Read Range Analysis of Passive RFID Systems for Manufacturing Control Systems

نویسندگان

  • M. Keskilammi
  • L. Sydänheimo
  • P. Salonen
  • M. Kivikoski
چکیده

An RFID system can be considered as a wireless communication system because the reader device communicates with the transponder by using electromagnetic waves at radio frequencies. The performance of this communication link can be studied by determining the read range for backscatter RFID systems. The read range or the distance where the reader unit notices the tag depends on many factors. Frequency used for identification, gain, orientation and polarization of the reader antenna and the transponder antenna, and the placement of the tag on the object to be identified will all have an impact on the RFID system’s read range. [1] This paper presents an approach to analyzing the read range of a backscatter RFID system as a function of frequency, antenna gain and polarization mismatch. Key-Words: RFID, Manufacturing Control, Transportation Systems, Production Planning

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Calculation of read distance in passive backscatter RFID systems and application

One of the obstacles to wide adapt passive RFID systems is the limited read distance or relatively high error rate due to radio interferences in the passive backscatter RFID systems. The most important tag performance characteristic is read distance at which RFID reader can detect the backscattered signal from the tag. The read distance in passive backscatter RFID systems depends on many factor...

متن کامل

Detection Probability of Passive RFID Systems under Cascaded Rician and Rayleigh Fading Channel

Radio Frequency Identification (RFID) system uses the principle of radiative power transfer between the reader and the tag antenna. The main performance metric for RFID system is the reliable reading coverage, where the tag can be read with higher detection probability. Most of current researches consider the reader coverage to be determined only by its read range assuming monostatic configurat...

متن کامل

Token-MAC: Inactive RFID Systems for A light MAC Protocol

Passive RFID systems used for list organization and benefit tracking normally use contention-based MAC protocols, such as the normal C1G2 protocol. Although the C1G2 protocol has the benefit that it is easy to apply, it suffers from wrongness and relatively low throughput when the number of tags in the network increases. It proposes a token-based MAC protocol called Token-MAC for passive RFID s...

متن کامل

Intercepting UHF RFID signals through synchronous detection

Recently, augmented ultrahigh frequency radio-frequency identification (UHF RFID) systems have been developed, and they contain additional components that can detect a tag’s backscattered response and use this information for the localization of the tag and other applications. The methods currently employed either have poor performance because the detection of the tag’s response is based on env...

متن کامل

The Study of RFID Authentication Protocols and Security of Some Popular RFID Tags

A radio frequency identification (RFID) system consists of three components: radio frequency (RF) tags (or transponders), RF readers (or transceivers), and a backend server. Tag readers inquire tags of their contents by broadcasting an RF signal, without physical contact, at a rate of several hundred tags per second and from a range of several meters. The advancements of Silicon manufacturing a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002