跳到主要內容

臺灣博碩士論文加值系統

(3.236.23.193) 您好!臺灣時間:2021/07/26 07:36
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:張景超
研究生(外文):Ching-ChaoChang
論文名稱:符合EPCglobal Gen2協定的RFID碰撞避免演算法之實作
論文名稱(外文):Implementation of RFID Anti-Collision Algorithm for EPCglobal Gen2 Protocol
指導教授:陳文字陳文字引用關係
指導教授(外文):Wen-Tzu Chen
學位類別:碩士
校院名稱:國立成功大學
系所名稱:電信管理研究所
學門:商業及管理學門
學類:其他商業及管理學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:英文
論文頁數:56
中文關鍵詞:射頻辨識碰撞避免實作平台
外文關鍵詞:RFIDanti-collisionimplementation
相關次數:
  • 被引用被引用:0
  • 點閱點閱:171
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來,無線射頻辨識系統(RFID)已經成為重要的基礎科技。它是一種快速、安全、高效的辨識程序,深深影響了供應鏈管理、收費繳費、圖書館、電子護照、購物等諸多領域。射頻辨識系統處於一個無線傳輸的環境中,當讀取器必須同時辨識多個標籤時,會產生資料碰撞而無法辨識的情況,因此如何避免資料傳送的碰撞問題(Anti-collision),一直是學者們努力的方向。然而,碰撞避免的相關研究大部分僅限於系統模擬階段,鮮少有實作方面的研究。
本研究建立了一套RFID實驗平台系統,包括防碰撞演算法的運作、程式的編譯和燒錄、數據收集的方法等。我們選擇眾所周知的Schoute演算法與最簡略的Low Bound演算法,實作並比較其結果。實驗結果與其它研究的模擬結果大致相符。因此,我們建立的平台在實際環境中是可運行的。未來,後續的研究者可以提出更有效率的防碰撞演算法,並使用這個實驗平台來驗證其性能。

In recent years, radio frequency identification (RFID) has become an important infrastructure technology. It is a fast, secure, and efficient identification procedure that influences many various applications, such as supply chain management, toll-payment, libraries, e-passports, and shopping. RFID technology works in a wireless environment in which a reader has to identify many tags at the same time. This usually leads to collisions and unidentified data in reading process. Therefore, one always strives to solve such an anti-collision problem. However, most research effort is usually limited to the stage of system simulation. Although the simulation is actually performed in accordance with the protocol, it is still not enough to explain the reliability in the real work.
This research builds a RFID platform, including work of anti-collision algorithm, programs of compilation and burning, method of data collecting, and so on. We select a well-known algorithm (Schoute’s Method) to implement and compare with a base line algorithm (low bound method). The experiment results are quit consistent with that from other works of research. Thus, the experiment platform we built is reliable in actual work. Future research can focus on more efficient anti-collision algorithms, and use this experiment platform to verify the algorithms.

摘 要 I
誌 謝 III
CONTENT IV
FIGURE LIST VI
TABLE LIST VIII
CHAPTER 1 INTRODUCTION 1
1.1 BRIEF OF RFID SYSTEMS 1
1.1.1 Basic RFID System Components 2
1.1.2 The Communication Model of RFID System 3
1.2 MOTIVATION AND OBJECTIVES 4
CHAPTER 2 RELATED WORKS 6
2.1 RFID ANTI-COLLISION METHOD 6
2.2 LITERATURE REVIEW 9
2.2.1 Low Bound Method 10
2.2.2 Schoute’s Method 10
2.3 EPC CLASS1 GEN2 UHF RFID SPECIFICATION 12
2.3.1 The Procedures of Reader/Tag 13
2.3.2 The Operations of Inventory Commands 14
2.3.3 EPCglobal Gen2 Algorithm 15
2.4 BRIEF OF RFID SYSTEM TEST PLATFORM 20
2.4.1 Test Platform-AS3992 UHF Gen2 Reader Chip 20
2.4.2 Microcontroller-8051 Single Chip 22
2.5 BRIEF OF MONITORING INTERFACE 24
2.6 SUMMARY 25
CHAPTER 3 METHODOLOGY 26
3.1 IMPLEMENTING ALGORITHM DESCRIPTION 26
3.1.1 Low Bound Frame Size Algorithm 26
3.1.2 Schoute Algorithm 29
3.2 EXPERIMENT DESCRIPTION 31
3.3 IDENTIFICATION EFFICIENCY FACTOR 34
CHAPTER 4 EXPERIMENT RESULTS 36
4.1 PERFORMANCE COMPARISON OF ALGORITHMS 36
4.2 PERFORMANCE COMPARISON OF QINITIAL 45
CHAPTER 5 CONCLUSION 53
REFERENCES 54

[1]Jia Zhai and Gi-Nam Wang, “An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags, ICCSA 2005, LNCS 3483, pp. 702–711, 2005.
[2]Rakesh Kumar, “Interaction of RFID Technology and Public Policy.
[3]ISO/IEC 18000-1.Information technology AIDC techniques–RFID for item management–air interface, part1–generic parameters for air interface communication for globally accepted frequencies. http://www.iso.org.
[4]Ari Juels. “yoking-proofs for RFID tags. In Ravi Sandhu and Roshan Thomas, editors, Workshop on Pervasive Computing and Communications Security–PerSec 2004, pages 138–143, Orlando, Florida, USA, March 2004.IEEE.
[5]Ranasinghe, D.C., Engels, D.W. and Cole, P.H. “Security and privacy solutions for low-cost RFID systems, Intelligent Sensors, Senso Networks and Information Processing Conference, 2004. Proceedings of the 2004,14-17 Dec. 2004 Page(s):337 – 342
[6]Don R. Hush and Cliff Wood, “Analysis of Tree Algorithm for RFID Arbitration, In IEEE International Symposium on Information Theory, 1998.
[7]C. Law, K. Lee, and K.-Y. Siu, “Efficient memoryless protocol for tag identification. In Proceedings of the 4th International Workshop on Discrete Algorithm and Methods for Mobile Computing and Communications, p. 75-84, Boston, MA, August 2000.
[8]Vogt, H. “Efficient Object Identification with Passive RFID Tags. In international Conference on Pervasive Computing, LNCS, Springer-Verlag 2002.
[9]Vogt, H. “Multiple Object Identification with Passive RFID Tags. Systems, Man and Cybernetics, 2002 IEEE International Conference on Volume 3, p.6-9 Oct. 2002.
[10]Jia Zhai, Gi-Nam Wang, “An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags. Computational Science and Its Applications – ICCSA 2005: International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV, Volume 3483, p.702-711, Apr. 2005.
[11]Wen-Tzu Chen and Wen-Bin Kao, “A Scheme for Improving the Efficiency of RFID Anti-Collision in EPCglobal Generation 2 Protocol, master thesis, NCKU, June 2008.
[12]K. Finkenzeller, RFID Handbook Radio Frequency Identification Fundamentals and Applications. John Wiley & Sons, 2000.
[13]V. Anatharam, “The stability region of the finite-user slotted aloha protocol, IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 535-540, May 1991.
[14]J. E. Wieselthier, A. Ephremides, and L. A. Michaels, “An exact analysis and performance evaluation of framed aloha with capture, IEEE Trans. Commun., vol. 37, no. 2, pp. 125-137, Feb. 1989.
[15]H. Vogt, “Efficient object identification with passive RFID tags, Apr. 2002, pp. 98-113.
[16]F. C. Schoute, “Dynamic frame length aloha, IEEE Trans. Commun., vol. 31, no. 4, pp. 565-568, Apr. 1983.

[17]Zhonghua Li, Chunhui He and Hong-Zhou Tan, “An Enhanced Tag Estimation Method Applied to Tag Anti-collision Algorithm in RFID Systems, International Conference on Information Science and Technology March 26-28, 2011.
[18]Wen-Tzu Chen and Guan-Hung Lin, “An Efficient Anti-Collision Method for Tag Identification in a RFID System, IEICE Transactions on Communications, volume E89-B, number 12, pp. 3386-3392, December 2006.
[19]EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz – 960 MHz Version 1.1.0
[20]Data Sheet-AS3992 UHF RFID Single Chip Reader
[21]MCS® 51 Microcontroller Family User's Manual, February 1994, Publication number 121517, Intel Corporation
[22]XILINX, “Spartan-II 8-bit Microcontroller Solutions -Customer Tutorial, March 2000
[23]Datasheet -MAX3232CPE - 3.0V to 5.5V, Low-Power, up to 1Mbps, True RS-232 Transceivers Using Four 0.1uF External Capacitors - Maxim Integrated Products
[24]Jun-Bong Eom, Tae-Jin Lee, “Accurate Tag Estimation for Dynamic Framed-Slotted ALOHA in RFID Systems, IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 1, JANUARY 2010, pp. 60-62.
[25]Bo Li, Junyu Wang, “Efficient Anti-Collision Algorithm Utilizing the Capture Effect for ISO 18000-6C RFID Protocol, IEEE COMMUNICATIONS LETTERS, VOL. 15, NO. 3, MARCH 2011, pp. 352-354.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊