replies.
PHY
• Analogue Model: simulates
effects affecting the signal
• Decider: evaluates received
signals
15
Packets Flow
• handleLowerControl: decides which
type of packet to be sent down to PHY.
• handleUpperMsg: deals with packets
coming from MAC to PHY
• handleAirFrame: deals with packets
coming from the channel to the PHY
• handleLowerMSG: deals with messages
coming from PHY to MAC
Sender Receiver
MAC
handleLowerControl
PHY
handleUpperMsg
Channel
PHY
handleAirFrame
MAC
handleLowerMSG
16
Select
• Reader Sends Select packet having all its
parameters.
• Tag state Ready
Reader
Tag
Tag
Tag
Tag
Select
Select
Select
17
Query
Reader Sends Query packet
• Tags set slot counter
Reply
• Tag state or
Arbitrate
Reader
Tag
Tag
Tag
Tag
Query
Query
Query
18
RN16
• Tag with slot counter 0 replies
with RN16 packet
• Tag state Reply
• Other Tags state Arbitrate
Reader
Tag
Tag
Tag
Tag
RN16
19
ACK
• Reader sends ACK packet to that
Tag.
• Only tag with slot counter = 0
receives the packet
Acknowledged
• Tag state or
Arbitrate
Reader
Tag
Tag
Tag
Tag
ACK
20
EPC
Tag checks its RN16 with that
coming in the ACK packet, and if
same the tag replies with its EPC in
the EPC packet
Reader
Tag
Tag
Tag
Tag
EPC
21
QueryRep
• Reader sends QueryRep packet specifying the
session.
• Tags compares their current session with the
session of the coming packet, if equal tags
decrement slot counter by 1.
Ready; chosen before
• Tag state Arbitrate; slot ≠ 0
Reply; slot = 0
Reader
Tag
Tag
Tag
Tag
QueryRep
QueryRep
QueryRep
22
Collision
• Two or more Tag with same
slot counter
• Discard
• Tags wait for Query packets
RN16
RN16
Reader
Tag
Tag
Tag
Tag
23
Demo Simulation for RFID
System
24
Conclusion & Future Work
• RFID Cross-layer Model
• Successful communication
between Reader and Tag
• All Select and Inventory
Commands
• Improve handling collisions
• Access commands
Conclusion
Future Work
25
Thank You
Questions are Welcomed
References
[1] R. Want, “An Introduction to RFID Technology,” IEEE CS and IEEE ComSoc, vol. 5,
no. 1, Santa Clara, 2006, pp. 25-33.
[2] EPC global Gen 2 Specification, 2015 [Online]. Available:
http://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf
[3] CSols.com (Laboratory Systems Integration). [Online]. Available:
http://www.csols.com/wordpress/tag/rfid/
[4] MiXiM simulator for wireless and mobile networks using OMNeT++. [Online].
Available: http://mixim.sourceforge.net
[5] Brooks.com (RFID Reader). [Online]. Available:
http://www.brooks.com/applications-by-industry/rfid/rfid-basics/rfid-
components/rfid-reader
[6] K. Wessel, et al., "MiXiM: the physical layer an architecture overview," 2nd
International Workshop on OMNeT++, Rome, Italy, 2009.
28

More Related Content

Viewers also liked

Prezentacja magdalena sypiół
Prezentacja   magdalena sypiółPrezentacja   magdalena sypiół
Prezentacja magdalena sypiółMagdalena Raci
 
Secrets most men will never know about women
Secrets most men will never know about womenSecrets most men will never know about women
Secrets most men will never know about womenvietcuong12
 
Tutorial 6 queues & arrays & results recording
Tutorial 6   queues & arrays & results recording Tutorial 6   queues & arrays & results recording
Tutorial 6 queues & arrays & results recording Mohd Batati
 
Ks4 the heart and circulatory system
Ks4 the heart and circulatory systemKs4 the heart and circulatory system
Ks4 the heart and circulatory systemSUSAN MATHEW
 
Introduction to Hytetra Services
Introduction to Hytetra ServicesIntroduction to Hytetra Services
Introduction to Hytetra ServicesHytetra Services
 

Viewers also liked (8)

Costco Nature
Costco NatureCostco Nature
Costco Nature
 
Prezentacja magdalena sypiół
Prezentacja   magdalena sypiółPrezentacja   magdalena sypiół
Prezentacja magdalena sypiół
 
WA1T News Release
WA1T News ReleaseWA1T News Release
WA1T News Release
 
Secrets most men will never know about women
Secrets most men will never know about womenSecrets most men will never know about women
Secrets most men will never know about women
 
Tutorial 6 queues & arrays & results recording
Tutorial 6   queues & arrays & results recording Tutorial 6   queues & arrays & results recording
Tutorial 6 queues & arrays & results recording
 
Ks4 blood vessels
Ks4 blood vesselsKs4 blood vessels
Ks4 blood vessels
 
Ks4 the heart and circulatory system
Ks4 the heart and circulatory systemKs4 the heart and circulatory system
Ks4 the heart and circulatory system
 
Introduction to Hytetra Services
Introduction to Hytetra ServicesIntroduction to Hytetra Services
Introduction to Hytetra Services
 

Similar to Last Defence

RFID Application
RFID ApplicationRFID Application
RFID Applicationlau_hkbu
 
15251810 pss6
15251810 pss615251810 pss6
15251810 pss615251810
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATIONsarah ho
 
15227049 pss7-ans
15227049 pss7-ans15227049 pss7-ans
15227049 pss7-anstimothyara
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
03 internet-of-things-rfid-systems-and-applications
03 internet-of-things-rfid-systems-and-applications03 internet-of-things-rfid-systems-and-applications
03 internet-of-things-rfid-systems-and-applicationsJohn Soldatos
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD ApplicationLenox1224
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ansTung Ko
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTrajeshplacherikunnel
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxMahdiHasanSowrav
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationbenkalok
 

Similar to Last Defence (20)

RFID Application
RFID ApplicationRFID Application
RFID Application
 
15251810 pss6
15251810 pss615251810 pss6
15251810 pss6
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
 
15227049 pss7-ans
15227049 pss7-ans15227049 pss7-ans
15227049 pss7-ans
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
14216213 pss7
14216213 pss714216213 pss7
14216213 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
1.SNORT.pdf
1.SNORT.pdf1.SNORT.pdf
1.SNORT.pdf
 
03 internet-of-things-rfid-systems-and-applications
03 internet-of-things-rfid-systems-and-applications03 internet-of-things-rfid-systems-and-applications
03 internet-of-things-rfid-systems-and-applications
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
 
try
trytry
try
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ans
 
RFID
RFIDRFID
RFID
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

Last Defence

  • 1. Simulation of RFID System using OMNeT++ Presented by: Paula Hanna ID#: 25-2029 Supervised by: Dr. Mohamed Ashour
  • 2.  Too much time wasted in queues  Scanning time is too slow 2 Wasted Time
  • 3.  Effort and time wasted in inventories Wasted Effort 3
  • 4. Outline 1. Introduction to RFID 2. System Components 3. Mechanism of the System 4. Aim of the Project 5. Project Tools 6. Implementation Steps 7. Demo Simulation 8. Conclusion & Future Work 4
  • 5. Introduction to RFID • Radio Frequency Identification (RFID) is an automatic identification technology. • Advantages: identification of several objects at same time, non line of sight, long distances, tags carrying more data. • More practical than traditional bar-codes. • Frequency range is from 860 to 960 MHz . 5
  • 6. System Components 1. Tag (microchip and antenna) 2. Reader (antenna) 6
  • 7. Mechanism of the System • Reader is the main source of power. • Reader emits a field of EMW. • EMW power the chip of Tag. • Tag replies with its identification number. Tag Tag Tag Tag Tag Reader Tag Tag Tag 7
  • 8. Managing Tag Population Reader manages Tag population through: Choosing one or more Tags. Identifying individual Tags. Communication with an identified Tag. Select Inventory Access 8
  • 9. Aim of the Project • Enhance an existing RFID model. -Network of Reader and Tags -Reader and Tag as one entity -No layering • Cross-layer RFID model. 9
  • 10. Project Tools 1. OMNeT++ • Component based C++ simulation library • Eclipse-based IDE • GUI support 2. MiXiM • OMNeT++ modeling framework • Having ready models 10
  • 11. Implementation Steps RFID model topology RFID Network Reader TagsConnection Manager App NICNetworkNIC AppNetwork MAC PHY PHY MACAnalogue Model Decider 11
  • 12. NED Files • Network Description • Code converted to GUI • Network Module Simple • Parameters • Gates • Connections 12
  • 13. RFID Network • One Reader Node • Number of Tag Nodes • Connection Manager: Managing connection between nodes of same channel. 13
  • 14. Reader and Tag Nodes • Application Layer Module • Network Layer Module • NIC Module 14
  • 15. NIC Module NIC Module MAC • RFReaderMac: Sending logical commands by reader. • RFTagMac: Receiving logical commands by tags and sending replies. PHY • Analogue Model: simulates effects affecting the signal • Decider: evaluates received signals 15
  • 16. Packets Flow • handleLowerControl: decides which type of packet to be sent down to PHY. • handleUpperMsg: deals with packets coming from MAC to PHY • handleAirFrame: deals with packets coming from the channel to the PHY • handleLowerMSG: deals with messages coming from PHY to MAC Sender Receiver MAC handleLowerControl PHY handleUpperMsg Channel PHY handleAirFrame MAC handleLowerMSG 16
  • 17. Select • Reader Sends Select packet having all its parameters. • Tag state Ready Reader Tag Tag Tag Tag Select Select Select 17
  • 18. Query Reader Sends Query packet • Tags set slot counter Reply • Tag state or Arbitrate Reader Tag Tag Tag Tag Query Query Query 18
  • 19. RN16 • Tag with slot counter 0 replies with RN16 packet • Tag state Reply • Other Tags state Arbitrate Reader Tag Tag Tag Tag RN16 19
  • 20. ACK • Reader sends ACK packet to that Tag. • Only tag with slot counter = 0 receives the packet Acknowledged • Tag state or Arbitrate Reader Tag Tag Tag Tag ACK 20
  • 21. EPC Tag checks its RN16 with that coming in the ACK packet, and if same the tag replies with its EPC in the EPC packet Reader Tag Tag Tag Tag EPC 21
  • 22. QueryRep • Reader sends QueryRep packet specifying the session. • Tags compares their current session with the session of the coming packet, if equal tags decrement slot counter by 1. Ready; chosen before • Tag state Arbitrate; slot ≠ 0 Reply; slot = 0 Reader Tag Tag Tag Tag QueryRep QueryRep QueryRep 22
  • 23. Collision • Two or more Tag with same slot counter • Discard • Tags wait for Query packets RN16 RN16 Reader Tag Tag Tag Tag 23
  • 24. Demo Simulation for RFID System 24
  • 25. Conclusion & Future Work • RFID Cross-layer Model • Successful communication between Reader and Tag • All Select and Inventory Commands • Improve handling collisions • Access commands Conclusion Future Work 25
  • 28. References [1] R. Want, “An Introduction to RFID Technology,” IEEE CS and IEEE ComSoc, vol. 5, no. 1, Santa Clara, 2006, pp. 25-33. [2] EPC global Gen 2 Specification, 2015 [Online]. Available: http://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf [3] CSols.com (Laboratory Systems Integration). [Online]. Available: http://www.csols.com/wordpress/tag/rfid/ [4] MiXiM simulator for wireless and mobile networks using OMNeT++. [Online]. Available: http://mixim.sourceforge.net [5] Brooks.com (RFID Reader). [Online]. Available: http://www.brooks.com/applications-by-industry/rfid/rfid-basics/rfid- components/rfid-reader [6] K. Wessel, et al., "MiXiM: the physical layer an architecture overview," 2nd International Workshop on OMNeT++, Rome, Italy, 2009. 28