+ All Categories
Home > Documents > Last Defence

Last Defence

Date post: 13-Jan-2017
Category:
Upload: paula-hanna
View: 31 times
Download: 3 times
Share this document with a friend
28
Simulation of RFID System using OMNeT++ Presented by: Paula Hanna ID#: 25-2029 Supervised by: Dr. Mohamed Ashour
Transcript
Page 1: Last Defence

Simulation of RFID System using OMNeT++

Presented by: Paula HannaID#: 25-2029

Supervised by: Dr. Mohamed Ashour

Page 2: Last Defence

Too much time wasted in queues

Scanning time is too slow

2

Wasted Time

Page 3: Last Defence

Effort and time wasted in inventories

Wasted Effort

3

Page 4: Last Defence

Outline1. Introduction to RFID2. System Components3. Mechanism of the System 4. Aim of the Project5. Project Tools6. Implementation Steps7. Demo Simulation8. Conclusion & Future Work

4

Page 5: Last Defence

Introduction to RFID• Radio Frequency Identification (RFID) is an automatic identification

technology.

• Advantages: identification of several objects at same time, non line of sight, long distances, tags carrying more data.

• More practical than traditional bar-codes.

• Frequency range is from 860 to 960 MHz .5

Page 6: Last Defence

System Components1. Tag (microchip and antenna) 2. Reader (antenna)

6

Page 7: Last Defence

Mechanism of the System • Reader is the main source of power.

• Reader emits a field of EMW.

• EMW power the chip of Tag.

• Tag replies with its identification number.

Tag

Tag

Tag

Tag

Tag

Reader

Tag

Tag

Tag7

Page 8: Last Defence

Managing Tag PopulationReader manages Tag population through:

Choosing one or more Tags.

Identifying individual Tags. Communication with an identified Tag.

Select

Inventory

Access

8

Page 9: Last Defence

Aim of the Project

• Enhance an existing RFID model. -Network of Reader and Tags -Reader and Tag as one entity -No layering • Cross-layer RFID model.

9

Page 10: Last Defence

Project Tools1. OMNeT++

• Component based C++ simulation library

• Eclipse-based IDE

• GUI support

2. MiXiM

• OMNeT++ modeling framework

• Having ready models

10

Page 11: Last Defence

Implementation Steps

RFID model topology

RFID Network

Reader TagsConnection Manager

App NICNetworkNIC AppNetwork

MAC PHY PHY MACAnalogue Model

Decider

11

Page 12: Last Defence

NED Files• Network Description• Code converted to GUI • Network Module Simple • Parameters • Gates• Connections

12

Page 13: Last Defence

RFID Network• One Reader Node

• Number of Tag Nodes

• Connection Manager: Managing connection between nodes of same channel.

13

Page 14: Last Defence

Reader and Tag Nodes• Application Layer Module• Network Layer Module• NIC Module

14

Page 15: Last Defence

NIC ModuleNIC Module

MAC• RFReaderMac: Sending logical commands by reader.

• RFTagMac: Receiving logical commands by tags and sending replies.

PHY• Analogue Model: simulates

effects affecting the signal

• Decider: evaluates received signals

15

Page 16: Last Defence

Packets Flow• handleLowerControl: decides which

type of packet to be sent down to PHY.

• handleUpperMsg: deals with packets coming from MAC to PHY

• handleAirFrame: deals with packets coming from the channel to the PHY

• handleLowerMSG: deals with messages coming from PHY to MAC

Sender Receiver

MAChandleLowerControl

PHYhandleUpperMsg

Channel

PHYhandleAirFrame

MAChandleLowerMSG

16

Page 17: Last Defence

Select • Reader Sends Select packet having all its

parameters.

• Tag state Ready

Reader

Tag

Tag

Tag

Tag

Select

Select

Select

17

Page 18: Last Defence

QueryReader Sends Query packet• Tags set slot counter Reply• Tag state or Arbitrate

Reader

Tag

Tag

Tag

Tag

Query

Query

Query

18

Page 19: Last Defence

RN16• Tag with slot counter 0 replies with

RN16 packet• Tag state Reply• Other Tags state Arbitrate

Reader

Tag

Tag

Tag

Tag

RN16

19

Page 20: Last Defence

ACK• Reader sends ACK packet to that

Tag.• Only tag with slot counter = 0

receives the packet

Acknowledged• Tag state or Arbitrate

Reader

Tag

Tag

Tag

Tag

ACK

20

Page 21: Last Defence

EPCTag checks its RN16 with that coming in the ACK packet, and if same the tag replies with its EPC in the EPC packet Reader

Tag

Tag

Tag

Tag

EPC

21

Page 22: Last Defence

QueryRep• Reader sends QueryRep packet specifying the

session. • Tags compares their current session with the

session of the coming packet, if equal tags decrement slot counter by 1.

Ready; chosen before• Tag state Arbitrate; slot ≠ 0 Reply; slot = 0

Reader

Tag

Tag

Tag

Tag

QueryRep

QueryRep

QueryRep

22

Page 23: Last Defence

Collision• Two or more Tag with same

slot counter

• Discard

• Tags wait for Query packets

RN16

RN16

Reader

Tag

Tag

Tag

Tag

23

Page 24: Last Defence

Demo Simulation for RFID System

24

Page 25: Last Defence

Conclusion & Future Work

• RFID Cross-layer Model• Successful communication

between Reader and Tag• All Select and Inventory

Commands • Improve handling collisions• Access commands

Conclusion

Future Work

25

Page 26: Last Defence

Thank You

Page 27: Last Defence

Questions are Welcomed

Page 28: Last Defence

References[1] R. Want, “An Introduction to RFID Technology,” IEEE CS and IEEE ComSoc, vol. 5, no. 1, Santa Clara, 2006, pp. 25-33. [2] EPC global Gen 2 Specification, 2015 [Online]. Available: http://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf[3] CSols.com (Laboratory Systems Integration). [Online]. Available: http://www.csols.com/wordpress/tag/rfid /[4] MiXiM simulator for wireless and mobile networks using OMNeT++. [Online]. Available: http://mixim.sourceforge.net[5] Brooks.com (RFID Reader). [Online]. Available: http://www.brooks.com/applications-by-industry/rfid/rfid-basics/rfid-components/rfid-reader[6] K. Wessel, et al., "MiXiM: the physical layer an architecture overview," 2nd International Workshop on OMNeT++, Rome, Italy, 2009. 28


Recommended