中国高校课件下载中心 》 教学资源 》 大学文库

南京大学:《物联网技术导论 Introduction of Internet of Things》课程教学资源(课件讲稿)专题——RFID的识别与估算机制

文档信息
资源类别:文库
文档格式:PDF
文档页数:46
文件大小:8.09MB
团购合买:点击进入团购
内容简介
一、RFID的基本通信原理 二、基于时隙ALOHA的标签识别机制 三、RFID标签估算机制(Estimation) 四、开放性问题(Open Problem)
刷新页面文档预览

“物联网技术导论”课程专题报告 专题1:RFID的识别与估算机制 谢磊教授 南京大学计算机科学与技术系

专题1:RFID的识别与估算机制 谢磊 教授 南京大学计算机科学与技术系 “物联网技术导论”课程专题报告

主要内容: 一、RFD的基本通信原理 二、基于时隙ALOHA的标签识别机制 三、RFID标签估算机制(Estimation) 四、开放性问题(Open Problem) 五、参考文献

二、基于时隙ALOHA的标签识别机制 主要内容: 五、参考文献 三、RFID标签估算机制(Estimation) 一、RFID的基本通信原理 四、开放性问题(Open Problem)

RFD的基本通信原理-1 Far-Field Propagation and Backscatter Principle Distance r o" Matching Network Reader Za TAG P4 P3 Reader antenna Tag antenna gain Gt gain Gr Fig.1.Far-Field Propagation for RFID system

RFID的基本通信原理-1 • Far-Field Propagation and Backscatter Principle

RFD的基本通信原理-2 Far-Field Propagation and Backscatter Principle We denote the down-link communication from the reader to a tag as the forward channel,and denote the up-link communication from a tag to the reader as the reverse channel. forward channel Distance r P2 Matching Network Reader Za TAG Reader antenna Tag antenna gain Gt gain Gr reverse channel Fig.1.Far-Field Propagation for RFID system

RFID的基本通信原理-2 • Far-Field Propagation and Backscatter Principle – We denote the down-link communication from the reader to a tag as the forward channel, and denote the up-link communication from a tag to the reader as the reverse channel. forward channel reverse channel

RFD的基本通信原理-3 Far-Field Propagation and Backscatter Principle For successful reading of a passive tag with the backscatter scheme, there are two thresholds to meet the physical requirements.The first is the tag power (sensitivity)threshold,Pts.It is the minimum received power necessary to turn on an RFID chip.The second is the reader sensitivity threshold,Prs.It is the minimum level of the tag signal that the reader can detect and resolve. Distance r Matching Network Reader Za 9 Prs Pt灯 TAG P4 Reader antenna Tag antenna gain Gt gain Gr Fig.1.Far-Field Propagation for RFID system

RFID的基本通信原理-3 • Far-Field Propagation and Backscatter Principle – For successful reading of a passive tag with the backscatter scheme, there are two thresholds to meet the physical requirements. The first is the tag power (sensitivity) threshold, Pts. It is the minimum received power necessary to turn on an RFID chip. The second is the reader sensitivity threshold, Prs. It is the minimum level of the tag signal that the reader can detect and resolve. Pts Prs

RFD的基本通信原理-4 Far-Field Propagation and Backscatter Principle Thus it must satisfy P2>Pts for the tag to be powered up and resolve the received signal,and also P4 Prs for the reader to detect and resolve the received signal. Distance r P2 Matching Network Reader Za 四V胶 TAG Reader antenna Tag antenna gain Gt gain Gr Fig.1.Far-Field Propagation for RFID system

RFID的基本通信原理-4 • Far-Field Propagation and Backscatter Principle – Thus it must satisfy P2 > Pts for the tag to be powered up and resolve the received signal, and also P4 > Prs for the reader to detect and resolve the received signal. Pts Prs P4 P2

基于时隙ALOHA的标签识别机制-1 Tag inventory and access Interrogator cw Select CW Query cw Ack Cw QueryRep CW NAK Cw Tag PC+EPC RN16 +CRC16 Interrogator cw Query Cw QueryRep CW QueryRep Cw QueryRep CW INo ReplyI Collision Detected Single Reply Tag RN16 RN16 Fig.2.C1G2 protocol

基于时隙ALOHA的标签识别机制-1 • Tag inventory and access

基于时隙ALOHA的标签识别机制-2 Tag inventory and access The MAC protocol for the C1G2 system is based on Slotted ALOHA, where each frame has a number of slots and each active tag will reply in a randomly selected slot per frame. When a reader(interrogator)wishes to read a set of tags,it first powers up and transmits a continuous wave(CW)to energize the tags.It then initiates a series of frames,varying the number of slots in each frame to best accommodate the number of tags.After all tags are read,the reader powers down.We refer to an individual frame as a Query Round,and the series of Query Rounds between power down periods as a Query Cycle. Query Cycle Query Round Query Round cee0。 Query Round

基于时隙ALOHA的标签识别机制-2 • Tag inventory and access – The MAC protocol for the C1G2 system is based on Slotted ALOHA, where each frame has a number of slots and each active tag will reply in a randomly selected slot per frame. – When a reader (interrogator) wishes to read a set of tags, it first powers up and transmits a continuous wave (CW) to energize the tags. It then initiates a series of frames, varying the number of slots in each frame to best accommodate the number of tags. After all tags are read, the reader powers down. We refer to an individual frame as a Query Round, and the series of Query Rounds between power down periods as a Query Cycle. Query Round Query Round …… Query Round Query Cycle

基于时隙ALOHA的标签识别机制-3 Tag inventory and access - For each Query Round,the reader can optionally transmit a Select command which limits the number of active tags by providing a bit mask.Then a Ouery command is transmitted which contains the uplink frequency and data encoding,the o parameter determining the number of slots for the following frame,and a Target parameter. Interrogator Select cw Query cw Ack Cw QueryRep Cw NAK Cw Tag RN16 PC+EPC +CRC16 Interrogator Query CW QueryRep Cw QueryRep Cw QueryRep INo Reply I Collision Detected Single Reply Tag RN16 Fig.2.C1G2 protocol

基于时隙ALOHA的标签识别机制-3 • Tag inventory and access – For each Query Round, the reader can optionally transmit a Select command which limits the number of active tags by providing a bit mask. Then a Query command is transmitted which contains the uplink frequency and data encoding, the Q parameter determining the number of slots for the following frame, and a Target parameter

基于时隙ALOHA的标签识别机制-4 Tag inventory and access 一 When a tag receives a Ouery command,it chooses a random number in the range (0,20-1),where is in the range (0,15),and the value is stored in the slot counter of the tag.If a tag stores a 0 in its slot counter, it will immediately backscatter a 16 bit random number,denoted by RN16. Interrogator Cw Select Cw Query cw Ack Cw QueryRep Cw NAK CW Tag RN16 PC+EPC +CRC16 Interrogator Cw Query CW QueryRep Cw QueryRep Cw QueryRep INo Reply I Collision Detected Single Reply Tag RN16 Fig.2.C1G2 protocol

基于时隙ALOHA的标签识别机制-4 • Tag inventory and access – When a tag receives a Query command, it chooses a random number in the range (0, 2�−1), where Q is in the range (0,15), and the value is stored in the slot counter of the tag. If a tag stores a 0 in its slot counter, it will immediately backscatter a 16 bit random number, denoted by RN16

刷新页面下载完整文档
VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
相关文档