RFID Singulation

http://en.wikipedia.org/wiki/Singulation


Singulation

From Wikipedia, the free encyclopedia

Singulation is a method by which an RFID reader identifies a tag with a specific serial number from a number of tags in its field. This is necessary because if multiple tags respond simultaneously to a query, they will jam each other. In a typical commercial application, such as scanning a bag of groceries, potentially hundreds of tags might be within range of the reader.

RFID读写器从在它的场中的许多标签中,通过一种方法,识别拥有一个特定序列号的一个标签,这种方法就是Singulation。这是必需的,因为如果对于一个请求,多个标签同时响应,它们就会互相堵塞。在一个典型的商业应用中,比如正在扫描一袋杂货,很有可能几百个标签都会在读写器的范围中。

Contents

   [hide] 
  • 1 Collision avoidance
  • 冲突避免
  • 2 Tree walking
  • 树的遍历
  • 3 ALOHA
  • 4 Slotted Aloha
  • 时隙Aloha
  • 5 Listen before talk
  • 载波监听(先听后讲)

Collision avoidance[edit]

冲突避免

Generally collision occurs when two entities require the identical resource; for example, two ships with crossing courses in a narrows. In wireless technology, collision occurs when two transmitters transmit at the same time with the same modulation scheme on the same frequency. In RFID technology, various strategies have been developed to overcome this dangerous situation.

通常,冲突发生在两个实体需要同一资源时。例如,在一个海峡里两艘交叉航向的船。在无线技术中,冲突发生在两个发射器在相同的时间、相同的频率发送相同的调制方式。在RFID技术中,已经发展了不同的策略来克服这个危险的情况。

Tree walking[edit]

Tree walking singulation

There are different methods of singulation, but the most common is "tree walking", which involves asking all tags with a serial number that starts with either a 1 or 0 to respond. If more than one responds, the reader might ask for all tags with a serial number that starts with 01 to respond, and then 010. It keeps doing this until it finds the tag it is looking for. Note that if the reader has some idea of what tags it wishes to interrogate, it can considerably optimise the search order. For example with some designs of tags, if a reader already suspects certain tags to be present then those tags can be instructed to remain silent, then tree walked without interference from them, and then finally they can be queried individually.

This simple protocol leaks considerable information, because anyone able to eavesdrop on the tag reader alone can determine all but the last bit of a tag's serial number. Thus a tag can be (largely) identified so long as the reader's signal is receivable, which is usually possible at much greater distance than simply reading a tag directly. Because of privacy and security concerns related to this, the Auto-ID Labs have developed two more advanced singulation protocols, called Class 0 UHF and Class 1 UHF, which are intended to be resistant to these sorts of attacks. These protocols, which are based on tree-walking but include other elements, have a performance of up to 1000 tags per second.

The tree walking protocol may be blocked or partially blocked by RSA Security's blocker tags.

ALOHA[edit]

The first offered singulation protocol is the ALOHA protocol, originally used decades ago in ALOHAnet and very similar to CSMA/CD used by Ethernet. These protocols are mainly used in HF tags. In ALOHA, tags detect when a collision has occurred, and attempt to resend after waiting a random interval. The performance of such collide-and-resend protocols is approximately doubled if transmissions are synchronised to particular time-slots, and in this application time-slots for the tags are readily provided for by the reader. ALOHA does not leak information like the tree-walking protocol, and is much less vulnerable to blocker tags, which would need to be active devices with much higher power handling capabilities in order to work. However when the reader field is densely populated, ALOHA may make much less efficient use of available bandwidth than optimised versions of tree-walking. In the worst case, an ALOHA protocol network can reach a state of congestion collapse. The Auto-ID consortium is attempting to standardise a version of an ALOHA protocol which it calls Class 0 HF. This has a performance of up to 200 tags per second.

Slotted Aloha[edit]

Slotted Aloha is another variety offering better properties than the initial concept.

Listen before talk[edit]

This concept is known from polite conversation. It applies as well to wireless communication, also named listen before send. With RFID it is applied for concurrence of readers (CSMAelementary term explanation in RFID Tribe) as well as with concurrence of tags.



你可能感兴趣的:(通信技术)