Date post: | 13-Jan-2017 |
Category: |
Documents |
Upload: | paula-hanna |
View: | 31 times |
Download: | 3 times |
Simulation of RFID System using OMNeT++
Presented by: Paula HannaID#: 25-2029
Supervised by: Dr. Mohamed Ashour
Too much time wasted in queues
Scanning time is too slow
2
Wasted Time
Effort and time wasted in inventories
Wasted Effort
3
Outline1. Introduction to RFID2. System Components3. Mechanism of the System 4. Aim of the Project5. Project Tools6. Implementation Steps7. Demo Simulation8. Conclusion & Future Work
4
Introduction to RFID• Radio Frequency Identification (RFID) is an automatic identification
technology.
• Advantages: identification of several objects at same time, non line of sight, long distances, tags carrying more data.
• More practical than traditional bar-codes.
• Frequency range is from 860 to 960 MHz .5
System Components1. Tag (microchip and antenna) 2. Reader (antenna)
6
Mechanism of the System • Reader is the main source of power.
• Reader emits a field of EMW.
• EMW power the chip of Tag.
• Tag replies with its identification number.
Tag
Tag
Tag
Tag
Tag
Reader
Tag
Tag
Tag7
Managing Tag PopulationReader manages Tag population through:
Choosing one or more Tags.
Identifying individual Tags. Communication with an identified Tag.
Select
Inventory
Access
8
Aim of the Project
• Enhance an existing RFID model. -Network of Reader and Tags -Reader and Tag as one entity -No layering • Cross-layer RFID model.
9
Project Tools1. OMNeT++
• Component based C++ simulation library
• Eclipse-based IDE
• GUI support
2. MiXiM
• OMNeT++ modeling framework
• Having ready models
10
Implementation Steps
RFID model topology
RFID Network
Reader TagsConnection Manager
App NICNetworkNIC AppNetwork
MAC PHY PHY MACAnalogue Model
Decider
11
NED Files• Network Description• Code converted to GUI • Network Module Simple • Parameters • Gates• Connections
12
RFID Network• One Reader Node
• Number of Tag Nodes
• Connection Manager: Managing connection between nodes of same channel.
13
Reader and Tag Nodes• Application Layer Module• Network Layer Module• NIC Module
14
NIC ModuleNIC Module
MAC• RFReaderMac: Sending logical commands by reader.
• RFTagMac: Receiving logical commands by tags and sending replies.
PHY• Analogue Model: simulates
effects affecting the signal
• Decider: evaluates received signals
15
Packets Flow• handleLowerControl: decides which
type of packet to be sent down to PHY.
• handleUpperMsg: deals with packets coming from MAC to PHY
• handleAirFrame: deals with packets coming from the channel to the PHY
• handleLowerMSG: deals with messages coming from PHY to MAC
Sender Receiver
MAChandleLowerControl
PHYhandleUpperMsg
Channel
PHYhandleAirFrame
MAChandleLowerMSG
16
Select • Reader Sends Select packet having all its
parameters.
• Tag state Ready
Reader
Tag
Tag
Tag
Tag
Select
Select
Select
17
QueryReader Sends Query packet• Tags set slot counter Reply• Tag state or Arbitrate
Reader
Tag
Tag
Tag
Tag
Query
Query
Query
18
RN16• Tag with slot counter 0 replies with
RN16 packet• Tag state Reply• Other Tags state Arbitrate
Reader
Tag
Tag
Tag
Tag
RN16
19
ACK• Reader sends ACK packet to that
Tag.• Only tag with slot counter = 0
receives the packet
Acknowledged• Tag state or Arbitrate
Reader
Tag
Tag
Tag
Tag
ACK
20
EPCTag checks its RN16 with that coming in the ACK packet, and if same the tag replies with its EPC in the EPC packet Reader
Tag
Tag
Tag
Tag
EPC
21
QueryRep• Reader sends QueryRep packet specifying the
session. • Tags compares their current session with the
session of the coming packet, if equal tags decrement slot counter by 1.
Ready; chosen before• Tag state Arbitrate; slot ≠ 0 Reply; slot = 0
Reader
Tag
Tag
Tag
Tag
QueryRep
QueryRep
QueryRep
22
Collision• Two or more Tag with same
slot counter
• Discard
• Tags wait for Query packets
RN16
RN16
Reader
Tag
Tag
Tag
Tag
23
Demo Simulation for RFID System
24
Conclusion & Future Work
• RFID Cross-layer Model• Successful communication
between Reader and Tag• All Select and Inventory
Commands • Improve handling collisions• Access commands
Conclusion
Future Work
25
Thank You
Questions are Welcomed
References[1] R. Want, “An Introduction to RFID Technology,” IEEE CS and IEEE ComSoc, vol. 5, no. 1, Santa Clara, 2006, pp. 25-33. [2] EPC global Gen 2 Specification, 2015 [Online]. Available: http://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf[3] CSols.com (Laboratory Systems Integration). [Online]. Available: http://www.csols.com/wordpress/tag/rfid /[4] MiXiM simulator for wireless and mobile networks using OMNeT++. [Online]. Available: http://mixim.sourceforge.net[5] Brooks.com (RFID Reader). [Online]. Available: http://www.brooks.com/applications-by-industry/rfid/rfid-basics/rfid-components/rfid-reader[6] K. Wessel, et al., "MiXiM: the physical layer an architecture overview," 2nd International Workshop on OMNeT++, Rome, Italy, 2009. 28