You are on page 1of 13

COLLISION AVOIDANCE IN RFID

SYSTEMS USING SHADOW SLOTS


GUIDED BY PRESENTED BY
STUD1
STUD2
STUD3
 
OBJECTIVE
• The main purpose of the project is to avoid
collision between the multiple tags when they
are being read by the reader.
ABSTRACT
• RFID system consists of a reader and multiple tags. In
the RFID environment, consumers can obtain product-
related information of
• Tag collision problem is serious in the environment.
This paper proposes a shadow-slot algorithm for
handling this
• The tags are arranged by using the collision tree
algorithm. The colliding tags are then placed in a
separate new slot
• Accordingly, the algorithm significantly reduces
collision frame slots, and eliminates empty frame slots.
Our
EXISTING SYSTEM
• STEP 1: Reservation procedure
a) Reader assigns reservation slots according to the
number of tags.
b)Each tag randomly selects a slot by sending
random numbers.
c) Reader allocates frame slot.

• STEP2: Identification procedure


a) Reader identifies the tag.
b)It consists of 3 cases
PROBLEMS IN EXISTING
SYSTEM

• If the random sequences are the same, it


receives and allocates the frame slot.
• Multiple IDs will be transmitted and collides.
• Results in misreading.
PROBLEM DEFINITION

• Tag collision problem


o Low packet reception rate due to transmission of
data at the same time, called as packet collision.
o TDMA is appropriate for RFID system.
o It has low complexity and so, Aloha based
protocols are used in this.
o But, it causes empty frame slots and collision
frame slots
PROPOSED SYSTEM
Reservation Procedure:
•The reader assigns some small-size slots for the tags
called the reservation slots.
•Each tag randomly selects a reservation slot by
transmitting a random number sequence
•The number of slots allocated depends on the number
of tags read by the reader.
Hardware/Software
Technologies Needed::
• Hardware and Software with cost
ARCHITECTURE DIAGRAM
MODULE DESCRIPTION
• Label/Badge Module
• Primer Module
• Beckon/Gesture Module
• Inventory Module
• Revision Module
• Server Module
Conclusion
REFERENCES
• H.Cho, J.Kim, and Y.Baek, “Large-scale active RFID system utilizing
ZigBee networks,” IEEE Trans. Consum. Electron., Vol. 57, No. 2,
pp.379-385, May 2011.
• J.Yu, W.Lee, and D.Du, “Reducing reader collision for mobile
RFID,”IEEE Trans. Consum. Electron., Vol. 57, No. 2, pp.574-582, May
2011.
• X.Jia and Q.Feng. “An efficient anti-collision protocol for RFID tag
identification,” IEEE Commun. Lett., vol. 14, no. 11, pp. 1014-1016,Nov.
2010
• L.Pan and H.Wu, “Smart trend-traversal protocol for RFID tag
arbitration,” IEEE Trans. Wireless Commun., vol.10, no.11, pp.3565-3569,
Nov. 2011.
• J.Myung, W.Lee, J.Srivastava, and T.K.Shih, “Tag-splitting:
adaptivecollision arbitration protocols for RFID tag identification,” IEEE
Trans. Parallel Distrib. Syst., vol. 18, no. 6, pp.763-775, Jun. 2007.

You might also like