Question

In: Computer Science

mention some RFID anti-collision protocols ?

mention some RFID anti-collision protocols ?

Solutions

Expert Solution

Some of the RFID anti- collision protocols are -

1. Aloha Protocols

Aloha-based protocols use a random-access strategy in order to successfully identify the number

of tags in an interrogation area .They belong to the group of probabilistic protocols because the

tags transmit their own ID in randomly selected slots in a frame in order to reduce the possibility of

a collision. However, there is no guarantee that all of the tags will be identified in the interrogation

process. These protocols suffer from the well-known tag starvation problem, in the sense that a tag

may not be correctly read during a reading cycle due to an excessive number of collisions with that

same tag. Every frame consists of a certain number of slots, and the tags can only respond once per

frame The main Aloha-based protocols can be divided into four subgroups: Pure Aloha (PA),

Slotted Aloha (SA), Frame Slotted Aloha (FSA) and Dynamic Frame Slotted Aloha (DFSA) protocols.

2. Tree-Based Protocols

One of the main features of tree-based protocols is that they are deterministic, since ideally,

they are designed to identify the whole set of tags in the interrogation area . These protocols

have simple design tags and work very well with a uniform set of tags.

Tree-based protocols usually work with a muting capability since they need the identified tags to

remain quiet after their identification. These protocols usually work using queries, which are broadcast

commands transmitted by a reader to require the tags to respond. If a tag’s ID does not match the

query, the reader command is rejected.

First, the most popular tree-based protocols are presented here. Then, a selected group of protocols

will be presented with the common feature of the use of Manchester coding. The first group includes:

Query Tree (QT), Query Window Tree (QwT), and Smart Trend Transversal (STT). Another group

consists of tree-based protocols that use Manchester coding: Binary Search (BS), Collision Tree (CT),

Optimal Query Tracking Tree (OQTT), and Collision Window Tree (CwT).

3. Hybrid Protocols

Hybrid protocols combine the advantages of tree-based and Aloha-based protocols to avoid their

problems and provide better features in tag identification . Most of them first implement

a tree-based procedure and tag estimation procedure in order to predict the number of tags.

Therefore, the combined Aloha-based and tree-based protocol procedures are known for their high

complexity and hardware demands. This kind of protocol can significantly increase performance as

compared to the previous ones.

Recent proposals include the Tree Slotted Aloha (TSA) and Binary Tree Slotted Aloha (BTSA).

TSA uses a tree structure, and the tag’s responses are organized in slots, as in FSA. In the BTSA protocol,

tags randomly choose a slot after the reader query.


Related Solutions

mention some technologies used in 5G?
mention some technologies used in 5G?
Researching Applications of RFID. Visit the Web and perform a search on RFID for applications that...
Researching Applications of RFID. Visit the Web and perform a search on RFID for applications that we didn’t discuss in this chapter. Also, search the Web for the leading provider of RFID technologies. What companies did you find? Does one seem to stand out above the rest? If so, which is it?
RFID is one of several systems for automatic data capture. Sometimes RFID is referred to as...
RFID is one of several systems for automatic data capture. Sometimes RFID is referred to as a component which enables the goods to become ‘intelligent’ and ‘smart’ so that they can communicate with their surroundings. Briefly compare bar codes and RFID and discuss four (4) different examples of situations where you believe that RFID has advantages over bar codes.
Provide information about Distance-vector routing protocols. Provide information about Link-state routing protocols. Provide some troubleshooting commands...
Provide information about Distance-vector routing protocols. Provide information about Link-state routing protocols. Provide some troubleshooting commands and explain about the usage.
a) What other protocols are just fine with UDP, and why? b) There are some applications...
a) What other protocols are just fine with UDP, and why? b) There are some applications protocols (e.g., HTTP, SMTP) that use TCP as their transport layer protocol and cannot use UDP instead. Why?
explain how RFID has affected retailing operations in Lululemon. What are some of the key benefits...
explain how RFID has affected retailing operations in Lululemon. What are some of the key benefits of this technology?What does the RFID chip tell you and how does it impact the guest experience? What type of merchandise is most likely to be crossdocked. at retailers' distribution centers? Why is this the case? Which of the following types of retailers do you think would benefit most from instituting CRM a. supermarket b. banks c. autombile dealers, or d. consumer electronic retailers?...
-What are some economical arguments made by the anti globalization movement?
-What are some economical arguments made by the anti globalization movement?
What is Anorexia nervosa? Mention some of the symptoms exhibited in this condition?
What is Anorexia nervosa? Mention some of the symptoms exhibited in this condition?
Why are some people anti-capitalist? What are some negative stereotypes associated with capitalism? Give some examples.
Why are some people anti-capitalist? What are some negative stereotypes associated with capitalism? Give some examples.
Describe communication protocols and specify at least 3 of the modern protocols in use
Describe communication protocols and specify at least 3 of the modern protocols in use
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT