applied wireless electronics grzegorz budzy „ lecture 5: rfid

Post on 12-Feb-2022

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

AppliedApplied WirelessWireless ElectronicsElectronics

Grzegorz BudzyGrzegorz Budzyńń

LLectureecture 55::RFIDRFIDWirelessWireless data transfer data transfer –– WiMAXWiMAX

Plan• RFID

– Introduction

– Tags

– Reader

– Communication

– Middleware

• WiMAX

– WiMAX standards

– WiMAX vs OSI model

– WiMAX architecture

RFID - Introduction

What is RFID?

• RFID means Radio Frequency IDentification

• RFID is An ADC (Automated Data Collection) technology that:– uses radio-frequency waves to transfer data

between a reader and a movable item to identify, categorize, track..

– Is fast and does not require physical sight or contact between reader/scanner and the tagged item.

What is RFID?

• RFID is An ADC (Automated Data Collection) technology that:– Performs the operation using low cost

components.

– Attempts to provide unique identification and backend integration that allows for wide range of applications.

• Other ADC technologies: Bar codes, OCR.

What is RFID?

Eth

ern

et

RFID

Reader

RFID Tag RF Antenna Network Workstation

Why RFID?• Tag detection not requiring human intervention

reduces employment costs and eliminates human errors from data collection,

• As no line-of-sight is required, tag placement is less constrained,

• RFID tags have a longer read range than, e. g., barcodes,

Why RFID?• Tags can have read/write memory capability, while

barcodes do not,

• An RFID tag can store large amounts of data additionally to a unique identifier,

• Unique item identification is easier to implement with RFID than with barcodes,

Why RFID?• Tags are less sensitive to adverse conditions (dust,

chemicals, physical damage etc.),

• Many tags can be read simultaneously,

• RFID tags can be combined with sensors,

• Automatic reading at several places reduces time lags and inaccuracies in an inventory

Why RFID?• Tags can locally store additional information; such

distributed data storage may increase fault tolerance of the entire system,

• Reduces inventory control and provisioning costs,

• Reduces warranty claim processing costs.

RFID – applications• Manufacturing and Processing

– Inventory and production process monitoring

– Warehouse order fulfillment

• Supply Chain Management

– Inventory tracking systems

– Logistics management

• Security

– Access control

– Counterfeiting and Theft control/prevention

• Location Tracking

– Traffic movement control and parking management

– Wildlife/Livestock monitoring and tracking

RFID Tags

Tags

Basic Tag Operation

NN

SS

TAG

Reader

Reader

TAG

BackscatterBackscatterInductive CouplingInductive Coupling

Basic Tag Operation• Near field (LF, HF): inductive coupling of tag to magnetic field

circulating around antenna (like a transformer)

• Varying magnetic flux induces current in tag. Modulate tag load to

communicate with reader

• field energy decreases proportionally to 1/R3

• Far field (UHF, microwave): backscatter.

• Modulate back scatter by changing antenna impedance

• Field energy decreases proportionally to 1/R

• Boundry between near and far field: R = wavelength/2π

• Absorption by non-conductive materials significant problem for

microwave frequencies

Tags Types

• Passive Tags

– Do not require power – Draws from Interrogator Field

– Lower storage capacities (few bits to 1 KB)

– Shorter read ranges (10 cm to 3 m)

– Usually Write-Once-Read-Many/Read-Only tags

– Cost around 25 cents to few dollars

Tags Types

• Active Tags

– Battery powered

– Higher storage capacities (512 KB)

– Longer read range (600m)

– Typically can be re-written by RF Interrogators

– Cost around 50 to 250 dollars

Electronic Product Code

Tag Architecture

ProtocolEngine

ProtocolEngine

ReceiverReceiver

MemoryMemory

Ante

nna

Ante

nna

Write Path

D

S

G

RFID Tag memory• Read-only tags

• Tag ID is assigned at the factory during manufacturing

– Can never be changed

– No additional data can be assigned to the tag

• Write once, read many (WORM) tags– Data written once, e.g., during packing or

manufacturing

– Tag is locked once data is written

– Similar to a compact disc or DVD

• Read/Write – Tag data can be changed over time

– Part or all of the data section can be locked

802.11n

18000-4EPC C0, C1, C1G2,

18000-6

18000-3.1,

15693,14443 A, B,

and C

11784/85, 14223Existing

standards

3%6%17%74%Market share

Transportation

vehicle ID (road

toll),

Access/Security,

large item

management,

supply chain

Transportation

vehicle ID,

Access/Security,

large item

management,

supply chain

Small item

management,

supply chain,

Anti-theft, library,

transportation

Smart Card,

Ticketing, animal

tagging,

Access, Laundry

Application

Electro magneticElectro magneticMagneticMagneticCoupling

10M2-7 M1M10 cmRead Range

2.45 - 5.8 GHz866 - 915MHz13.56 MHz125 - 134KHzFreq. Range

MicrowaveUHFHFLF

RFID Readers

RFID Readers• Reader functions:

– Remotely power tags

– Establish a bidirectional data link

– Inventory tags, filter results

– Communicate with networked server(s)

– Can read 100-300 tags per second

• Readers (interrogators) can be at a fixed point such as– Entrance/exit

– Point of sale

• Readers can also be mobile/hand-held

RFID Reader

915MHz

Radio

Network

Processor

Digital Signal

Processor

(DSP)

13.56MHz

Radio

Power

Supply

RFID Reader – block diagram

Transmit path Receive Path Frequency Synthesizer Digital

RFID READER

RF ModuleDAC

Host Device

ADC

Crystal

Micro-

Controller

AGC FiltersI/Q

Demod

PLL

VCO

DAC Power Control

PA

Filter Coupler

Coupler

Power

Detect

Coupler

FPGA

Regulatio

n

Baseband

&

Protocol

RFID Reader – software stack

RFID Reader API Library

Custom

Application/

Protocol

Reader

Protocol

ApplicationNetw

ork

management

File

Systems

Network

Protocols

High-Level Interfaces

Low-Level Interfaces

O/S

Hardware

Platform API Libraries

Custom

Application/

Protocol

Custom

Application/

Protocol

Network Interface

RFID Communication

RFID Communication

Tags

Reader

Power from RF field

Reader

Antenna

Reader->Tag Commands

Tag->Reader Responses

RFID Communication

Channel

RFID Communication

RFID Communication• Host manages Reader(s) and issues Commands

• Reader and tag communicate via RF signal

• Carrier signal generated by the reader

• Carrier signal sent out through the antennas

• Carrier signal hits tag(s)

• Tag receives and modifies carrier signal– “sends back” modulated signal (Passive Backscatter)

• Antennas receive the modulated signal and send them to the Reader

• Reader decodes the data

• Results returned to the host application

Passive RFID – limiting factors

Sourc

e: [1

]

• Reader transmitter power (Gov’t. limited)

• Reader receiver sensitivity

• Reader antenna gain (Gov’t. limited)

• Tag antenna gain (Size limited)

• Power required at tag (Silicon process limited)

• Tag modulator efficiency

Passive RFID – limiting factors

Sourc

e: [1

]

• Since P ~ 1/r2 , doubling read range requires 4X

the transmitter power.

• Larger antennas can help, but at the expense

of larger physical size

• More advanced CMOS process technology

helps by reducing P

• At large distances, reader sensitivity limitations

dominate.

RFID – Collisions

Sourc

e: [1

]

• Reader-Reader Interference

• Reader-Tag Interference

RFID Middleware

RFID Middleware• In some applications RFID usage generates huge

amount of data that has to be porcesses

• Consider a supermarket chain implementing

RFID:

– 12 bytes EPC + Reader ID + Time = 18 bytes per tag

– Average number of tags in a neighborhood store =

700,000

– Data generated per second = 12.6 GB

– Data generated per day = 544 TB

– Assuming 50 stores in the chain, data generated per

day = 2720 TB

RFID Middleware

RFID Example

MFRC522- RFID Contactless Reader IC

MFRC522- RFID Contactless Reader IC• Features:

– reader/writer IC for contactless communication at 13.56

MHz

– Typical operating distance in Read/Write mode up to 50

mm depending on the antenna size and tuning

– Supports ISO/IEC 14443 A higher transfer speed

communication up to 848 kBd

– Supported host interfaces

• SPI up to 10 Mbit/s

• I2C-bus interface up to 400 kBd in Fast mode, up to 3400 kBd in

High-speed mode

• RS232 Serial UART up to 1228.8 kBd, with voltage levels dependant

on pin voltage supply

MFRC522- RFID Contactless Reader IC

WiMAX

What is WiMAX?

• WiMAX is a short for Worldwide Interoperability for Microwave Access

• WiMAX telecommunication protocols areimplmentation of IEEE 802.16 recommendations

• The name "WiMAX" was created by the WiMAX Forum, formed in June 2001 to promote conformity and interoperability of the standard

What is WiMAX?

• WiMAX is a wide area alternative to IEEE 802.11/WiFi

• WiMAX a method for breaking wire basedcommunication monopolies

• WiMAX a method for providing backhaul to IEEE 802.11/WiFi access points

• WiMAX is, in some sort, a universal solution for broadband wireless access

What is WiMAX?

Sourc

e: [1

]

What is WiMAX?

Sourc

e: [1

]

WiMAX History

• In the mid-1990’s, various groups began to promote “last-mile” fixed wireless access solutions.

• Multiple goals:– Provide the capacity and reliability of wire based

communication but with the flexibility and ease of deployment of wireless

– Provide a versatile system for corporate orinstitutional backhaul/distribution networks

– Break the monopolies of incumbent carriers

WiMAX History

• Interest soon focused in two approaches.– LMDS – Local Multipoint Distrubiution Service

• operates in 26-29 GHz spectrum under LoSconditions

• uses conventional QAM modulation with ATMderived upper layers to provide high speed service

• Distance is typically limited to about 2.4 km

• Links up to 8km in point-to-point configurations

WiMAX History

• Interest soon focused in two approaches.– MMDS – Multichannel Multipoint Distribiution

Service• Known also under the name of Broadband Radio

Service (BRS)

• an alternative method of cable television programming reception

• uses microwave frequencies at 2.1 GHz and from 2.5 GHz to 2.7 GHz, usually under LoS conditions

• may use any of various PHY, MAC, and NET layers

• provided significantly greater range than LMDS

WiMAX History

• High costs, lack of standards and fear of vendor lock-in drove off potential LMDS customers.

• In 1999, IEEE 802.16 was formed to address these issues by developing open standards for LMDS.

• In 2001, the IEEE 802.16 standard for BWA (Brodband Wireless Access) systemsoperating in the 10-66 GHz range was released

WiMAX History

• 802.16-2001 Fixed Broadband Wireless Access (10–66 GHz)

• 802.16a-2003 Physical layer and MAC definitions for 2–11 GHz

• P802.16.2a Coexistence with 2–11 GHz and 23.5–43.5 GHz

• 802.16e-2005 Mobile Broadband Wireless Access System

• 802.16-2009 Air Interface for Fixed and Mobile Broadband Wireless Access System

• 802.16m-2011 Advanced Air Interface with data rates of 100 Mbit/s mobile and 1 Gbit/s fixed.

Wi-Fi – Standards

Sourc

e: [3

]

WiMAX – applications

Sourc

e: [2

]

WiMAX Services

• Digital audio/video multicast

• Digital telephony

• ATM

• Internet protocol

• Bridged LAN

• Back-haul

• Frame relay

WiMAX – Key features

• Major goal of IEEE 802.16 (2-11 GHz): provide a “universal” solution for broadband wireless access– point-to-multipoint, LoS or NLoS

– ranges of “several” km; urban, suburban, rural

• Operating Frequency: 2 – 11 GHz

• Allocations: Licenced and Unlicenced

• Channel Bandwidth: 1.25 – 20 MHz

WiMAX – Key features

• Modulation: Single carrier, 256 OFDM, 2048 OFDMA, BPSK, QPSK, 16-QAM, 64-QAM, 256-QAM

• Antenna system support: Diversity, MIMO, SDMA

• Duplexing: FDD, H-FDD, TDD

• Data Rates: From T1 (1.5 MB/s) to over 70 Mb/s

WiMAX – Key features

• The IEEE 802.16 MAC layer supports– OFDM and OFDMA

– ARQ (Automatic Repeat Request)

– Dynamic Frequency Selection

– Mesh Networking

– Advanced Antenna Systems

– Differentiated Quality of Service

– Enhanced Security

WiMAX vs OSI model

WiMAX – MAC layer• Connection oriented

– Connection ID (CID), Service Flows

• Channel access: decided by BS– UL-MAP

• Defines uplink channel access

• Defines uplink data burst profiles

– DL-MAP• Defines downlink data burst profiles

– UL-MAP and DL-MAP are both transmitted in the beginning of each downlink subframe

WiMAX – physical layer• Allows use of directional antennas

• Allows use of two different duplexingschemes:– Frequency Division Duplexing (FDD)

– Time Division Duplexing (TDD)

• Support for both full and half duplex stations

• Adaptive Data Burst profiles– Transmission parameters (e.g. Modulation, FEC)

can be modified on a frame-by-frame basis for each SS

– Profiles are identified by ”Interval Usage Code”

WiMAX – physical layer implmentation

Sourc

e: [3

]

WiMAX – physical layer implmentation

Sourc

e: [3

]

WiMAX Frame Format

• Header - protocol control information

– Downlink header – used by the base station

– Uplink header – used by the subscriber to convey

bandwidth management needs to base station

– Bandwidth request header – used by subscriber to

request additional bandwidth

• Payload – either higher-level data or a MAC

control message

• CRC – error-detecting code

WiMAX – physical layer - Downlink• Continuous downstream mode

– For continuous transmission (audio/video)

– Simple TDM scheme is used for channel access

– Frequency division duplex (FDD)

• Burst downstream mode– For bursty transmission (IP-based traffic)

– DAMA-TDMA scheme for channel access

– FDD with adaptive modulation, frequency shift division duplexing (FSDD), time division duplexing (TDD)

WiMAX – TDD Downlink subframe

Sourc

e: [2

]

WiMAX – physical layer - Uplink• Stations transmit in in their assigned

allocation specified in an initial map

• Uplink sub-frame may also contain contention-based allocations for initial system access

• Uses a DAMA-TDMA technique

• Error correction uses Reed-Solomon codes

• Modulation scheme based on QPSK, 16-QAM or 64-QAM

WiMAX – Uplink subframe

Sourc

e: [4

]

WiMAX frequency channels

Sourc

e: [4

]

WiMAX Peak Raw Data Rates• Assumptions:

– 10MHz bandwidth

Sourc

e: [1

]

WiMAX architecture

WiMAX topology - PMP• PMP – point-to-multipoint: the central point

of the network is the Base Station (BS)

Sourc

e: [1

]

WiMAX topology - mesh• In mesh topology there is no central point of

the network. The traffic may go through BS or

directly between single stations (SS).

Sourc

e: [1

]

WiMAX topologies

• A major advantage of the Mesh mode is that the

reach of a BS can be much greater, depending on

the number of hops, until the most distant SS.

• On the other hand, using the Mesh mode brings

up the now thoroughly studied research topic of

ad hoc (no fixed infrastructure) networks routing

(more difficult).

WiMAX topologies

• When authorised to a Mesh network, a

candidate SS node receives a 16-bit Node ID

(IDentifier) upon a request to an SS identified as

the Mesh BS.

• The Node ID is the basis of node identification.

• The Node ID is transferred in the Mesh

subheader of a generic MAC frame in both

unicast and broadcast messages.

WiMAX application example

WiMAX transceiver AT86RF535B

• Single-chip 3.5GHz WiMAX Transceiver

• Low-IF/Zero-IF Transceiver Architecture; Requires No

External Filters

• Support Channel Bandwidths of 3.5, 5.0, 7.0,

8.75MHz, and 10MHz

• Modulation up to 64QAM

• Ultra-fast Fractional-N Synthesizer

• Sensitivity < -74 dBm at 64-QAM, 7MHz BW

• Low Supply Voltage: 3.0 V

WiMAX transceiver AT86RF535B

Sourc

e: [5

]

WiMAX transceiver AT86RF535B

• Functional description:

– based on the IEEE 802.16-2004 standard

– provides transmit, receive, and frequency synthesis

functions using the OFDM modulation schemes

– consists of a frequency-agile RF transceiver intended for use

in 3.5-GHz licensed bands at data rates up to 26Mbps

– addresses the requirements of base station (BS) as well as

subscriber stations (SS) equipment

– Configuration and control registers and a bi-directional data

communication over SPI interface

WiMAX transceiver AT86RF535B

Sourc

e: [5

]

Thank you for your attention

References[1] http://www.naclin.org/RFID-SECURITY-Bibhuti.ppt#259,4,Brief History

[2] “Introduction to RFID” CAENRFID an IIT Corporation

[3] www.rfidprivacy.org

[4] Lundmark T., „ WiMAX - a sneak preview”, TietoEnator

[5] „WiMAX, making ubiquitous high-speed data services a reality”, WhitePaper, Alcatel

[6] www.altera.com

[7] Sridhar Iyer, „ WiMAX: IEEE 802.16 - Wireless MANs”, http://www.it.iitb.ac.in/~sri

[8] AT86RF535B documentation, www.atmel.com

top related