2. Abstract
RFID is a wireless communication technology that provides
automatic identification or tracking and data collection from any
tagged object.
Due to the shared communication channel between the reader and
the tags during the identification process in RFID systems,
Many tags may communicate with the reader at the same time,
which causes collisions. The problem of tag collision has to be
addressed to have fast multiple tag identification process.
There are two main approaches to the tag collision problem: ALOHA
based algorithms and tree based algorithms.
A new trend emerged recently which takes the advantages of
both ALOHA and tree based approaches. This paper describes
the process and performance of the tag anti-collision algorithms
of the tree-ALOHA trend.
3. Introduction
Ubiquitous tagging is a paradigm where everything related
has a unique tag associated with it.
Picture the scenario that every object in the world can be
uniquely identifiable with some form of electronic tags.
This would have tremendous benefits in terms of
tracking and identifying an object, making ubiquitous
identification possible.
As ubiquitous identification systems have become
commonplace in access control and security applications
areas, RFID systems are increasingly being used a s the
automated identification system for these applications.
4. Existing System
Combining RFID with the Internet, database and
middleware can change everyday objects into
mobile network nodes, and then it becomes easy to
track, trace, monitor, and perform some actions on
those tagged objects.
Tag exsixting anti-collision algorithms can be
classified into two broad groups
1. probabilistic algorithms
2.deterministic algorithms.
5. Disadvantages
The tag sends its own ID to the reader for tag
identification. The reader should be able to
recognize tags as quickly as possible. However, the
signals in both directions between the reader and the
tag may collide
As a consequence, either the reader may not identify
all tags or a tag identification process may suffer from
long delay
6.
7. Proposed System
Tree ALOHA, slotted ALOHA and frame slotted
ALOHA, algorithm used to anti collision the RFID
TAG
It decrease the occurrence possibility of tag collisions
by allowing the tags to transmit their own serial
numbers at a distinct time
8. Advantages
The slotted ALOHA based tag anti-collision
algorithms provide simple implementation and
good performance for small amount of tags
Tree based RFID tag anti-collision algorithms
achieve full read rate
9. Applications Used In RFIS
RFID technology is already widely applied in
manufacture
supply chain
retail
inventory control
transportation
healthcare
agriculture
construction
11. Tree ALOHA Working Algorithm
A reader chooses ‘0’ or ‘1’ for the initiative. If the reader makes
a choice, the identification process should keep the way of choice
order when the tree splits at a node. Then the binary tree working
algorithm (BTWA) is operated as follows:
The reader transmits k-length prefix.
Tags send (k+1)th bit if the first k bits of tag IDs are the same as the
prefix.
If the received bits collide, the extended prefix attached ‘0’ or ‘1’ to
the prefix is retransmitted by the reader. If they do not collide, the
received bit is attached to the prefix for the next prefix. If there
is no response, the branch is ignored. Also, a collision occurs at
the last bit of the tag IDs, the reader assumes there are two tags
because of the uniqueness of the tag IDs.
The reader repeats the procedure until all branches are searched.
12. Simulation Result
The average inquiring bits and response bits for
one-tag identification.
In the RN16QTA, both the average inquiring bits and
response bits for one-tag identification are between
the case of QTA and the case of CTTA.
The reason is that RN16QTA reduces the overhead
from both the average inquiring bits and response
bits by using the temporary IDs, but generates the
overhead caused by collecting the tag IDs.
13. References
[1] R. Weinstein, “RFID: A Technical Overview and Its
Application to The Enterprise,” IEEE IT
Professional, Vol. 7, Iss. 3, pp. 27-33, May-Jun. 2005.
[2] Y. Xiao, X. Shen, B. Sun, and L. Cai, “Security and
Privacy in RFID and Applications in Telemedicine,” IEEE
Communications Magazine, Vol. 44, Iss. 4, pp. 64-72, Apr.
2006.
[3] J. Landt, “The History of RFID,” IEEE Potentials, Vol. 24,
Iss. 4, pp. 8-11, Oct.-Nov. 2005.
[4] D.-H. Shih, P.-L. Sun, D. C. Yen, and S.-M. Huang,
“Short Survey: Taxonomy and Survey of RFID Anti-
collision Protocols,” Computer Communications, Vol. 29,
Iss. 11, pp. 2150-2166, Jul. 2006.