RFID Multiple Access Methods

نویسنده

  • Eth Zürich
چکیده

Abstract Due to their limitless possibilities and low cost, RFID systems are powerful object identi cation tools well-suited in everyday applications. When attempting to identify multiple RFID tags from densely populated elds within the shortest timeframe possible, the typical design characteristics of RFID systems lead to a problematic lack of adequate resources to e ciently do so. After a brief introduction to RFID we present several forms of the multipleaccess protocol Aloha known from networking to resolve collisions, with special focus on the variants thereof which make them attractive for deploying in RFID systems. We then review a series of commercially available or standards-de ned RFID systems, and liken the contention resolution protocols used to the presented Aloha variants. The problematic of comparing the systems' performance will be addressed, and several systems brie y put against one-another.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-domain Rfid Access Control Using Asymmetric Key Based Tag-reader Mutual Authentication

Multi-domain RFID applications, such as asset tracking across domains, shift the paradigm in business model and enable next-generation business processes for aviation industry. The increasing number of RFID applications also merits the consolidation of RFID tags so they can serve multiple purposes. However, the adoption of such multi-domain RFID applications depends on their ability to enforce ...

متن کامل

Using CDMA as Anti-Collision Method for RFID - Research & Applications

The increasing number of deployed RFID systems and the resulting need for fast recognition of a given amount of RFID tags puts great demand on future RFID readers. Applications requesting for a fast capture of RFID tags are mainly found in logistic and manufacturing processes. Imagine trucks driving through large RFID gates, where each RFID tagged package or even item has to be identified. Also...

متن کامل

مدلی برای پیاده‌سازی فناوری RFID در بیمارستان‏ها مورد مطالعه: بخش‌های جراحی بیمارستان فیروزگر تهران

Introduction: Efforts to enhance health care services have been an inevitable issue from long time ago, and significant technology-driven changes in industries have far-reaching effects on the healthcare system. Besides technical feasibility of Radio Frequency Identification (RFID) technology, measurement and evaluation of cost effectiveness and performance of this technology are also noteworth...

متن کامل

DCSK Multi-Access Scheme for UHF RFID System

DCSK modulation in chaos communication is a robust non-coherent modulation scheme. In this paper, the multiple-access DCSK scheme based on the OVSF code is proposed. Using the multiple-access DCSK scheme in RFID system, a DCSK-RFID system is presented. In the presented DCSK-RFID system, we use the DCSK for tag modulation for its low complexity and the simple receiver of the DCSK scheme is appli...

متن کامل

Privacy Issues of Applying RFID in Retail Industry

Retail industry poses typical enterprise computing challenges, since a retailer normally deals with multiple parties that belong to different organizations (i.e., suppliers, manufacturers, distributors, end consumers). Capable of enabling retailers to effectively and efficiently manage merchandise transferring among various parties, Radio Frequency Identification (RFID) is an emerging technolog...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004