Professional Documents
Culture Documents
Aloha Based Rfid Anti Collision PDF
Aloha Based Rfid Anti Collision PDF
net/publication/224695227
CITATIONS READS
49 413
2 authors, including:
Leian Liu
Zhongkai University of Agriculture and Engineering
23 PUBLICATIONS 137 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Leian Liu on 21 March 2019.
Abstract—Collision is a familiar problem and one of the largest ALOHA algorithm, belong to the stochastic collision
disadvantages in RFID system. There are always two methods to resolution. Binary search algorithm and Dynamic binary search
deal with the collision problems. One is the deterministic collision algorithm and tree-based algorithms belong to the deterministic
resolution and the other is the stochastic collision resolution. The resolution. In this paper, focus is given on the ALOHA-based
ALOHA-based anti-collision algorithms belong to the latter. In algorithms. The ALOHA-based algorithms in RFID systems
this paper, the ALOHA-based anti-collision algorithms are are described and the most important is the method to estimate
introduced and summarized. The most important is that two Tag the number of tags in the interrogation zone of the reader is
estimation methods which are necessary to the DFSA algorithm discussed and analyzed.
(Dynamic framed slotted ALOHA algorithm) are investigated
using the conventional ternary feedback model. How to use these
two Tag estimation methods is also analyzed. II. ALOHA-BASED ALGORITHMS
ALOHA-based algorithms are an important part of the
Keywords-RFID; ALOHA; anti-collision algorithm; multiple anti-collision algorithms in RFID systems and are being used
access in many practical RFID systems. In this section, the ALOHA-
based algorithms are summarized and analyzed.
I. INTRODUCTION
RFID which means “Radio Frequency Identification” is A. ALOHA and Slotted ALOHA algorithm
developed very fast in recent few years. The history of RFID The introduction of the ALOHA algorithm which is used
technology can backwards to the early days of twenty century. to solve the bursty traffic in packet communication networks
In 1948, the first paper focused on the RFID technology- was firstly appeared in the paper [2]. In RFID system, the
“Communication by Means of Reflected Power” [1] appeared ALOHA algorithm is used exclusively with read-only
and it can be regarded as a milestone of the RFID technology. transponders (tags) [3]. The ALOHA algorithm is a
RFID technology is one of the branches of automatic transponder-driven stochastic TDMA procedure which means
identification technology. Compared with other automatic once a transponder enters the interrogation zone of an
identification technology, RFID technology has lots of merits, interrogator (reader), it will send its data packet to the
e.g., it does not require the direct contact and line-of-sight, it interrogator. In such a RFID system, the amount of the data
can work effectively under extremely bad condition, tags can transmitted between the reader and the tag are small, typically
be used repeatedly and the information stored in them is much only the identification codes of tags in the interrogation zone
larger and can be reprogrammed easily, tags can be recognized of the reader. In the ALOHA algorithm, tags transmit the data
by the reader at the same time, etc. Because of merits in a cyclical sequence. The time in which the data are
mentioned above, RFID technology is used in many areas transmitted to the reader is only a fraction of the repetition
today. Identity identification and assets management are two time. After the first transmission, the tag will wait for a
areas in which RFID techniques are used widely and maturely. relatively longer time to transmit its data again. The difference
Commercial supply chain is one of the most widely area in of waiting time between each tag is small. By this way, not
which RFID techniques are used. Preventing from fakes is until all the tags finish the transmission of their data to the
another use of RFID techniques. Besides its merits, there are reader successfully, can the repeating process stop.
still some problems and disadvantages that should be deal with. Considering the scheme of the ALOHA algorithm, there is a
Collision is a familiar problem and one of the largest certain probability that a collision will happen which means
disadvantages in RFID system. Only the collision problem is two or more tags will transmit their data at the same time or
solved, can RFID system work effectively. Typically, there are although they do not transmit their data at the same time, they
two kinds of methods used to solve this problem. One is the may also collide with each other, e.g., when one tag is in the
deterministic collision resolution and the other is the stochastic process of transmitting its data to the reader, there is another
collision resolution. The ALOHA algorithm and some methods tag which begin to transmit its data to the reader too. When the
based on it, such as the Slotted ALOHA algorithm, the Framed number of tags in the interrogation zone of the reader becomes
slotted ALOHA algorithm and the Dynamic framed slotted
n 1 1
P( X = t ) = ( )t (1 − ) n −t (2)
t N N
Figure 1. Relationship between Number of slots and Throughput
So the expected number of slots ( m ) each one of which
having t tags allocated to them can be received by: After each request, the number of E , S and C can be
received and N in the current frame is already known, so
n 1 1 according to equation (4), (5) and (6), we can get the number
m = N ( )t (1 − )n −t (3)
of tags ( n " ) which have not been recognized by the reader
t N N
after the current frame as follows:
By equation (3), we can get:
n" = n − S (10)
1
E = N (1 − )n (4) C. Comparison between two Tag estimation methods
N
By equation (1), we can see that Tag estimation methodⅠ
1 is simple and easy to be implemented. Tag estimation method
S = n(1 − )n −1 (5)
N Ⅱis more complicated when compared with Tag estimation
methodⅠ, but it is more accurate.
C = N −E−S (6) We define the estimation accuracy as follows:
E , S and C are defined at the beginning of this section. We n' n'
define the throughput T as follows: estimation accuracy = = (11)
n" n − S
S n 1 Given some values of N and n , we can get Fig. 2 depending
T= = (1 − )n −1 (7)
N N N on the equation (11) as follows:
We differentiate equation (7) and get the result:
REFERENCES
[1] H. Stockman, “Communication by Means of Reflected Power”,
Proceedings of the IRE, Oct., 1948, pp. 1196-1204.
[2] N. Abramson, “The ALOHA System-Another Alternative for Computer
Communications”, Fall Joint Computer Conference, AFIPS Conference
Proceedings, 1970, Vol. 37, pp. 281-285.
Figure 2. Relationship between Number of slots and Estimation accuracy [3] Klaus Finkenzeller, RFID Handbook: Fundamentals and Applications in
Contactless Smart Cards and Identification, 2nd ed., John Wiley & Sons
In Fig. 2, the estimation accuracy is much closer to 1 Ltd, 2003.
(above 1 or below 1), the better result will be achieved. We [4] L. G. Roberts, “Extensions of Packet Communication Technology to a
can also find that when the number of slots is almost the same Hand Held Personal Terminal”, AFIPS Conf. Proc., Spring Joint
Computer Conf., 1972, vol. 40, pp. 295-298.
to that of the tags, the two Tag estimation methods get almost
[5] J. E. Wieselthier, A. Ephremides, and L. A. Michaels, “An Exact
the same result. In this condition, the estimation accuracy in Analysis and Performance Evaluation of Framed ALOHA with
Fig. 2 is almost equal to 1. So if the two tag estimation Capture”, IEEE Transactions on Communications, 1989, vol. 37, pp.
methods are used in the Dynamic framed ALOHA algorithm, 125-137.
the following sequence will be implemented: [6] R. Du, H. Okada, H. Nakanishi, H. Sanada, and Y. Tezuka,
“Performance Evaluation and Optimization of ALOHA Scheme with
• Firstly, choose a suitable frame length N. Here, Capture Effect”, Conf. Rec. GLOBECOM’87, Nov., 1987, pp. 555-560.
“suitable” means N should not too small or too large [7] EPCglobal, Class 1 Generation 2 UHF Air Interface Protocol Standard
according to the applications in practice. Version 1.0.9, 2005.
[8] International Organization for Standardization, ISO/IEC 14443-3:
• Secondly, after the first request, using Tag estimation Identification Cards-Contactless Integrated Circuit(s) cards-Proximity
methodⅡto estimate the number of tags, because it cards-Part3: Initialization and anti-collision, 2000.
will give us a good estimation result. [9] H. Vogt, “Multiple Object Identification with Passive RIFD Tags”, 2002
IEEE International Conf. on Systems, man and Cybernetics, Oct., 2002,
• From now on, after the second request and so on, we vol.3, pp.6-9.
can use Tag estimation methodⅠat ease and it will [10] Jia Zhai and Gi-Nam Wang, “An Anti-collision Algorithm Using Two-
also give us a good estimation result. Functioned Estimation for RFID Tags”, International Conference on
Computational Science and its Applications, 2005, pp. 702-711.
Keep on sending the request, until all the tags are [11] F. C. Schoute, “Dynamic Frame Length ALOHA”, IEEE Transactions
recognized and there is no reply from the tags any longer. on Communications, Apr., 1983, vol. 31, pp. 565-568.